ESKEA: Enhanced Symmetric Key Encryption Algorithm Based Secure Data Storage in Cloud Networks with Data Deduplication
- PDF / 1,833,187 Bytes
- 17 Pages / 439.37 x 666.142 pts Page_size
- 102 Downloads / 223 Views
ESKEA: Enhanced Symmetric Key Encryption Algorithm Based Secure Data Storage in Cloud Networks with Data Deduplication Silambarasan Elkana Ebinazer1 · Nickolas Savarimuthu1 · S. Mary Saira Bhanu1 Accepted: 11 November 2020 © Springer Science+Business Media, LLC, part of Springer Nature 2020
Abstract Data deduplication approach is utilized in cloud storage to decrease the bandwidth of communication and storage space by eliminating the data copies from the cloud service provider (CSP). However, one of the main problems of cloud storage is data deduplication with secure data storage. To overcome this issue, the researchers presented symmetric data storage methods based on an encryption algorithm. Nonetheless, the Enhanced Symmetric Key Encryption Algorithm (ESKEA) based on secure data storage with data deduplication is proposed in this research to further improve data confidentiality. In this approach, the block-level deduplication of data is performed using the Convergent Encryption (CE) algorithm to check the CSP duplicate copies of data. Then, ESKEA algorithm is presented for secure storage of data. In ESKEA, Spider Monkey Optimization Algorithm (SMOA) optimally selects the secret key. The results of this work showed that the execution of the proposed ESKEA is more effective than that of the SKEA in terms of upload time and download time. Keywords Cloud storage · Data deduplication · Symmetric encryption algorithm · Convergent encryption · Spider monkey optimization algorithm
1 Introduction The incredible adaptability and monetary reserve funds of cloud computing propel organizations and people to redistribute the data to the cloud server (CS). With the quick development of data collections put away in the CS, it is pressing to grow innovative procedures to utilize the bandwidth of network and storage space proficiently [1–4]. To accomplish * Silambarasan Elkana Ebinazer [email protected] Nickolas Savarimuthu [email protected] S. Mary Saira Bhanu [email protected] 1
Department of Computer Applications, National Institute of Technology, Tiruchirappalli, Tamil Nadu, India
13
Vol.:(0123456789)
S. Elkana Ebinazer et al.
this, deduplication of data has gotten more consideration from both the scholarly world and industry. From one perspective, deduplication systems exploit data comparability to recognize similar data as well as to decrease the space of storage by putting away just one single copy in the CS [5–7]. But, from the security point of view, the common utilization of data from Data Proprietors (DPs) increases additional difficulties for deduplication of data. Due to the consideration of security and confidentiality, the DPs want to encrypt data using keys before uploading it to the CS. This causes DPs deduplication incomprehensible since similar data encrypted by various DPs’ keys will result in various ciphertexts. So as to take care of this issue, CE [8] [9] is presented, that utilizes a hash estimation as the key of encryption which is called CE Key (CEK). Accordingly, the indistinguishable
Data Loading...