Open Access Open Access  Restricted Access Subscription or Fee Access

Enhancing security and Efficiency in cloud Data De-duplication through re encryption

A. Sai Nikhith, N. Tarun, G. Tharun, B. Sahithi, J. Sai Vishal, Vijay .

Abstract


Data de-duplication technologies have been widely used by commercial cloud storage providers since they are helpful and essential in addressing the growing data expansion. To enhance and guarantee the security of sensitive information provided by users in the outsourced storage mode, numerous secure data de-duplication techniques have been developed and employed in diverse settings. Several scholars have been drawn to secure and efficient re-encryption for encrypted data de-duplication systems, and several solutions have been built to facilitate dynamic ownership management. This study examines the re-encryption de-duplication storage system and demonstrates the stub-reserved attack vulnerability of the recently announced lightweight rekeying-aware encrypted de-duplication scheme (REED).


Keywords


Re-encryption, Data de-duplication, User joining, User revocation, randomised convergent encryption

Full Text:

PDF

References


X. Chen, J. Li, J. Weng, J. Ma, and W. Lou, “Verifiable computation over the large database with incremental updates,” IEEE Trans. Computers, vol. 65, no. 10, pp. 3184–3195, 2016.

M. Gerla, J. Weng, and G. Pau, “Pics-on-wheels: Photo surveillance in the vehicular cloud,” International Conference on Computing, Networking and Communications, pp. 1123–1127, 2013.

X. Chen, J. Li, J. Ma, Q. Tang, and W. Lou, “New algorithms for secure outsourcing of modular exponentiations,” IEEE Trans. Parallel Distrib. Syst., vol. 25, no. 9, pp. 2386–2396, 2014.

H. Yuan, X. Chen, T. Jiang, X. Zhang, Z. Yan, and Y. Xiang, “Dedupdum: Secure and scalable data deduplication with dynamic user management,” Inf. Sci., vol. 456, pp. 159–173, 2018.

H. Huang, X. Chen, Q. Wu, X. Huang, and J. Shen, “Bitcoin-based fair payments for outsourcing computations of fog devices,” Future Generation Comp. Syst., vol. 78, pp. 850–858, 2018.

IDC. (2014) The digital universe of opportunities: Rich data and the increasing value of the Internet of things. [Online]. Available: https://www.emc.com/leadership/digitaluniverse/2014iview/index.htm

W. J. Bolosky, S. Corbin, D. Goebel, and J. R. Douceur, “Single instance storage in Windows 2000,” in Conference on Usenix Windows Systems Symposium, 2000.

Dropbox. (2007). [Online]. Available: http://www.dropbox.com

Google Drive. (2012). [Online]. Available: http://drive.google.com

Memopal. (2018). [Online]. Available: http://www.memopal.com

Netapp. (2008) Netapp deduplication helps the duke institute for genome sciences and Policy reduce storage requirements for genomic information by 83 per cent. [Online]. Available: http://www.netapp.com

M. Dutch, “Understanding data deduplication ratios,” in SNIA Data Management Forum, 2008, pp. 1–13.

T. Jiang, X. Chen, J. Li, D. S. Wong, J. Ma, and J. K. Liu, “TIMER: secure and reliable cloud storage against data re-outsourcing,” Information Security Practice and Experience - 10th International Conference, pp. 346–358, 2014.

X. Chen, B. Lee, and K. Kim, “Receipt-free electronic auction schemes using homomorphic encryption,” Information Security and Cryptology - ICISC 2003, 6th International Conference, Seoul, Korea, November 27-28, 2003, Revised Papers, pp. 259–273, 2003.

J. Wang, X. Chen, J. Li, K. Kluczniak, and M. Kutylowski, “Trdup: enhancing secure data deduplication with user traceability in cloud computing,” IJWGS, vol. 13, no. 3, pp. 270–289, 2017.

X. Zhang, X. Chen, J.Wang, Z. Zhan, and J. Li, “Verifiable privacy-preserving single-layer perceptron training scheme in cloud computing,” Soft Comput., vol. 22, no. 23, pp. 7719–7732, 2018.

J. R. Douceur, A. Adya, W. J. Bolosky, P. Simon, and M. Theimer, “Reclaiming space from duplicate files in a serverless distributed file system,” in ICDCS, 2002, pp. 617–624.

Google Genomics. (2018). [Online]. Available: https://cloud.google.com/genomics/

Amazon. (2018). [Online]. Available: https://aws.amazon.com/

J. Hur, D. Koo, Y. Shin, and K. Kang, “Secure data de-duplication with dynamic ownership management in cloud storage,” IEEE Trans. Knowl. Data Eng., vol. 28, no. 11, pp. 3113–3125, 2016.

J. Li, X. Chen, X. Huang, S. Tang, Y. Xiang, M. M. Hassan and A. Alelaiwi, “Secure distributed deduplication systems with improved reliability,” IEEE Trans. Computers, vol. 64, no. 12, pp.3569–3579, 2015.

T. Jiang, X. Chen, Q. Wu, J. Ma, W. Susilo, and W. Lou, “Secure and efficient cloud data deduplication with randomized tag,” IEEE Trans. Information Forensics and Security, vol. 12, no. 3, pp. 532–543, 2017.

W. C. G. III, A. Shull, S. Myers, and A. J. Lee, “On the practicality of cryptographically enforcing dynamic access control policies in the cloud,” IEEE Symposium on Security and Privacy, pp. 819–838,2016.

J. Li, C. Qin, P. P. C. Lee, and J. Li, “Rekeying for encrypted deduplication storage,” in 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2016, pp. 618–629.

J. Li, Y. K. Li, X. Chen, P. P. C. Lee, and W. Lou, “A hybrid cloud approach for secure authorized deduplication,” IEEE Trans. Parallel Distrib. Syst., vol. 26, no. 5, pp. 1206–1216, 2015.


Refbacks

  • There are currently no refbacks.


Copyright (c) 2023 Journal of Telecommunication, Switching Systems and Networks