IDEAS home Printed from https://ideas.repec.org/a/igg/japuc0/v11y2019i2p27-40.html
   My bibliography  Save this article

Secure Deduplication Scheme for Cloud Encrypted Data

Author

Listed:
  • Vishal Passricha

    (National Institute of Technology Kurukshetra, India)

  • Ashish Chopra

    (National Institute of Technology Kurukshetra, India)

  • Shubhanshi Singhal

    (Technology Education and Research Integrated Institutions, Kurukshetra, India)

Abstract

Cloud storage (CS) is gaining much popularity nowadays because it offers low-cost and convenient network storage services. In this big data era, the explosive growth in digital data moves the users towards CS but this causes a lot of storage pressure on CS systems because a large volume of this data is redundant. Data deduplication is an effective data reduction technique. The dynamic nature of data makes security and ownership of data as a very important issue. Proof-of-ownership schemes are a robust way to check the ownership claimed by any owner. However, this method affects the deduplication process because encryption methods have varying characteristics. A convergent encryption (CE) scheme is widely used for secure data deduplication. The problem with the CE-based scheme is that the user can decrypt the cloud data while he has lost his ownership. This article addresses the problem of ownership revocation by proposing a secure deduplication scheme for encrypted data. The proposed scheme enhances the security against unauthorized encryption and poison attack on the predicted set of data.

Suggested Citation

  • Vishal Passricha & Ashish Chopra & Shubhanshi Singhal, 2019. "Secure Deduplication Scheme for Cloud Encrypted Data," International Journal of Advanced Pervasive and Ubiquitous Computing (IJAPUC), IGI Global, vol. 11(2), pages 27-40, April.
  • Handle: RePEc:igg:japuc0:v:11:y:2019:i:2:p:27-40
    as

    Download full text from publisher

    File URL: http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/IJAPUC.2019040103
    Download Restriction: no
    ---><---

    More about this item

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:igg:japuc0:v:11:y:2019:i:2:p:27-40. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Journal Editor (email available below). General contact details of provider: https://www.igi-global.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.