Data Secure De-Duplication in Cloud Environment
-
Published:2024-05-24
Issue:
Volume:
Page:105-110
-
ISSN:2581-9429
-
Container-title:International Journal of Advanced Research in Science, Communication and Technology
-
language:en
-
Short-container-title:IJARSCT
Author:
L. Kavitha 1, Sumalatha. V 1
Affiliation:
1. Vels Institute of Science Technology and Advanced Studies, Pallavaram, Chennai, India
Abstract
In the current area of information explosion, users’ demand for data storage is increasing, and data on the cloud has become the first choice of users and enterprises. Cloud storage facilitates users to backup and share data, effectively reducing users’ storage expenses. As the duplicate data of different users are stored multiple times, leading to a sudden decrease in storage utilization of cloud servers. Data stored in plaintext form can directly remove duplicate data, while cloud servers are semi-trusted and usually need to store data after encryption to protect user privacy. In this paper, we focus on how to achieve secure re-duplication and recover data in ciphertext for different users, and determine whether the indexes of public key searchable encryption and the matching relationship of trapdoor are equal in cipher text to achieve secure de-duplication. For the duplicate file, the data user’s re-encryption key about the file is appended to the ciphertext chain table of the stored copy. The cloud server uses the re-encryption key to generate the specified transformed ciphertext, and the data user decrypts the transformed ciphertext by its private key to recover the file. The proposed scheme is secure and efficient through security analysis and experimental simulation analysis.
Publisher
Naksh Solutions
Reference14 articles.
1. [1] J. R. Douceur, A. Adya, W. J. Bolosky, P. Simon, and M. Theimer, ‘‘Reclaiming space from duplicate files in a serverless distributed file system,’’ in Proc. 22nd Int. Conf. Distrib. Comput. Syst., Vienna, Austria, 2002, pp. 617–624. 2. [2] A. Agarwala, P. Singh, and P. K. Atrey, ‘‘DICE: A dual integrity convergent encryption protocol for client side secure data deduplication,’’ in Proc. IEEE Int. Conf. Syst., Man, Cybern. (SMC), Banff, AB, Canada, Oct. 2017, pp. 2176–2181. 3. [3] P. Anderson and L. Zhang, ‘‘Fast and secure laptop backups with encrypted deduplication,’’ in Proc. 24th Large Installation Syst. Admin. Conf., San jose, CA, USA, 2010, pp. 1–12. 4. [4] D. Harnik, B. Pinkas, and A. Shulman-Peleg, ‘‘Side channels in cloud services: Deduplication in cloud storage,’’ IEEE Security Privacy, vol. 8, no. 6, pp. 40–47, Nov./Dec. 2010. 5. [5] J. Li, X. Chen, M. Li, J. Li, P. P. C. Lee, and W. Lou, ‘‘Secure deduplication with efficient and reliable convergent key management,’’ IEEE Trans. Parallel Distrib. Syst., vol. 25, no. 6, pp. 1615–1625, Jun. 2014.
|
|