Journal of Cybersecurity and Information Management

Journal DOI

https://doi.org/10.54216/JCIM

Submit Your Paper

2690-6775ISSN (Online) 2769-7851ISSN (Print)

Volume 14 , Issue 2 , PP: 87-100, 2024 | Cite this article as | XML | Html | PDF | Full Length Article

Modelling a Request and Response-Based Cryptographic Model For Executing Data Deduplication in the Cloud

Doddi Suresh Kumar 1 , Nulaka Srinivasu 2 *

  • 1 Computer Science and Engineering, Koneru Lakshmaiah Education Foundation, Guntur, Andhra Pradesh, India - (sureshdkumarmca@kluniversity.in)
  • 2 Computer Science and Engineering, Koneru Lakshmaiah Education Foundation, Guntur, Andhra Pradesh, India - (srinivasu28@kluniversity.in)
  • Doi: https://doi.org/10.54216/JCIM.140206

    Received: January 10, 2024 Revised: March 13, 2024 Accepted: July 01, 2024
    Abstract

    Cloud storage is one of the most crucial components of cloud computing because it makes it simpler for users to share and manage their data on the cloud with authorized users. Secure deduplication has attracted much attention in cloud storage because it may remove redundancy from encrypted data to save storage space and communication overhead. Many current safe deduplication systems usually focus on accomplishing the following characteristics regarding security and privacy: Access control, tag consistency, data privacy and defence against various attacks. But as far as we know, none can simultaneously fulfil all four conditions. In this research, we offer a safe deduplication method that is effective and provides user-defined access control to address this flaw. Because it only allows the cloud service provider to grant data access on behalf of data owners, our proposed solution (Request-response-based Elliptic Curve Cryptography) may effectively delete duplicates without compromising the security and privacy of cloud users. A thorough security investigation reveals that our approved safe deduplication solution successfully thwarts brute-force attacks while dependably maintaining tag consistency and data confidentiality. Comprehensive simulations show that our solution surpasses the evaluation in computing, communication, storage overheads, and deduplication efficiency.

    Keywords :

    data deduplication , cloud , encryption , decryption , redundancy

    References

    [1] Miao, J. Wang, H. Li, and X. Chen, “Secure multi-server-aided data deduplication in cloud computing,” Pervasive and Mobile Computing, vol. 24, pp. 129–137, 2015.

    [2] Shin, D. Koo, J. Yun, and J. Hur, “Decentralized server-aided encryption for secure deduplication in cloud storage,” IEEE Trans. Services Computing, vol. PP, no. 99, pp. 1–1, 2017.

    [3] Liu, W. Sun, W. Lou, Q. Pei, and Y. Zhang, “One-tag checker: Messagelocked integrity auditing on encrypted cloud deduplication storage,” in 2017 IEEE Conference on Computer Communications, INFOCOM 2017, Atlanta, GA, USA, May 1-4, 2017, 2017, pp. 1–9.

    [4] Jiang, T. Jiang, and L. Wang, “Secure and efficient cloud data deduplication with ownership management,” IEEE Trans. Services Computing, vol. PP, no. 99, pp. 1–1, 2017.

    [5] Ambeth Kumar, V.D. (2017). Automation of Image Categorization with Most Relevant Negatives. Pattern Recognition and Image Analysis, 27(3), 371–379.

    [6] Kumar, I., Kumar, A., Kumar, V.D.A. et al. (2022) Dense Tissue Pattern Characterization Using  

         Deep Neural Network. Cogn Comput 14, 1728–1751.

     [7] Yan, L. Zhang, W. Ding, and Q. Zheng, “Heterogeneous data storage management with deduplication in cloud computing,” IEEE Trans. Big Data, pp. 1–1, 2017.

    [8] Liu, K. R. Choo, R. H. Deng, R. Lu, and J. Weng, “Efficient and privacy-preserving outsourced calculation of rational numbers,” IEEE Trans. Dependable Sec. Comput., vol. 15, no. 1, pp. 27–39, 2018.

    [9] Yan, W. Ding, X. Yu, H. Zhu, and R. H. Deng, “Deduplication on encrypted big data in the cloud," IEEE Trans. Big Data, vol. 2, no. 2, pp. 138– 150, 2016.

    [10] Ambeth Kumar, V.D. Vaishali,S. Shweta, B. (2015). Basic Study of the Human Foot. Biomedical and Pharmacology, 8(1), 435-444.

    [11] Koo and J. Hur, “Privacy-preserving deduplication of encrypted data with dynamic ownership management in fog computing,” Future Generation Comp. Syst., vol. 78, pp. 739–752, 2018.

    [12] Tang, Y. Cui, C. Guan, J. Wu, J. Weng, and K. Ren, “Enabling ciphertext deduplication for secure cloud storage and access control,” in Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, AsiaCCS 2016, Xi’an, China, May 30 - June 3, 2016, 2016, pp. 59–70.

    [13] Yang, H. Zhu, H. Lu, J. Weng, Y. Zhang, and K. R. Choo, "Cloud-based data sharing with fine-grained proxy re-encryption," Pervasive and Mobile Computing, vol. 28, pp. 122–134, 2016.

    [14] Yan, L. Zhang, W. Ding, and Q. Zheng, “Heterogeneous data storage management with deduplication in cloud computing,” IEEE Trans. Big Data, vol. 5, no. 3, pp. 393–407, Sep. 2019.

    [15] Shen, Y. Su, and R. Hao, “Lightweight cloud storage auditing with deduplication supporting strong privacy protection,” IEEE Access, vol. 8, pp. 44 359–44 372, 2020.

