Skip to main content

Present State of the Art on Secure Data Deduplication in Cloud

  • Conference paper
  • First Online:
Proceeding of First Doctoral Symposium on Natural Computing Research

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 169))

  • 259 Accesses

Abstract

Cloud is resource-rich distributed environment for outsourcing data and computations in pay as you go fashion. Organizations changed their business models with respect to computing resources. Different kinds of data are being outsourced to public cloud. The data also includes imagery that is essential in different real-world applications. However, providing privacy and security to the storage data is indispensable. From the cloud infrastructure point of view, it is essential to have provision for identifying duplicates in the objects stored and there needs to be a mechanism for secure deduplication. Deduplication at different levels of granularity is essential for improving performance of cloud infrastructure and also see that the privacy and security of data is not lost. The traditional methods used for deduplication do not work directly on the encrypted data. This has been overcome with certain deduplication methods that can act directly on the encrypted and outsourced data. The conventional cryptographic methods such as symmetric and asymmetric are not flexible to have flexibility in access control. Compressive sensing-based simultaneous data compression and security for data deduplication in cloud is the proposition desired. Toward this end, this paper reviews literature and find current academic thinking on this area of research. It covers various kinds of methods and provides valuable insights that help in further research in the area of secure storage of images in cloud in such a way that the deduplication process can be leveraged.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Xia W, Jiang H, Feng D, Douglis F, Shilane P, Hua Y, Fu M, Zhang Y, Zhou Y (2016) A comprehensive study of the past, present, and future of data deduplication. Proc IEEE 104(9):1–30

    Google Scholar 

  2. Cui H, Deng RH, Li Y, Wu G (2017) Attribute-based storage supporting secure deduplication of encrypted data in cloud, pp 1–14

    Google Scholar 

  3. Jiang T, Chen X, Wu Q, Ma J, Susilo W, Lou W (2017) Secure and efficient cloud data deduplication with randomized tag. IEEE Trans Inf Forensics Secur 12(3):1–12

    Google Scholar 

  4. Hur J, Koo D, Shin Y, Kang K (2016) Secure data deduplication with dynamic ownership management in cloud storage. IEEE Trans Knowl Data Eng 28(11):1–14

    Google Scholar 

  5. Fu Y, Jiang H, Xiao N, Tian L, Liu F, Xu L (2014) Application-aware local-global source deduplication for cloud backup services of personal storage. IEEE Trans Parallel Distrib Syst 25(5):1155–1165

    Google Scholar 

  6. Yan Z, Wang M, Li Y (2016) Encrypted data management with deduplication in cloud computing. IEEE Cloud Computing published by the IEEE computer society, pp 1–8

    Google Scholar 

  7. Li J, Chen X, Huang X, Tang S, Xiang Y, Hassan M, Alelaiwi AH (2015) Secure distributed deduplication systems with improved reliability. IEEE Trans Comput 64(12):3569–3579

    Google Scholar 

  8. Zhu S, Zhu C, Wang W (2018)A novel image compression-encryption scheme based on chaos and compression sensing. IEEE Access 6:1–13

    Google Scholar 

  9. Zhang Y, Zhou J, Chen F, Zhang Y, Wong K-W et al (2016) Embedding cryptographic features in compressive sensing, pp 1–10

    Google Scholar 

  10. Zhang Y, Xu B, Zhou N (2017) A novel image compression–encryption hybrid algorithm based on the analysis sparse representation. Elsevier, pp 1–25

    Google Scholar 

  11. Zhou N, Li H, Wang D, Pan S, Zhou Z (2015) Image compression and encryption scheme based on 2D compressive sensing and fractional Mellin transform. Opt Commun 343:10–21

    Article  Google Scholar 

  12. Zhou N, Pan S, Cheng S, Zhou Z (2016) Image compression_encryption scheme based on hyper-chaotic system and 2D compressive sensing. Opt Laser Technol 82:121–133

    Article  Google Scholar 

  13. Zhou N, Pan S, Cheng S, Zhou Z (2016) Image compression–encryption scheme based on hyper-chaotic system and 2D compressive sensing. Elsevier, pp 121–133

    Google Scholar 

  14. Gan L (2008) Block compressed sensing of natural images. Dept. of Electrical Engineering and Electronics, pp 1–5

    Google Scholar 

  15. Athira V, George SN, Deepthi PP (2013) A novel encryption method based on compressive sensing. In: Proceedings of international multi-conference automation, computing, communication, control compressed sensing, Kottayam, India, pp 271–275

    Google Scholar 

  16. Huang R, Rhee KH, Uchida S (2012) A parallel image encryption method based on compressive sensing. Springer, Berlin

    Google Scholar 

  17. Cheng Zhou M, Xiong C, Mao R, Gong J (2011) Compressed sensing of images using nonuniform sampling. In: IEEE 2011 fourth international conference on intelligent computation technology and automation, pp 1–15

