Lightweight Secure Deduplication Based on Data Popularity

被引:5
|
作者
Wang, Zhiqiang [1 ,2 ]
Gao, Wenjing [1 ]
Yu, Jia [1 ]
Shen, Wengting [1 ]
Hao, Rong [1 ]
机构
[1] Qingdao Univ, Coll Comp Sci & Technol, Qingdao 266011, Peoples R China
[2] Univ Hlth & Rehabil Sci, Qingdao Hosp, Qingdao 266011, Peoples R China
来源
IEEE SYSTEMS JOURNAL | 2023年 / 17卷 / 04期
基金
中国国家自然科学基金;
关键词
Encryption; Security; Computational modeling; Servers; Cloud computing; Resistance; Public key; cloud storage security; data integrity; data popularity; secure deduplication; SCHEME; EFFICIENT; SPACE;
D O I
10.1109/JSYST.2023.3307883
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Data deduplication technology is a very important technology in cloud storage. It is widely applied in various fields, such as electronic health care. Data deduplication technology can significantly eliminate redundant data and save storage space. For protecting the security of user's data, secure deduplication schemes based on data popularity have been proposed. They use the convergent encryption to encrypt the data with high popularity and use double-layer encryption to encrypt the data with low popularity. However, these schemes have huge computational overhead because of the adopted double-layer encryption for the whole data and the complex symmetric key delivery. In order to address this problem, we design a lightweight secure deduplication scheme based on data popularity. We propose a new outer-layer encryption strategy, which encrypts two different parts of the inner-layer convergent ciphertext with different techniques. This strategy reduces the computational overhead of outer-layer encryption, while ensuring that unpopular data are still semantically secure. In addition, we use a new method to transfer the key of the outer-layer encryption. It not only reduces the computational overhead of the user to generate and encrypt the symmetric key but also reduces the computational overhead of the cloud server to decrypt the symmetric key when popularity transition arises. Finally, the experimental results demonstrate that our scheme is more efficient than the existing schemes in aspects of encrypting unpopular data and transferring the symmetric key.
引用
收藏
页码:5531 / 5542
页数:12
相关论文
共 50 条
  • [1] Secure Encrypted Data Deduplication Based on Data Popularity
    Yunlong He
    Hequn Xian
    Liming Wang
    Shuguang Zhang
    Mobile Networks and Applications, 2021, 26 : 1686 - 1695
  • [2] Secure Encrypted Data Deduplication Based on Data Popularity
    He, Yunlong
    Xian, Hequn
    Wang, Liming
    Zhang, Shuguang
    MOBILE NETWORKS & APPLICATIONS, 2021, 26 (04) : 1686 - 1695
  • [3] Scalable and Popularity-Based Secure Deduplication Schemes With Fully Random Tags
    Ha, Guanxiong
    Jia, Chunfu
    Huang, Yixuan
    Chen, Hang
    Li, Ruiqi
    Jia, Qiaowen
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (03) : 1484 - 1500
  • [4] Secure and Efficient Data Deduplication in JointCloud Storage
    Zhang, Di
    Le, Junqing
    Mu, Nankun
    Wu, Jiahui
    Liao, Xiaofeng
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2023, 11 (01) : 156 - 167
  • [5] SimLESS: A Secure Deduplication System Over Similar Data in Cloud Media Sharing
    Song, Mingyang
    Hua, Zhongyun
    Zheng, Yifeng
    Xiang, Tao
    Jia, Xiaohua
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 4700 - 4715
  • [6] LDAP: a lightweight deduplication and auditing protocol for secure data storage in cloud environment
    Daniel, Esther
    Vasanthi, N. A.
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 1): : 1247 - 1258
  • [7] Fog-to-MultiCloud Cooperative Ehealth Data Management With Application-Aware Secure Deduplication
    Fu, Yinjin
    Xiao, Nong
    Chen, Tao
    Wang, Jian
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (05) : 3136 - 3148
  • [8] DIADD: Secure Deduplication and Efficient Data Integrity Auditing With Data Dynamics for Cloud Storage
    Zheng, Xiangshuo
    Shen, Wenting
    Su, Ye
    Gao, Yuan
    IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2025, 22 (01): : 299 - 316
  • [9] Blockchain-Based Shared Data Integrity Auditing and Deduplication
    Miao, Ying
    Gai, Keke
    Zhu, Liehuang
    Choo, Kim-Kwang Raymond
    Vaidya, Jaideep
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (04) : 3688 - 3703
  • [10] LDAP: a lightweight deduplication and auditing protocol for secure data storage in cloud environment
    Esther Daniel
    N. A. Vasanthi
    Cluster Computing, 2019, 22 : 1247 - 1258