Abstract
In the era of high-speed internet access, a surge in redundant data generation is observed across different media sources and devices, posing challenges in computational and storage efficiency during data outsourcing and retrieval. Addressing this issue and optimizing storage efficiency is essential to curtailing redundant data creation within storage servers. The potential compromise of sensitive data within outsourced information is susceptible to both internal and external threats. Thus, securing data during both data-in-transmission and data-at-storage is imperative. However, conventional cryptosystems alongside deduplication services face a dilemma due to the conflict between encryption and deduplication. Furthermore, prevailing cryptosystems pose false keys and false ownership claiming, bruit-force, and dictionary attacks during the secure deduplication process. To tackle these challenges, this paper utilizes a Finite State Automata (FSA) based cryptosystem alongside deduplication, complemented by Proof of Ownership (PoW) and Data Integrity Verification (DIV) protocols. This method ensures robust data security effectively by resolving the encryption-deduplication paradox. Empirical evaluation validates the efficacy of the proposed method, showcasing improvements over the existing system. It also demonstrates reduced communication and computational complexity and improved storage efficiency, and fortified security provisions during data deduplication.





















Similar content being viewed by others
Data Availibility
Data availability is not applicable to this article as no new data were created or analysed in this work.
References
Rydning DRJGJ, Reinsel J, Gantz J. The digitization of the world from edge to core. Framingham: International Data Corporation; 2018.
Wang J. Formal methods in computer science. CRC Press; 2019.
Armknecht F, Bohli J-M, Karame GO, Youssef F. Transparent data deduplication in the cloud. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015. pp. 886–900.
Meyer Dutch T, Bolosky WJ. A study of practical deduplication. ACM Trans Storage (ToS). 2012;7(4):1–20.
Rashid F, Miri A. Deduplication practices for multimedia data in the cloud. In: Guide to big data applications. Springer; 2018. p. 245–71.
Zhou Y, Feng D, Xia W, Fu M, Huang F, Zhang Y, Li C. Secdep: A user-aware efficient fine-grained secure deduplication scheme with multi-level key management. In 2015 31st Symposium on Mass Storage Systems and Technologies (MSST). IEEE; 2015. pp. 1–14.
Ravneet K, Inderveer C, Jhilik B. Data deduplication techniques for efficient cloud storage management: a systematic review. J Supercomput. 2018;74(5):2035–85.
Youngjoo S, Dongyoung K, Junbeom H. A survey of secure data deduplication schemes for cloud storage systems. ACM Comput Surv (CSUR). 2017;49(4):1–38.
Bellare M, Keelveedhi S, Ristenpart T. Message-locked encryption and secure deduplication. In: Annual international conference on the theory and applications of cryptographic techniques. Springer; 2013. pp. 296–312.
Douceur JR, Adya A, Bolosky WJ, Simon P, Theimer M. Reclaiming space from duplicate files in a serverless distributed file system. In: Proceedings 22nd international conference on distributed computing systems. IEEE; 2002. pp. 617–624.
Abubaker S, Wu K. Dafa-a lightweight des augmented finite automaton cryptosystem. In: International Conference on Security and Privacy in Communication Systems. Springer; 2012. pp. 1–18.
Kumar NS, Rajya Lakshmi GV, Balamurugan B. Enhanced attribute based encryption for cloud computing. In: International Conference on Information and Communication Technologies, vol. 46. Procedia Computer Science; 2015. pp. 689–96.
Saroj SK, Chauhan SK, Sharma AK, Vats S. Threshold cryptography based data security in cloud computing. In: 2015 IEEE International Conference on Computational Intelligence & Communication Technology. IEEE; 2015. pp. 202–207.
El Makkaoui K, Beni-Hssane A, Ezzati A. Multiprime cloud-rsa: a fast homomorphic encryption scheme for data confidentiality protection in clouds. Int J Intell Enterp. 2019;6(2–4):217–29.
Gudeme JR, Pasupuleti SK, Kandukuri R. Review of remote data integrity auditing schemes in cloud computing: taxonomy, analysis, and open issues. Int J Cloud Comput. 2019;8(1):20–49.
Juels A, Kaliski Jr BS. Pors: Proofs of retrievability for large files. In: Proceedings of the 14th ACM conference on Computer and communications security. 2007; pp. 584–597.
Chris Erway C, Küpçü A, Papamanthou C, Tamassia R. Dynamic provable data possession. ACM Trans Inf Syst Secur (TISSEC). 2015;17(4):1–29.
Kan Y, Xiaohua J. An efficient and secure dynamic auditing protocol for data storage in cloud computing. IEEE Trans Parallel Distrib Syst. 2012;24(9):1717–26.
Wang Q, Wang C, Li J, Ren K, Lou W. Enabling public verifiability and data dynamics for storage security in cloud computing. In: European symposium on research in computer security. Springer; 2009. pp. 355–370.
Ateniese G, Burns R, Curtmola R, Herring J, Kissner L, Peterson Z, Song D. Provable data possession at untrusted stores. In: Proceedings of the 14th ACM conference on Computer and communications security; 2007. pp. 598–609.
