Abstract
Cloud-based processes store enormous amounts of data to support several daily applications, especially in intelligent systems and the Industrial Internet of Things (IIoT) applications. The advancement of hosted cloud storage services endorses the productivity of IIoT applications. It is critical to enabling businesses to increase data security, privacy, efficiency, accessibility, and flexibility. There are many concerns for cloud providers, including storage overhead, upload/download bandwidth, and data security and privacy. Utilizing secure data deduplication technology, cloud service providers may maximize their available storage capacity, resulting in effective and secure disk space use. This review focuses on a comparative study of secure data deduplication mechanisms for cloud-based applications, including MD5 and various versions of SHA. These techniques remove duplicate data in different storage levels and enhance users’ data integrity, confidentiality, and privacy protection. It is computationally more efficient than traditional compression methods, which may support IoT applications to manage the exponential growth of their data. We also present an overview and classification of the most recent research on data deduplication based on essential mechanisms.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Prajapati, P., Shah, P.: A review on secure data deduplication: cloud storage security issue. J. King Saud Univ. Comput. Inf. Sci. 34(7), 3996–4007 (2022)
Harauz, J., Kaufman, L.M., Potter, B.: Data security in the world of cloud computing. IEEE Secur. Priv. 7(4), 61–64 (2009)
Zissis, D., Lekkas, D.: Addressing cloud computing security issues. Futur. Gener. Comput. Syst. 28(3), 583–592 (2012)
Geer, D.: Reducing the storage burden via data deduplication. IEEE Comput. 41(12), 15–17 (2008)
He, Q., Li, Z., Zhang, X.: Data deduplication techniques. In: Proceedings International Conference on Future Information Technology and Management Engineering (FITME 2010), pp. 430–433 (2010)
Harnik, D., Pinkas, B., Shulman-Peleg, A.: Side channels in cloud services: deduplication in cloud storage. IEEE Secur. Priv. 8(6), 40–47 (2010)
Xu, J., Chang, E., Zhou, J.: Leakage-resilient client-side deduplication of encrypted data in cloud storage. In: Cryptology ePrint Archive: Report 2011/538 (2011)
Stanek, J., Sorniotti, A., Androulaki, E., Kencl, L.: A secure data deduplication scheme for cloud storage. In: Christin, N., Safavi-Naini, R. (eds.) FC 2014. LNCS, vol. 8437, pp. 99–118. Springer, Heidelberg (2014). https://doi.org/10.1007/978-3-662-45472-5_8
Yuan, Y., Wu, Xu., Lu, Y. (eds.): ISCTCS 2012. CCIS, vol. 320. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-35795-4
Waghmare, M.B., Padwekar, S.V.: Survey on techniques for authorized deduplication of encrypted data in cloud. In: 2020 International Conference on Computer Communication and Informatics (ICCCI), pp. 1–5 (2020)
Chhabra, N., Bala, M.: A comparative study of data deduplication strategies. In: 1st International Conference on Secure Cyber Computing and Communication (ICSCCC), pp. 68–72 (2018)
Zhu, Y., Zhang, X., Zhao, R., Dong, X.: Data de-duplication on similar file detection. In: 8th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, pp. 66–73 (2014)
Hu, Q.: A data integrity verification scheme of deduplication for cloud ciphertexts. In: IEEE 9th Joint International Information Technology and Artificial Intelligence Conference (ITAIC), pp. 865–869 (2020)
Wen, Z., Luo, J., Chen, H., Meng, J., Li, X., Li, J.: A verifiable data deduplication scheme in cloud computing. In: International Conference on Intelligent Networking and Collaborative Systems, pp. 85–90 (2014)
Vijayalakshmi, K., Jayalakshmi, V.: Analysis on data deduplication techniques of storage of big data in cloud. In: 5th International Conference on Computing Methodologies and Communication (ICCMC), pp. 976–983 (2021)
Fan, C.-I., Huang, S.-Y., Hsu, W.-C.: Hybrid data deduplication in cloud environment. In: International Conference on Information Security and Intelligent Control, pp. 174–177 (2012)
