Skip to main content

Advertisement

Log in

Finite State Automata Based Cryptosystem for Secure Data Sharing and De-duplication in Cloud Computing

  • Original Research
  • Published:
SN Computer Science Aims and scope Submit manuscript

Abstract

In the era of high-speed internet access, a surge in redundant data generation is observed across different media sources and devices, posing challenges in computational and storage efficiency during data outsourcing and retrieval. Addressing this issue and optimizing storage efficiency is essential to curtailing redundant data creation within storage servers. The potential compromise of sensitive data within outsourced information is susceptible to both internal and external threats. Thus, securing data during both data-in-transmission and data-at-storage is imperative. However, conventional cryptosystems alongside deduplication services face a dilemma due to the conflict between encryption and deduplication. Furthermore, prevailing cryptosystems pose false keys and false ownership claiming, bruit-force, and dictionary attacks during the secure deduplication process. To tackle these challenges, this paper utilizes a Finite State Automata (FSA) based cryptosystem alongside deduplication, complemented by Proof of Ownership (PoW) and Data Integrity Verification (DIV) protocols. This method ensures robust data security effectively by resolving the encryption-deduplication paradox. Empirical evaluation validates the efficacy of the proposed method, showcasing improvements over the existing system. It also demonstrates reduced communication and computational complexity and improved storage efficiency, and fortified security provisions during data deduplication.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Algorithm 1
Algorithm 2
Fig. 6
Algorithm 3
Algorithm 4
Fig. 7
Algorithm 5
Fig. 8
Algorithm 6
Fig. 9
Algorithm 7
Fig. 10
Algorithm 8
Fig. 11
Fig. 12
Fig. 13

Similar content being viewed by others

Data Availibility

Data availability is not applicable to this article as no new data were created or analysed in this work.

References

  1. Rydning DRJGJ, Reinsel J, Gantz J. The digitization of the world from edge to core. Framingham: International Data Corporation; 2018.

    Google Scholar 

  2. Wang J. Formal methods in computer science. CRC Press; 2019.

    Book  Google Scholar 

  3. Armknecht F, Bohli J-M, Karame GO, Youssef F. Transparent data deduplication in the cloud. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015. pp. 886–900.

  4. Meyer Dutch T, Bolosky WJ. A study of practical deduplication. ACM Trans Storage (ToS). 2012;7(4):1–20.

    Article  Google Scholar 

  5. Rashid F, Miri A. Deduplication practices for multimedia data in the cloud. In: Guide to big data applications. Springer; 2018. p. 245–71.

    Chapter  Google Scholar 

  6. Zhou Y, Feng D, Xia W, Fu M, Huang F, Zhang Y, Li C. Secdep: A user-aware efficient fine-grained secure deduplication scheme with multi-level key management. In 2015 31st Symposium on Mass Storage Systems and Technologies (MSST). IEEE; 2015. pp. 1–14.

  7. Ravneet K, Inderveer C, Jhilik B. Data deduplication techniques for efficient cloud storage management: a systematic review. J Supercomput. 2018;74(5):2035–85.

    Article  Google Scholar 

  8. Youngjoo S, Dongyoung K, Junbeom H. A survey of secure data deduplication schemes for cloud storage systems. ACM Comput Surv (CSUR). 2017;49(4):1–38.

    Article  Google Scholar 

  9. Bellare M, Keelveedhi S, Ristenpart T. Message-locked encryption and secure deduplication. In: Annual international conference on the theory and applications of cryptographic techniques. Springer; 2013. pp. 296–312.

  10. Douceur JR, Adya A, Bolosky WJ, Simon P, Theimer M. Reclaiming space from duplicate files in a serverless distributed file system. In: Proceedings 22nd international conference on distributed computing systems. IEEE; 2002. pp. 617–624.

  11. Abubaker S, Wu K. Dafa-a lightweight des augmented finite automaton cryptosystem. In: International Conference on Security and Privacy in Communication Systems. Springer; 2012. pp. 1–18.

  12. Kumar NS, Rajya Lakshmi GV, Balamurugan B. Enhanced attribute based encryption for cloud computing. In: International Conference on Information and Communication Technologies, vol. 46. Procedia Computer Science; 2015. pp. 689–96.

  13. Saroj SK, Chauhan SK, Sharma AK, Vats S. Threshold cryptography based data security in cloud computing. In: 2015 IEEE International Conference on Computational Intelligence & Communication Technology. IEEE; 2015. pp. 202–207.