David C, Alptekin K, Daniel W. Dynamic proofs of retrievability via oblivious ram. J Cryptol. 2017;30(1):22–57.
Jay D, Parvez F, Vijay L, Akka Z, Manoj G, Mauro C. Spark: Secure pseudorandom key-based encryption for deduplicated storage. Comput Commun. 2020;154:148–59.
Xiaoyu Z, Yuyang Z, Yalan Y, Fagen L. A cloud data deduplication scheme based on certificateless proxy re-encryption. J Syst Archit. 2020;102: 101666.
Geeta CM, Shreyas Raju RG, Raghavendra S, Rajkumar B, Venugopal KR, Iyengar SS, Patnaik LM. Sdvadc: Secure deduplication and virtual auditing of data in cloud. Procedia Comput Sci. 2020;171:2225–34.
Guo C, Jiang X, Choo K-KR, Jie Y. R-dedup: Secure client-side deduplication for encrypted data without involving a third-party entity. J Netw Comput Appl. 2020;162: 102664.
Guohua T, Hua M, Ying X, Zhenhua L. Randomized deduplication with ownership management and data sharing in cloud storage. J Inf Secur Appl. 2020;51: 102432.
Liang X, Yan Z, Deng RH. Game theoretical study on client-controlled cloud data deduplication. Comput Secur. 2020;91: 101730.
Yuan H, Chen X, Wang J, Yuan J, Yan H, Susilo W. Blockchain-based public auditing and secure deduplication with fair arbitration. Inf Sci. 2020;541:409–25.
Saharan S, Somani G, Gupta G, Verma R, Gaur MS, Buyya R. Quickdedup: Efficient vm deduplication in cloud computing environments. J Parallel Distrib Comput. 2020;139:18–31.
Ke H, Xiaosong Z, Yi M, Fatemeh R, Xiaoming H, Yongcheng G. Blockchain-based deduplication with arbitration and incentives. IET Inf Secur. 2022;16(6):401–16.
Hua M, Linchao Z, Zhenhua L, Enting D. Secure deduplication of encrypted data in online and offline environments. Int J High Perform Comput Netw. 2019;14(3):294–303.
Huixia H, Tao J, Shichong T, Xiaoling T. Efficient public integrity auditing with secure deduplication in cloud computing. Int J Embed Syst. 2019;11(6):764–77.
Mote RD, Pawar AV. Privacy preservation using hybrid cloud environment and map-reduce for data deduplication. Int J Adv Intell Paradig. 2019;14(3–4):281–96.
Yuan H, Chen X, Li J, Jiang T, Wang J, Deng R. Secure cloud data deduplication with efficient re-encryption. IEEE Trans Serv Comput. 2019;15(1):442–56.
Jiaojiao W, Yanping L, Tianyin W, Yong D. Cpda: A confidentiality-preserving deduplication cloud storage with public cloud auditing. IEEE Access. 2019;7:160482–97.
Miri A, Rashid F. Secure textual data deduplication scheme based on data encoding and compression. In 2019 IEEE 10th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON). IEEE; 2019. pp. 0207–0211.
Geeta CM, Lakshmi GM, Raju RGS, Raghavendra S, Buyya R, Venugopal KR, Iyengar SS, Patnaik LM. Stldas: Secure two level deduplication and auditing of shared data in cloud. In 2019 IEEE Region 10 Symposium (TENSYMP). IEEE; 2019. pp. 698–703.
Zhang Y, Xu C, Cheng N, Shen X. Secure encrypted data deduplication for cloud storage against compromised key servers. In: 2019 IEEE Global Communications Conference (GLOBECOM). IEEE; 2019. pp. 1–6.
Islam T, Mistareehi H, Manivannan D. Secres: A secure and reliable storage scheme for cloud with client-side data deduplication. In: 2019 IEEE Global Communications Conference (GLOBECOM). IEEE; 2019. pp. 1–6.
Meixia M, Guohua T, Willy S. New proofs of ownership for efficient data deduplication in the adversarial conspiracy model. Int J Intell Syst. 2021;36(6):2753–66.
Kohavi Z, Jha NK. Switching and finite automata theory. Cambridge University Press; 2009.
Tao R. Finite automata and application to cryptography. Springer; 2008.
Carton O, Guillon B, Reiter F. Counter machines and distributed automata. In: International Workshop on Cellular Automata and Discrete Complex Systems. Springer; 2018. pp. 13–28.
Gutowitz H. Cellular automata: theory and experiment. MIT press; 1991. p. 45.
Amorim I, Machiavelo A, Reis R. On linear finite automata and cryptography. Technical report, Technical Report Series: DCC-2011-11, Version 1.0, 2011.
Wolfram S. Cryptography with cellular automata. In: Conference on the Theory and Application of Cryptographic Techniques. Springer; 1985. pp. 429–432.
Nandi S, Kar BK, Chaudhuri PP. Theory and applications of cellular automata in cryptography. IEEE Trans Comput. 1994;43(12):1346–57.
