Secure Data Storage Optimization Over Cloud using Encrypted Cloud Data Deduplication Technique

Authors

  • Dr. Harsh Lohia
  • Suhas A
  • Lakade

DOI:

https://doi.org/10.46243/jst.2024.v9.i01.pp131-138

Keywords:

authorization, data security, hybrid storage on cloud, privilege, deduplication

Abstract

Data deduplication is a crucial data compression technique used to eliminate duplicate copies of repetitive data, commonly employed in cloud storage to reduce storage space and bandwidth usage. To ensure the confidentiality of sensitive data while supporting deduplication, a method known as convergent encryption has been introduced to encrypt data before outsourcing. In this paper, we present the first formal approach to address the problem of authorized data deduplication. Unlike traditional deduplication systems, we also consider the varying privileges of users during the duplicate check process, in addition to the data itself. We introduce several novel deduplication constructions that facilitate authorized duplicate check within a hybrid cloud architecture. A comprehensive security analysis validates the effectiveness of proposed scheme based on the specified security model. As a proof of concept, we have implemented a prototype of the proposed authorized duplicate check scheme and performed testbed experiments using it. The results demonstrate that proposed approach incurs minimal overhead compared to normal operations.

 

 

Downloads

Published

2024-02-03

How to Cite

Dr. Harsh Lohia, Suhas A, & Lakade. (2024). Secure Data Storage Optimization Over Cloud using Encrypted Cloud Data Deduplication Technique. Journal of Science & Technology (JST), 9(1), 131–138. https://doi.org/10.46243/jst.2024.v9.i01.pp131-138

Similar Articles

<< < 11 12 13 14 15 16 17 18 19 20 > >> 

You may also start an advanced similarity search for this article.