    [16] Kumar, V.D.A., Sharmila, S., Kumar, A. et al.  (2023). A novel solution for finding postpartum haemorrhage using fuzzy neural techniques. Neural Comput & Applic. 35(33), 23683–23696

    [17] Liang, Z. Yan, X. Chen, L. T. Yang, W. Lou, and Y. T. Hou, “Game theoretical analysis on encrypted cloud data deduplication,” IEEE Trans. Ind. Informat., vol. 15, no. 10, pp. 5778–5789, Oct. 2019.

    [18] Liang, Z. Yan, R. H. Deng, and Q. Zheng, “Investigating the adoption of hybrid encrypted cloud data deduplication with game theory,” IEEE Trans. Parallel Distrib. Syst., vol. 32, no. 3, pp. 587–600, Mar. 2021.

    [19] Sathya Preiya, V., and V. D. Ambeth Kumar. (2023). Deep Learning-Based Classification and Feature Extraction for Predicting Pathogenesis of Foot Ulcers in Patients with Diabetes. Diagnostics 13(12), 1983.

    [20] Chen, Y. Mu, G. Yang, and F. Guo, ‘BL-MLE: Block-level message-locked encryption for secure large file deduplication,” IEEE Trans. Inf. Forensics Security, vol. 10, no. 12, pp. 2643–2652, Dec. 2015.

    [21] Kiss, J. Liu, T. Schneider, N. Asokan, and B. Pinkas, “Private set intersection for unequal set sizes with mobile applications,” in Proc. Privacy Enhancing Technol., 2017, pp. 177–197.

    [22] Pooranian, M. Shojafar, S. Garg, R. Taheri, and R. Tafazolli, “LEVER: Secure deduplicated cloud storage with encrypted two-party interactions in cyber–physical systems," IEEE Trans—Ind. Informat., vol. 17, no. 8, pp. 5759–5768, Aug. 2021.

    [23] Hemamalini, Selvamani, and Visvam Devadoss Ambeth Kumar. (2022). Outlier Based Skimpy Regularization Fuzzy Clustering Algorithm for Diabetic Retinopathy Image Segmentation. Symmetry,  14(12),  2512

    [24] Sherubha, "Graph-Based Event Measurement for Analyzing Distributed Anomalies in Sensor Networks”, Sådhanå(Springer), 45:212, https://doi.org/10.1007/s12046-020-01451-w

    [25] Sherubha, “An Efficient Network Threat Detection and Classification Method using ANP-MVPS Algorithm in Wireless Sensor Networks”, International Journal of Innovative Technology and Exploring Engineering (IJITEE), Volume-8 Issue-11, September 2019

    [26] Sherubha, “An Efficient Intrusion Detection and Authentication Mechanism for Detecting Clone Attack in Wireless Sensor Networks”, Journal of Advanced Research in Dynamical and Control Systems (JARDCS), Volume 11, issue 5, Pg No. 55-68

    [27] Piyush K. Pareek, Pixel Level Image Fusion in Moving objection Detection and Tracking with Machine Learning “,Fusion: Practice and Applications, Volume 2 , Issue 1 , PP: 42-60, 2020

    [28] Shivam Grover, Kshitij Sidana, Vanita Jain, “Egocentric Performance Capture: A Review”, Fusion: Practice and Applications, Volume 2, Issue 2 , PP: 64-73, 2020.

    [29] Abdel Nasser H. Zaied, Mahmoud Ismail and Salwa El- Sayed, A Survey on Meta-heuristic Algorithms for Global Optimization Problems, Journal of Intelligent Systems and Internet of Things,Volume 1 , Issue 1 , PP: 48-60, 2020

    [30] Mahmoud H.Alnamoly, Ahmed M. Alzohairy, Ibrahim M. El-Henawy, “A survey on gel images analysis software tools, Journal of Intelligent Systems and Internet of Things,Volume 1 , Issue 1 , PP: 40-47, 2021.

    Cite This Article As :
    Suresh, Doddi. , Srinivasu, Nulaka. Modelling a Request and Response-Based Cryptographic Model For Executing Data Deduplication in the Cloud. Journal of Cybersecurity and Information Management, vol. , no. , 2024, pp. 87-100. DOI: https://doi.org/10.54216/JCIM.140206
    Suresh, D. Srinivasu, N. (2024). Modelling a Request and Response-Based Cryptographic Model For Executing Data Deduplication in the Cloud. Journal of Cybersecurity and Information Management, (), 87-100. DOI: https://doi.org/10.54216/JCIM.140206
    Suresh, Doddi. Srinivasu, Nulaka. Modelling a Request and Response-Based Cryptographic Model For Executing Data Deduplication in the Cloud. Journal of Cybersecurity and Information Management , no. (2024): 87-100. DOI: https://doi.org/10.54216/JCIM.140206
    Suresh, D. , Srinivasu, N. (2024) . Modelling a Request and Response-Based Cryptographic Model For Executing Data Deduplication in the Cloud. Journal of Cybersecurity and Information Management , () , 87-100 . DOI: https://doi.org/10.54216/JCIM.140206
    Suresh D. , Srinivasu N. [2024]. Modelling a Request and Response-Based Cryptographic Model For Executing Data Deduplication in the Cloud. Journal of Cybersecurity and Information Management. (): 87-100. DOI: https://doi.org/10.54216/JCIM.140206
    Suresh, D. Srinivasu, N. "Modelling a Request and Response-Based Cryptographic Model For Executing Data Deduplication in the Cloud," Journal of Cybersecurity and Information Management, vol. , no. , pp. 87-100, 2024. DOI: https://doi.org/10.54216/JCIM.140206