An efficient secure data deduplication method using radix trie with bloom filter (SDD-RT-BF) in cloud environment

  • PDF / 991,707 Bytes
  • 9 Pages / 595.276 x 790.866 pts Page_size
  • 69 Downloads / 208 Views

DOWNLOAD

REPORT


An efficient secure data deduplication method using radix trie with bloom filter (SDD-RT-BF) in cloud environment Silambarasan Elkana Ebinazer 1

&

Nickolas Savarimuthu 1 & Mary Saira Bhanu S 2

Received: 26 June 2020 / Accepted: 21 August 2020 # Springer Science+Business Media, LLC, part of Springer Nature 2020

Abstract Recent advancements in the domain of cloud computing (CC) and big data technologies leads to an exponential increase in cloud data, huge replica data utilized the available memory space and maximum computation brought a major issue to the restricted cloud storage space. This paper develops an effective radix trie (RT) with Bloom Filter (BF) based secure data deduplication model, abbreviated as SDD-RT-BD. The proposed SDD-RT-BF model involves three major stages namely, authorized deduplication, proof of ownership and role key update. Initially, a convergent encryption approach is applied for preventing the leakage of data and employed role re-encryption process for attaining authorized deduplication resourcefully. Specifically, management centre handles the authorized request, and establish a RT structure to map the relationship among roles and keys. Besides, BF is applied for the implementation of data updating and enhance the retrieval of ownership verifying efficiently. The inclusion of RT along with BF for secure data deduplication shows the novelty of the paper. A detailed simulation experiments takes place for demonstrating the security and effectiveness of the presented model. The experimental outcome pointed out that the SDD-RT-BF model possesses many beneficial features namely Client-side deduplication, Tag consistency preservation, Update of outsourced data and Fault tolerance. The experimental results denoted that under the file size of 8 MB, the SDDRT-BF model offers maximum deduplication rate of 25.40% whereas the SS, SSIMI and SDM models attains minimum deduplication rate of 24.60%, 23.60% and 22.30% respectively. Keywords Bloom filter . Cloud computing . Deduplication . Security . Radix trie

1 Introduction In recent days, digitalization methods results to a massive quantity of multimedia data which has become a more

This article is part of the Topical Collection: Special Issue on Network In Box, Architecture, Networking and Applications Guest Editor: Ching-Hsien Hsu * Silambarasan Elkana Ebinazer [email protected] Nickolas Savarimuthu [email protected] Mary Saira Bhanu S [email protected] 1

Department of Computer Applications, National Institute of Technology, Tiruchirappalli, Tamil Nadu, India

2

Department of Computer Science and Engineering, National Institute of Technology, Tiruchirappalli, Tamil Nadu, India

complex one to handle. A most required problem solving techniques are cloud based solutions that has been acquired by several organizations. Even the cloud-based solutions are meant to be most expensive; it is composed with several other challenging factors like security, reliability, confidentiality, and accessibility of the context which has been provided external