  14. El Makkaoui K, Beni-Hssane A, Ezzati A. Multiprime cloud-rsa: a fast homomorphic encryption scheme for data confidentiality protection in clouds. Int J Intell Enterp. 2019;6(2–4):217–29.

    Google Scholar 

  15. Gudeme JR, Pasupuleti SK, Kandukuri R. Review of remote data integrity auditing schemes in cloud computing: taxonomy, analysis, and open issues. Int J Cloud Comput. 2019;8(1):20–49.

    Article  Google Scholar 

  16. Juels A, Kaliski Jr BS. Pors: Proofs of retrievability for large files. In: Proceedings of the 14th ACM conference on Computer and communications security. 2007; pp. 584–597.

  17. Chris Erway C, Küpçü A, Papamanthou C, Tamassia R. Dynamic provable data possession. ACM Trans Inf Syst Secur (TISSEC). 2015;17(4):1–29.

    Article  Google Scholar 

  18. Kan Y, Xiaohua J. An efficient and secure dynamic auditing protocol for data storage in cloud computing. IEEE Trans Parallel Distrib Syst. 2012;24(9):1717–26.

    Google Scholar 

  19. Wang Q, Wang C, Li J, Ren K, Lou W. Enabling public verifiability and data dynamics for storage security in cloud computing. In: European symposium on research in computer security. Springer; 2009. pp. 355–370.

  20. Ateniese G, Burns R, Curtmola R, Herring J, Kissner L, Peterson Z, Song D. Provable data possession at untrusted stores. In: Proceedings of the 14th ACM conference on Computer and communications security; 2007. pp. 598–609.

  21. David C, Alptekin K, Daniel W. Dynamic proofs of retrievability via oblivious ram. J Cryptol. 2017;30(1):22–57.

    Article  MathSciNet  Google Scholar 

  22. Jay D, Parvez F, Vijay L, Akka Z, Manoj G, Mauro C. Spark: Secure pseudorandom key-based encryption for deduplicated storage. Comput Commun. 2020;154:148–59.

    Article  Google Scholar 

  23. Xiaoyu Z, Yuyang Z, Yalan Y, Fagen L. A cloud data deduplication scheme based on certificateless proxy re-encryption. J Syst Archit. 2020;102: 101666.

    Article  Google Scholar 

  24. Geeta CM, Shreyas Raju RG, Raghavendra S, Rajkumar B, Venugopal KR, Iyengar SS, Patnaik LM. Sdvadc: Secure deduplication and virtual auditing of data in cloud. Procedia Comput Sci. 2020;171:2225–34.

    Article  Google Scholar 

  25. Guo C, Jiang X, Choo K-KR, Jie Y. R-dedup: Secure client-side deduplication for encrypted data without involving a third-party entity. J Netw Comput Appl. 2020;162: 102664.

    Article  Google Scholar 

  26. Guohua T, Hua M, Ying X, Zhenhua L. Randomized deduplication with ownership management and data sharing in cloud storage. J Inf Secur Appl. 2020;51: 102432.

    Google Scholar 

  27. Liang X, Yan Z, Deng RH. Game theoretical study on client-controlled cloud data deduplication. Comput Secur. 2020;91: 101730.

    Article  Google Scholar 

  28. Yuan H, Chen X, Wang J, Yuan J, Yan H, Susilo W. Blockchain-based public auditing and secure deduplication with fair arbitration. Inf Sci. 2020;541:409–25.

    Article  MathSciNet  Google Scholar 

  29. Saharan S, Somani G, Gupta G, Verma R, Gaur MS, Buyya R. Quickdedup: Efficient vm deduplication in cloud computing environments. J Parallel Distrib Comput. 2020;139:18–31.

    Article  Google Scholar 

  30. Ke H, Xiaosong Z, Yi M, Fatemeh R, Xiaoming H, Yongcheng G. Blockchain-based deduplication with arbitration and incentives. IET Inf Secur. 2022;16(6):401–16.

    Article  Google Scholar 

  31. Hua M, Linchao Z, Zhenhua L, Enting D. Secure deduplication of encrypted data in online and offline environments. Int J High Perform Comput Netw. 2019;14(3):294–303.

    Article  Google Scholar 

  32. Huixia H, Tao J, Shichong T, Xiaoling T. Efficient public integrity auditing with secure deduplication in cloud computing. Int J Embed Syst. 2019;11(6):764–77.

