Abstract
Recent advancements in the domain of cloud computing (CC) and big data technologies leads to an exponential increase in cloud data, huge replica data utilized the available memory space and maximum computation brought a major issue to the restricted cloud storage space. This paper develops an effective radix trie (RT) with Bloom Filter (BF) based secure data deduplication model, abbreviated as SDD-RT-BD. The proposed SDD-RT-BF model involves three major stages namely, authorized deduplication, proof of ownership and role key update. Initially, a convergent encryption approach is applied for preventing the leakage of data and employed role re-encryption process for attaining authorized deduplication resourcefully. Specifically, management centre handles the authorized request, and establish a RT structure to map the relationship among roles and keys. Besides, BF is applied for the implementation of data updating and enhance the retrieval of ownership verifying efficiently. The inclusion of RT along with BF for secure data deduplication shows the novelty of the paper. A detailed simulation experiments takes place for demonstrating the security and effectiveness of the presented model. The experimental outcome pointed out that the SDD-RT-BF model possesses many beneficial features namely Client-side deduplication, Tag consistency preservation, Update of outsourced data and Fault tolerance. The experimental results denoted that under the file size of 8 MB, the SDD-RT-BF model offers maximum deduplication rate of 25.40% whereas the SS, SSIMI and SDM models attains minimum deduplication rate of 24.60%, 23.60% and 22.30% respectively.
Similar content being viewed by others
References
Ali M, Khan SU, Vasilakos AV (2015) Security in cloud computing: opportunities and challenges. Inf Sci 305:357–383
Xiong J, Zhang Y, Tang S, Liu X, Yao Z (2019) Secure encrypted data with authorized deduplication in cloud. IEEE Access 7:75090–75104
Widjava I (2011) The 10 worst cloud outages: lessons learned. Cloud business review http://www.Cbrdigital.Com/2011/06/30/the-10-worstcloud-outages-lessons-learned.Html
Wu S, Li K-C, Mao B, Liao M (2017) Dac: improving storage availability with deduplication-assisted cloud-of-clouds. Futur Gener Comput Syst 74:190–198
Zhan Q, Su J, Hu Y (2017) Research on encryption strategy in large data environment based on proxy re-encryption. Int J Big Data Intell 4(3):208–215
Singh P, Raman B, Agarwal N (2017a) Towards elncrypted video tampering detection and localization based on pob number system over cloud. IEEE Transactions on Circuits and Systems for Video Technology (99):1–1
Li Y, Gai K, Qiu L, Qiu M, Zhao H (2017) Intelligent cryptography approach for secure distributed big data storage in cloud computing. Inf Sci 387:103–115
Liu J, Wang J, Tao X, Shen J (2017) Secure similaritybased cloud data deduplication in ubiquitous city. Pervasive and Mobile computing, pp 231–242
Kamara S, Lauter KE et al (2010) Cryptographic cloud storage. In: financial cryptography workshops, volume 6054. Springer, pp 136–149
Geambasu R, Kohno T, Levy AA, Levy HM (2009) Vanish: increasing data privacy with self-destructing data. In USENIX security symposium, volume 316
Douceur JR, Adya A, Bolosky WJ, Simon P, Theimer M (2002) Reclaiming space from duplicate files in a serverless distributed file system. In: distributed computing systems, 2002. Proceedings. 22nd international conference on, IEEE, pp 617–624
Bellare M, Keelveedhi S, Ristenpart T (2013) Message-locked encryption and secure deduplication. In Annual International Conference on the Theory and Applications of Cryptographic Techniques. Springer, pp 296–312
Di Pietro R, Sorniotti A (2012) Boosting efficiency and security in proof of ownership for deduplication. In: proceedings of the 7th ACM symposium on information, computer and communications security, ACM, pp 81–82
Ng WK, Wen Y, Zhu H (2012) Private data deduplication protocols in cloud storage. In proceedings of the 27th annual ACM symposium on applied computing, ACM, pp 441–446
Leis V, Kemper A, Neumann T (2013) The adaptive radix tree: ARTful indexing for main-memory databases. In: 2013 IEEE 29th international conference on data engineering (ICDE) IEEE, pp 38-49
Debnath B, Sengupta S, Li J, Lilja DJ, Du DH (2011) BloomFlash: bloom filter on flash-based storage. In 2011 31st international conference on distributed computing systems, IEEE, pp 635-644
Singh P, Agarwal N, Raman B (2018) Secure data deduplication using secret sharing schemes over cloud. Futur Gener Comput Syst 88:156–167
N Krishnaraj, Mohamed Elhoseny, E Laxmi Lydia, K Shankar, Omar ALDabbas (2020) An efficient radix trie-based semantic visual indexing model for large-scale image retrieval in cloud environment. Software: Practice and Experience. In press: https://doi.org/10.1002/spe.2834
Sachi Nandan Mohanty, Ramya KC, Sheeba Rani S, Deepak Gupta, Shankar K, Lakshmanaprabu SK (2020) An efficient Lightweight integrated Block chain (ELIB) model for IoT security and privacy. Future Gener Comput Syst 102:1027–1037
Shankar K, Mohamed Elhoseny (2019) Trust based cluster head election of secure message transmission in MANET using multi secure protocol with TDES. J Univers Comput Sci 25(10):1221–1239
Mohamed Elhoseny, Shankar K (2019) Reliable data transmission model for mobile Ad Hoc network using signcryption technique. IEEE Transactions on Reliability:1–10. In Press. https://doi.org/10.1109/TR.2019.2915800
Shankar K, Lakshmanaprabu SK, Deepak Gupta, Ashish Khanna, Victor Hugo C Albuquerque (2018) Adaptive optimal multi key based encryption for digital image security. Concurrency and Computation: Practice and Experience. In press. https://doi.org/10.1002/cpe.5122
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
This article is part of the Topical Collection: Special Issue on Network In Box, Architecture, Networking and Applications
Guest Editor: Ching-Hsien Hsu
Rights and permissions
About this article
Cite this article
Ebinazer, S.E., Savarimuthu, N. & S, M.S.B. An efficient secure data deduplication method using radix trie with bloom filter (SDD-RT-BF) in cloud environment. Peer-to-Peer Netw. Appl. 14, 2443–2451 (2021). https://doi.org/10.1007/s12083-020-00989-0
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12083-020-00989-0