Abstract
Cloud storage helps clients reduce the burden of data management and storage, attracting more data owners to keep their private information on the cloud. Among the massive amounts of confidential information that are being created rapidly nowadays, storage efficiency has become a primary concern for reliable data deduplication. Numerous deduplication algorithms have been developed to minimize storage requirements and network traffic, but those schemes are not efficient in real life. Besides, they also lack access control as cloud service providers manage most of the operations. We propose a deduplication architecture that combines access control with convergent encryption to ensure the confidentiality of data uploaded to the remote server along with the encryption keys. We use the SHA-256 hash function with Proof of Ownership (PoW) to achieve data integrity and authenticate users for secure deduplication.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Asif-Ur-Rahman M, Afsana F, Mahmud M, Kaiser MS, Ahmed MR, Kaiwartya O, James-Taylor A (2018) Toward a heterogeneous mist, fog, and cloud-based framework for the internet of healthcare things. IEEE Internet Things J 6(3):4049–4062
Khan M, Alanazi AS, Khan LS, Hussain I (2021) An efficient image encryption scheme based on fractal Tromino and Chebyshev polynomial. Complex Intell Syst 7(5):2751–2764
Nahiduzzaman M, Tasnim M, Newaz NT, Shamim Kaiser M, Mahmud M (2020) Machine learning based early fall detection for elderly people with neurological disorder using multimodal data fusion. In: International conference on brain informatics. Springer, pp 204–214
Al-Amin S, Sharkar SR, Shamim Kaiser M, Biswas M (2021) Towards a blockchain-based supply chain management for e-agro business system. In: Proceedings of international conference on trends in computational and cognitive engineering. Springer, pp 329–339
Meyer DT, Bolosky WJ (2012) A study of practical deduplication. ACM Trans Storage (ToS), 7(4):1–20
Yinjin Fu, Jiang Hong, Xiao Nong, Tian Lei, Liu Fang, Lei Xu (2013) Application-aware local-global source deduplication for cloud backup services of personal storage. IEEE Trans Parallel Distrib Syst 25(5):1155–1165
Harnik Danny, Pinkas Benny, Shulman-Peleg Alexandra (2010) Side channels in cloud services: deduplication in cloud storage. IEEE Secur & Priv 8(6):40–47
Li J, Chen X, Li M, Li J, Lee PPC, Lou W (2014) Secure deduplication with efficient and reliable convergent key management. IEEE Trans Parallel Distrib Syst 25(6):1615–1625
Islam T, Mistareehi H, Manivannan D (2019) Secres: a secure and reliable storage scheme for cloud with client-side data deduplication. In: 2019 IEEE global communications conference (GLOBECOM). IEEE, pp 1–6
Zhou Yukun, Dan Feng Yu, Hua Wen Xia, Min Fu, Huang Fangting, Zhang Yucheng (2018) A similarity-aware encrypted deduplication scheme with flexible access control in the cloud. Future Gener Comput Syst 84:177–189
Douceur JR, Adya A, Bolosky WJ, Simon P, Theimer M (2002) Reclaiming space from duplicate files in a serverless distributed file system. In: Proceedings 22nd international conference on distributed computing systems, pp 617–624. ISSN: 1063-6927
Quinlan S, Dorward S (2002) Venti: a new approach to archival data storage. In: Conference on file and storage technologies (FAST 02)
Li Shanshan, Chunxiang Xu, Zhang Yuan (2019) Csed: Client-side encrypted deduplication scheme based on proofs of ownership for cloud storage. J Inf Secur Appl 46:250–258
Zhang Y, Xu C, Cheng N, Shen X (2019) Secure encrypted data deduplication for cloud storage against compromised key servers. In: 2019 IEEE global communications conference (GLOBECOM)
Zhang Y, Xu C, Li H, Yang K, Zhou J, Lin X (2018) HealthDep: an efficient and secure deduplication scheme for cloud-assisted ehealth systems. IEEE Trans Ind Inf 14(9):4101–4112
Yuan H, Chen X, Li J, Jiang T, Wang J, Deng RH (2022) Secure cloud data deduplication with efficient re-encryption. IEEE Trans Serv Comput 15(1):442–456
Yuan Haoran, Chen Xiaofeng, Jiang Tao, Zhang Xiaoyu, Yan Zheng, Xiang Yang (2018) DedupDUM: secure and scalable data deduplication with dynamic user management. Inform Sci 456:159–173
Singh Priyanka, Agarwal Nishant, Raman Balasubramanian (2018) Secure data deduplication using secret sharing schemes over cloud. Future Gener Comput Syst 88:156–167
Fan Yongkai, Lin Xiaodong, Liang Wei, Tan Gang, Nanda Priyadarsi (2019) A secure privacy preserving deduplication scheme for cloud computing. Future Gener Comput Syst 101:127–135
Yang X, Lu R, Shao J, Tang X, Ghorbani AA (2022) Achieving efficient secure deduplication with user-defined access control in cloud. IEEE Trans Dependable Secure Comput 19(1):591–606
Liu X, Sun W, Lou W, Pei Q, Zhang Y (2017) One-tag checker: message-locked integrity auditing on encrypted cloud deduplication storage. In: IEEE INFOCOM 2017—IEEE conference on computer communications, pp 1–9
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Nahiduzzaman, M., Kaiser, M.S., Ahmed, M.R., Tania, M.H. (2023). An Efficient and Secure Data Deduplication Scheme for Cloud Assisted Storage Systems with Access Control. In: Kaiser, M.S., Waheed, S., Bandyopadhyay, A., Mahmud, M., Ray, K. (eds) Proceedings of the Fourth International Conference on Trends in Computational and Cognitive Engineering. Lecture Notes in Networks and Systems, vol 618. Springer, Singapore. https://doi.org/10.1007/978-981-19-9483-8_26
Download citation
DOI: https://doi.org/10.1007/978-981-19-9483-8_26
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-19-9482-1
Online ISBN: 978-981-19-9483-8
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)