    Article  Google Scholar 

  33. Mote RD, Pawar AV. Privacy preservation using hybrid cloud environment and map-reduce for data deduplication. Int J Adv Intell Paradig. 2019;14(3–4):281–96.

    Google Scholar 

  34. Yuan H, Chen X, Li J, Jiang T, Wang J, Deng R. Secure cloud data deduplication with efficient re-encryption. IEEE Trans Serv Comput. 2019;15(1):442–56.

    Article  Google Scholar 

  35. Jiaojiao W, Yanping L, Tianyin W, Yong D. Cpda: A confidentiality-preserving deduplication cloud storage with public cloud auditing. IEEE Access. 2019;7:160482–97.

    Article  Google Scholar 

  36. Miri A, Rashid F. Secure textual data deduplication scheme based on data encoding and compression. In 2019 IEEE 10th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON). IEEE; 2019. pp. 0207–0211.

  37. Geeta CM, Lakshmi GM, Raju RGS, Raghavendra S, Buyya R, Venugopal KR, Iyengar SS, Patnaik LM. Stldas: Secure two level deduplication and auditing of shared data in cloud. In 2019 IEEE Region 10 Symposium (TENSYMP). IEEE; 2019. pp. 698–703.

  38. Zhang Y, Xu C, Cheng N, Shen X. Secure encrypted data deduplication for cloud storage against compromised key servers. In: 2019 IEEE Global Communications Conference (GLOBECOM). IEEE; 2019. pp. 1–6.

  39. Islam T, Mistareehi H, Manivannan D. Secres: A secure and reliable storage scheme for cloud with client-side data deduplication. In: 2019 IEEE Global Communications Conference (GLOBECOM). IEEE; 2019. pp. 1–6.

  40. Meixia M, Guohua T, Willy S. New proofs of ownership for efficient data deduplication in the adversarial conspiracy model. Int J Intell Syst. 2021;36(6):2753–66.

    Article  Google Scholar 

  41. Kohavi Z, Jha NK. Switching and finite automata theory. Cambridge University Press; 2009.

    Book  Google Scholar 

  42. Tao R. Finite automata and application to cryptography. Springer; 2008.

    Google Scholar 

  43. Carton O, Guillon B, Reiter F. Counter machines and distributed automata. In: International Workshop on Cellular Automata and Discrete Complex Systems. Springer; 2018. pp. 13–28.

  44. Gutowitz H. Cellular automata: theory and experiment. MIT press; 1991. p. 45.

    Google Scholar 

  45. Amorim I, Machiavelo A, Reis R. On linear finite automata and cryptography. Technical report, Technical Report Series: DCC-2011-11, Version 1.0, 2011.

  46. Wolfram S. Cryptography with cellular automata. In: Conference on the Theory and Application of Cryptographic Techniques. Springer; 1985. pp. 429–432.

  47. Nandi S, Kar BK, Chaudhuri PP. Theory and applications of cellular automata in cryptography. IEEE Trans Comput. 1994;43(12):1346–57.

    Article  MathSciNet  Google Scholar 

  48. Khaleel G, Turaev S, Tamrin MIM, et al. A new block cipher based on finite automata systems. Int J Perceptive Cogn Comput. 2016. https://doi.org/10.31436/ijpcc.v2i1.31.

    Article  Google Scholar 

  49. Khaleel G, Turaev S, Al-Shaikhli I, Tamrin MIM. An overview of cryptosystems based on finite automata. J Adv Rev Sci Res. 2016;27(1):1–7.

    Google Scholar 

  50. Gysin M. A one-key cryptosystem based on a finite nonlinear automaton. In: International Conference on Cryptography: Policy and Algorithms. Springer; 1995. pp. 165–173.

  51. Yongkai F, Xiaodong L, Wei L, Gang T, Priyadarsi N. A secure privacy preserving deduplication scheme for cloud computing. Future Gener Comput Syst. 2019;101:127–35.

    Article  Google Scholar 

  52. Renji T, Shihua C. On finite automaton public-key cryptosystem. Theor Comput Sci. 1999;226(1–2):143–72.

    MathSciNet  Google Scholar 

  53. Walker J, Fourmilab. ENT - A Pseudorandom Number Sequence Test Program, 2020. https://www.fourmilab.ch/random/. Accessed 20 Aug 2020.

