109
Views
3
CrossRef citations to date
0
Altmetric
Computers and Computing

Secure Client-Side Deduplication Scheme for Cloud with Dual Trusted Execution Environment

ORCID Icon

References

  • X. Liang, Z. Yan, and R. H. Deng, “Game theoretical study on client-controlled cloud data deduplication,” Comput. Secur., Vol. 91, pp. 101730, Apr. 2020.
  • S. Saharan, G. Somani, G. Gupta, R. Verma, M. S. Gaur, and R. Buyya, “Quickdedup: Efficient VM deduplication in cloud computing environments,” J. Parallel. Distrib. Comput., Vol. 139, pp. 18–31, May 2020.
  • G. Tian, H. Ma, Y. Xie, and Z. Liu, “Randomized deduplication with ownership management and data sharing in cloud storage,” J. Inf. Secur. Appl., Vol. 51, pp. 102432, Apr 2020.
  • H. Hou, J. Yu, and R. Hao, “Cloud storage auditing with deduplication supporting different security levels according to data popularity,” J. Netw. Comput. Appl., Vol. 134, pp. 26–39, May 2019.
  • Y. Fan, X. Lin, W. Liang, G. Tan, and P. Nanda, “A secure privacy preserving deduplication scheme for cloud computing,” Future Gener. Comput. Syst., Vol. 101, pp. 127–35, Dec 2019.
  • R. P. Arora, and G. Verma, “Implementation of authentication and transaction security based on Kerberos,” Int. J. Innov. Technol. Creat. Eng., Vol. 1, no. 2, pp. 10–19, Feb 2011.
  • G. Rastogi, and R. Sushil, “Cloud computing implementation: Key issues and solutions,” In 2015 2nd International Conference on Computing for Sustainable Global Development (INDIACom), New Delhi, Mar. 2015, pp. 320–24.
  • L. Zhenhua L, K. Yaqian, L. Chen, and F. Yaqing, “Hybrid cloud approach for block-level deduplication and searchable encryption in large universe,” J. China Univ. Posts Telecommun., Vol. 24, no. 5, pp. 23–34, Oct 2017.
  • P. Singh, N. Agarwal, and B. Raman, “Secure data deduplication using secret sharing schemes over cloud,” Future Gener. Comput. Syst., Vol. 88, pp. 156–67, Nov 2018.
  • G. Rastogi, and R. Sushil, “Secured identity management system for preserving data privacy and transmission in cloud computing,” Int. J. Future Gener. Commun. Netw., Vol. 11, no. 1, pp. 23–36, Jan 2018.
  • M. Miao, J. Wang, H. Li, and X. Chen, “Secure multi-server-aided data deduplication in cloud computing,” Pervasive. Mob. Comput., Vol. 24, no. 99, pp. 129–37, Dec. 2015.
  • J. Liu, J. Wang, X. Tao, and J. Shen, “Secure similarity-based cloud data deduplication in ubiquitous city,” Pervasive. Mob. Comput., Vol. 41, pp. 231–42, Oct 2017.
  • M. Miao, T. Jiang, and I. You, “Payment-based incentive mechanism for secure cloud deduplication,” Int. J. Inf. Manage., Vol. 35, no. 3, pp. 379–86, Jun 2015.
  • H. Cui, R. H. Deng, Y. Li, and G. Wu, “Attribute-based storage supporting secure deduplication of encrypted data in cloud,” IEEE Trans. Big Data, Vol. 5, no. 3, pp. 330–42, Jan 2017.
  • X. Liang, Z. Yan, X. Chen, L. T. Yang, W. Lou, and A. Y. T. Hou, “Game theoretical analysis on encrypted cloud data deduplication,” IEEE Trans. Ind. Inf., Vol. 15, no. 10, pp. 5778–89, Jun 2019.
  • J. Devagnanam, and N. M. Elango, “Optimal resource allocation of cluster using hybrid grey wolf and cuckoo search algorithm in cloud computing,” J. Netw. Commun. Syst., Vol. 3, no. 1, pp. 31–40, 2020.
  • T. Brammya, and A. Deepa, “Job scheduling in cloud environment using lion algorithm,” J. Netw. Commun. Syst., Vol. 2, no. 1, pp. 1–14, 2020.
  • G. P. Bhole, “Optimal container resource allocation using hybrid SA-MFO algorithm in cloud architecture,” Multimed. Res., Vol. 3, no. 1, pp. 11–20, 2020.
  • J. Xu, W. Zhang, Z. Zhang, T. Wang, and T. Huang, “Clustering-based acceleration for virtual machine image deduplication in the cloud environment,” J. Syst. Softw., Vol. 121, pp. 144–56, Nov. 2016.
  • R. N. Widodo, H. Lim, and M. Atiquzzaman, “A new content-defined chunking algorithm for data deduplication in cloud storage,” Future Gener. Comput. Syst., Vol. 71, pp. 145–56, Jun 2017.
  • H. Wu, C. Wang, Y. Fu, S. Sakr, K. Lu, and L. Zhu, “A differentiated caching mechanism to enable primary storage deduplication in clouds,” IEEE Trans. Parallel Distrib. Syst., Vol. 29, no. 6, pp. 1202–16, Jan 2018.
