Abstract
An application of Cloud Computing (CC) technologies for interconnecting data as well as applications served as of manifold geographic locations is the distributed cloud. For distributed CC, Managing a vast measure of data along with maintaining security are vital aspects. Though lots of techniques were introduced recently to manage and protect data on the distributed cloud, those have not rendered any desirable security. Thus, a secure Data Deduplication (DD) along with Data Portability (DP) for a distributed cloud environment is proposed here. To enhance the user data’s security, primarily, the inputted files are bifurcated into blocks and after that, an appropriate Cloud Server (CS) is chosen utilizing Hybrid Forest Genetic Algorithm (HFGA) centred upon split file features together with CS features. In a DD phase, the Whirlpool algorithm converts the split data into Hash Code (HC), and then, the hash chaining technique securely removes the duplicated data. Then, that split data is compressed, encrypted, together with amassed in the selected CS. Next, the Levy Flight-Wind Driven Optimization (LF-WDO) performs the DP to enhance the cloud data’s security. Within 3265 ms, the proposed Whirlpool algorithm renders an HC for the 10,000 kb file. The proposed LF-WDO achieves a lower process time of 2987 ms, which is above 5% smaller than the existing techniques. Investigational outcomes exhibit the proposed work’s potential.
Similar content being viewed by others
Data Availability
Data sharing is not applicable to this article as no datasets were generated or analysed during the current study.
References
Amin, R., Kumar, N., Biswas, G. P., Iqbal, R., & Chang, V. (2018). A light weight authentication protocol for IoT-enabled devices in distributed cloud computing environment. Future Generation Computer Systems, 78, 1005–1019. https://doi.org/10.1016/j.future.2016.12.028
Wu, F., Li, X., Xu, L., Sangaiah, A. K., & Rodrigues, J. J. P. C. (2018). Authentication protocol for distributed cloud computing an explanation of the security situations for internet of things enabled devices. IEEE Consumer Electronics Magazine, 7(6), 38–44. https://doi.org/10.1109/MCE.2018.2851744
Salunke, P.M., & Mahale, V. V. (2018). Secure data sharing in distributed cloud environment. In 2nd international conference on I-SMAC, 30–31 August 2018, Plladam, India.
Usman, M., Jan, M. A., & He, X. (2017). Cryptography based secure data storage and sharing using HEVC and public clouds. Information Sciences, 387, 90–102. https://doi.org/10.1016/j.ins.2016.08.059
Yuan, H., Chen, X., Li, J., Jiang, T., Wang, J., & Deng, R. (2019). Secure cloud data deduplication with efficient re-encryption. IEEE Transactions on Services Computing, 15(1), 442–456. https://doi.org/10.1109/TSC.2019.2948007
Waghmare, M. B., & Padwekar, S. V. (2020). Survey on techniques for authorized deduplication of encrypted data in cloud. In International conference on computer communication and informatics, IEEE, 22–24 January 2020, Coimbatore, India. https://doi.org/10.1109/ICCCI48352.2020.9104184
Shin, H., Koo, D., Shin, Y., & Hur, J. (2018). Privacy-preserving and updatable block-level data deduplication in cloud storage services. In IEEE 11th international conference on cloud computing, 2–7 July 2018, San Francisco, CA, USA. https://doi.org/10.1109/CLOUD.2018.00056
Jiang, S., Jiang, T., & Wang, L. (2017). Secure and efficient cloud data deduplication with ownership management. IEEE Transactions on Services Computing, 13(6), 1152–1165. https://doi.org/10.1109/TSC.2017.2771280
Chavhan, S., Patil, P., & Patle, G. (2020). Implementation of improved inline deduplication scheme for distributed cloud storage. In 5th international conference on communication and electronics systems, IEEE, 10–12 June 2020, Coimbatore, India. https://doi.org/10.1109/ICCES48766.2020.9137963
