Skip to main content

A Comparative Study of Secure and Efficient Data Duplication Mechanisms for Cloud-Based IoT Applications

  • Conference paper
  • First Online:
Proceedings of the 2023 International Conference on Advances in Computing Research (ACR’23) (ACR 2023)

Abstract

Cloud-based processes store enormous amounts of data to support several daily applications, especially in intelligent systems and the Industrial Internet of Things (IIoT) applications. The advancement of hosted cloud storage services endorses the productivity of IIoT applications. It is critical to enabling businesses to increase data security, privacy, efficiency, accessibility, and flexibility. There are many concerns for cloud providers, including storage overhead, upload/download bandwidth, and data security and privacy. Utilizing secure data deduplication technology, cloud service providers may maximize their available storage capacity, resulting in effective and secure disk space use. This review focuses on a comparative study of secure data deduplication mechanisms for cloud-based applications, including MD5 and various versions of SHA. These techniques remove duplicate data in different storage levels and enhance users’ data integrity, confidentiality, and privacy protection. It is computationally more efficient than traditional compression methods, which may support IoT applications to manage the exponential growth of their data. We also present an overview and classification of the most recent research on data deduplication based on essential mechanisms.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 189.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 249.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Prajapati, P., Shah, P.: A review on secure data deduplication: cloud storage security issue. J. King Saud Univ. Comput. Inf. Sci. 34(7), 3996–4007 (2022)

    Google Scholar 

  2. Harauz, J., Kaufman, L.M., Potter, B.: Data security in the world of cloud computing. IEEE Secur. Priv. 7(4), 61–64 (2009)

    Article  Google Scholar 

  3. Zissis, D., Lekkas, D.: Addressing cloud computing security issues. Futur. Gener. Comput. Syst. 28(3), 583–592 (2012)

    Article  Google Scholar 

  4. Geer, D.: Reducing the storage burden via data deduplication. IEEE Comput. 41(12), 15–17 (2008)

    Article  Google Scholar 

  5. He, Q., Li, Z., Zhang, X.: Data deduplication techniques. In: Proceedings International Conference on Future Information Technology and Management Engineering (FITME 2010), pp. 430–433 (2010)

    Google Scholar 

  6. Harnik, D., Pinkas, B., Shulman-Peleg, A.: Side channels in cloud services: deduplication in cloud storage. IEEE Secur. Priv. 8(6), 40–47 (2010)

    Article  Google Scholar 

  7. Xu, J., Chang, E., Zhou, J.: Leakage-resilient client-side deduplication of encrypted data in cloud storage. In: Cryptology ePrint Archive: Report 2011/538 (2011)

    Google Scholar 

  8. Stanek, J., Sorniotti, A., Androulaki, E., Kencl, L.: A secure data deduplication scheme for cloud storage. In: Christin, N., Safavi-Naini, R. (eds.) FC 2014. LNCS, vol. 8437, pp. 99–118. Springer, Heidelberg (2014). https://doi.org/10.1007/978-3-662-45472-5_8

    Chapter  Google Scholar 

  9. Yuan, Y., Wu, Xu., Lu, Y. (eds.): ISCTCS 2012. CCIS, vol. 320. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-35795-4

    Book  Google Scholar 

  10. Waghmare, M.B., Padwekar, S.V.: Survey on techniques for authorized deduplication of encrypted data in cloud. In: 2020 International Conference on Computer Communication and Informatics (ICCCI), pp. 1–5 (2020)

    Google Scholar 

  11. Chhabra, N., Bala, M.: A comparative study of data deduplication strategies. In: 1st International Conference on Secure Cyber Computing and Communication (ICSCCC), pp. 68–72 (2018)

    Google Scholar 

  12. Zhu, Y., Zhang, X., Zhao, R., Dong, X.: Data de-duplication on similar file detection. In: 8th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, pp. 66–73 (2014)

    Google Scholar 

  13. Hu, Q.: A data integrity verification scheme of deduplication for cloud ciphertexts. In: IEEE 9th Joint International Information Technology and Artificial Intelligence Conference (ITAIC), pp. 865–869 (2020)

    Google Scholar 

  14. Wen, Z., Luo, J., Chen, H., Meng, J., Li, X., Li, J.: A verifiable data deduplication scheme in cloud computing. In: International Conference on Intelligent Networking and Collaborative Systems, pp. 85–90 (2014)

    Google Scholar 

  15. Vijayalakshmi, K., Jayalakshmi, V.: Analysis on data deduplication techniques of storage of big data in cloud. In: 5th International Conference on Computing Methodologies and Communication (ICCMC), pp. 976–983 (2021)

    Google Scholar 

  16. Fan, C.-I., Huang, S.-Y., Hsu, W.-C.: Hybrid data deduplication in cloud environment. In: International Conference on Information Security and Intelligent Control, pp. 174–177 (2012)