  • Z. Yan, W. Ding, X. Yu, H. Zhu, and R. H. Deng, “Deduplication on encrypted big data in cloud,” IEEE Trans. Big Data, Vol. 2, no. 2, pp. 138–50, Jul 2016.
  • Z. Yan, L. Zhang, D. I. Wenxiu, and Q. Zheng, “Heterogeneous data storage management with deduplication in cloud computing,” IEEE Trans. Big Data, Vol. 5, no. 3, pp. 393–407, May 2017.
  • K. Tulasi, and S. Karanam, “Heterogeneous data storage management with deduplication aware in cloud computing,” in 2018 IADS International Conference on Computing, Communications & Data Engineering (CCODE), Tirupati, Feb. 2018.
  • G. Rastogi, and R. Sushil, “Cloud computing security and homomorphic encryption,” IUP J. Comput. Sci., Vol. 9, no. 3, pp. 48–58, Jul. 2015.
  • R. K. Koppanati, K. Kumar, and S. Qamar, “E-MOC: An efficient secret sharing model for multimedia on cloud,” in International Conference on Deep Learning, Artificial Intelligence and Robotics. Cham: Springer, Dec. 2019, pp. 246–60.
  • R. K. Koppanati, S. Qamar, and K. Kumar, “SMALL: Secure multimedia technique using logistic and LFSR,” in 2018 International Conference on Intelligent Computing and Control Systems (ICICCS), Madurai, Jun. 2018, pp. 1820–5.
  • P. Pete, K. Patange, M. Wankhade, A. Chatterjee, M. Kurhekar, and K. Kumar, “3E-VMC: An experimental energy efficient model for VMs scheduling over cloud,” in 2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC), Jalandhar, India, December 2018, pp. 322–7.
  • R. Krishna, and K. Kumar, “P-MEC: Polynomial congruence based multimedia encryption technique over cloud,” IEEE Consum. Electron. Mag., Vol. 10, pp. 41–6, 2020.
  • S. Sharma, and K. Kumar, “Guess: Genetic uses in video encryption with secret sharing,” in Proceedings of 2nd International Conference on Computer Vision & Image Processing. Singapore: Springer, 2018, pp. 51–62.
  • P. Manupriya, S. Sinha, and K. Kumar, “V⊕ SEE: Video secret sharing encryption technique,” in 2017 Conference on Information and Communication Technology (CICT), Gwalior, India, Nov. 2017, pp. 1–6.
  • K. Kumar, and M. Kurhekar, “Sentimentalizer: Docker container utility over Cloud,” in 2017 Ninth International Conference on Advances in Pattern Recognition (ICAPR), Bangalore, India, Dec. 2017, pp. 1–6.
  • K. Kumar, and M. Kurhekar, “Economically efficient virtualization over cloud using docker containers,” in 2016 IEEE International Conference on Cloud Computing in Emerging Markets (CCEM), Bangalore, India, Oct. 2016, pp. 95–100.
  • J. Malhotra, and J. Bakal, “Second order mutual information based grey wolf optimization for effective storage and deduplication,” Sādhanā, Vol. 43, no. 11, pp. 1–12, Nov. 2018.
  • J. Wu, Y. Li, T. Wang, and Y. Ding, “CPDA: A confidentiality-preserving deduplication cloud storage with public cloud auditing,” IEEE. Access., Vol. 7, pp. 160482-97, Oct 2019.
  • S. Sun, W. Yao, and X. Li, “SORD: A new strategy of online replica deduplication in cloud-P2P,” Cluster. Comput., Vol. 22, no. 1, pp. 1–23, Mar. 2019.
  • L. Wang, B. Wang, W. Song, and Z. Zhang, “A key-sharing based secure deduplication scheme in cloud storage,” Inf. Sci., Vol. 204, pp. 48–60, Dec. 2019.
  • S. Li, C. Xu, and Y. Zhang, “CSED: Client-side encrypted deduplication scheme based on proofs of ownership for cloud storage,” J. Inf. Secur. Appl., Vol. 46, pp. 250–8, Jun. 2019.
  • J. K. Periasamy, and B. Latha, “An enhanced secure content deduplication identification and prevention (ESCDIP) algorithm in cloud environment,” Neural Comput. Appl., Vol. 32, pp. 485–94, Jan 2020.
  • X. Zheng, Y. Zhou, Y. Ye, and F. Li, “A cloud data deduplication scheme based on certificateless proxy re-encryption,” J. Syst. Archit., Vol. 102, pp. 101666, Jan 2020.
  • B. Mao, H. Jiang, S. Wu, and L. Tian, “Leveraging data deduplication to improve the performance of primary storage systems in the cloud,” IEEE Trans. Comput., Vol. 65, no. 6, pp. 1775–88, 2015.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.