Hybrid cloud storage system with enhanced multilayer cryptosystem for secure deduplication in cloud

被引:0
|
作者
Mageshkumar N. [1 ]
Swapna J. [2 ]
Pandiaraj A. [3 ]
Rajakumar R. [7 ]
Krichen M. [4 ,5 ]
Ravi V. [6 ]
机构
[1] Department of Computer Science and Technology, Madanapalle Institute of Technology and Science, Madanapalle
[2] Department of Computer Science & Engineering, Veltech Rangarajan Dr.Sagunthala R&D Institute of Science and Technology, Chennai
[3] Department of Computing Technology, SRM Institute of Science and Technology, Kattankulathur, chennai
[4] Department of Information Technology, Faculty of Computer Science and Information Technology (FCSIT), Al-Baha University, Alaqiq
[5] ReDCAD Laboratory, University of Sfax, Sfax
[6] Center for Artificial Intelligence, Prince Mohammad Bin Fahd University, Khobar
[7] Centre for Automation, School of Computer Science and Engineering, Vellore Institute of Technology Chennai Campus, Chennai
关键词
Cloud computing; Cyber security; Deduplication; Diffie-Hellman assumption; Symmetrical encryption;
D O I
10.1016/j.ijin.2023.11.001
中图分类号
学科分类号
摘要
Data deduplication is a crucial technique in the field of data compression that aims to eliminate redundant copies of recurring data. This technique has gained significant popularity in the realm of cloud storage due to its ability to effectively reduce storage requirements and optimize bandwidth utilization. To ensure the safeguarding of sensitive data while simultaneously facilitating deduplication, researchers have put forth the concept of convergent encryption as a potential solution. This technique involves encrypting the data prior to its outsourcing, thereby enhancing the confidentiality of the information. In this work, an earnest endeavor is undertaken to formally tackle the issue of authorized data deduplication, with the aim of enhancing data security. Our approach combines the Diffie-Hellman algorithm and symmetrical external decision to protect and popularize information, ensuring end-to-end encryption to encourage user adoption of cloud storage. The proposed model employs block-level deduplication and guarantees the randomness of ciphertexts by generating encryption keys using the Diffie-Hellman algorithm. This method effectively counters both internal and external brute-force attacks, enhancing data security while reducing computational costs. An extensive experimentation is carried out to demonstrate that our approach is particularly beneficial in scenarios with multiple privilege sets. Overall, the proposed model offers an elaborate framework that maintains data privacy and strengthens security measures, contributing to a more efficient and secure cloud-based document search. © 2023 The Author(s)
引用
收藏
页码:301 / 309
页数:8
相关论文
共 50 条
  • [21] Secure deduplication with efficient user revocation in cloud storage
    Wang, Yunling
    Miao, Meixia
    Wang, Jianfeng
    Zhang, Xuefeng
    COMPUTER STANDARDS & INTERFACES, 2021, 78 (78)
  • [22] Verifiable Secure Data Deduplication Method in Cloud Storage
    Xian H.-Q.
    Liu H.-Y.
    Zhang S.-G.
    Hou R.-T.
    Xian, He-Qun (xianhq@126.com), 1600, Chinese Academy of Sciences (31): : 455 - 470
  • [23] A SURVEY ON MANAGING CLOUD STORAGE USING SECURE DEDUPLICATION
    Keerthana, K.
    Gnanadhas, C. Suresh
    Kumar, R. T. Dinesh
    IIOAB JOURNAL, 2016, 7 (09) : 656 - 666
  • [24] A Universal Deduplication Architecture for Secure and Efficient Cloud Storage
    Saric, Kevin
    Ramachandran, Gowri Sankar
    Pal, Shantanu
    Jurdak, Raja
    Nepal, Surya
    2022 IEEE 4TH INTERNATIONAL CONFERENCE ON TRUST, PRIVACY AND SECURITY IN INTELLIGENT SYSTEMS, AND APPLICATIONS, TPS-ISA, 2022, : 10 - 19
  • [25] Secure Public Cloud Storage Auditing with Deduplication: More Efficient and Secure
    Liu, Jiasen
    Wang, Xu An
    Zhao, Kaiyang
    Wang, Han
    ADVANCES IN INTERNET, DATA AND WEB TECHNOLOGIES (EIDWT 2020), 2020, 47 : 290 - 300
  • [26] A secure cloud storage system supporting privacy-preserving fuzzy deduplication
    Xuan Li
    Jin Li
    Faliang Huang
    Soft Computing, 2016, 20 : 1437 - 1448
  • [27] A secure cloud storage system supporting privacy-preserving fuzzy deduplication
    Li, Xuan
    Li, Jin
    Huang, Faliang
    SOFT COMPUTING, 2016, 20 (04) : 1437 - 1448
  • [28] Enhanced attribute based access control with secure deduplication for big data storage in cloud
    Premkamal, Praveen Kumar
    Pasupuleti, Syam Kumar
    Singh, Abhishek Kumar
    Alphonse, P. J. A.
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2021, 14 (01) : 102 - 120
  • [29] Enhanced attribute based access control with secure deduplication for big data storage in cloud
    Praveen Kumar Premkamal
    Syam Kumar Pasupuleti
    Abhishek Kumar Singh
    P. J. A. Alphonse
    Peer-to-Peer Networking and Applications, 2021, 14 : 102 - 120
  • [30] Design of Hybrid Cryptosystem for Cloud System
    Purevjav, Saranzaya
    Kim, Ki Hwan
    Sain, Mangal
    Lee, HoonJae
    2015 IEEE Conference on Wireless Sensors (ICWiSe), 2015, : 67 - 70