Lightweight Secure Deduplication Based on Data Popularity

被引:2
|
作者
Wang, Zhiqiang [1 ,2 ]
Gao, Wenjing [1 ]
Yu, Jia [1 ]
Shen, Wengting [1 ]
Hao, Rong [1 ]
机构
[1] Qingdao Univ, Coll Comp Sci & Technol, Qingdao 266011, Peoples R China
[2] Univ Hlth & Rehabil Sci, Qingdao Hosp, Qingdao 266011, Peoples R China
来源
IEEE SYSTEMS JOURNAL | 2023年 / 17卷 / 04期
基金
中国国家自然科学基金;
关键词
Encryption; Security; Computational modeling; Servers; Cloud computing; Resistance; Public key; cloud storage security; data integrity; data popularity; secure deduplication; SCHEME; EFFICIENT; SPACE;
D O I
10.1109/JSYST.2023.3307883
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Data deduplication technology is a very important technology in cloud storage. It is widely applied in various fields, such as electronic health care. Data deduplication technology can significantly eliminate redundant data and save storage space. For protecting the security of user's data, secure deduplication schemes based on data popularity have been proposed. They use the convergent encryption to encrypt the data with high popularity and use double-layer encryption to encrypt the data with low popularity. However, these schemes have huge computational overhead because of the adopted double-layer encryption for the whole data and the complex symmetric key delivery. In order to address this problem, we design a lightweight secure deduplication scheme based on data popularity. We propose a new outer-layer encryption strategy, which encrypts two different parts of the inner-layer convergent ciphertext with different techniques. This strategy reduces the computational overhead of outer-layer encryption, while ensuring that unpopular data are still semantically secure. In addition, we use a new method to transfer the key of the outer-layer encryption. It not only reduces the computational overhead of the user to generate and encrypt the symmetric key but also reduces the computational overhead of the cloud server to decrypt the symmetric key when popularity transition arises. Finally, the experimental results demonstrate that our scheme is more efficient than the existing schemes in aspects of encrypting unpopular data and transferring the symmetric key.
引用
下载
收藏
页码:5531 / 5542
页数:12
相关论文
共 50 条
  • [21] Secure Encrypted Data With Authorized Deduplication in Cloud
    Xiong, Jinbo
    Zhang, Yuanyuan
    Tang, Shaohua
    Liu, Ximeng
    Yao, Zhiqiang
    IEEE ACCESS, 2019, 7 : 75090 - 75104
  • [22] Secure Deduplication Method Based on Autoencoder
    Qi, Hui
    Lu, Tianwei
    Cong, Ligang
    Di, Xiaoqiang
    2020 IEEE INTL SYMP ON PARALLEL & DISTRIBUTED PROCESSING WITH APPLICATIONS, INTL CONF ON BIG DATA & CLOUD COMPUTING, INTL SYMP SOCIAL COMPUTING & NETWORKING, INTL CONF ON SUSTAINABLE COMPUTING & COMMUNICATIONS (ISPA/BDCLOUD/SOCIALCOM/SUSTAINCOM 2020), 2020, : 345 - 352
  • [23] A Secure Data Deduplication Scheme for Cloud Storage
    Stanek, Jan
    Sorniotti, Alessandro
    Androulaki, Elli
    Kencl, Lukas
    FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2014, 2014, 8437 : 99 - 118
  • [24] Secure Cloud Encrypted Data Deduplication Method
    Zhang S.-G.
    Xian H.-Q.
    Wang L.-M.
    Liu H.-Y.
    Ruan Jian Xue Bao/Journal of Software, 2019, 30 (12): : 3815 - 3828
  • [25] A hybrid encryption for secure data deduplication the cloud
    Ebinazer S.E.
    Savarimuthu N.
    Bhanu S.M.S.
    International Journal of Cloud Computing, 2023, 12 (2-4) : 295 - 307
  • [26] Data popularity-based encrypted deduplication scheme without third-party servers
    Ha, Guanxiong
    Jia, Qiaowen
    Chen, Hang
    Jia, Chunfu
    Tongxin Xuebao/Journal on Communications, 2022, 43 (08): : 17 - 29
  • [27] Secure data deduplication in data centre: State of the art and perspectives
    Liu Y.
    Sun D.
    Sun, Dawei (sundaweicn@163.com), 1600, Inderscience Enterprises Ltd., 29, route de Pre-Bois, Case Postale 856, CH-1215 Geneva 15, CH-1215, Switzerland (11): : 83 - 89
  • [28] Attribute-Based Storage Supporting Secure Deduplication of Encrypted Data in Cloud
    Cui, Hui
    Deng, Robert H.
    Li, Yingjiu
    Wu, Guowei
    IEEE TRANSACTIONS ON BIG DATA, 2019, 5 (03) : 330 - 342
  • [29] Secure Data Deduplication Scheme Based on Distributed Random Key in Integrated Networks
    Qi, Hui
    Han, Yingjie
    Di, Xiaoqiang
    Sun, Fang
    PROCEEDINGS OF 2017 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS (ICCC), 2017, : 1308 - 1312
  • [30] A secure two-phase data deduplication scheme
    Meye, Pierre
    Raipin, Philippe
    Tronel, Frederic
    Anceaume, Emmanuelle
    2014 IEEE INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS, 2014 IEEE 6TH INTL SYMP ON CYBERSPACE SAFETY AND SECURITY, 2014 IEEE 11TH INTL CONF ON EMBEDDED SOFTWARE AND SYST (HPCC,CSS,ICESS), 2014, : 802 - 809