Lightweight Secure Deduplication Based on Data Popularity

被引:5
|
作者
Wang, Zhiqiang [1 ,2 ]
Gao, Wenjing [1 ]
Yu, Jia [1 ]
Shen, Wengting [1 ]
Hao, Rong [1 ]
机构
[1] Qingdao Univ, Coll Comp Sci & Technol, Qingdao 266011, Peoples R China
[2] Univ Hlth & Rehabil Sci, Qingdao Hosp, Qingdao 266011, Peoples R China
来源
IEEE SYSTEMS JOURNAL | 2023年 / 17卷 / 04期
基金
中国国家自然科学基金;
关键词
Encryption; Security; Computational modeling; Servers; Cloud computing; Resistance; Public key; cloud storage security; data integrity; data popularity; secure deduplication; SCHEME; EFFICIENT; SPACE;
D O I
10.1109/JSYST.2023.3307883
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Data deduplication technology is a very important technology in cloud storage. It is widely applied in various fields, such as electronic health care. Data deduplication technology can significantly eliminate redundant data and save storage space. For protecting the security of user's data, secure deduplication schemes based on data popularity have been proposed. They use the convergent encryption to encrypt the data with high popularity and use double-layer encryption to encrypt the data with low popularity. However, these schemes have huge computational overhead because of the adopted double-layer encryption for the whole data and the complex symmetric key delivery. In order to address this problem, we design a lightweight secure deduplication scheme based on data popularity. We propose a new outer-layer encryption strategy, which encrypts two different parts of the inner-layer convergent ciphertext with different techniques. This strategy reduces the computational overhead of outer-layer encryption, while ensuring that unpopular data are still semantically secure. In addition, we use a new method to transfer the key of the outer-layer encryption. It not only reduces the computational overhead of the user to generate and encrypt the symmetric key but also reduces the computational overhead of the cloud server to decrypt the symmetric key when popularity transition arises. Finally, the experimental results demonstrate that our scheme is more efficient than the existing schemes in aspects of encrypting unpopular data and transferring the symmetric key.
引用
收藏
页码:5531 / 5542
页数:12
相关论文
共 50 条
  • [31] An Integrated Privacy Preserving Attribute-Based Access Control Framework Supporting Secure Deduplication
    Xu, Runhua
    Joshi, James
    Krishnamurthy, Prashant
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (02) : 706 - 721
  • [32] Blockchain-Based Secure and Lightweight Authentication for Internet of Things
    Yang, Xu
    Yang, Xuechao
    Yi, Xun
    Khalil, Ibrahim
    Zhou, Xiaotong
    He, Debiao
    Huang, Xinyi
    Nepal, Surya
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (05) : 3321 - 3332
  • [33] Data Splitting based Double Layer Encryption for Secure Ciphertext Deduplication in Cloud Storage
    Tang, Xin
    Jin, Luchao
    2024 IEEE 17TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING, CLOUD 2024, 2024, : 153 - 163
  • [34] Enhanced attribute based access control with secure deduplication for big data storage in cloud
    Premkamal, Praveen Kumar
    Pasupuleti, Syam Kumar
    Singh, Abhishek Kumar
    Alphonse, P. J. A.
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2021, 14 (01) : 102 - 120
  • [35] Security-Aware and Efficient Data Deduplication for Edge-Assisted Cloud Storage Systems
    Xie, Qingyuan
    Zhang, Chen
    Jia, Xiaohua
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2023, 16 (03) : 2191 - 2202
  • [36] Blockchain-Based Transparent Integrity Auditing and Encrypted Deduplication for Cloud Storage
    Li, Shanshan
    Xu, Chunxiang
    Zhang, Yuan
    Du, Yicong
    Chen, Kefei
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2023, 16 (01) : 134 - 146
  • [37] Data Secure De-Duplication and Recovery Based on Public Key Encryption With Keyword Search
    Li, Le
    Zheng, Dong
    Zhang, Haoyu
    Qin, Baodong
    IEEE ACCESS, 2023, 11 : 28688 - 28698
  • [38] Blockchain based secure medical data outsourcing with data deduplication in cloud environment
    Benil, T.
    Jasper, J.
    COMPUTER COMMUNICATIONS, 2023, 209 : 1 - 13
  • [39] Enhanced Secure Thresholded Data Deduplication Scheme for Cloud Storage
    Stanek, Jan
    Kencl, Lukas
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2018, 15 (04) : 694 - 707
  • [40] Scalable and Secure Big Data IoT System Based on Multifactor Authentication and Lightweight Cryptography
    Atiewi, Saleh
    Al-Rahayfeh, Amer
    Almiani, Muder
    Yussof, Salman
    Alfandi, Omar
    Abugabah, Ahed
    Jararweh, Yaser
    IEEE ACCESS, 2020, 8 : 113498 - 113511