Abstract
Cloud is resource-rich distributed environment for outsourcing data and computations in pay as you go fashion. Organizations changed their business models with respect to computing resources. Different kinds of data are being outsourced to public cloud. The data also includes imagery that is essential in different real-world applications. However, providing privacy and security to the storage data is indispensable. From the cloud infrastructure point of view, it is essential to have provision for identifying duplicates in the objects stored and there needs to be a mechanism for secure deduplication. Deduplication at different levels of granularity is essential for improving performance of cloud infrastructure and also see that the privacy and security of data is not lost. The traditional methods used for deduplication do not work directly on the encrypted data. This has been overcome with certain deduplication methods that can act directly on the encrypted and outsourced data. The conventional cryptographic methods such as symmetric and asymmetric are not flexible to have flexibility in access control. Compressive sensing-based simultaneous data compression and security for data deduplication in cloud is the proposition desired. Toward this end, this paper reviews literature and find current academic thinking on this area of research. It covers various kinds of methods and provides valuable insights that help in further research in the area of secure storage of images in cloud in such a way that the deduplication process can be leveraged.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Xia W, Jiang H, Feng D, Douglis F, Shilane P, Hua Y, Fu M, Zhang Y, Zhou Y (2016) A comprehensive study of the past, present, and future of data deduplication. Proc IEEE 104(9):1–30
Cui H, Deng RH, Li Y, Wu G (2017) Attribute-based storage supporting secure deduplication of encrypted data in cloud, pp 1–14
Jiang T, Chen X, Wu Q, Ma J, Susilo W, Lou W (2017) Secure and efficient cloud data deduplication with randomized tag. IEEE Trans Inf Forensics Secur 12(3):1–12
Hur J, Koo D, Shin Y, Kang K (2016) Secure data deduplication with dynamic ownership management in cloud storage. IEEE Trans Knowl Data Eng 28(11):1–14
Fu Y, Jiang H, Xiao N, Tian L, Liu F, Xu L (2014) Application-aware local-global source deduplication for cloud backup services of personal storage. IEEE Trans Parallel Distrib Syst 25(5):1155–1165
Yan Z, Wang M, Li Y (2016) Encrypted data management with deduplication in cloud computing. IEEE Cloud Computing published by the IEEE computer society, pp 1–8
Li J, Chen X, Huang X, Tang S, Xiang Y, Hassan M, Alelaiwi AH (2015) Secure distributed deduplication systems with improved reliability. IEEE Trans Comput 64(12):3569–3579
Zhu S, Zhu C, Wang W (2018)A novel image compression-encryption scheme based on chaos and compression sensing. IEEE Access 6:1–13
Zhang Y, Zhou J, Chen F, Zhang Y, Wong K-W et al (2016) Embedding cryptographic features in compressive sensing, pp 1–10
Zhang Y, Xu B, Zhou N (2017) A novel image compression–encryption hybrid algorithm based on the analysis sparse representation. Elsevier, pp 1–25
Zhou N, Li H, Wang D, Pan S, Zhou Z (2015) Image compression and encryption scheme based on 2D compressive sensing and fractional Mellin transform. Opt Commun 343:10–21
Zhou N, Pan S, Cheng S, Zhou Z (2016) Image compression_encryption scheme based on hyper-chaotic system and 2D compressive sensing. Opt Laser Technol 82:121–133
Zhou N, Pan S, Cheng S, Zhou Z (2016) Image compression–encryption scheme based on hyper-chaotic system and 2D compressive sensing. Elsevier, pp 121–133
Gan L (2008) Block compressed sensing of natural images. Dept. of Electrical Engineering and Electronics, pp 1–5
Athira V, George SN, Deepthi PP (2013) A novel encryption method based on compressive sensing. In: Proceedings of international multi-conference automation, computing, communication, control compressed sensing, Kottayam, India, pp 271–275
