A secure framework for managing data in cloud storage using rapid asymmetric maximum based dynamic size chunking and fuzzy logic for deduplication

被引:0
|
作者
K. Rajkumar
U. Hariharan
V. Dhanakoti
N. Muthukumaran
机构
[1] Jain University (Deemed-to-Be University),Department of Computer Science and Engineering, Faculty of Engineering and Technology
[2] Apex Institute of Technology,Department of Computer Science and Engineering
[3] Chandigarh University,Department of Computer Science and Engineering
[4] SRM Valliammai Engineering College,Department of ECE
[5] Sri Eshwar College of Engineering,undefined
来源
Wireless Networks | 2024年 / 30卷
关键词
Rapid asymmetric maximum (RAM); Dynamic size chunking (DSC); Ant lion optimization; Type2-fuzzy logic; Cloud storage platform;
D O I
暂无
中图分类号
学科分类号
摘要
Cloud storage is the ideal solution for outsourcing big data since the cloud can store a large amount of data. Cloud storage, on the other hand, raises additional problems about data duplication, fine-grained access control, and privacy, all of these factors are crucial for cloud large data storage. Data duplication approaches based on encrypted data schemes now available do not provide for fine-grained access control. This paper proposes a secure framework for managing data using rapid asymmetric maximum based dynamic size chunking and fuzzy logic for deduplication. Chunking, fingerprinting, hashing, and writing are the four main process of the proposed method. Initially, chunking is done to split the files into chunks. Rapid Asymmetric Maximum (RAM) based Dynamic Size Chunking (DSC) is used in the proposed method. These chunked files are then fingerprinted using hashing process for ensuring data authentication. Then B-tree indexing approach is used in the proposed method in order to keep the fingerprinted in an organized state. General Type2-Fuzzy logic is using Ant Lion Optimization (ALO) is used for detecting duplicate files in the documents. In the cloud storage platform, only non-duplicate documents are safely kept. The Triple Data Encryption Standard is used to do a security study before outsourcing non-duplicate data to a third-party cloud server. The total computation time of the proposed technique is 0.4 s in the inline phase and 0.04 s in the offline phase, and the deduplication ratio is 95% in the inline phase and 90% in the offline phase. This proposed deduplication approach requires less storage, which reduces memory use and processing time.
引用
收藏
页码:321 / 334
页数:13
相关论文
共 50 条
  • [31] ESDedup: An efficient and secure deduplication scheme based on data similarity and blockchain for cloud-assisted medical storage systems
    Ling Xiao
    Beiji Zou
    Chengzhang Zhu
    Fanbo Nie
    The Journal of Supercomputing, 2023, 79 : 2932 - 2960
  • [32] ESDedup: An efficient and secure deduplication scheme based on data similarity and blockchain for cloud-assisted medical storage systems
    Xiao, Ling
    Zou, Beiji
    Zhu, Chengzhang
    Nie, Fanbo
    JOURNAL OF SUPERCOMPUTING, 2023, 79 (03): : 2932 - 2960
  • [33] A Trust Management Framework for Secure Cloud Data Storage Using Cryptographic Role-Based Access Control
    Zhou, Lan
    Varadharajan, Vijay
    Hitchens, Michael
    E-BUSINESS AND TELECOMMUNICATIONS, ICETE 2013, 2014, 456 : 226 - 251
  • [34] An Effective Framework for Managing University Data Using a Cloud Based Environment
    Shakil, Kashish Ara
    Sethi, Shuchi
    Alam, Mansaf
    2015 2ND INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT (INDIACOM), 2015, : 1262 - 1266
  • [35] Fuzzy Identity-Based Dynamic Auditing of Big Data on Cloud Storage
    Zhao, Chenbin
    Xu, Li
    Li, Jiguo
    Wang, Feng
    Fang, He
    IEEE ACCESS, 2019, 7 : 160459 - 160471
  • [36] Blockchain based Secure Data Storage and Access Control System using Cloud
    Desai, Shubham
    Deshmukh, Onkar
    Shelke, Rahul
    Choudhary, Harish
    Sambhare, S. S.
    Yadav, Arjunsingh
    2019 5TH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION, CONTROL AND AUTOMATION (ICCUBEA), 2019,
  • [37] PKI-Based Cryptography for Secure Cloud Data Storage Using ECC
    Yin, XiaoChun
    Liu, ZengGuang
    Lee, Young Sil
    Lee, Hoon Jae
    2014 INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY CONVERGENCE (ICTC), 2014, : 194 - 199
  • [38] Secure Data Storage in Cloud: An e-Stream Cipher-Based Secure and Dynamic Updation Policy
    Dharavath Ramesh
    Rahul Mishra
    Damodar Reddy Edla
    Arabian Journal for Science and Engineering, 2017, 42 : 873 - 883
  • [39] Secure Data Storage in Cloud: An e-Stream Cipher-Based Secure and Dynamic Updation Policy
    Ramesh, Dharavath
    Mishra, Rahul
    Edla, Damodar Reddy
    ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2017, 42 (02) : 873 - 883
  • [40] Retraction Note to: Secure storage allocation scheme using fuzzy based heuristic algorithm for cloud
    M. Sivaram
    M. Kaliappan
    S. Jeya Shobana
    M. Viju Prakash
    V. Porkodi
    K. Vijayalakshmi
    S. Vimal
    A. Suresh
    Journal of Ambient Intelligence and Humanized Computing, 2023, 14 (Suppl 1) : 325 - 325