Lightweight Secure Deduplication Based on Data Popularity

被引:2
|
作者
Wang, Zhiqiang [1 ,2 ]
Gao, Wenjing [1 ]
Yu, Jia [1 ]
Shen, Wengting [1 ]
Hao, Rong [1 ]
机构
[1] Qingdao Univ, Coll Comp Sci & Technol, Qingdao 266011, Peoples R China
[2] Univ Hlth & Rehabil Sci, Qingdao Hosp, Qingdao 266011, Peoples R China
来源
IEEE SYSTEMS JOURNAL | 2023年 / 17卷 / 04期
基金
中国国家自然科学基金;
关键词
Encryption; Security; Computational modeling; Servers; Cloud computing; Resistance; Public key; cloud storage security; data integrity; data popularity; secure deduplication; SCHEME; EFFICIENT; SPACE;
D O I
10.1109/JSYST.2023.3307883
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Data deduplication technology is a very important technology in cloud storage. It is widely applied in various fields, such as electronic health care. Data deduplication technology can significantly eliminate redundant data and save storage space. For protecting the security of user's data, secure deduplication schemes based on data popularity have been proposed. They use the convergent encryption to encrypt the data with high popularity and use double-layer encryption to encrypt the data with low popularity. However, these schemes have huge computational overhead because of the adopted double-layer encryption for the whole data and the complex symmetric key delivery. In order to address this problem, we design a lightweight secure deduplication scheme based on data popularity. We propose a new outer-layer encryption strategy, which encrypts two different parts of the inner-layer convergent ciphertext with different techniques. This strategy reduces the computational overhead of outer-layer encryption, while ensuring that unpopular data are still semantically secure. In addition, we use a new method to transfer the key of the outer-layer encryption. It not only reduces the computational overhead of the user to generate and encrypt the symmetric key but also reduces the computational overhead of the cloud server to decrypt the symmetric key when popularity transition arises. Finally, the experimental results demonstrate that our scheme is more efficient than the existing schemes in aspects of encrypting unpopular data and transferring the symmetric key.
引用
下载
收藏
页码:5531 / 5542
页数:12
相关论文
共 50 条
  • [1] Secure Encrypted Data Deduplication Based on Data Popularity
    Yunlong He
    Hequn Xian
    Liming Wang
    Shuguang Zhang
    Mobile Networks and Applications, 2021, 26 : 1686 - 1695
  • [2] Secure Encrypted Data Deduplication Based on Data Popularity
    He, Yunlong
    Xian, Hequn
    Wang, Liming
    Zhang, Shuguang
    MOBILE NETWORKS & APPLICATIONS, 2021, 26 (04): : 1686 - 1695
  • [3] A secure deduplication scheme based on data popularity with fully random tags
    Ha, Guanxiong
    Chen, Hang
    Jia, Chunfu
    Li, Ruiqi
    Jia, Qiaowen
    2021 IEEE 20TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2021), 2021, : 207 - 214
  • [4] Scalable and Popularity-Based Secure Deduplication Schemes With Fully Random Tags
    Ha, Guanxiong
    Jia, Chunfu
    Huang, Yixuan
    Chen, Hang
    Li, Ruiqi
    Jia, Qiaowen
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (03) : 1484 - 1500
  • [5] LDAP: a lightweight deduplication and auditing protocol for secure data storage in cloud environment
    Daniel, Esther
    Vasanthi, N. A.
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 1): : 1247 - 1258
  • [6] LDAP: a lightweight deduplication and auditing protocol for secure data storage in cloud environment
    Esther Daniel
    N. A. Vasanthi
    Cluster Computing, 2019, 22 : 1247 - 1258
  • [7] PerfectDedup: Secure Data Deduplication
    Puzio, Pasquale
    Molva, Refik
    Onen, Melek
    Loureiro, Sergio
    DATA PRIVACY MANAGEMENT, AND SECURITY ASSURANCE, 2016, 9481 : 150 - 166
  • [8] A secure data deduplication scheme based on differential privacy
    Ren, Jun
    Yao, Zhiqiang
    Xiong, Jinbo
    Zhang, Yuanyuan
    Ye, Ayong
    2016 IEEE 22ND INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS (ICPADS), 2016, : 1241 - 1246
  • [9] Deduplication scheme with data popularity for cloud storage
    He X.
    Yang Q.
    Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2024, 51 (01): : 187 - 200
  • [10] A Client-based Secure Deduplication of Multimedia Data
    Li, Danping
    Yang, Chao
    Li, Chengzhou
    Jiang, Qi
    Chen, Xiaofeng
    Ma, Jianfeng
    Ren, Jian
    2017 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2017,