Skip to main content
Erschienen in: Wireless Personal Communications 3/2021

07.09.2020

ECC-CRT: An Elliptical Curve Cryptographic Encryption and Chinese Remainder Theorem based Deduplication in Cloud

verfasst von: B. Rasina Begum, P. Chitra

Erschienen in: Wireless Personal Communications | Ausgabe 3/2021

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Cloud computing provides the data storage facility for the maintenance, management and remote backup of the data. The storage cost and data retrieving time has increased. To encrypt, the Elliptical Curve Cryptographic and to generate key the Chinese Remainder Theorem (ECC-CRT) based deduplication scheme is proposed. Data deduplication is the process of eliminating the repeated data in cloud storage. Cloud service provider receives the encrypted data and checks for duplication. Deduplication is performed by using cosine similarity checking. The advantage of the method is, it avoids malicious upload and downloads in storage space. The performance is compared with existing methods.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Arora, S., & Beri, R. (2017). Adoption and Use of Cloud by Small and Medium Businesses (SMBS). Advances in Computational Sciences and Technology, 10, 529–536. Arora, S., & Beri, R. (2017). Adoption and Use of Cloud by Small and Medium Businesses (SMBS). Advances in Computational Sciences and Technology, 10, 529–536.
2.
Zurück zum Zitat Kawtikwar, N. P., & Joshi, M. (2017). Data Deduplication in Cloud Environment using File-Level and Block-Level Techniques. Imperial Journal of Interdisciplinary Research, 3(5), 1294–1298. Kawtikwar, N. P., & Joshi, M. (2017). Data Deduplication in Cloud Environment using File-Level and Block-Level Techniques. Imperial Journal of Interdisciplinary Research, 3(5), 1294–1298.
3.
Zurück zum Zitat Li, J., Li, Y. K., Chen, X., Lee, P. P., & Lou, W. (2015). A hybrid cloud approach for secure authorized deduplication. IEEE Transactions on Parallel and Distributed Systems, 26, 1206–1216.CrossRef Li, J., Li, Y. K., Chen, X., Lee, P. P., & Lou, W. (2015). A hybrid cloud approach for secure authorized deduplication. IEEE Transactions on Parallel and Distributed Systems, 26, 1206–1216.CrossRef
4.
Zurück zum Zitat Xu, L., Pavlo, A., Sengupta, S., & Ganger, G. R. (2017). Online Deduplication for Databases. In Proceedings of the 2017 ACM International Conference on Management of Data, (pp. 1355–1368). Xu, L., Pavlo, A., Sengupta, S., & Ganger, G. R. (2017). Online Deduplication for Databases. In Proceedings of the 2017 ACM International Conference on Management of Data, (pp. 1355–1368).
5.
Zurück zum Zitat Yarom Y., & Falkner, K. (2014). FLUSH + RELOAD: A high resolution, low noise, L3 Cache side-channel attack. In USENIX Security Symposium, (pp. 719–732). Yarom Y., & Falkner, K. (2014). FLUSH + RELOAD: A high resolution, low noise, L3 Cache side-channel attack. In USENIX Security Symposium, (pp. 719–732).
6.
Zurück zum Zitat Ryan, M. D. (2013). Cloud computing security: The scientific challenge, and a survey of solutions. Journal of Systems and Software, 86, 2263–2268.CrossRef Ryan, M. D. (2013). Cloud computing security: The scientific challenge, and a survey of solutions. Journal of Systems and Software, 86, 2263–2268.CrossRef
7.
Zurück zum Zitat Kshetri, N. (2013). Privacy and security issues in cloud computing: The role of institutions and institutional evolution. Telecommunications Policy, 37, 372–386.CrossRef Kshetri, N. (2013). Privacy and security issues in cloud computing: The role of institutions and institutional evolution. Telecommunications Policy, 37, 372–386.CrossRef
8.
Zurück zum Zitat Wei, L., Zhu, H., Cao, Z., Dong, X., Jia, W., Chen, Y., et al. (2014). Security and privacy for storage and computation in cloud computing. Information Sciences, 258, 371–386.CrossRef Wei, L., Zhu, H., Cao, Z., Dong, X., Jia, W., Chen, Y., et al. (2014). Security and privacy for storage and computation in cloud computing. Information Sciences, 258, 371–386.CrossRef
9.
Zurück zum Zitat Sujithra, M., Padmavathi, G., & Narayanan, S. (2015). Mobile device data security: a cryptographic approach by outsourcing mobile data to cloud. Procedia Computer Science, 47, 480–485.CrossRef Sujithra, M., Padmavathi, G., & Narayanan, S. (2015). Mobile device data security: a cryptographic approach by outsourcing mobile data to cloud. Procedia Computer Science, 47, 480–485.CrossRef