  54. Abubaker S. Probabilistic, lightweight cryptosystems based on finite automata. A PhD thesis, 2011.

  55. Thorncharoensri P, Susilo W, Chow YW. Privacy-preserving file sharing on cloud storage with certificateless signcryption. Theor Comput Sci. 2022;19(916):1–21.

    Article  MathSciNet  Google Scholar 

  56. Lei J, Wu Q, Xu J. Privacy and security-aware workflow scheduling in a hybrid cloud. Future Gener Comput Syst. 2022;1(131):269–78.

    Article  Google Scholar 

  57. Xie B, Xiang T, Liao X. Access-oblivious and privacy-preserving k nearest neighbors classification in dual clouds. Comput Commun. 2022;15(184):12–23.

    Article  Google Scholar 

  58. Valadares DC, Will NC, Spohn MA, de Souza Santos DF, Perkusich A, Gorgonio KC. Confidential computing in cloud/fog-based Internet of Things scenarios. Internet Things. 2022;1(19): 100543.

    Article  Google Scholar 

  59. Shen J, Yang H, Vijayakumar P, Kumar N. A privacy-preserving and untraceable group data sharing scheme in cloud computing. IEEE Trans Dependable Secur Comput. 2021;19(4):2198–210.

    Article  Google Scholar 

  60. Ge C, Susilo W, Liu Z, Xia J, Szalachowski P, Fang L. Secure keyword search and data sharing mechanism for cloud computing. IEEE Trans Dependable Secur Comput. 2020;18(6):2787–800.

    Google Scholar 

  61. Zhuo M, Zhang J. Efficient, Traceable and Privacy-Aware Data Access Control in Distributed Cloud-based IoD Systems. IEEE Access. 2023;11:45206–21.

    Article  Google Scholar 

  62. Huang Q, Wang C, Chen L. Secure and fine-grained flow control for subscription-based data services in cloud-edge computing. IEEE Trans Serv Comput. 2022;16(3):2165–77.

    Google Scholar 

  63. Roy S, Das AK, Chatterjee S, Kumar N, Chattopadhyay S, Rodrigues JJ. Provably secure fine-grained data access control over multiple cloud servers in mobile cloud computing based healthcare applications. IEEE Trans Ind Inform. 2018;15(1):457–68.

    Article  Google Scholar 

  64. Sangeetha M, Vijayakarthik P, Dhanasekaran S, Murugan BS. Fine grained access control using H-KCABE in cloud storage. Mater Today Proc. 2021;1(37):2735–7.

    Article  Google Scholar 

  65. Kodada BB, D’Mello DA, DK SK. FSAaCIT: Finite State Automata based One-Key Cryptosystem and Chunk-based Indexing Technique for Secure Data De-duplication in Cloud Computing. https://www.techrxiv.org/ndownloader/files/36651519/1

  66. Xue Y, et al. Achieving efficient secure deduplication with user-defined access control in cloud. IEEE Trans Dependable Secure Comput. 2020;19(1):591–606.

    Google Scholar 

  67. Xixun Y, et al. Veridedup: A verifiable cloud data deduplication scheme with integrity and duplication proof. IEEE Trans Dependable Secur Comput. 2022;20(1):680–94.

    Google Scholar 

  68. Mondal A, Chatterjee PS. CloudSec: a lightweight and agile approach to secure medical image transmission in the cloud computing environment. SN Comput Sci 2024; 5(2):237.

    Article  Google Scholar 

Download references

Funding

The authors declare that no funds, grants, or other support were received during the preparation of this manuscript.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Basappa B. Kodada.

Ethics declarations

Conflict of Interest

On behalf of all authors, the corresponding author states that there is no potential Conflict of interest, whether financial or non-financial.

Research Involving Human and\or Animal Participants

The authors also clarify that neither human nor animal participants were engaged in this research work.

Consent for Publication

The authors wish to clarify that the manuscript is not currently being reviewed or considered for publication by any peer-reviewed journal. However, the results presented in this manuscript are available in the TechRxiv preprint server [65] powered by IEEE which was submitted by the authors to obtain feedback and comments from the scientific community.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Kodada, B.B., D’Mello, D.A. & Kumar, D.K.S. Finite State Automata Based Cryptosystem for Secure Data Sharing and De-duplication in Cloud Computing. SN COMPUT. SCI. 5, 774 (2024). https://doi.org/10.1007/s42979-024-03101-y

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s42979-024-03101-y

Keywords

Navigation