    Google Scholar 

  17. Rashid, F., Miri, A.: Secure image data deduplication through compressive sensing. In: 14th Annual Conference on Privacy, Security and Trust (PST), pp. 569–572 (2016)

    Google Scholar 

  18. Vañó-García, F., Marco-Gisbert, H.: How kernel randomization is canceling memory deduplication in cloud computing systems. In: IEEE 17th International Symposium on Network Computing and Applications (NCA), pp. 1–4 (2018)

    Google Scholar 

  19. Manogar, E., Abirami, S.: A study on data deduplication techniques for optimized storage. In: 6th International Conference on Advanced Computing (ICoAC), pp. 161–166 (2014)

    Google Scholar 

  20. Malathi, P., Suganthidevi, S.: Comparative study and secure data deduplication techniques for cloud computing storage. In: International Conference on Innovative Computing, Intelligent Communication and Smart Electrical Systems (ICSES), pp. 1–5 (2021)

    Google Scholar 

  21. Tarun, S., Batth, R.S., Kaur, S.: A scheme for data deduplication using advance machine learning architecture in distributed systems. In: International Conference on Computing Sciences (ICCS), pp. 53–60 (2021)

    Google Scholar 

  22. Pooranian, Z., Chen, K.-C., Yu, C.-M., Conti, M.: RARE: defeating side channels based on data-deduplication in cloud storage. In: IEEE INFOCOM & IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), pp. 444–449 (2018)

    Google Scholar 

  23. Backialakshmi, N., Manikandan, M.: Data de-duplication using N0SQL databases in cloud. In: International Conference on Soft-Computing and Networks Security (ICSNS), pp. 1–4 (2015)

    Google Scholar 

  24. Li, S.: EF-dedup: enabling collaborative data deduplication at the network edge. In: IEEE 39th International Conference on Distributed Computing Systems (ICDCS), pp. 986–996 (2019)

    Google Scholar 

  25. Li, D., et al.: A parallel and pipelined architecture for accelerating fingerprint computation in high throughput data storages. In: IEEE 23rd Annual International Symposium on Field-Programmable Custom Computing Machines, pp. 203–206 (2015)

    Google Scholar 

  26. Xu, X., Hu, N., Tu, Q.: Two-side data deduplication mechanism for non-center cloud storage systems. In: IEEE International Conference on Ubiquitous Wireless Broadband (ICUWB), pp. 1–4 (2016)

    Google Scholar 

  27. Xia, W., et al.: A comprehensive study of the past, present, and future of data deduplication. Proc. IEEE 104(9), 1681–1710 (2016)

    Article  Google Scholar 

  28. Baravkar, S.: Vaishali mali “authorized data deduplication using hybrid cloud technique.” Int. J. Sci. Res. (IJSR) 5(7), 1284–1289 (2016)

    Google Scholar 

  29. Liu, Q., Fu, Y., Ni, G., Hou, R.: Hadoop based scalable cluster deduplication for big data. In: IEEE 36th International Conference on Distributed Computing Systems Workshops (ICDCSW), pp. 98–105 (2016)

    Google Scholar 

  30. Sun, Y., Zeng, C.Y., Chung, J., Huang, Z.: Online data deduplication for in-memory big-data analytic systems. IEEE International Conference on Communications (ICC), pp. 1–7 (2017)

    Google Scholar 

  31. Zhang, Z., Jiang, Z., Peng, C., Liu, Z.: Analysis of data fragments in deduplication system. In: International Conference System Science and Engineering (ICSSE), pp. 559–563 (2012)

    Google Scholar 

  32. Bellovin, S.M., Rescorla, E.K.: Deploying a new hash algorithm. In: Presentation at Rump Session of CRYPTO (2005)

    Google Scholar 

  33. Kulkarni, V.R., Mujawar, S., Apte, S.: Hash function implementation using artificial neural networks. Int. J. Soft Comput. 1(1) (2010)

    Google Scholar 

  34. Srikantaswamy, S.G.: Hash function design using matrix multiplication, ex-or, checksum generation and compression technique approach. Int. J. Comput. Sci. Inf. Technol. Secur. 3(1) (2013)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Fathi Amsaad .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Baligodugula, V.V. et al. (2023). A Comparative Study of Secure and Efficient Data Duplication Mechanisms for Cloud-Based IoT Applications. In: Daimi, K., Al Sadoon, A. (eds) Proceedings of the 2023 International Conference on Advances in Computing Research (ACR’23). ACR 2023. Lecture Notes in Networks and Systems, vol 700. Springer, Cham. https://doi.org/10.1007/978-3-031-33743-7_46

Download citation

Publish with us

Policies and ethics