Skip to main content

An Efficient and Secure Data Deduplication Scheme for Cloud Assisted Storage Systems with Access Control

  • Conference paper
  • First Online:
Proceedings of the Fourth International Conference on Trends in Computational and Cognitive Engineering

Abstract

Cloud storage helps clients reduce the burden of data management and storage, attracting more data owners to keep their private information on the cloud. Among the massive amounts of confidential information that are being created rapidly nowadays, storage efficiency has become a primary concern for reliable data deduplication. Numerous deduplication algorithms have been developed to minimize storage requirements and network traffic, but those schemes are not efficient in real life. Besides, they also lack access control as cloud service providers manage most of the operations. We propose a deduplication architecture that combines access control with convergent encryption to ensure the confidentiality of data uploaded to the remote server along with the encryption keys. We use the SHA-256 hash function with Proof of Ownership (PoW) to achieve data integrity and authenticate users for secure deduplication.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 219.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 279.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Asif-Ur-Rahman M, Afsana F, Mahmud M, Kaiser MS, Ahmed MR, Kaiwartya O, James-Taylor A (2018) Toward a heterogeneous mist, fog, and cloud-based framework for the internet of healthcare things. IEEE Internet Things J 6(3):4049–4062

    Google Scholar 

  2. Khan M, Alanazi AS, Khan LS, Hussain I (2021) An efficient image encryption scheme based on fractal Tromino and Chebyshev polynomial. Complex Intell Syst 7(5):2751–2764

    Google Scholar 

  3. Nahiduzzaman M, Tasnim M, Newaz NT, Shamim Kaiser M, Mahmud M (2020) Machine learning based early fall detection for elderly people with neurological disorder using multimodal data fusion. In: International conference on brain informatics. Springer, pp 204–214

    Google Scholar 

  4. Al-Amin S, Sharkar SR, Shamim Kaiser M, Biswas M (2021) Towards a blockchain-based supply chain management for e-agro business system. In: Proceedings of international conference on trends in computational and cognitive engineering. Springer, pp 329–339

    Google Scholar 

  5. Meyer DT, Bolosky WJ (2012) A study of practical deduplication. ACM Trans Storage (ToS), 7(4):1–20

    Google Scholar 

  6. Yinjin Fu, Jiang Hong, Xiao Nong, Tian Lei, Liu Fang, Lei Xu (2013) Application-aware local-global source deduplication for cloud backup services of personal storage. IEEE Trans Parallel Distrib Syst 25(5):1155–1165

    Google Scholar 

  7. Harnik Danny, Pinkas Benny, Shulman-Peleg Alexandra (2010) Side channels in cloud services: deduplication in cloud storage. IEEE Secur & Priv 8(6):40–47

    Article  Google Scholar 

  8. Li J, Chen X, Li M, Li J, Lee PPC, Lou W (2014) Secure deduplication with efficient and reliable convergent key management. IEEE Trans Parallel Distrib Syst 25(6):1615–1625

    Google Scholar 

  9. Islam T, Mistareehi H, Manivannan D (2019) Secres: a secure and reliable storage scheme for cloud with client-side data deduplication. In: 2019 IEEE global communications conference (GLOBECOM). IEEE, pp 1–6

    Google Scholar 

  10. Zhou Yukun, Dan Feng Yu, Hua Wen Xia, Min Fu, Huang Fangting, Zhang Yucheng (2018) A similarity-aware encrypted deduplication scheme with flexible access control in the cloud. Future Gener Comput Syst 84:177–189

    Article  Google Scholar 

  11. Douceur JR, Adya A, Bolosky WJ, Simon P, Theimer M (2002) Reclaiming space from duplicate files in a serverless distributed file system. In: Proceedings 22nd international conference on distributed computing systems, pp 617–624. ISSN: 1063-6927

    Google Scholar 

  12. Quinlan S, Dorward S (2002) Venti: a new approach to archival data storage. In: Conference on file and storage technologies (FAST 02)

    Google Scholar 

  13. Li Shanshan, Chunxiang Xu, Zhang Yuan (2019) Csed: Client-side encrypted deduplication scheme based on proofs of ownership for cloud storage. J Inf Secur Appl 46:250–258

    Google Scholar 

  14. Zhang Y, Xu C, Cheng N, Shen X (2019) Secure encrypted data deduplication for cloud storage against compromised key servers. In: 2019 IEEE global communications conference (GLOBECOM)

    Google Scholar 

  15. Zhang Y, Xu C, Li H, Yang K, Zhou J, Lin X (2018) HealthDep: an efficient and secure deduplication scheme for cloud-assisted ehealth systems. IEEE Trans Ind Inf 14(9):4101–4112

    Google Scholar 

  16. Yuan H, Chen X, Li J, Jiang T, Wang J, Deng RH (2022) Secure cloud data deduplication with efficient re-encryption. IEEE Trans Serv Comput 15(1):442–456

    Google Scholar 

  17. Yuan Haoran, Chen Xiaofeng, Jiang Tao, Zhang Xiaoyu, Yan Zheng, Xiang Yang (2018) DedupDUM: secure and scalable data deduplication with dynamic user management. Inform Sci 456:159–173

    Article  Google Scholar 

  18. Singh Priyanka, Agarwal Nishant, Raman Balasubramanian (2018) Secure data deduplication using secret sharing schemes over cloud. Future Gener Comput Syst 88:156–167

    Article  Google Scholar 

  19. Fan Yongkai, Lin Xiaodong, Liang Wei, Tan Gang, Nanda Priyadarsi (2019) A secure privacy preserving deduplication scheme for cloud computing. Future Gener Comput Syst 101:127–135

    Article  Google Scholar 

  20. Yang X, Lu R, Shao J, Tang X, Ghorbani AA (2022) Achieving efficient secure deduplication with user-defined access control in cloud. IEEE Trans Dependable Secure Comput 19(1):591–606

    Google Scholar 

  21. Liu X, Sun W, Lou W, Pei Q, Zhang Y (2017) One-tag checker: message-locked integrity auditing on encrypted cloud deduplication storage. In: IEEE INFOCOM 2017—IEEE conference on computer communications, pp 1–9

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Md. Nahiduzzaman .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Nahiduzzaman, M., Kaiser, M.S., Ahmed, M.R., Tania, M.H. (2023). An Efficient and Secure Data Deduplication Scheme for Cloud Assisted Storage Systems with Access Control. In: Kaiser, M.S., Waheed, S., Bandyopadhyay, A., Mahmud, M., Ray, K. (eds) Proceedings of the Fourth International Conference on Trends in Computational and Cognitive Engineering. Lecture Notes in Networks and Systems, vol 618. Springer, Singapore. https://doi.org/10.1007/978-981-19-9483-8_26

Download citation

Publish with us

Policies and ethics