Skip to main content
Erschienen in: Wireless Personal Communications 4/2021

19.11.2020

ESKEA: Enhanced Symmetric Key Encryption Algorithm Based Secure Data Storage in Cloud Networks with Data Deduplication

verfasst von: Silambarasan Elkana Ebinazer, Nickolas Savarimuthu, S. Mary Saira Bhanu

Erschienen in: Wireless Personal Communications | Ausgabe 4/2021

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Data deduplication approach is utilized in cloud storage to decrease the bandwidth of communication and storage space by eliminating the data copies from the cloud service provider (CSP). However, one of the main problems of cloud storage is data deduplication with secure data storage. To overcome this issue, the researchers presented symmetric data storage methods based on an encryption algorithm. Nonetheless, the Enhanced Symmetric Key Encryption Algorithm (ESKEA) based on secure data storage with data deduplication is proposed in this research to further improve data confidentiality. In this approach, the block-level deduplication of data is performed using the Convergent Encryption (CE) algorithm to check the CSP duplicate copies of data. Then, ESKEA algorithm is presented for secure storage of data. In ESKEA, Spider Monkey Optimization Algorithm (SMOA) optimally selects the secret key. The results of this work showed that the execution of the proposed ESKEA is more effective than that of the SKEA in terms of upload time and download time.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Tan, C., Hijazi, M., Lim, Y., & Gani, A. (2018). A survey on proof of retrievability for cloud data integrity and availability: Cloud storage state-of-the-art, issues, solutions and future trends. Journal of Network and Computer Applications, 110, 75–86.CrossRef Tan, C., Hijazi, M., Lim, Y., & Gani, A. (2018). A survey on proof of retrievability for cloud data integrity and availability: Cloud storage state-of-the-art, issues, solutions and future trends. Journal of Network and Computer Applications, 110, 75–86.CrossRef
2.
Zurück zum Zitat Li, B., Huang, Y., Liu, Z., Li, J., Tian, Z., & Yiu, S. (2019). HybridORAM: practical oblivious cloud storage with constant bandwidth. Information Sciences, 479, 651–663.CrossRef Li, B., Huang, Y., Liu, Z., Li, J., Tian, Z., & Yiu, S. (2019). HybridORAM: practical oblivious cloud storage with constant bandwidth. Information Sciences, 479, 651–663.CrossRef
3.
Zurück zum Zitat Bedi, R., Singh, J., & Gupta, S. (2016). Analysis of multi cloud storage applications for resource constrained mobile devices. Perspectivesin Science, 8, 279–282.CrossRef Bedi, R., Singh, J., & Gupta, S. (2016). Analysis of multi cloud storage applications for resource constrained mobile devices. Perspectivesin Science, 8, 279–282.CrossRef
4.
Zurück zum Zitat Wang, R. (2017). Research on data security technology based on cloud storage. Procedia Engineering, 174, 1340–1355.CrossRef Wang, R. (2017). Research on data security technology based on cloud storage. Procedia Engineering, 174, 1340–1355.CrossRef
5.
Zurück zum Zitat Li, H., Dong, M., Liao, X., & Jin, H. (2015). Deduplication-based energy efficient storage system in cloud environment. The Computer Journal, 58(6), 1373–1383.CrossRef Li, H., Dong, M., Liao, X., & Jin, H. (2015). Deduplication-based energy efficient storage system in cloud environment. The Computer Journal, 58(6), 1373–1383.CrossRef
6.
Zurück zum Zitat Wen, Z., Luo, J., Chen, H., Meng, J., Li, X., Li, J. (2014). A verifiable data deduplication scheme in cloud computing. In: Proceedings of 6th international conference on intelligent networking and collaborative systems, 2014; Salerno, Italy. Wen, Z., Luo, J., Chen, H., Meng, J., Li, X., Li, J. (2014). A verifiable data deduplication scheme in cloud computing. In: Proceedings of 6th international conference on intelligent networking and collaborative systems, 2014; Salerno, Italy.
7.
Zurück zum Zitat Li, J., & Hou, M. (2018). Improving data availability for deduplication in cloud storage. International Journal of Grid and High Performance Computing, 10(2), 70–89.CrossRef Li, J., & Hou, M. (2018). Improving data availability for deduplication in cloud storage. International Journal of Grid and High Performance Computing, 10(2), 70–89.CrossRef
8.
