Hybrid cloud storage system with enhanced multilayer cryptosystem for secure deduplication in cloud

被引:0
|
作者
Mageshkumar N. [1 ]
Swapna J. [2 ]
Pandiaraj A. [3 ]
Rajakumar R. [7 ]
Krichen M. [4 ,5 ]
Ravi V. [6 ]
机构
[1] Department of Computer Science and Technology, Madanapalle Institute of Technology and Science, Madanapalle
[2] Department of Computer Science & Engineering, Veltech Rangarajan Dr.Sagunthala R&D Institute of Science and Technology, Chennai
[3] Department of Computing Technology, SRM Institute of Science and Technology, Kattankulathur, chennai
[4] Department of Information Technology, Faculty of Computer Science and Information Technology (FCSIT), Al-Baha University, Alaqiq
[5] ReDCAD Laboratory, University of Sfax, Sfax
[6] Center for Artificial Intelligence, Prince Mohammad Bin Fahd University, Khobar
[7] Centre for Automation, School of Computer Science and Engineering, Vellore Institute of Technology Chennai Campus, Chennai
来源
International Journal of Intelligent Networks | 2023年 / 4卷
关键词
Cloud computing; Cyber security; Deduplication; Diffie-Hellman assumption; Symmetrical encryption;
D O I
10.1016/j.ijin.2023.11.001
中图分类号
学科分类号
摘要
Data deduplication is a crucial technique in the field of data compression that aims to eliminate redundant copies of recurring data. This technique has gained significant popularity in the realm of cloud storage due to its ability to effectively reduce storage requirements and optimize bandwidth utilization. To ensure the safeguarding of sensitive data while simultaneously facilitating deduplication, researchers have put forth the concept of convergent encryption as a potential solution. This technique involves encrypting the data prior to its outsourcing, thereby enhancing the confidentiality of the information. In this work, an earnest endeavor is undertaken to formally tackle the issue of authorized data deduplication, with the aim of enhancing data security. Our approach combines the Diffie-Hellman algorithm and symmetrical external decision to protect and popularize information, ensuring end-to-end encryption to encourage user adoption of cloud storage. The proposed model employs block-level deduplication and guarantees the randomness of ciphertexts by generating encryption keys using the Diffie-Hellman algorithm. This method effectively counters both internal and external brute-force attacks, enhancing data security while reducing computational costs. An extensive experimentation is carried out to demonstrate that our approach is particularly beneficial in scenarios with multiple privilege sets. Overall, the proposed model offers an elaborate framework that maintains data privacy and strengthens security measures, contributing to a more efficient and secure cloud-based document search. © 2023 The Author(s)
引用
收藏
页码:301 / 309
页数:8
相关论文
共 50 条
  • [41] Secure Encrypted Data Deduplication for Cloud Storage against Compromised Key Servers
    Zhang, Yuan
    Xu, Chunxiang
    Cheng, Nan
    Shen, Xuemin
    2019 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2019,
  • [42] Attribute-Based Storage Supporting Secure Deduplication of Encrypted Data in Cloud
    Cui, Hui
    Deng, Robert H.
    Li, Yingjiu
    Wu, Guowei
    IEEE TRANSACTIONS ON BIG DATA, 2019, 5 (03) : 330 - 342
  • [43] LDAP: a lightweight deduplication and auditing protocol for secure data storage in cloud environment
    Daniel, Esther
    Vasanthi, N. A.
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 1): : 1247 - 1258
  • [44] Proof of Storage for Video Deduplication in the Cloud
    Rashid, Fatema
    Miri, Ali
    Woungang, Isaac
    2015 IEEE INTERNATIONAL CONGRESS ON BIG DATA - BIGDATA CONGRESS 2015, 2015, : 499 - 505
  • [45] High Efficient Secure Data Deduplication Method for Cloud Computing
    Guo, Yongan
    Jiang, Chunlei
    JOURNAL OF INTERNET TECHNOLOGY, 2020, 21 (02): : 557 - 564
  • [46] A REVIEW OF HILEVEL AUTHORIZED DEDUPLICATION METHOD FOR CLOUD STORAGE SYSTEM
    Nandhini, I.
    Selvappriya, K.
    Tamilselvi, S.
    2016 3RD INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING AND COMMUNICATION SYSTEMS (ICACCS), 2016,
  • [47] DIADD: Secure Deduplication and Efficient Data Integrity Auditing With Data Dynamics for Cloud Storage
    Zheng, Xiangshuo
    Shen, Wenting
    Su, Ye
    Gao, Yuan
    IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2025, 22 (01): : 299 - 316
  • [48] Secure cloud storage with anonymous deduplication using ID-based key management
    Mohammed Gharib
    MohammadAmin Fazli
    The Journal of Supercomputing, 2023, 79 : 2356 - 2382
  • [49] SecReS: A Secure and Reliable Storage Scheme for Cloud with Client-side Data Deduplication
    Islam, Tariqul
    Mistareehi, Hassan
    Manivannan, D.
    2019 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2019,
  • [50] Dynamic Auditing and Deduplication with Secure Data Deletion in Cloud
    Dinesh, N.
    Juvanna, I.
    ARTIFICIAL INTELLIGENCE AND EVOLUTIONARY COMPUTATIONS IN ENGINEERING SYSTEMS, ICAIECES 2016, 2017, 517 : 305 - 313