Rashid, F., Miri, A.: Secure image data deduplication through compressive sensing. In: 14th Annual Conference on Privacy, Security and Trust (PST), pp. 569–572 (2016)
Vañó-García, F., Marco-Gisbert, H.: How kernel randomization is canceling memory deduplication in cloud computing systems. In: IEEE 17th International Symposium on Network Computing and Applications (NCA), pp. 1–4 (2018)
Manogar, E., Abirami, S.: A study on data deduplication techniques for optimized storage. In: 6th International Conference on Advanced Computing (ICoAC), pp. 161–166 (2014)
Malathi, P., Suganthidevi, S.: Comparative study and secure data deduplication techniques for cloud computing storage. In: International Conference on Innovative Computing, Intelligent Communication and Smart Electrical Systems (ICSES), pp. 1–5 (2021)
Tarun, S., Batth, R.S., Kaur, S.: A scheme for data deduplication using advance machine learning architecture in distributed systems. In: International Conference on Computing Sciences (ICCS), pp. 53–60 (2021)
Pooranian, Z., Chen, K.-C., Yu, C.-M., Conti, M.: RARE: defeating side channels based on data-deduplication in cloud storage. In: IEEE INFOCOM & IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), pp. 444–449 (2018)
Backialakshmi, N., Manikandan, M.: Data de-duplication using N0SQL databases in cloud. In: International Conference on Soft-Computing and Networks Security (ICSNS), pp. 1–4 (2015)
Li, S.: EF-dedup: enabling collaborative data deduplication at the network edge. In: IEEE 39th International Conference on Distributed Computing Systems (ICDCS), pp. 986–996 (2019)
Li, D., et al.: A parallel and pipelined architecture for accelerating fingerprint computation in high throughput data storages. In: IEEE 23rd Annual International Symposium on Field-Programmable Custom Computing Machines, pp. 203–206 (2015)
Xu, X., Hu, N., Tu, Q.: Two-side data deduplication mechanism for non-center cloud storage systems. In: IEEE International Conference on Ubiquitous Wireless Broadband (ICUWB), pp. 1–4 (2016)
Xia, W., et al.: A comprehensive study of the past, present, and future of data deduplication. Proc. IEEE 104(9), 1681–1710 (2016)
Baravkar, S.: Vaishali mali “authorized data deduplication using hybrid cloud technique.” Int. J. Sci. Res. (IJSR) 5(7), 1284–1289 (2016)
Liu, Q., Fu, Y., Ni, G., Hou, R.: Hadoop based scalable cluster deduplication for big data. In: IEEE 36th International Conference on Distributed Computing Systems Workshops (ICDCSW), pp. 98–105 (2016)
Sun, Y., Zeng, C.Y., Chung, J., Huang, Z.: Online data deduplication for in-memory big-data analytic systems. IEEE International Conference on Communications (ICC), pp. 1–7 (2017)
Zhang, Z., Jiang, Z., Peng, C., Liu, Z.: Analysis of data fragments in deduplication system. In: International Conference System Science and Engineering (ICSSE), pp. 559–563 (2012)
Bellovin, S.M., Rescorla, E.K.: Deploying a new hash algorithm. In: Presentation at Rump Session of CRYPTO (2005)
Kulkarni, V.R., Mujawar, S., Apte, S.: Hash function implementation using artificial neural networks. Int. J. Soft Comput. 1(1) (2010)
Srikantaswamy, S.G.: Hash function design using matrix multiplication, ex-or, checksum generation and compression technique approach. Int. J. Comput. Sci. Inf. Technol. Secur. 3(1) (2013)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Baligodugula, V.V. et al. (2023). A Comparative Study of Secure and Efficient Data Duplication Mechanisms for Cloud-Based IoT Applications. In: Daimi, K., Al Sadoon, A. (eds) Proceedings of the 2023 International Conference on Advances in Computing Research (ACR’23). ACR 2023. Lecture Notes in Networks and Systems, vol 700. Springer, Cham. https://doi.org/10.1007/978-3-031-33743-7_46
Download citation
DOI: https://doi.org/10.1007/978-3-031-33743-7_46
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-33742-0
Online ISBN: 978-3-031-33743-7
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)