Advanced techniques for secure and efficient cloud data


Commercial cloud storage providers have mostly adopted data deduplication technology, which is necessary

to handle the exponential rise of data. A variety of secure data deduplication techniques have been developed

and implemented in a variety of settings to better safeguard the security of users’ sensitive data in the outsourced storage mode. Numerous instruments have been developed to assist dynamic ownership management, and these schemes have attracted a lot of scholarly interest. They are particularly interested in strategies for deduplicating encrypted data that are effective and secure. The re-encryption deduplication storage system is the primary subject of this study, and we demonstrate how the recently developed lightweight rekeying-aware encrypted deduplication scheme (REED) is susceptible to an attack we refer to as

the stub-reserved attack. Furthermore, we provide a secure data deduplication method based on the convergent all-or-nothing transform (CAONT) and arbitrary Bloom filter bits. Re-encryption functions nicely with this approach. Our method can withstand a stub-reserved attack and ensure the privacy of the owners’ sensitive data thanks to a built-in characteristic of the one-way hash function. Additionally, the CAONT only requires a portion of the package to be re-encrypted, rather than the complete package, which lessens the computational load on the system. Our technique is safe and effective at re-encryption, according to security analysis and experimental findings.


Keywords: Re-encryption, Data deduplication, User joining, User revocation, Cloud security, Cybersecurity, Data security.


Patnana Sayesu

Leave a Reply

Your email address will not be published. Required fields are marked *