Skip to main content
Erschienen in: Peer-to-Peer Networking and Applications 4/2021

28.08.2020

An efficient secure data deduplication method using radix trie with bloom filter (SDD-RT-BF) in cloud environment

verfasst von: Silambarasan Elkana Ebinazer, Nickolas Savarimuthu, Mary Saira Bhanu S

Erschienen in: Peer-to-Peer Networking and Applications | Ausgabe 4/2021

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Recent advancements in the domain of cloud computing (CC) and big data technologies leads to an exponential increase in cloud data, huge replica data utilized the available memory space and maximum computation brought a major issue to the restricted cloud storage space. This paper develops an effective radix trie (RT) with Bloom Filter (BF) based secure data deduplication model, abbreviated as SDD-RT-BD. The proposed SDD-RT-BF model involves three major stages namely, authorized deduplication, proof of ownership and role key update. Initially, a convergent encryption approach is applied for preventing the leakage of data and employed role re-encryption process for attaining authorized deduplication resourcefully. Specifically, management centre handles the authorized request, and establish a RT structure to map the relationship among roles and keys. Besides, BF is applied for the implementation of data updating and enhance the retrieval of ownership verifying efficiently. The inclusion of RT along with BF for secure data deduplication shows the novelty of the paper. A detailed simulation experiments takes place for demonstrating the security and effectiveness of the presented model. The experimental outcome pointed out that the SDD-RT-BF model possesses many beneficial features namely Client-side deduplication, Tag consistency preservation, Update of outsourced data and Fault tolerance. The experimental results denoted that under the file size of 8 MB, the SDD-RT-BF model offers maximum deduplication rate of 25.40% whereas the SS, SSIMI and SDM models attains minimum deduplication rate of 24.60%, 23.60% and 22.30% respectively.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Ali M, Khan SU, Vasilakos AV (2015) Security in cloud computing: opportunities and challenges. Inf Sci 305:357–383MathSciNetCrossRef Ali M, Khan SU, Vasilakos AV (2015) Security in cloud computing: opportunities and challenges. Inf Sci 305:357–383MathSciNetCrossRef
2.
Zurück zum Zitat Xiong J, Zhang Y, Tang S, Liu X, Yao Z (2019) Secure encrypted data with authorized deduplication in cloud. IEEE Access 7:75090–75104CrossRef Xiong J, Zhang Y, Tang S, Liu X, Yao Z (2019) Secure encrypted data with authorized deduplication in cloud. IEEE Access 7:75090–75104CrossRef
4.
Zurück zum Zitat Wu S, Li K-C, Mao B, Liao M (2017) Dac: improving storage availability with deduplication-assisted cloud-of-clouds. Futur Gener Comput Syst 74:190–198CrossRef Wu S, Li K-C, Mao B, Liao M (2017) Dac: improving storage availability with deduplication-assisted cloud-of-clouds. Futur Gener Comput Syst 74:190–198CrossRef
5.
Zurück zum Zitat Zhan Q, Su J, Hu Y (2017) Research on encryption strategy in large data environment based on proxy re-encryption. Int J Big Data Intell 4(3):208–215CrossRef Zhan Q, Su J, Hu Y (2017) Research on encryption strategy in large data environment based on proxy re-encryption. Int J Big Data Intell 4(3):208–215CrossRef
6.
Zurück zum Zitat Singh P, Raman B, Agarwal N (2017a) Towards elncrypted video tampering detection and localization based on pob number system over cloud. IEEE Transactions on Circuits and Systems for Video Technology (99):1–1 Singh P, Raman B, Agarwal N (2017a) Towards elncrypted video tampering detection and localization based on pob number system over cloud. IEEE Transactions on Circuits and Systems for Video Technology (99):1–1
7.
Zurück zum Zitat Li Y, Gai K, Qiu L, Qiu M, Zhao H (2017) Intelligent cryptography approach for secure distributed big data storage in cloud computing. Inf Sci 387:103–115CrossRef Li Y, Gai K, Qiu L, Qiu M, Zhao H (2017) Intelligent cryptography approach for secure distributed big data storage in cloud computing. Inf Sci 387:103–115CrossRef
8.
Zurück zum Zitat Liu J, Wang J, Tao X, Shen J (2017) Secure similaritybased cloud data deduplication in ubiquitous city. Pervasive and Mobile computing, pp 231–242 Liu J, Wang J, Tao X, Shen J (2017) Secure similaritybased cloud data deduplication in ubiquitous city. Pervasive and Mobile computing, pp 231–242
9.
Zurück zum Zitat Kamara S, Lauter KE et al (2010) Cryptographic cloud storage. In: financial cryptography workshops, volume 6054. Springer, pp 136–149 Kamara S, Lauter KE et al (2010) Cryptographic cloud storage. In: financial cryptography workshops, volume 6054. Springer, pp 136–149
10.
Zurück zum Zitat Geambasu R, Kohno T, Levy AA, Levy HM (2009) Vanish: increasing data privacy with self-destructing data. In USENIX security symposium, volume 316 Geambasu R, Kohno T, Levy AA, Levy HM (2009) Vanish: increasing data privacy with self-destructing data. In USENIX security symposium, volume 316
11.
