ECC-CRT: An Elliptical Curve Cryptographic Encryption and Chinese Remainder Theorem based Deduplication in Cloud

被引:11
作者
Begum, B. Rasina [1 ]
Chitra, P. [2 ]
机构
[1] Mohamed Sathak Engn Coll, Dept Comp Sci & Engn, Keelakarai 623806, Tamil Nadu, India
[2] Thiyagarajar Coll Engn, Dept Comp Sci & Engn, Madurai 625015, Tamil Nadu, India
关键词
Chinese Remainder Theorem (CRT); Elliptical Curve Cryptography (ECC); Key generation; Deduplication and Cosine similarity; RE-ENCRYPTION; SECURE; EFFICIENT;
D O I
10.1007/s11277-020-07756-7
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Cloud computing provides the data storage facility for the maintenance, management and remote backup of the data. The storage cost and data retrieving time has increased. To encrypt, the Elliptical Curve Cryptographic and to generate key the Chinese Remainder Theorem (ECC-CRT) based deduplication scheme is proposed. Data deduplication is the process of eliminating the repeated data in cloud storage. Cloud service provider receives the encrypted data and checks for duplication. Deduplication is performed by using cosine similarity checking. The advantage of the method is, it avoids malicious upload and downloads in storage space. The performance is compared with existing methods.
引用
收藏
页码:1683 / 1702
页数:20
相关论文
共 29 条
[1]   Cosine similarity measures of bipolar neutrosophic set for diagnosis of bipolar disorder diseases [J].
Abdel-Basset, Mohamed ;
Mohamed, Mai ;
Elhoseny, Mohamed ;
Le Hoang Son ;
Chiclana, Francisco ;
Zaied, Abd El-Nasser H. .
ARTIFICIAL INTELLIGENCE IN MEDICINE, 2019, 101
[2]  
Arora S., 2017, Advances in Computational Sciences and Technology, V10, P529
[3]  
Bhagwat D, 2009, 2009 IEEE INTERNATIONAL SYMPOSIUM ON MODELING, ANALYSIS & SIMULATION OF COMPUTER AND TELECOMMUNICATION SYSTEMS (MASCOTS), P237
[4]   Collaborative and secure sharing of healthcare data in multi-clouds [J].
Fabian, Benjamin ;
Ermakova, Tatiana ;
Junghanns, Philipp .
INFORMATION SYSTEMS, 2015, 48 :132-150
[5]   Secure Data Deduplication with Dynamic Ownership Management in Cloud Storage [J].
Hur, Junbeom ;
Koo, Dongyoung ;
Shin, Youngjoo ;
Kang, Kyungtae .
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2016, 28 (11) :3113-3125
[6]   A new threshold changeable secret sharing scheme based on the Chinese Remainder Theorem [J].
Jia, Xingxing ;
Wang, Daoshun ;
Nie, Daxin ;
Luo, Xiangyang ;
Sun, Jonathan Zheng .
INFORMATION SCIENCES, 2019, 473 :13-30
[7]   Secure and Efficient Cloud Data Deduplication With Randomized Tag [J].
Jiang, Tao ;
Chen, Xiaofeng ;
Wu, Qianhong ;
Ma, Jianfeng ;
Susilo, Willy ;
Lou, Wenjing .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 12 (03) :532-543
[8]   Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute-Based Encryption [J].
Jung, Taeho ;
Li, Xiang-Yang ;
Wan, Zhiguo ;
Wan, Meng .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (01) :190-199
[9]  
Kawtikwar N. P., 2017, Imperial Journal of Interdisciplinary Research, V3, P1294
[10]   Privacy and security issues in cloud computing: The role of institutions and institutional evolution [J].
Kshetri, Nir .
TELECOMMUNICATIONS POLICY, 2013, 37 (4-5) :372-386