Skip to main content

Advertisement

Log in

Secure Data Deduplication and Data Portability in Distributed Cloud Server Using Hash Chaining and LF-WDO

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

An application of Cloud Computing (CC) technologies for interconnecting data as well as applications served as of manifold geographic locations is the distributed cloud. For distributed CC, Managing a vast measure of data along with maintaining security are vital aspects. Though lots of techniques were introduced recently to manage and protect data on the distributed cloud, those have not rendered any desirable security. Thus, a secure Data Deduplication (DD) along with Data Portability (DP) for a distributed cloud environment is proposed here. To enhance the user data’s security, primarily, the inputted files are bifurcated into blocks and after that, an appropriate Cloud Server (CS) is chosen utilizing Hybrid Forest Genetic Algorithm (HFGA) centred upon split file features together with CS features. In a DD phase, the Whirlpool algorithm converts the split data into Hash Code (HC), and then, the hash chaining technique securely removes the duplicated data. Then, that split data is compressed, encrypted, together with amassed in the selected CS. Next, the Levy Flight-Wind Driven Optimization (LF-WDO) performs the DP to enhance the cloud data’s security. Within 3265 ms, the proposed Whirlpool algorithm renders an HC for the 10,000 kb file. The proposed LF-WDO achieves a lower process time of 2987 ms, which is above 5% smaller than the existing techniques. Investigational outcomes exhibit the proposed work’s potential.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

Data Availability

Data sharing is not applicable to this article as no datasets were generated or analysed during the current study.

References

  1. Amin, R., Kumar, N., Biswas, G. P., Iqbal, R., & Chang, V. (2018). A light weight authentication protocol for IoT-enabled devices in distributed cloud computing environment. Future Generation Computer Systems, 78, 1005–1019. https://doi.org/10.1016/j.future.2016.12.028

    Article  Google Scholar 

  2. Wu, F., Li, X., Xu, L., Sangaiah, A. K., & Rodrigues, J. J. P. C. (2018). Authentication protocol for distributed cloud computing an explanation of the security situations for internet of things enabled devices. IEEE Consumer Electronics Magazine, 7(6), 38–44. https://doi.org/10.1109/MCE.2018.2851744

    Article  Google Scholar 

  3. Salunke, P.M., & Mahale, V. V. (2018). Secure data sharing in distributed cloud environment. In 2nd international conference on I-SMAC, 30–31 August 2018, Plladam, India.

  4. Usman, M., Jan, M. A., & He, X. (2017). Cryptography based secure data storage and sharing using HEVC and public clouds. Information Sciences, 387, 90–102. https://doi.org/10.1016/j.ins.2016.08.059

    Article  MATH  Google Scholar 

  5. Yuan, H., Chen, X., Li, J., Jiang, T., Wang, J., & Deng, R. (2019). Secure cloud data deduplication with efficient re-encryption. IEEE Transactions on Services Computing, 15(1), 442–456. https://doi.org/10.1109/TSC.2019.2948007

    Article  Google Scholar 

  6. Waghmare, M. B., & Padwekar, S. V. (2020). Survey on techniques for authorized deduplication of encrypted data in cloud. In International conference on computer communication and informatics, IEEE, 22–24 January 2020, Coimbatore, India. https://doi.org/10.1109/ICCCI48352.2020.9104184

  7. Shin, H., Koo, D., Shin, Y., & Hur, J. (2018). Privacy-preserving and updatable block-level data deduplication in cloud storage services. In IEEE 11th international conference on cloud computing, 2–7 July 2018, San Francisco, CA, USA. https://doi.org/10.1109/CLOUD.2018.00056

  8. Jiang, S., Jiang, T., & Wang, L. (2017). Secure and efficient cloud data deduplication with ownership management. IEEE Transactions on Services Computing, 13(6), 1152–1165. https://doi.org/10.1109/TSC.2017.2771280

    Article  Google Scholar 

  9. Chavhan, S., Patil, P., & Patle, G. (2020). Implementation of improved inline deduplication scheme for distributed cloud storage. In 5th international conference on communication and electronics systems, IEEE, 10–12 June 2020, Coimbatore, India. https://doi.org/10.1109/ICCES48766.2020.9137963