Huang R, Rhee KH, Uchida S (2012) A parallel image encryption method based on compressive sensing. Springer, Berlin
Cheng Zhou M, Xiong C, Mao R, Gong J (2011) Compressed sensing of images using nonuniform sampling. In: IEEE 2011 fourth international conference on intelligent computation technology and automation, pp 1–15
Tudoran R, Costan A, Antoniu G (2016) OverFlow: multi-site aware big data management for scientific workflows on clouds. IEEE Trans Cloud Comput 4(1):1–15
Wen M, Ota K, Li H, Lei J, Gu C, Su Z (2015) Secure data deduplication with reliable key management for dynamic updates in CPSS. IEEE Trans Comput Social Syst 2(4)
Goyal V, Pandey O, Sahai A, Waters B (2006) Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM conference on computer and communications security, 5126. Springer, Berlin, pp 89–98
Shyamala Devi M, Arun C (2014) A survey on secured searching techniques for effective data utilization in public cloud. J Theor Appl Inf Technol 66:1–6
Cao N, Wang C, Li M, Ren K, Lou W (2015) Privacy-preserving multi-keyword ranked search over encrypted cloud data. In: 2015 IEEE transactions on parallel and distributed systems, pp 1–9
Lai J, Deng RH, Yang Y, Weng J (2016) Adaptable cipher text policy attribute-based encryption, In: 2013—6th international conference pairing-based cryptography—pairing. Springer, Beijing, China, pp 199–214
Li J, Kit Li Y, Chen X, Lee PPC, Lou W (2014) A hybrid cloud approach for secure authorized deduplication. IEEE Trans Parallel Comput 1–11
Meye P, Raipin P, Tronel F, Anceaume E (2014) A secure two phase data deduplication scheme. In: Proceedings, pp 802–809
Yang C, Ren J, Ma JF (2013) Provable ownership of file in deduplication cloud storage. In: Proceedings of IEEE global communication conference, pp 695–700
Fan C, Huang SY, Hsu WC (2012) Hybrid data deduplication in cloud environment. In: Proceedings of international conference on information, security, and intelligence control, pp 174–177
Kaaniche N, Laurent M (2014) A secure client side deduplication scheme in cloud storage environments. In: Proceedings of 6th international conference on new technology mobility and security, pp 1–7
Yuan J, Yu S Secure and constant cost public cloud storage auditing with deduplication. In: Proceedings of IEEE conference communication network and security, National Harbor, pp 145–153
Puzio P, Molva R, Onen M, Loureiro S (2013) Cloudedup: secure deduplication with encrypted data for cloud storage. In: IEEE conference on CloudCom, pp 1–8
Zheng Y, Yuan X, Wang X, Jiang J, Wang C, Gui X (2017) Toward encrypted cloud media center with secure deduplication. IEEE Trans Multim 19(2):251–265
Zhu S, Zhu C, Wang W (2018) A novel image compression-encryption scheme based on chaos and compression sensing. IEEE Access 1–14
Yan Z, Wang M, Li Y, Vasilakos AV (2016) Encrypted data management with deduplication in cloud computing. IEEE Cloud Comput 3(2):28–35
Cheriton DR (2020) Deduplication based data security. United States Patent, Patent No.: US 10,558,377 B2.
Takeshita J, Karl R, Jung T (2020) Secure single-server nearly-identical image deduplication, pp 1–11
Li J, Li T, Liu Z, Chen X (2019) Secure deduplication system with active key update and its application in IoT. ACM Trans Intel Syst Technol 10(6):1–21
Passricha V, Chopra A, Singhal S (2019) Secure deduplication scheme for cloud encrypted data. Int J Adv Pervasive Ubiquitous Comput 11(2):27–28
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Manikyam, N.R.H., Shyamala Devi, M. (2021). Present State of the Art on Secure Data Deduplication in Cloud. In: Patil, V.H., Dey, N., N. Mahalle, P., Shafi Pathan, M., Kimbahune, V.V. (eds) Proceeding of First Doctoral Symposium on Natural Computing Research. Lecture Notes in Networks and Systems, vol 169. Springer, Singapore. https://doi.org/10.1007/978-981-33-4073-2_23
Download citation
DOI: https://doi.org/10.1007/978-981-33-4073-2_23
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-33-4072-5
Online ISBN: 978-981-33-4073-2
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)