Skip to main content
Log in

An efficient secure data deduplication method using radix trie with bloom filter (SDD-RT-BF) in cloud environment

  • Published:
Peer-to-Peer Networking and Applications Aims and scope Submit manuscript

Abstract

Recent advancements in the domain of cloud computing (CC) and big data technologies leads to an exponential increase in cloud data, huge replica data utilized the available memory space and maximum computation brought a major issue to the restricted cloud storage space. This paper develops an effective radix trie (RT) with Bloom Filter (BF) based secure data deduplication model, abbreviated as SDD-RT-BD. The proposed SDD-RT-BF model involves three major stages namely, authorized deduplication, proof of ownership and role key update. Initially, a convergent encryption approach is applied for preventing the leakage of data and employed role re-encryption process for attaining authorized deduplication resourcefully. Specifically, management centre handles the authorized request, and establish a RT structure to map the relationship among roles and keys. Besides, BF is applied for the implementation of data updating and enhance the retrieval of ownership verifying efficiently. The inclusion of RT along with BF for secure data deduplication shows the novelty of the paper. A detailed simulation experiments takes place for demonstrating the security and effectiveness of the presented model. The experimental outcome pointed out that the SDD-RT-BF model possesses many beneficial features namely Client-side deduplication, Tag consistency preservation, Update of outsourced data and Fault tolerance. The experimental results denoted that under the file size of 8 MB, the SDD-RT-BF model offers maximum deduplication rate of 25.40% whereas the SS, SSIMI and SDM models attains minimum deduplication rate of 24.60%, 23.60% and 22.30% respectively.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

References

  1. Ali M, Khan SU, Vasilakos AV (2015) Security in cloud computing: opportunities and challenges. Inf Sci 305:357–383

    Article  MathSciNet  Google Scholar 

  2. Xiong J, Zhang Y, Tang S, Liu X, Yao Z (2019) Secure encrypted data with authorized deduplication in cloud. IEEE Access 7:75090–75104

    Article  Google Scholar 

  3. Widjava I (2011) The 10 worst cloud outages: lessons learned. Cloud business review http://www.Cbrdigital.Com/2011/06/30/the-10-worstcloud-outages-lessons-learned.Html

  4. Wu S, Li K-C, Mao B, Liao M (2017) Dac: improving storage availability with deduplication-assisted cloud-of-clouds. Futur Gener Comput Syst 74:190–198

    Article  Google Scholar 

  5. Zhan Q, Su J, Hu Y (2017) Research on encryption strategy in large data environment based on proxy re-encryption. Int J Big Data Intell 4(3):208–215

    Article  Google Scholar 

  6. Singh P, Raman B, Agarwal N (2017a) Towards elncrypted video tampering detection and localization based on pob number system over cloud. IEEE Transactions on Circuits and Systems for Video Technology (99):1–1

  7. Li Y, Gai K, Qiu L, Qiu M, Zhao H (2017) Intelligent cryptography approach for secure distributed big data storage in cloud computing. Inf Sci 387:103–115

    Article  Google Scholar 

  8. Liu J, Wang J, Tao X, Shen J (2017) Secure similaritybased cloud data deduplication in ubiquitous city. Pervasive and Mobile computing, pp 231–242

  9. Kamara S, Lauter KE et al (2010) Cryptographic cloud storage. In: financial cryptography workshops, volume 6054. Springer, pp 136–149

  10. Geambasu R, Kohno T, Levy AA, Levy HM (2009) Vanish: increasing data privacy with self-destructing data. In USENIX security symposium, volume 316

  11. Douceur JR, Adya A, Bolosky WJ, Simon P, Theimer M (2002) Reclaiming space from duplicate files in a serverless distributed file system. In: distributed computing systems, 2002. Proceedings. 22nd international conference on, IEEE, pp 617–624

  12. Bellare M, Keelveedhi S, Ristenpart T (2013) Message-locked encryption and secure deduplication. In Annual International Conference on the Theory and Applications of Cryptographic Techniques. Springer, pp 296–312

  13. Di Pietro R, Sorniotti A (2012) Boosting efficiency and security in proof of ownership for deduplication. In: proceedings of the 7th ACM symposium on information, computer and communications security, ACM, pp 81–82

  14. Ng WK, Wen Y, Zhu H (2012) Private data deduplication protocols in cloud storage. In proceedings of the 27th annual ACM symposium on applied computing, ACM, pp 441–446

  15. Leis V, Kemper A, Neumann T (2013) The adaptive radix tree: ARTful indexing for main-memory databases. In: 2013 IEEE 29th international conference on data engineering (ICDE) IEEE, pp 38-49

  16. Debnath B, Sengupta S, Li J, Lilja DJ, Du DH (2011) BloomFlash: bloom filter on flash-based storage. In 2011 31st international conference on distributed computing systems, IEEE, pp 635-644

  17. Singh P, Agarwal N, Raman B (2018) Secure data deduplication using secret sharing schemes over cloud. Futur Gener Comput Syst 88:156–167

    Article  Google Scholar 

  18. N Krishnaraj, Mohamed Elhoseny, E Laxmi Lydia, K Shankar, Omar ALDabbas (2020) An efficient radix trie-based semantic visual indexing model for large-scale image retrieval in cloud environment. Software: Practice and Experience. In press: https://doi.org/10.1002/spe.2834

  19. Sachi Nandan Mohanty, Ramya KC, Sheeba Rani S, Deepak Gupta, Shankar K, Lakshmanaprabu SK (2020) An efficient Lightweight integrated Block chain (ELIB) model for IoT security and privacy. Future Gener Comput Syst 102:1027–1037

  20. Shankar K, Mohamed Elhoseny (2019) Trust based cluster head election of secure message transmission in MANET using multi secure protocol with TDES. J Univers Comput Sci 25(10):1221–1239

    Google Scholar 

  21. Mohamed Elhoseny, Shankar K (2019) Reliable data transmission model for mobile Ad Hoc network using signcryption technique. IEEE Transactions on Reliability:1–10. In Press. https://doi.org/10.1109/TR.2019.2915800

  22. Shankar K, Lakshmanaprabu SK, Deepak Gupta, Ashish Khanna, Victor Hugo C Albuquerque (2018) Adaptive optimal multi key based encryption for digital image security. Concurrency and Computation: Practice and Experience. In press. https://doi.org/10.1002/cpe.5122

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Silambarasan Elkana Ebinazer.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

This article is part of the Topical Collection: Special Issue on Network In Box, Architecture, Networking and Applications

Guest Editor: Ching-Hsien Hsu

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Ebinazer, S.E., Savarimuthu, N. & S, M.S.B. An efficient secure data deduplication method using radix trie with bloom filter (SDD-RT-BF) in cloud environment. Peer-to-Peer Netw. Appl. 14, 2443–2451 (2021). https://doi.org/10.1007/s12083-020-00989-0

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12083-020-00989-0

Keywords

Navigation