Zurück zum Zitat Agarwala, A., Singh, P., Atrey, P. (2017). DICE: A dual integrity convergent encryption protocol for client side secure data deduplication. In: Proceddings of IEEE international conference on systems, man, and cybernetics (SMC); 2017; Banff, AB, Canada. Agarwala, A., Singh, P., Atrey, P. (2017). DICE: A dual integrity convergent encryption protocol for client side secure data deduplication. In: Proceddings of IEEE international conference on systems, man, and cybernetics (SMC); 2017; Banff, AB, Canada.
9.
Zurück zum Zitat Li, J., Chen, X., Li, M., Li, J., Lee, P., & Lou, W. (2014). Secure deduplication with efficient and reliable convergent key management. IEEE Transactions on Parallel and Distributed Systems, 25(6), 1615–1625.CrossRef Li, J., Chen, X., Li, M., Li, J., Lee, P., & Lou, W. (2014). Secure deduplication with efficient and reliable convergent key management. IEEE Transactions on Parallel and Distributed Systems, 25(6), 1615–1625.CrossRef
10.
Zurück zum Zitat Daniel, E., & Vasanthi, N. (2017). LDAP: A lightweight deduplication and auditing protocol for secure data storage in cloud environment. Cluster Computing, 22, 1247–1258.CrossRef Daniel, E., & Vasanthi, N. (2017). LDAP: A lightweight deduplication and auditing protocol for secure data storage in cloud environment. Cluster Computing, 22, 1247–1258.CrossRef
11.
Zurück zum Zitat Yuan, H., Chen, X., Jiang, T., Zhang, X., Yan, Z., & Xiang, Y. (2018). DedupDUM: Secure and scalable data deduplication with dynamic user management. Information Sciences, 456, 159–173.CrossRef Yuan, H., Chen, X., Jiang, T., Zhang, X., Yan, Z., & Xiang, Y. (2018). DedupDUM: Secure and scalable data deduplication with dynamic user management. Information Sciences, 456, 159–173.CrossRef
12.
Zurück zum Zitat Jiang, S., Jiang, T., Wang, L. (2017). Secure and efficient cloud data deduplication with ownership management. IEEE Transactions on Services Computing. 1–1. Jiang, S., Jiang, T., Wang, L. (2017). Secure and efficient cloud data deduplication with ownership management. IEEE Transactions on Services Computing. 1–1.
13.
Zurück zum Zitat Malar, E., & Gauthaam, M. (2020). Wavelet analysis of EEG for the identification of alcoholics using probabilistic classifiers and neural networks. International Journal of Intelligence and Sustainable Computing, 1(1), 3.CrossRef Malar, E., & Gauthaam, M. (2020). Wavelet analysis of EEG for the identification of alcoholics using probabilistic classifiers and neural networks. International Journal of Intelligence and Sustainable Computing, 1(1), 3.CrossRef
14.
Zurück zum Zitat Yang, C., Zhang, M., Jiang, Q., Zhang, J., Li, D., Ma, J., & Ren, J. (2017). Zero knowledge based client side deduplication for encrypted files of secure cloud storage in smart cities. Pervasive and Mobile Computing, 41, 243–258.CrossRef Yang, C., Zhang, M., Jiang, Q., Zhang, J., Li, D., Ma, J., & Ren, J. (2017). Zero knowledge based client side deduplication for encrypted files of secure cloud storage in smart cities. Pervasive and Mobile Computing, 41, 243–258.CrossRef
15.
Zurück zum Zitat Li, X., Li, J., & Huang, F. (2015). A secure cloud storage system supporting privacy-preserving fuzzy deduplication. Soft Computing, 20(4), 1437–1448.CrossRef Li, X., Li, J., & Huang, F. (2015). A secure cloud storage system supporting privacy-preserving fuzzy deduplication. Soft Computing, 20(4), 1437–1448.CrossRef
16.
Zurück zum Zitat Shin, Y., Koo, D., Hur, J., & Yun, J. (2015). Secure proof of storage with deduplication for cloud storage systems. Multimedia Tools and Applications, 76(19), 19363–19378.CrossRef Shin, Y., Koo, D., Hur, J., & Yun, J. (2015). Secure proof of storage with deduplication for cloud storage systems. Multimedia Tools and Applications, 76(19), 19363–19378.CrossRef
17.
Zurück zum Zitat Kasiselvanathan, M., Sangeetha, V., & Kalaiselvi, A. (2020). Palm pattern recognition using scale invariant feature transform. International Journal of Intelligence and Sustainable Computing, 1(1), 44.CrossRef Kasiselvanathan, M., Sangeetha, V., & Kalaiselvi, A. (2020). Palm pattern recognition using scale invariant feature transform. International Journal of Intelligence and Sustainable Computing, 1(1), 44.CrossRef
Metadaten
Titel
ESKEA: Enhanced Symmetric Key Encryption Algorithm Based Secure Data Storage in Cloud Networks with Data Deduplication
verfasst von
Silambarasan Elkana Ebinazer
Nickolas Savarimuthu
S. Mary Saira Bhanu
Publikationsdatum
19.11.2020
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 4/2021
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-020-07989-6

Weitere Artikel der Ausgabe 4/2021

Wireless Personal Communications 4/2021 Zur Ausgabe

Neuer Inhalt