Lightweight Secure Deduplication Based on Data Popularity

被引:2
|
作者
Wang, Zhiqiang [1 ,2 ]
Gao, Wenjing [1 ]
Yu, Jia [1 ]
Shen, Wengting [1 ]
Hao, Rong [1 ]
机构
[1] Qingdao Univ, Coll Comp Sci & Technol, Qingdao 266011, Peoples R China
[2] Univ Hlth & Rehabil Sci, Qingdao Hosp, Qingdao 266011, Peoples R China
来源
IEEE SYSTEMS JOURNAL | 2023年 / 17卷 / 04期
基金
中国国家自然科学基金;
关键词
Encryption; Security; Computational modeling; Servers; Cloud computing; Resistance; Public key; cloud storage security; data integrity; data popularity; secure deduplication; SCHEME; EFFICIENT; SPACE;
D O I
10.1109/JSYST.2023.3307883
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Data deduplication technology is a very important technology in cloud storage. It is widely applied in various fields, such as electronic health care. Data deduplication technology can significantly eliminate redundant data and save storage space. For protecting the security of user's data, secure deduplication schemes based on data popularity have been proposed. They use the convergent encryption to encrypt the data with high popularity and use double-layer encryption to encrypt the data with low popularity. However, these schemes have huge computational overhead because of the adopted double-layer encryption for the whole data and the complex symmetric key delivery. In order to address this problem, we design a lightweight secure deduplication scheme based on data popularity. We propose a new outer-layer encryption strategy, which encrypts two different parts of the inner-layer convergent ciphertext with different techniques. This strategy reduces the computational overhead of outer-layer encryption, while ensuring that unpopular data are still semantically secure. In addition, we use a new method to transfer the key of the outer-layer encryption. It not only reduces the computational overhead of the user to generate and encrypt the symmetric key but also reduces the computational overhead of the cloud server to decrypt the symmetric key when popularity transition arises. Finally, the experimental results demonstrate that our scheme is more efficient than the existing schemes in aspects of encrypting unpopular data and transferring the symmetric key.
引用
下载
收藏
页码:5531 / 5542
页数:12
相关论文
共 50 条
  • [41] Secure and efficient big data deduplication in fog computing
    Yan, Jiajun
    Wang, Xiaoming
    Gan, Qingqing
    Li, Suyu
    Huang, Daxin
    SOFT COMPUTING, 2020, 24 (08) : 5671 - 5682
  • [42] Secure and efficient big data deduplication in fog computing
    Jiajun Yan
    Xiaoming Wang
    Qingqing Gan
    Suyu Li
    Daxin Huang
    Soft Computing, 2020, 24 : 5671 - 5682
  • [43] Secure deduplication method based on tag clustering
    Gao, Fengkun
    Wang, Chunbo
    Di, Xiaoqiang
    Cao, Jinhui
    Liu, Xu
    Qi, Hui
    2022 IEEE INTL CONF ON PARALLEL & DISTRIBUTED PROCESSING WITH APPLICATIONS, BIG DATA & CLOUD COMPUTING, SUSTAINABLE COMPUTING & COMMUNICATIONS, SOCIAL COMPUTING & NETWORKING, ISPA/BDCLOUD/SOCIALCOM/SUSTAINCOM, 2022, : 838 - 844
  • [44] Secure Data Deduplication System with Tag Consistency in Cloud Data Storage
    Patil, Pramod Gorakh
    Dixit, Aditya Rajesh
    Sharma, Aman
    Mahale, Prashant Rajendra
    Jadhav, Mayur Pundlik
    INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS AND COMMUNICATION TECHNOLOGIES (ICCNCT 2018), 2019, 15 : 119 - 124
  • [45] Enhanced attribute based access control with secure deduplication for big data storage in cloud
    Premkamal, Praveen Kumar
    Pasupuleti, Syam Kumar
    Singh, Abhishek Kumar
    Alphonse, P. J. A.
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2021, 14 (01) : 102 - 120
  • [46] Tapping the Potential: Secure Chunk-based Deduplication of Encrypted Data for Cloud Backup
    Sun, Wenhai
    Zhang, Ning
    Lou, Wenjing
    Hou, Y. Thomas
    2018 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2018,
  • [47] Secure Deduplication Based on Rabin Fingerprinting over Wireless Sensing Data in Cloud Computing
    Zhang, Yinghui
    Su, Haonan
    Yang, Menglei
    Zheng, Dong
    Ren, Fang
    Zhao, Qinglan
    SECURITY AND COMMUNICATION NETWORKS, 2018,
  • [48] Enhanced attribute based access control with secure deduplication for big data storage in cloud
    Praveen Kumar Premkamal
    Syam Kumar Pasupuleti
    Abhishek Kumar Singh
    P. J. A. Alphonse
    Peer-to-Peer Networking and Applications, 2021, 14 : 102 - 120
  • [49] A New Secure Data Deduplication Approach Supporting User Traceability
    Wang, Jianfeng
    Chen, Xiaofeng
    Li, Jin
    Kluczniak, Kamil
    Kutylowski, Miroslaw
    2015 10TH INTERNATIONAL CONFERENCE ON BROADBAND AND WIRELESS COMPUTING, COMMUNICATION AND APPLICATIONS (BWCCA 2015), 2015, : 120 - 124
  • [50] Secure Data Deduplication with Dynamic Ownership Management in Cloud Storage
    Hur, Junbeom
    Koo, Dongyoung
    Shin, Youngjoo
    Kang, Kyungtae
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2016, 28 (11) : 3113 - 3125