10.
Zurück zum Zitat Liu, J. K., Liang, K., Susilo, W., Liu, J., & Xiang, Y. (2016). Two-factor data security protection mechanism for cloud storage system. IEEE Transactions on Computers, 65, 1992–2004.MathSciNetCrossRef Liu, J. K., Liang, K., Susilo, W., Liu, J., & Xiang, Y. (2016). Two-factor data security protection mechanism for cloud storage system. IEEE Transactions on Computers, 65, 1992–2004.MathSciNetCrossRef
11.
Zurück zum Zitat Li, M., Yu, S., Zheng, Y., Ren, K., & Lou, W. (2013). Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption. IEEE Transactions on Parallel and Distributed Systems, 24, 131–143.CrossRef Li, M., Yu, S., Zheng, Y., Ren, K., & Lou, W. (2013). Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption. IEEE Transactions on Parallel and Distributed Systems, 24, 131–143.CrossRef
12.
Zurück zum Zitat Jung, T., Li, X.-Y., Wan, Z., & Wan, M. (2015). Control cloud data access privilege and anonymity with fully anonymous attribute-based encryption. IEEE Transactions on Information Forensics and Security, 10, 190–199.CrossRef Jung, T., Li, X.-Y., Wan, Z., & Wan, M. (2015). Control cloud data access privilege and anonymity with fully anonymous attribute-based encryption. IEEE Transactions on Information Forensics and Security, 10, 190–199.CrossRef
13.
Zurück zum Zitat Li, J., Lin, X., Zhang, Y., & Han, J. (2016). KSF-OABE: outsourced attribute-based encryption with keyword search function for cloud storage. IEEE Transactions on Services Computing, 10, 715–725. Li, J., Lin, X., Zhang, Y., & Han, J. (2016). KSF-OABE: outsourced attribute-based encryption with keyword search function for cloud storage. IEEE Transactions on Services Computing, 10, 715–725.
14.
Zurück zum Zitat Liang, K., Au, M. H., Liu, J. K., Susilo, W., Wong, D. S., Yang, G., et al. (2015). A secure and efficient ciphertext-policy attribute-based proxy re-encryption for cloud data sharing. Future Generation Computer Systems, 52, 95–108.CrossRef Liang, K., Au, M. H., Liu, J. K., Susilo, W., Wong, D. S., Yang, G., et al. (2015). A secure and efficient ciphertext-policy attribute-based proxy re-encryption for cloud data sharing. Future Generation Computer Systems, 52, 95–108.CrossRef
15.
Zurück zum Zitat Tysowski, P. K., & Hasan, M. A. (2013). Hybrid attribute-and re-encryption-based key management for secure and scalable mobile applications in clouds. IEEE Transactions on Cloud Computing, 1, 172–186.CrossRef Tysowski, P. K., & Hasan, M. A. (2013). Hybrid attribute-and re-encryption-based key management for secure and scalable mobile applications in clouds. IEEE Transactions on Cloud Computing, 1, 172–186.CrossRef
16.
Zurück zum Zitat Yang, K., & Jia, X. (2014). Expressive, efficient, and revocable data access control for multi-authority cloud storage. IEEE Transactions on Parallel and Distributed Systems, 25, 1735–1744.CrossRef Yang, K., & Jia, X. (2014). Expressive, efficient, and revocable data access control for multi-authority cloud storage. IEEE Transactions on Parallel and Distributed Systems, 25, 1735–1744.CrossRef
17.
Zurück zum Zitat Fabian, B., Ermakova, T., & Junghanns, P. (2015). Collaborative and secure sharing of healthcare data in multi-clouds. Information Systems, 48, 132–150.CrossRef Fabian, B., Ermakova, T., & Junghanns, P. (2015). Collaborative and secure sharing of healthcare data in multi-clouds. Information Systems, 48, 132–150.CrossRef
18.
Zurück zum Zitat Patranabis, S., Shrivastava, Y., & Mukhopadhyay, D. (2017). Provably Secure Key-Aggregate Cryptosystems with Broadcast Aggregate Keys for Online Data Sharing on the Cloud. IEEE Transactions on Computers, 66, 891–904.MathSciNetCrossRef Patranabis, S., Shrivastava, Y., & Mukhopadhyay, D. (2017). Provably Secure Key-Aggregate Cryptosystems with Broadcast Aggregate Keys for Online Data Sharing on the Cloud. IEEE Transactions on Computers, 66, 891–904.MathSciNetCrossRef
19.
Zurück zum Zitat Jia, X., Wang, D., Nie, D., Luo, X., & Sun, J. Z. (2019). A new threshold changeable secret sharing scheme based on the Chinese Remainder Theorem. Information Sciences, 473, 13–30.MathSciNetCrossRef Jia, X., Wang, D., Nie, D., Luo, X., & Sun, J. Z. (2019). A new threshold changeable secret sharing scheme based on the Chinese Remainder Theorem. Information Sciences, 473, 13–30.MathSciNetCrossRef
20.
