Modified security and cryptography-based data deduplication in cloud environment

被引:0
|
作者
Kumar, Doddi Suresh [1 ]
Srinivasu, Nulaka [1 ]
机构
[1] Koneru Lakshmaiah Educ Fdn, Comp Sci & Engn, Guntur 522301, Andhra Prades, India
关键词
Data deduplication; cloud; encryption; decryption; redundancy; PRESERVING DEDUPLICATION; MANAGEMENT; INTERNET; STORAGE; SCHEME;
D O I
10.1142/S1793962326410047
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Data redundancy consumes huge storage space while setting up or employing cloud and fog storage. The dynamic cloud nature primarily focuses on the static environments which must be revised. Data deduplication solutions help minimize and control this issue by eradicating duplicate data from cloud storage systems. Since it might improve storage economy and security, data deduplication (DD) over encrypted data is a crucial problem in computing and storage systems. In this research, a novel approach to building secure deduplication systems across cloud and fog environments is developed. It uses MCDD and convergent cryptographic algorithms. The two most significant objectives of such systems are the focus of the suggested approach. Data redundancy must be minimized, but it also needs to be secured using a robust encryption method, which needs to be devised. The suggested approach is ideally suited for tasks like a user uploading new data to cloud storage or the fog. The proposed method might eliminate data redundancy by detecting redundancy at the block level. The testing results indicate that the recommended methodology can surpass a few cutting-edge techniques regarding computing effectiveness and security levels. The file is encrypted twice, once with the modified cryptographic model for deduplication (MCDD) and once with convergence encryption (CE).
引用
收藏
页数:18
相关论文
共 50 条
  • [31] Research on Global BloomFilter-Based Data Routing Strategy of Deduplication in Cloud Environment
    He, Qinlu
    Li, Zhen
    Chen, Chen
    Feng, Hao
    IETE JOURNAL OF RESEARCH, 2024, 70 (03) : 2705 - 2715
  • [32] Quantum cryptography based cloud security model (QC-CSM) for ensuring cloud data security in storage and accessing
    K. Sundar
    S. Sasikumar
    C. Jayakumar
    D. Nagarajan
    S. karthick
    Multimedia Tools and Applications, 2023, 82 : 42817 - 42832
  • [33] Application-Aware Big Data Deduplication in Cloud Environment
    Fu, Yinjin
    Xiao, Nong
    Jiang, Hong
    Hu, Guyu
    Chen, Weiwei
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2019, 7 (04) : 921 - 934
  • [34] A Big Data Deduplication Using HECC Based Encryption With Modified Hash Value in Cloud
    Shrivastava, Ankit
    Tiwary, Abhigyan
    PROCEEDINGS OF THE 2018 SECOND INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND CONTROL SYSTEMS (ICICCS), 2018, : 484 - 489
  • [35] THE IMPLEMENTATION OF A CRYPTOGRAPHY-BASED SECURE OFFICE SYSTEM
    MUELLERSCHLOER, C
    WAGNER, NR
    AFIPS CONFERENCE PROCEEDINGS, 1982, 51 : 487 - +
  • [36] Toward A Real-Time Elliptic Curve Cryptography-Based Facial Security System
    Tuy Tan Nguyen
    Lee, Hanho
    2022 IEEE ASIA PACIFIC CONFERENCE ON CIRCUITS AND SYSTEMS, APCCAS, 2022, : 364 - 367
  • [37] Cryptography-based secure data storage and sharing using HEVC and public clouds
    Usman, Muhammad
    Jan, Mian Ahmad
    He, Xiangjian
    INFORMATION SCIENCES, 2017, 387 : 90 - 102
  • [38] Light weight cryptography-based data hiding system for Internet of Medical Things
    Pesaru, Swetha
    Mallenahalli, Naresh K.
    Vardhan, B. Vishnu
    INTERNATIONAL JOURNAL OF HEALTHCARE MANAGEMENT, 2022,
  • [39] Quantum Key Distribution and Cryptography Mechanisms for Cloud Data Security
    Thangapandiyan, M.
    Anand, P. M. Rubesh
    Sankaran, K. Sakthidasan
    PROCEEDINGS OF THE 2018 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATION AND SIGNAL PROCESSING (ICCSP), 2018, : 1031 - 1035
  • [40] A Study on Quantum Cryptography Based Security Management in Cloud
    Raina, Priya
    Kaushal, Sakshi
    6TH INTERNATIONAL CONFERENCE ON COMPUTER & COMMUNICATION TECHNOLOGY (ICCCT-2015), 2015, : 350 - 354