High Efficient Secure Data Deduplication Method for Cloud Computing

Yongan Guo,
Chunlei Jiang,

Abstract


Deduplication technology helps reduce the overhead of cloud storage services, which clearly benefits the development of the increasingly big-data-driven society. However, data stored in the cloud is usually in an encrypted form since users request high levels of data security and privacy. Thus, data encryption brings new challenges to deduplication in cloud computing, making deduplication for encrypted data more challenging. Because conventional deduplication solutions cannot handle encrypted data, and there are various problems with existing deduplication schemes, this paper proposes an improved scheme based on ownership challenge and proxy re-encryption to enhance its security performance and attain an efficient and secure deduplication. A theoretical analysis and computer simulation is performed to evaluate its performance. The performance analysis shows that the scheme is efficient and has good attack resistance in the big data deduplication for cloud computing.


Citation Format:
Yongan Guo, Chunlei Jiang, "High Efficient Secure Data Deduplication Method for Cloud Computing," Journal of Internet Technology, vol. 21, no. 2 , pp. 557-564, Mar. 2020.

Full Text:

PDF

Refbacks

  • There are currently no refbacks.





Published by Executive Committee, Taiwan Academic Network, Ministry of Education, Taipei, Taiwan, R.O.C
JIT Editorial Office, Office of Library and Information Services, National Dong Hwa University
No. 1, Sec. 2, Da Hsueh Rd., Shoufeng, Hualien 974301, Taiwan, R.O.C.
Tel: +886-3-931-7314  E-mail: jit.editorial@gmail.com