Hybrid cloud storage system with enhanced multilayer cryptosystem for secure deduplication in cloud

被引:0
|
作者
Mageshkumar N. [1 ]
Swapna J. [2 ]
Pandiaraj A. [3 ]
Rajakumar R. [7 ]
Krichen M. [4 ,5 ]
Ravi V. [6 ]
机构
[1] Department of Computer Science and Technology, Madanapalle Institute of Technology and Science, Madanapalle
[2] Department of Computer Science & Engineering, Veltech Rangarajan Dr.Sagunthala R&D Institute of Science and Technology, Chennai
[3] Department of Computing Technology, SRM Institute of Science and Technology, Kattankulathur, chennai
[4] Department of Information Technology, Faculty of Computer Science and Information Technology (FCSIT), Al-Baha University, Alaqiq
[5] ReDCAD Laboratory, University of Sfax, Sfax
[6] Center for Artificial Intelligence, Prince Mohammad Bin Fahd University, Khobar
[7] Centre for Automation, School of Computer Science and Engineering, Vellore Institute of Technology Chennai Campus, Chennai
关键词
Cloud computing; Cyber security; Deduplication; Diffie-Hellman assumption; Symmetrical encryption;
D O I
10.1016/j.ijin.2023.11.001
中图分类号
学科分类号
摘要
Data deduplication is a crucial technique in the field of data compression that aims to eliminate redundant copies of recurring data. This technique has gained significant popularity in the realm of cloud storage due to its ability to effectively reduce storage requirements and optimize bandwidth utilization. To ensure the safeguarding of sensitive data while simultaneously facilitating deduplication, researchers have put forth the concept of convergent encryption as a potential solution. This technique involves encrypting the data prior to its outsourcing, thereby enhancing the confidentiality of the information. In this work, an earnest endeavor is undertaken to formally tackle the issue of authorized data deduplication, with the aim of enhancing data security. Our approach combines the Diffie-Hellman algorithm and symmetrical external decision to protect and popularize information, ensuring end-to-end encryption to encourage user adoption of cloud storage. The proposed model employs block-level deduplication and guarantees the randomness of ciphertexts by generating encryption keys using the Diffie-Hellman algorithm. This method effectively counters both internal and external brute-force attacks, enhancing data security while reducing computational costs. An extensive experimentation is carried out to demonstrate that our approach is particularly beneficial in scenarios with multiple privilege sets. Overall, the proposed model offers an elaborate framework that maintains data privacy and strengthens security measures, contributing to a more efficient and secure cloud-based document search. © 2023 The Author(s)
引用
收藏
页码:301 / 309
页数:8
相关论文
共 50 条
  • [41] Secure deduplication for multimedia data with user revocation in cloud storage
    Hyunsoo Kwon
    Changhee Hahn
    Daeyoung Kim
    Junbeom Hur
    Multimedia Tools and Applications, 2017, 76 : 5889 - 5903
  • [42] Enabling Ciphertext Deduplication for Secure Cloud Storage and Access Control
    Tang, Heyi
    Cui, Yong
    Guan, Chaowen
    Wu, Jianping
    Weng, Jian
    Ren, Kui
    ASIA CCS'16: PROCEEDINGS OF THE 11TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 59 - 70
  • [43] A Secure Client Side Deduplication Scheme in Cloud Storage Environments
    Kaaniche, Nesrine
    Laurent, Maryline
    2014 6TH INTERNATIONAL CONFERENCE ON NEW TECHNOLOGIES, MOBILITY AND SECURITY (NTMS), 2014,
  • [44] Secure deduplication for multimedia data with user revocation in cloud storage
    Kwon, Hyunsoo
    Hahn, Changhee
    Kim, Daeyoung
    Hur, Junbeom
    MULTIMEDIA TOOLS AND APPLICATIONS, 2017, 76 (04) : 5889 - 5903
  • [45] File Deduplication with Cloud Storage File System
    Ku, Chan-I
    Luo, Guo-Heng
    Chang, Che-Pin
    Yuan, Shyan-Ming
    2013 IEEE 16TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE 2013), 2013, : 280 - 287
  • [46] A Secure Cloud Backup System with Deduplication and Assured Deletion
    Lai, Junzuo
    Xiong, Jie
    Wang, Chuansheng
    Wu, Guangzheng
    Li, Yanling
    PROVABLE SECURITY, PROVSEC 2017, 2017, 10592 : 74 - 83
  • [47] To Develop Secure Deduplication of Data Using Hybrid Cloud Methodology
    Motegaonkar, Sonali B.
    Kulkarni, Chaitanya S.
    2016 INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS, AND OPTIMIZATION TECHNIQUES (ICEEOT), 2016, : 1759 - 1762
  • [48] Secure Enterprise Data Deduplication in the Cloud
    Rashid, Fatema
    Miri, Ali
    Woungang, Isaac
    2013 IEEE SIXTH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (CLOUD 2013), 2013, : 367 - 374
  • [49] Secure Data Deduplication With Dynamic Access Control for Mobile Cloud Storage
    Qi, Saiyu
    Wei, Wei
    Wang, Jianfeng
    Sun, Shifeng
    Rutkowski, Leszek
    Huang, Tingwen
    Kacprzyk, Janusz
    Qi, Yong
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2024, 23 (04) : 2566 - 2582
  • [50] RCDSD: RSA based Cross Domain Secure Deduplication on Cloud Storage
    Mishra, Shivansh
    Singh, Surjit
    Ali, Syed Taqi
    2018 9TH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING TECHNOLOGIES (ICCCNT), 2018,