Zurück zum Zitat Prasetyo, H., & Guo, J.-M. (2019). A note on multiple secret sharing using Chinese remainder theorem and exclusive-OR. IEEE Access, 7, 37473–37497.CrossRef Prasetyo, H., & Guo, J.-M. (2019). A note on multiple secret sharing using Chinese remainder theorem and exclusive-OR. IEEE Access, 7, 37473–37497.CrossRef
21.
Zurück zum Zitat Yan, X., Lu, Y., Liu, L., Liu, J., & Yang, G. (2018). Chinese remainder theorem-based two-in-one image secret sharing with three decoding options. Digital Signal Processing, 82, 80–90.CrossRef Yan, X., Lu, Y., Liu, L., Liu, J., & Yang, G. (2018). Chinese remainder theorem-based two-in-one image secret sharing with three decoding options. Digital Signal Processing, 82, 80–90.CrossRef
22.
Zurück zum Zitat Wang, Q., Li, J., Xia, W., Kruus, E., Debnath, B., & Lee, P. P. (2020) Austere Flash Caching with Deduplication and Compression. In 2020 {USENIX} Annual Technical Conference ({USENIX}{ATC} 20), (pp. 713–726). Wang, Q., Li, J., Xia, W., Kruus, E., Debnath, B., & Lee, P. P. (2020) Austere Flash Caching with Deduplication and Compression. In 2020 {USENIX} Annual Technical Conference ({USENIX}{ATC} 20), (pp. 713–726).
23.
Zurück zum Zitat Yan, Z., Ding, W., Yu, X., Zhu, H., & Deng, R. H. (2016). Deduplication on encrypted big data in cloud. IEEE Transactions on Big Data, 2, 138–150.CrossRef Yan, Z., Ding, W., Yu, X., Zhu, H., & Deng, R. H. (2016). Deduplication on encrypted big data in cloud. IEEE Transactions on Big Data, 2, 138–150.CrossRef
24.
Zurück zum Zitat Abdel-Basset, M., Mohamed, M., Elhoseny, M., Chiclana, F., & Zaied, A. E.-N. H. (2019). Cosine similarity measures of bipolar neutrosophic set for diagnosis of bipolar disorder diseases. Artificial Intelligence in Medicine, 101, 101735.CrossRef Abdel-Basset, M., Mohamed, M., Elhoseny, M., Chiclana, F., & Zaied, A. E.-N. H. (2019). Cosine similarity measures of bipolar neutrosophic set for diagnosis of bipolar disorder diseases. Artificial Intelligence in Medicine, 101, 101735.CrossRef
25.
Zurück zum Zitat Wei, G. (2017). Some cosine similarity measures for picture fuzzy sets and their applications to strategic decision making. Informatica, 28, 547–564.CrossRef Wei, G. (2017). Some cosine similarity measures for picture fuzzy sets and their applications to strategic decision making. Informatica, 28, 547–564.CrossRef
26.
Zurück zum Zitat Hur, J., Koo, D., Shin, Y., & Kang, K. (2016). Secure data deduplication with dynamic ownership management in cloud storage. IEEE Transactions on Knowledge and Data Engineering, 28, 3113–3125.CrossRef Hur, J., Koo, D., Shin, Y., & Kang, K. (2016). Secure data deduplication with dynamic ownership management in cloud storage. IEEE Transactions on Knowledge and Data Engineering, 28, 3113–3125.CrossRef
27.
Zurück zum Zitat Jiang, T., Chen, X., Wu, Q., Ma, J., Susilo, W., & Lou, W. (2017). Secure and Efficient Cloud Data Deduplication With Randomized Tag. IEEE Transactions on Information Forensics and Security, 12, 532–543.CrossRef Jiang, T., Chen, X., Wu, Q., Ma, J., Susilo, W., & Lou, W. (2017). Secure and Efficient Cloud Data Deduplication With Randomized Tag. IEEE Transactions on Information Forensics and Security, 12, 532–543.CrossRef
28.
Zurück zum Zitat Liu, J., Wang, J., Tao, X., & Shen, J. (2017). Secure similarity-based cloud data deduplication in Ubiquitous city. Pervasive and Mobile Computing. Liu, J., Wang, J., Tao, X., & Shen, J. (2017). Secure similarity-based cloud data deduplication in Ubiquitous city. Pervasive and Mobile Computing.
29.
Zurück zum Zitat Bhagwat, D., Eshghi, K., Long, D. D., & Lillibridge, M. (2009). Extreme binning: Scalable, parallel deduplication for chunk-based file backup. In Modeling, Analysis & Simulation of Computer and Telecommunication Systems, 2009. MASCOTS’09. IEEE International Symposium on, (pp. 1–9). Bhagwat, D., Eshghi, K., Long, D. D., & Lillibridge, M. (2009). Extreme binning: Scalable, parallel deduplication for chunk-based file backup. In Modeling, Analysis & Simulation of Computer and Telecommunication Systems, 2009. MASCOTS’09. IEEE International Symposium on, (pp. 1–9).
Metadaten
Titel
ECC-CRT: An Elliptical Curve Cryptographic Encryption and Chinese Remainder Theorem based Deduplication in Cloud
verfasst von
B. Rasina Begum
P. Chitra
Publikationsdatum
07.09.2020
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 3/2021
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-020-07756-7

Weitere Artikel der Ausgabe 3/2021

Wireless Personal Communications 3/2021 Zur Ausgabe

Neuer Inhalt