    Google Scholar 

  18. Tudoran R, Costan A, Antoniu G (2016) OverFlow: multi-site aware big data management for scientific workflows on clouds. IEEE Trans Cloud Comput 4(1):1–15

    Google Scholar 

  19. Wen M, Ota K, Li H, Lei J, Gu C, Su Z (2015) Secure data deduplication with reliable key management for dynamic updates in CPSS. IEEE Trans Comput Social Syst 2(4)

    Google Scholar 

  20. Goyal V, Pandey O, Sahai A, Waters B (2006) Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM conference on computer and communications security, 5126. Springer, Berlin, pp 89–98

    Google Scholar 

  21. Shyamala Devi M, Arun C (2014) A survey on secured searching techniques for effective data utilization in public cloud. J Theor Appl Inf Technol 66:1–6

    Google Scholar 

  22. Cao N, Wang C, Li M, Ren K, Lou W (2015) Privacy-preserving multi-keyword ranked search over encrypted cloud data. In: 2015 IEEE transactions on parallel and distributed systems, pp 1–9

    Google Scholar 

  23. Lai J, Deng RH, Yang Y, Weng J (2016) Adaptable cipher text policy attribute-based encryption, In: 2013—6th international conference pairing-based cryptography—pairing. Springer, Beijing, China, pp 199–214

    Google Scholar 

  24. Li J, Kit Li Y, Chen X, Lee PPC, Lou W (2014) A hybrid cloud approach for secure authorized deduplication. IEEE Trans Parallel Comput 1–11

    Google Scholar 

  25. Meye P, Raipin P, Tronel F, Anceaume E (2014) A secure two phase data deduplication scheme. In: Proceedings, pp 802–809

    Google Scholar 

  26. Yang C, Ren J, Ma JF (2013) Provable ownership of file in deduplication cloud storage. In: Proceedings of IEEE global communication conference, pp 695–700

    Google Scholar 

  27. Fan C, Huang SY, Hsu WC (2012) Hybrid data deduplication in cloud environment. In: Proceedings of international conference on information, security, and intelligence control, pp 174–177

    Google Scholar 

  28. Kaaniche N, Laurent M (2014) A secure client side deduplication scheme in cloud storage environments. In: Proceedings of 6th international conference on new technology mobility and security, pp 1–7

    Google Scholar 

  29. Yuan J, Yu S Secure and constant cost public cloud storage auditing with deduplication. In: Proceedings of IEEE conference communication network and security, National Harbor, pp 145–153

    Google Scholar 

  30. Puzio P, Molva R, Onen M, Loureiro S (2013) Cloudedup: secure deduplication with encrypted data for cloud storage. In: IEEE conference on CloudCom, pp 1–8

    Google Scholar 

  31. Zheng Y, Yuan X, Wang X, Jiang J, Wang C, Gui X (2017) Toward encrypted cloud media center with secure deduplication. IEEE Trans Multim 19(2):251–265

    Article  Google Scholar 

  32. Zhu S, Zhu C, Wang W (2018) A novel image compression-encryption scheme based on chaos and compression sensing. IEEE Access 1–14

    Google Scholar 

  33. Yan Z, Wang M, Li Y, Vasilakos AV (2016) Encrypted data management with deduplication in cloud computing. IEEE Cloud Comput 3(2):28–35

    Article  Google Scholar 

  34. Cheriton DR (2020) Deduplication based data security. United States Patent, Patent No.: US 10,558,377 B2.

    Google Scholar 

  35. Takeshita J, Karl R, Jung T (2020) Secure single-server nearly-identical image deduplication, pp 1–11

    Google Scholar 

  36. Li J, Li T, Liu Z, Chen X (2019) Secure deduplication system with active key update and its application in IoT. ACM Trans Intel Syst Technol 10(6):1–21

    Google Scholar 

  37. Passricha V, Chopra A, Singhal S (2019) Secure deduplication scheme for cloud encrypted data. Int J Adv Pervasive Ubiquitous Comput 11(2):27–28

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Naga Raju Hari Manikyam .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Manikyam, N.R.H., Shyamala Devi, M. (2021). Present State of the Art on Secure Data Deduplication in Cloud. In: Patil, V.H., Dey, N., N. Mahalle, P., Shafi Pathan, M., Kimbahune, V.V. (eds) Proceeding of First Doctoral Symposium on Natural Computing Research. Lecture Notes in Networks and Systems, vol 169. Springer, Singapore. https://doi.org/10.1007/978-981-33-4073-2_23

Download citation

Publish with us

Policies and ethics