Efficient Deduplication on Cloud Environment Using Bloom Filter and IND-CCA2 Secured Cramer Shoup Cryptosystem

  • Y. Mohamed SirajudeenEmail author
  • C. Muralidharan
  • R. Anitha
Conference paper
Part of the Lecture Notes on Data Engineering and Communications Technologies book series (LNDECT, volume 38)


Cloud Service Providers (CSP) offers several services over the internet to the cloud users. One of the predominant services offered to the cloud users is data storage. With the rapid growth of digital data, redundancy has become the bottleneck issue in cloud computing environment. Storing identical copies of user data increases the storage overhead. The traditional way of performing deduplication is by comparing the cipher texts, which will result in high time complexity and heavy load on users. To utilize the cloud storage effectively and to reduce the work load of cloud users, a novel inline data deduplication method is created based on Bloom filter. The proposed scheme combines the application of bloom filter and Cramer Shoup cryptosystem to perform secure inline deduplication. Two matrices are created such as keyword matrix and file matrix based on the application of the bloom filter to perform deduplication on the cloud storage. The empirical study of the proposed deduplication technique is carried out on the Eucalyptus v4.2.0 open source private cloud on top of the Xeon processor with 64 GB of RAM Speed. It has been observed that the proposed deduplication improves the efficiency and effectiveness of the deduplication compared to the traditional deduplication algorithms.


Data deduplication Redundancy Cloud computing Cramer shoup encryption technique 



The work of this paper is financially sponsored by Science and Engineering Research Board (SERB), Department of Science and Technology (DST), Government of India. The Grant Number is ECR/2016/000546.


  1. 1.
    Kenji, E.K., Jonathan, M., John, Z.: Diffusing the cloud: cloud computing and implications for public policy. J. Ind. Compet. Trade 11, 209–237 (2011)CrossRefGoogle Scholar
  2. 2.
    Liu, Y., Sun, Y., Ryoo, J., Rizvi, S., Vasilakos, A.V.: A survey of security and privacy challenges in cloud computing: solutions and future directions. J. Comput. Sci. Eng. 9, 119–133 (2015)CrossRefGoogle Scholar
  3. 3.
    Yan, Z., Ding, W., Yu, X., Zhu, H., Deng, R.H.: Deduplication on encrypted big data in cloud. IEEE Trans. Big Data 2, 138–150 (2017)CrossRefGoogle Scholar
  4. 4.
    Waghmare, V., Kapse, S.: Authorized deduplication: an approach for secure cloud environment. In: International Conference on Information Security and Privacy (2016). Proc. Comput. Sci. 78, 815–823CrossRefGoogle Scholar
  5. 5.
    Diffie, W., Hellman, M.E.: New direction in cryptography. IEEE Trans. Inf. Theory 12, 644–654 (1976)MathSciNetCrossRefGoogle Scholar
  6. 6.
    Xia, W., Jiang, H., Feng, D., Tian, L.: DARE: a deduplication-aware resemblance detection and elimination scheme for data reduction with low overheads. IEEE Trans. Comput. 65, 1692–1705 (2016)MathSciNetCrossRefGoogle Scholar
  7. 7.
    Jiang, T., Chen, X., Wu, Q., Ma, J., Susilo, W., Lou, W.: Secure and efficient cloud data deduplication with randomized tag. IEEE Trans. Inf. Forensic Secur. 12, 532–545 (2017)CrossRefGoogle Scholar
  8. 8.
    Deng, F., Rafiei, D.: Approximately detecting duplicates for streaming data using stable bloom filters. In: Proceedings of the ACM International Conference on Management of Data, pp. 25–36 (2006)Google Scholar
  9. 9.
    Almeida, P., Baquero, C., Preguica, N., Hutchison, D.: Scalable bloom filters. Inf. Process. Lett. 101, 255–261 (2007)MathSciNetCrossRefGoogle Scholar
  10. 10.
    Venish, A., Siva Sankar, K.: Study of chunking algorithm in data deduplication. In: Proceedings of the International Conference on Soft Computing System, Advances in Intelligent System and Computing, pp. 13–20 (2016)Google Scholar
  11. 11.
    Dal Bianco, G., Galante, R., Goncalves, M.A., Canuto, S., Heuser, C.: A practical and effective sampling selection strategy for large scale deduplication. IEEE Trans. Knowl. Data Eng. 27, 1–15 (2015)CrossRefGoogle Scholar
  12. 12.
    Li, J., Li, Y.K., Chen, X., Lee, P.P.C., Lou, W.: A hybrid cloud approach for secure authorized deduplication. IEEE Trans. Parallel Distrib. Syst. 20, 1–11 (2014)Google Scholar
  13. 13.
    Mihir, B., Sriram, K., Thomas, R.: Message-locked encryption and secure deduplication. In: Proceedings of the Advances in Cryptography, pp. 296–312 (2013)Google Scholar
  14. 14.
    Li, W., Huang, K., Zhang, D., Qin, Z.: Accurate counting bloom filter for large scale data processing. Math. Probl. Eng. 4, 1–11 (2013)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  • Y. Mohamed Sirajudeen
    • 1
    Email author
  • C. Muralidharan
    • 1
  • R. Anitha
    • 1
  1. 1.DST Cloud Research Lab, Department of Computer Science and EngineeringSri Venkateswara College of EngineeringSriperumbudurIndia

Personalised recommendations