Zurück zum Zitat Douceur JR, Adya A, Bolosky WJ, Simon P, Theimer M (2002) Reclaiming space from duplicate files in a serverless distributed file system. In: distributed computing systems, 2002. Proceedings. 22nd international conference on, IEEE, pp 617–624 Douceur JR, Adya A, Bolosky WJ, Simon P, Theimer M (2002) Reclaiming space from duplicate files in a serverless distributed file system. In: distributed computing systems, 2002. Proceedings. 22nd international conference on, IEEE, pp 617–624
12.
Zurück zum Zitat Bellare M, Keelveedhi S, Ristenpart T (2013) Message-locked encryption and secure deduplication. In Annual International Conference on the Theory and Applications of Cryptographic Techniques. Springer, pp 296–312 Bellare M, Keelveedhi S, Ristenpart T (2013) Message-locked encryption and secure deduplication. In Annual International Conference on the Theory and Applications of Cryptographic Techniques. Springer, pp 296–312
13.
Zurück zum Zitat Di Pietro R, Sorniotti A (2012) Boosting efficiency and security in proof of ownership for deduplication. In: proceedings of the 7th ACM symposium on information, computer and communications security, ACM, pp 81–82 Di Pietro R, Sorniotti A (2012) Boosting efficiency and security in proof of ownership for deduplication. In: proceedings of the 7th ACM symposium on information, computer and communications security, ACM, pp 81–82
14.
Zurück zum Zitat Ng WK, Wen Y, Zhu H (2012) Private data deduplication protocols in cloud storage. In proceedings of the 27th annual ACM symposium on applied computing, ACM, pp 441–446 Ng WK, Wen Y, Zhu H (2012) Private data deduplication protocols in cloud storage. In proceedings of the 27th annual ACM symposium on applied computing, ACM, pp 441–446
15.
Zurück zum Zitat Leis V, Kemper A, Neumann T (2013) The adaptive radix tree: ARTful indexing for main-memory databases. In: 2013 IEEE 29th international conference on data engineering (ICDE) IEEE, pp 38-49 Leis V, Kemper A, Neumann T (2013) The adaptive radix tree: ARTful indexing for main-memory databases. In: 2013 IEEE 29th international conference on data engineering (ICDE) IEEE, pp 38-49
16.
Zurück zum Zitat Debnath B, Sengupta S, Li J, Lilja DJ, Du DH (2011) BloomFlash: bloom filter on flash-based storage. In 2011 31st international conference on distributed computing systems, IEEE, pp 635-644 Debnath B, Sengupta S, Li J, Lilja DJ, Du DH (2011) BloomFlash: bloom filter on flash-based storage. In 2011 31st international conference on distributed computing systems, IEEE, pp 635-644
17.
Zurück zum Zitat Singh P, Agarwal N, Raman B (2018) Secure data deduplication using secret sharing schemes over cloud. Futur Gener Comput Syst 88:156–167CrossRef Singh P, Agarwal N, Raman B (2018) Secure data deduplication using secret sharing schemes over cloud. Futur Gener Comput Syst 88:156–167CrossRef
18.
Zurück zum Zitat N Krishnaraj, Mohamed Elhoseny, E Laxmi Lydia, K Shankar, Omar ALDabbas (2020) An efficient radix trie-based semantic visual indexing model for large-scale image retrieval in cloud environment. Software: Practice and Experience. In press: https://doi.org/10.1002/spe.2834 N Krishnaraj, Mohamed Elhoseny, E Laxmi Lydia, K Shankar, Omar ALDabbas (2020) An efficient radix trie-based semantic visual indexing model for large-scale image retrieval in cloud environment. Software: Practice and Experience. In press: https://​doi.​org/​10.​1002/​spe.​2834
19.
Zurück zum Zitat Sachi Nandan Mohanty, Ramya KC, Sheeba Rani S, Deepak Gupta, Shankar K, Lakshmanaprabu SK (2020) An efficient Lightweight integrated Block chain (ELIB) model for IoT security and privacy. Future Gener Comput Syst 102:1027–1037 Sachi Nandan Mohanty, Ramya KC, Sheeba Rani S, Deepak Gupta, Shankar K, Lakshmanaprabu SK (2020) An efficient Lightweight integrated Block chain (ELIB) model for IoT security and privacy. Future Gener Comput Syst 102:1027–1037
20.
Zurück zum Zitat Shankar K, Mohamed Elhoseny (2019) Trust based cluster head election of secure message transmission in MANET using multi secure protocol with TDES. J Univers Comput Sci 25(10):1221–1239 Shankar K, Mohamed Elhoseny (2019) Trust based cluster head election of secure message transmission in MANET using multi secure protocol with TDES. J Univers Comput Sci 25(10):1221–1239
22.
Zurück zum Zitat Shankar K, Lakshmanaprabu SK, Deepak Gupta, Ashish Khanna, Victor Hugo C Albuquerque (2018) Adaptive optimal multi key based encryption for digital image security. Concurrency and Computation: Practice and Experience. In press. https://doi.org/10.1002/cpe.5122 Shankar K, Lakshmanaprabu SK, Deepak Gupta, Ashish Khanna, Victor Hugo C Albuquerque (2018) Adaptive optimal multi key based encryption for digital image security. Concurrency and Computation: Practice and Experience. In press. https://​doi.​org/​10.​1002/​cpe.​5122
Metadaten
Titel
An efficient secure data deduplication method using radix trie with bloom filter (SDD-RT-BF) in cloud environment
verfasst von
Silambarasan Elkana Ebinazer
Nickolas Savarimuthu
Mary Saira Bhanu S
Publikationsdatum
28.08.2020
Verlag
Springer US
Erschienen in
Peer-to-Peer Networking and Applications / Ausgabe 4/2021
Print ISSN: 1936-6442
Elektronische ISSN: 1936-6450
DOI
https://doi.org/10.1007/s12083-020-00989-0

Weitere Artikel der Ausgabe 4/2021

Peer-to-Peer Networking and Applications 4/2021 Zur Ausgabe