ECC-CRT: An Elliptical Curve Cryptographic Encryption and Chinese Remainder Theorem based Deduplication in Cloud
- PDF / 1,891,085 Bytes
- 20 Pages / 439.37 x 666.142 pts Page_size
- 44 Downloads / 266 Views
ECC‑CRT: An Elliptical Curve Cryptographic Encryption and Chinese Remainder Theorem based Deduplication in Cloud B. Rasina Begum1 · P. Chitra2
© Springer Science+Business Media, LLC, part of Springer Nature 2020
Abstract Cloud computing provides the data storage facility for the maintenance, management and remote backup of the data. The storage cost and data retrieving time has increased. To encrypt, the Elliptical Curve Cryptographic and to generate key the Chinese Remainder Theorem (ECC-CRT) based deduplication scheme is proposed. Data deduplication is the process of eliminating the repeated data in cloud storage. Cloud service provider receives the encrypted data and checks for duplication. Deduplication is performed by using cosine similarity checking. The advantage of the method is, it avoids malicious upload and downloads in storage space. The performance is compared with existing methods. Keywords Chinese Remainder Theorem (CRT) · Elliptical Curve Cryptography (ECC) · Key generation · Deduplication and Cosine similarity
1 Introduction Cloud computing is an emerging technology because of their ability to offer the cost efficient and on demand use of huge storage. Cloud is the terminology, which is commonly utilized to refer a bunch of components. Cloud computation is the practice of delivering computational services like servers, storages, data bases, networking, and applications. The groups that provide those services are termed as Cloud Service Provider (CSP). Cloud computing is a model for enabling convenient, on demand network access to shared pool of configurable computing resources. The service models of cloud computing was categorized into three such as Infrastructure as a Service (IaaS), [1] Platform as a Service (PaaS), and Software as a Service (SaaS). The cloud offers many benefits such as, fast deployment, pay for use, lower cast, scalability, rapid provisioning, rapid elasticity, ubiquitous network access, greater resiliency, hypervisor protection against network attacks, low cost * B. Rasina Begum [email protected] 1
Department of Computer Science and Engineering, Mohamed Sathak Engineering College, Keelakarai, Tamil Nadu 623806, India
2
Department of Computer Science and Engineering, Thiyagarajar College of Engineering, Madurai, Tamil Nadu 625 015, India
13
Vol.:(0123456789)
B. Rasina Begum, P. Chitra
disaster recovery and data storage solutions, on demand security controls, real time detection of system tempering and rapid re-constitution of services. In cloud computing, it categorized into four, such as private cloud, public cloud, hybrid cloud and community cloud. Data deduplication is the process of reducing the storage space. It identifies the redundant data by using hash values and compares the data chunks and generates the logical values to other copies instead of storing other authentic copies of redundant data. Deduplication reduces the data volume so the disk space and network bandwidth are reduced, so it reduces the cost and energy consumption for running st
Data Loading...