Lightweight Secure Deduplication Based on Data Popularity

被引:2
|
作者
Wang, Zhiqiang [1 ,2 ]
Gao, Wenjing [1 ]
Yu, Jia [1 ]
Shen, Wengting [1 ]
Hao, Rong [1 ]
机构
[1] Qingdao Univ, Coll Comp Sci & Technol, Qingdao 266011, Peoples R China
[2] Univ Hlth & Rehabil Sci, Qingdao Hosp, Qingdao 266011, Peoples R China
来源
IEEE SYSTEMS JOURNAL | 2023年 / 17卷 / 04期
基金
中国国家自然科学基金;
关键词
Encryption; Security; Computational modeling; Servers; Cloud computing; Resistance; Public key; cloud storage security; data integrity; data popularity; secure deduplication; SCHEME; EFFICIENT; SPACE;
D O I
10.1109/JSYST.2023.3307883
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Data deduplication technology is a very important technology in cloud storage. It is widely applied in various fields, such as electronic health care. Data deduplication technology can significantly eliminate redundant data and save storage space. For protecting the security of user's data, secure deduplication schemes based on data popularity have been proposed. They use the convergent encryption to encrypt the data with high popularity and use double-layer encryption to encrypt the data with low popularity. However, these schemes have huge computational overhead because of the adopted double-layer encryption for the whole data and the complex symmetric key delivery. In order to address this problem, we design a lightweight secure deduplication scheme based on data popularity. We propose a new outer-layer encryption strategy, which encrypts two different parts of the inner-layer convergent ciphertext with different techniques. This strategy reduces the computational overhead of outer-layer encryption, while ensuring that unpopular data are still semantically secure. In addition, we use a new method to transfer the key of the outer-layer encryption. It not only reduces the computational overhead of the user to generate and encrypt the symmetric key but also reduces the computational overhead of the cloud server to decrypt the symmetric key when popularity transition arises. Finally, the experimental results demonstrate that our scheme is more efficient than the existing schemes in aspects of encrypting unpopular data and transferring the symmetric key.
引用
下载
收藏
页码:5531 / 5542
页数:12
相关论文
共 50 条
  • [31] ClouDedup: Secure Deduplication with Encrypted Data for Cloud Storage
    Puzio, Pasquale
    Molva, Refik
    Oenen, Melek
    Loureiro, Sergio
    2013 IEEE FIFTH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGY AND SCIENCE (CLOUDCOM), VOL 1, 2013, : 363 - 370
  • [32] Secure and Lightweight Deduplicated Storage via Shielded Deduplication-Before-Encryption
    Yang, Zuoru
    Li, Jingwei
    Lee, Patrick P. C.
    PROCEEDINGS OF THE 2022 USENIX ANNUAL TECHNICAL CONFERENCE, 2022, : 37 - 52
  • [33] Dynamic Auditing and Deduplication with Secure Data Deletion in Cloud
    Dinesh, N.
    Juvanna, I.
    ARTIFICIAL INTELLIGENCE AND EVOLUTIONARY COMPUTATIONS IN ENGINEERING SYSTEMS, ICAIECES 2016, 2017, 517 : 305 - 313
  • [34] SecDedup: Secure data deduplication with dynamic auditing in the cloud
    Peng, Li
    Yan, Zheng
    Liang, Xueqin
    Yu, Xixun
    INFORMATION SCIENCES, 2023, 644
  • [35] DEDUCT: A Secure Deduplication of Textual Data in Cloud Environments
    Ghassabi, Kiana
    Pahlevani, Peyman
    IEEE ACCESS, 2024, 12 : 70743 - 70758
  • [36] Secure and Efficient Cloud Data Deduplication With Randomized Tag
    Jiang, Tao
    Chen, Xiaofeng
    Wu, Qianhong
    Ma, Jianfeng
    Susilo, Willy
    Lou, Wenjing
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 12 (03) : 532 - 543
  • [37] Secure Image Data Deduplication through Compressive Sensing
    Rashid, Fatema
    Miri, Ali
    2016 14TH ANNUAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2016,
  • [38] Verifiable Secure Data Deduplication Method in Cloud Storage
    Xian H.-Q.
    Liu H.-Y.
    Zhang S.-G.
    Hou R.-T.
    Xian, He-Qun (xianhq@126.com), 1600, Chinese Academy of Sciences (31): : 455 - 470
  • [39] Secure and Efficient Hybrid Data Deduplication in Edge Computing
    Shin, Hyungjune
    Koo, Dongyoung
    Hur, Junbeom
    ACM TRANSACTIONS ON INTERNET TECHNOLOGY, 2022, 22 (03)
  • [40] Secure and Efficient Cloud Data Deduplication with Ownership Management
    Jiang, Shunrong
    Jiang, Tao
    Wang, Liangmin
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2020, 13 (06) : 1152 - 1165