Modified security and cryptography-based data deduplication in cloud environment

被引:0
|
作者
Kumar, Doddi Suresh [1 ]
Srinivasu, Nulaka [1 ]
机构
[1] Koneru Lakshmaiah Educ Fdn, Comp Sci & Engn, Guntur 522301, Andhra Prades, India
关键词
Data deduplication; cloud; encryption; decryption; redundancy; PRESERVING DEDUPLICATION; MANAGEMENT; INTERNET; STORAGE; SCHEME;
D O I
10.1142/S1793962326410047
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Data redundancy consumes huge storage space while setting up or employing cloud and fog storage. The dynamic cloud nature primarily focuses on the static environments which must be revised. Data deduplication solutions help minimize and control this issue by eradicating duplicate data from cloud storage systems. Since it might improve storage economy and security, data deduplication (DD) over encrypted data is a crucial problem in computing and storage systems. In this research, a novel approach to building secure deduplication systems across cloud and fog environments is developed. It uses MCDD and convergent cryptographic algorithms. The two most significant objectives of such systems are the focus of the suggested approach. Data redundancy must be minimized, but it also needs to be secured using a robust encryption method, which needs to be devised. The suggested approach is ideally suited for tasks like a user uploading new data to cloud storage or the fog. The proposed method might eliminate data redundancy by detecting redundancy at the block level. The testing results indicate that the recommended methodology can surpass a few cutting-edge techniques regarding computing effectiveness and security levels. The file is encrypted twice, once with the modified cryptographic model for deduplication (MCDD) and once with convergence encryption (CE).
引用
收藏
页数:18
相关论文
共 50 条
  • [1] STUDY OF CRYPTOGRAPHY-BASED CYBERSPACE DATA SECURITY
    Yang, Tonghao
    Yu, Bin
    2014 INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING TECHNOLOGIES (ICCCNT, 2014,
  • [2] Hybrid Data Deduplication in Cloud Environment
    Fan, Chun-I
    Huang, Shi-Yuan
    Hsu, Wen-Che
    THIRD INTERNATIONAL CONFERENCE ON INFORMATION SECURITY AND INTELLIGENT CONTROL (ISIC 2012), 2012, : 174 - 177
  • [3] Threshold Cryptography Based Data Security in Cloud Computing
    Saroj, Sushil Kr
    Chauhan, Sanjeev Kr
    Sharma, Aravendra Kr
    Vats, Sundaram
    2015 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMMUNICATION TECHNOLOGY CICT 2015, 2015, : 202 - 207
  • [4] RESEARCH ON CRYPTOGRAPHY-BASED DATA SECURITY AND TRUSTWORTHINESS IN DIGITAL CONSTRUCTION OF WATER RESOURCES AND HYDROPOWER
    Yue, Chao
    Liu, Wei
    Chen, Licheng
    Zuo, Chong
    SCALABLE COMPUTING-PRACTICE AND EXPERIENCE, 2024, 25 (05): : 4014 - 4022
  • [5] Deduplication Based Storage and Retrieval of Data from Cloud Environment
    Pritha, N. Lakshmi
    Velmurugan, N.
    Winster, S. Godfrey
    Vijayaraj, A.
    INTERNATIONAL CONFERENCE ON INNOVATION INFORMATION IN COMPUTING TECHNOLOGIES, 2015, 2015,
  • [6] Secured Data Storage Using Deduplication in Cloud Computing Based on Elliptic Curve Cryptography
    Ahamed, N. Niyaz
    Duraipandian, N.
    COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2022, 41 (01): : 83 - 94
  • [7] Cryptography and Data Security in Cloud Computing
    Yan, Zheng
    Deng, Robert H.
    Varadharajan, Vijay
    INFORMATION SCIENCES, 2017, 387 : 53 - 55
  • [8] Blockchain based secure medical data outsourcing with data deduplication in cloud environment
    Benil, T.
    Jasper, J.
    COMPUTER COMMUNICATIONS, 2023, 209 : 1 - 13
  • [9] A New Approach for Maintaining Data Security using Cryptography in a Hybrid Cloud Environment
    Jebaseli, Nisha
    Banu, A. Fairose
    JOURNAL OF ALGEBRAIC STATISTICS, 2022, 13 (02) : 214 - 224
  • [10] Enhanced Performance and Data Security using Elliptic Curve Cryptography in Cloud Environment
    Acharya, Shreenath
    Manoj, K.
    Gayana, M. N.
    2021 INTERNATIONAL CONFERENCE ON COMPUTATIONAL PERFORMANCE EVALUATION (COMPE-2021), 2021, : 869 - 873