  10. Esteban Lopez-Falcon, C., Miranda-Lopez, V., Tchernykh, A., Babenko, M., & Avetisyan, A. (2018). Bi-objective analysis of an adaptive secure data storage in a multi cloud. Springer. https://doi.org/10.1007/978-3-030-16205-4_23

    Book  Google Scholar 

  11. Yan, Z., Wang, M., Li, Y., & Vasilakos, A. V. (2016). Encrypted data management with deduplication in cloud computing. IEEE Cloud Computing, 3(2), 28–35. https://doi.org/10.1109/MCC.2016.29

    Article  Google Scholar 

  12. Tian, H., Nan, F., Chang, C.-C., Huang, Y., Jing, Lu., & Yongqian, Du. (2019). Privacy preserving public auditing for secure data storage in fog-to-cloud computing. Journal of Network and Computer Applications, 127, 59–69. https://doi.org/10.1016/j.jnca.2018.12.004

    Article  Google Scholar 

  13. Mo, Y. (2019). A data security storage method for iot under hadoop cloud computing platform. International Journal of Wireless Information Networks, 26(3), 152–157. https://doi.org/10.1007/s10776-019-00434-x

    Article  Google Scholar 

  14. Zheng, X., Zhou, Y., Ye, Y., & Li, F. (2020). A cloud data deduplication scheme based on certificateless proxy re-encryption. Journal of Systems Architecture, 102, 1–43. https://doi.org/10.1016/j.sysarc.2019.101666

    Article  Google Scholar 

  15. Vengala, D. K., Kavitha, D., & Kumar, A. P. (2020). Secure data transmission on a distributed cloud server with the help of HMCA and data encryption using optimized CP-ABE-ECC. Cluster Computing, 23(5), 1683–1696. https://doi.org/10.1007/s10586-020-03114-1

    Article  Google Scholar 

  16. Shahid, F., Ashraf, H., Ghani, A., Ghayyur, S. A. K., Shamshirband, S., & Salwana, E. (2020). PSDS Proficient security over distributed storage a method for data transmission in cloud. IEEE Access, 8, 118285–118298. https://doi.org/10.1109/ACCESS.2020.3004433

    Article  Google Scholar 

  17. Li, Y., Gai, K., Qiu, L., Qiu, M., & Zhao, H. (2017). Intelligent cryptography approach for secure distributed big data storage in cloud computing. Information Sciences, 387, 103–115. https://doi.org/10.1016/j.ins.2016.09.005

    Article  MATH  Google Scholar 

  18. Beulah, S., & Ramesh Dhanaseelan, F. (2019). Detection of duplicated data with minimum overhead and secure data transmission for sensor big data. Cluster Computing, 22(5), 10467–10479. https://doi.org/10.1007/s10586-017-1079-x

    Article  Google Scholar 

  19. Liang, W., Fan, Y., Li, K.-C., Zhang, D., & Gaudiot, J.-L. (2020). Secure data storage and recovery in industrial blockchain network environments. IEEE Transactions on Industrial Informatics, 16(10), 6543–6552. https://doi.org/10.1109/TII.2020.2966069

    Article  Google Scholar 

  20. Tchernykh, A., Babenko, M., Chervyakov, N., Miranda-Lopez, V., Avetisyan, A., Drozdov, A. Y., Rivera-Rodriguez, R., Radchenko, G., & Zhihui, Du. (2020). Scalable data storage design for non-stationary IoT environment with adaptive security and reliability. IEEE Internet of Things Journal, 7(10), 10171–10188. https://doi.org/10.1109/JIOT.2020.2981276

    Article  Google Scholar 

Download references

Funding

This work has no funding resource.

Author information

Authors and Affiliations

Authors

Contributions

All authors contributed to the study conception and design. Material preparation, data collection and analysis were performed by ARA, PS. The first draft of the manuscript was written by ARA and all authors commented on previous versions of the manuscript. All authors read and approved the final manuscript.

Corresponding author

Correspondence to A. R. Athira.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest.

Ethical Approval

This article does not contain any studies with human participants or animals performed by any of the authors.

Consent of Publication

Not applicable.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Athira, A.R., Sasikala, P. Secure Data Deduplication and Data Portability in Distributed Cloud Server Using Hash Chaining and LF-WDO. Wireless Pers Commun 125, 3773–3785 (2022). https://doi.org/10.1007/s11277-022-09735-6

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-022-09735-6

Keywords

Navigation