Esteban Lopez-Falcon, C., Miranda-Lopez, V., Tchernykh, A., Babenko, M., & Avetisyan, A. (2018). Bi-objective analysis of an adaptive secure data storage in a multi cloud. Springer. https://doi.org/10.1007/978-3-030-16205-4_23
Yan, Z., Wang, M., Li, Y., & Vasilakos, A. V. (2016). Encrypted data management with deduplication in cloud computing. IEEE Cloud Computing, 3(2), 28–35. https://doi.org/10.1109/MCC.2016.29
Tian, H., Nan, F., Chang, C.-C., Huang, Y., Jing, Lu., & Yongqian, Du. (2019). Privacy preserving public auditing for secure data storage in fog-to-cloud computing. Journal of Network and Computer Applications, 127, 59–69. https://doi.org/10.1016/j.jnca.2018.12.004
Mo, Y. (2019). A data security storage method for iot under hadoop cloud computing platform. International Journal of Wireless Information Networks, 26(3), 152–157. https://doi.org/10.1007/s10776-019-00434-x
Zheng, X., Zhou, Y., Ye, Y., & Li, F. (2020). A cloud data deduplication scheme based on certificateless proxy re-encryption. Journal of Systems Architecture, 102, 1–43. https://doi.org/10.1016/j.sysarc.2019.101666
Vengala, D. K., Kavitha, D., & Kumar, A. P. (2020). Secure data transmission on a distributed cloud server with the help of HMCA and data encryption using optimized CP-ABE-ECC. Cluster Computing, 23(5), 1683–1696. https://doi.org/10.1007/s10586-020-03114-1
Shahid, F., Ashraf, H., Ghani, A., Ghayyur, S. A. K., Shamshirband, S., & Salwana, E. (2020). PSDS Proficient security over distributed storage a method for data transmission in cloud. IEEE Access, 8, 118285–118298. https://doi.org/10.1109/ACCESS.2020.3004433
Li, Y., Gai, K., Qiu, L., Qiu, M., & Zhao, H. (2017). Intelligent cryptography approach for secure distributed big data storage in cloud computing. Information Sciences, 387, 103–115. https://doi.org/10.1016/j.ins.2016.09.005
Beulah, S., & Ramesh Dhanaseelan, F. (2019). Detection of duplicated data with minimum overhead and secure data transmission for sensor big data. Cluster Computing, 22(5), 10467–10479. https://doi.org/10.1007/s10586-017-1079-x
Liang, W., Fan, Y., Li, K.-C., Zhang, D., & Gaudiot, J.-L. (2020). Secure data storage and recovery in industrial blockchain network environments. IEEE Transactions on Industrial Informatics, 16(10), 6543–6552. https://doi.org/10.1109/TII.2020.2966069
Tchernykh, A., Babenko, M., Chervyakov, N., Miranda-Lopez, V., Avetisyan, A., Drozdov, A. Y., Rivera-Rodriguez, R., Radchenko, G., & Zhihui, Du. (2020). Scalable data storage design for non-stationary IoT environment with adaptive security and reliability. IEEE Internet of Things Journal, 7(10), 10171–10188. https://doi.org/10.1109/JIOT.2020.2981276
Funding
This work has no funding resource.
Author information
Authors and Affiliations
Contributions
All authors contributed to the study conception and design. Material preparation, data collection and analysis were performed by ARA, PS. The first draft of the manuscript was written by ARA and all authors commented on previous versions of the manuscript. All authors read and approved the final manuscript.
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that they have no conflict of interest.
Ethical Approval
This article does not contain any studies with human participants or animals performed by any of the authors.
Consent of Publication
Not applicable.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Athira, A.R., Sasikala, P. Secure Data Deduplication and Data Portability in Distributed Cloud Server Using Hash Chaining and LF-WDO. Wireless Pers Commun 125, 3773–3785 (2022). https://doi.org/10.1007/s11277-022-09735-6
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-022-09735-6