Khaleel G, Turaev S, Tamrin MIM, et al. A new block cipher based on finite automata systems. Int J Perceptive Cogn Comput. 2016. https://doi.org/10.31436/ijpcc.v2i1.31.
Khaleel G, Turaev S, Al-Shaikhli I, Tamrin MIM. An overview of cryptosystems based on finite automata. J Adv Rev Sci Res. 2016;27(1):1–7.
Gysin M. A one-key cryptosystem based on a finite nonlinear automaton. In: International Conference on Cryptography: Policy and Algorithms. Springer; 1995. pp. 165–173.
Yongkai F, Xiaodong L, Wei L, Gang T, Priyadarsi N. A secure privacy preserving deduplication scheme for cloud computing. Future Gener Comput Syst. 2019;101:127–35.
Renji T, Shihua C. On finite automaton public-key cryptosystem. Theor Comput Sci. 1999;226(1–2):143–72.
Walker J, Fourmilab. ENT - A Pseudorandom Number Sequence Test Program, 2020. https://www.fourmilab.ch/random/. Accessed 20 Aug 2020.
Abubaker S. Probabilistic, lightweight cryptosystems based on finite automata. A PhD thesis, 2011.
Thorncharoensri P, Susilo W, Chow YW. Privacy-preserving file sharing on cloud storage with certificateless signcryption. Theor Comput Sci. 2022;19(916):1–21.
Lei J, Wu Q, Xu J. Privacy and security-aware workflow scheduling in a hybrid cloud. Future Gener Comput Syst. 2022;1(131):269–78.
Xie B, Xiang T, Liao X. Access-oblivious and privacy-preserving k nearest neighbors classification in dual clouds. Comput Commun. 2022;15(184):12–23.
Valadares DC, Will NC, Spohn MA, de Souza Santos DF, Perkusich A, Gorgonio KC. Confidential computing in cloud/fog-based Internet of Things scenarios. Internet Things. 2022;1(19): 100543.
Shen J, Yang H, Vijayakumar P, Kumar N. A privacy-preserving and untraceable group data sharing scheme in cloud computing. IEEE Trans Dependable Secur Comput. 2021;19(4):2198–210.
Ge C, Susilo W, Liu Z, Xia J, Szalachowski P, Fang L. Secure keyword search and data sharing mechanism for cloud computing. IEEE Trans Dependable Secur Comput. 2020;18(6):2787–800.
Zhuo M, Zhang J. Efficient, Traceable and Privacy-Aware Data Access Control in Distributed Cloud-based IoD Systems. IEEE Access. 2023;11:45206–21.
Huang Q, Wang C, Chen L. Secure and fine-grained flow control for subscription-based data services in cloud-edge computing. IEEE Trans Serv Comput. 2022;16(3):2165–77.
Roy S, Das AK, Chatterjee S, Kumar N, Chattopadhyay S, Rodrigues JJ. Provably secure fine-grained data access control over multiple cloud servers in mobile cloud computing based healthcare applications. IEEE Trans Ind Inform. 2018;15(1):457–68.
Sangeetha M, Vijayakarthik P, Dhanasekaran S, Murugan BS. Fine grained access control using H-KCABE in cloud storage. Mater Today Proc. 2021;1(37):2735–7.
Kodada BB, D’Mello DA, DK SK. FSAaCIT: Finite State Automata based One-Key Cryptosystem and Chunk-based Indexing Technique for Secure Data De-duplication in Cloud Computing. https://www.techrxiv.org/ndownloader/files/36651519/1
Xue Y, et al. Achieving efficient secure deduplication with user-defined access control in cloud. IEEE Trans Dependable Secure Comput. 2020;19(1):591–606.
Xixun Y, et al. Veridedup: A verifiable cloud data deduplication scheme with integrity and duplication proof. IEEE Trans Dependable Secur Comput. 2022;20(1):680–94.
Mondal A, Chatterjee PS. CloudSec: a lightweight and agile approach to secure medical image transmission in the cloud computing environment. SN Comput Sci 2024; 5(2):237.
Funding
The authors declare that no funds, grants, or other support were received during the preparation of this manuscript.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of Interest
On behalf of all authors, the corresponding author states that there is no potential Conflict of interest, whether financial or non-financial.
Research Involving Human and\or Animal Participants
The authors also clarify that neither human nor animal participants were engaged in this research work.
Consent for Publication
The authors wish to clarify that the manuscript is not currently being reviewed or considered for publication by any peer-reviewed journal. However, the results presented in this manuscript are available in the TechRxiv preprint server [65] powered by IEEE which was submitted by the authors to obtain feedback and comments from the scientific community.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Kodada, B.B., D’Mello, D.A. & Kumar, D.K.S. Finite State Automata Based Cryptosystem for Secure Data Sharing and De-duplication in Cloud Computing. SN COMPUT. SCI. 5, 774 (2024). https://doi.org/10.1007/s42979-024-03101-y
Received:
Accepted:
Published:
DOI: https://doi.org/10.1007/s42979-024-03101-y