A secure framework for managing data in cloud storage using rapid asymmetric maximum based dynamic size chunking and fuzzy logic for deduplication

被引:0
|
作者
K. Rajkumar
U. Hariharan
V. Dhanakoti
N. Muthukumaran
机构
[1] Jain University (Deemed-to-Be University),Department of Computer Science and Engineering, Faculty of Engineering and Technology
[2] Apex Institute of Technology,Department of Computer Science and Engineering
[3] Chandigarh University,Department of Computer Science and Engineering
[4] SRM Valliammai Engineering College,Department of ECE
[5] Sri Eshwar College of Engineering,undefined
来源
Wireless Networks | 2024年 / 30卷
关键词
Rapid asymmetric maximum (RAM); Dynamic size chunking (DSC); Ant lion optimization; Type2-fuzzy logic; Cloud storage platform;
D O I
暂无
中图分类号
学科分类号
摘要
Cloud storage is the ideal solution for outsourcing big data since the cloud can store a large amount of data. Cloud storage, on the other hand, raises additional problems about data duplication, fine-grained access control, and privacy, all of these factors are crucial for cloud large data storage. Data duplication approaches based on encrypted data schemes now available do not provide for fine-grained access control. This paper proposes a secure framework for managing data using rapid asymmetric maximum based dynamic size chunking and fuzzy logic for deduplication. Chunking, fingerprinting, hashing, and writing are the four main process of the proposed method. Initially, chunking is done to split the files into chunks. Rapid Asymmetric Maximum (RAM) based Dynamic Size Chunking (DSC) is used in the proposed method. These chunked files are then fingerprinted using hashing process for ensuring data authentication. Then B-tree indexing approach is used in the proposed method in order to keep the fingerprinted in an organized state. General Type2-Fuzzy logic is using Ant Lion Optimization (ALO) is used for detecting duplicate files in the documents. In the cloud storage platform, only non-duplicate documents are safely kept. The Triple Data Encryption Standard is used to do a security study before outsourcing non-duplicate data to a third-party cloud server. The total computation time of the proposed technique is 0.4 s in the inline phase and 0.04 s in the offline phase, and the deduplication ratio is 95% in the inline phase and 90% in the offline phase. This proposed deduplication approach requires less storage, which reduces memory use and processing time.
引用
收藏
页码:321 / 334
页数:13
相关论文
共 50 条
  • [41] RETRACTED ARTICLE: Secure storage allocation scheme using fuzzy based heuristic algorithm for cloud
    M. Sivaram
    M. Kaliappan
    S. Jeya Shobana
    M. Viju Prakash
    V. Porkodi
    K. Vijayalakshmi
    S. Vimal
    A. Suresh
    Journal of Ambient Intelligence and Humanized Computing, 2021, 12 : 5609 - 5617
  • [42] Secure Cloud Storage for Medical IoT Data using Adaptive Neuro-Fuzzy Inference System
    Mohiyuddin, Aqsa
    Javed, Abdul Rehman
    Chakraborty, Chinmay
    Rizwan, Muhammad
    Shabbir, Maryam
    Nebhen, Jamel
    INTERNATIONAL JOURNAL OF FUZZY SYSTEMS, 2022, 24 (02) : 1203 - 1215
  • [43] SEEDDUP: A Three-Tier SEcurE Data DedUPlication Architecture-Based Storage and Retrieval for Cross-Domains Over Cloud
    Rasina Begum, B.
    Chitra, P.
    IETE JOURNAL OF RESEARCH, 2023, 69 (04) : 2224 - 2241
  • [44] A novel model for enhancing cloud security and data deduplication using fuzzy and refraction learning based chimp optimization
    Andavan, Mohanaprakash Thottipalayam
    Parameswari, M.
    Subramanian, Nalini
    Vairaperumal, Nirmalrani
    INTERNATIONAL JOURNAL OF MACHINE LEARNING AND CYBERNETICS, 2024, 15 (03) : 1025 - 1038
  • [45] A novel model for enhancing cloud security and data deduplication using fuzzy and refraction learning based chimp optimization
    Mohanaprakash Thottipalayam Andavan
    M. Parameswari
    Nalini Subramanian
    Nirmalrani Vairaperumal
    International Journal of Machine Learning and Cybernetics, 2024, 15 (3) : 1025 - 1038
  • [46] Secure Data Storage in Cloud Computing Using Code Based McEliece and NTRU Cryptosystems
    Geetha Rani E.
    Tukkoji C.
    SN Computer Science, 5 (4)
  • [47] DNA Based Cloud Storage Security Framework Using Fuzzy Decision Making Technique
    Majumdar, Abhishek
    Biswas, Arpita
    Baishnab, Krishna Lal
    Sood, Sandeep K.
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2019, 13 (07): : 3794 - 3820
  • [48] Secure Framework for Data access Using Location Based Service in Mobile Cloud Computing
    Goyal, Deepanshu
    Krishna, M. Bala
    2015 ANNUAL IEEE INDIA CONFERENCE (INDICON), 2015,
  • [49] Effective Test Case Prioritization Framework Using Fuzzy Logic for Cloud-Based Applications
    Saini, Pushpanjali
    Jain, Anubha
    Singh, Vaishali
    Kaur, Rupinder
    PROCEEDINGS OF SEVENTH INTERNATIONAL CONGRESS ON INFORMATION AND COMMUNICATION TECHNOLOGY, VOL 4, 2023, 465 : 569 - 576
  • [50] RETRACTED: Secure storage allocation scheme using fuzzy based heuristic algorithm for cloud (Retracted Article)
    Sivaram, M.
    Kaliappan, M.
    Shobana, S. Jeya
    Prakash, M. Viju
    Porkodi, V.
    Vijayalakshmi, K.
    Vimal, S.
    Suresh, A.
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2021, 12 (05) : 5609 - 5617