Loading…
Finite State Automata Based Cryptosystem for Secure Data Sharing and De-duplication in Cloud Computing
In the era of high-speed internet access, a surge in redundant data generation is observed across different media sources and devices, posing challenges in computational and storage efficiency during data outsourcing and retrieval. Addressing this issue and optimizing storage efficiency is essential...
Saved in:
Published in: | SN computer science 2024-08, Vol.5 (6), p.774, Article 774 |
---|---|
Main Authors: | , , |
Format: | Article |
Language: | English |
Subjects: | |
Citations: | Items that this one cites |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | In the era of high-speed internet access, a surge in redundant data generation is observed across different media sources and devices, posing challenges in computational and storage efficiency during data outsourcing and retrieval. Addressing this issue and optimizing storage efficiency is essential to curtailing redundant data creation within storage servers. The potential compromise of sensitive data within outsourced information is susceptible to both internal and external threats. Thus, securing data during both data-in-transmission and data-at-storage is imperative. However, conventional cryptosystems alongside deduplication services face a dilemma due to the conflict between encryption and deduplication. Furthermore, prevailing cryptosystems pose false keys and false ownership claiming, bruit-force, and dictionary attacks during the secure deduplication process. To tackle these challenges, this paper utilizes a Finite State Automata (FSA) based cryptosystem alongside deduplication, complemented by Proof of Ownership (PoW) and Data Integrity Verification (DIV) protocols. This method ensures robust data security effectively by resolving the encryption-deduplication paradox. Empirical evaluation validates the efficacy of the proposed method, showcasing improvements over the existing system. It also demonstrates reduced communication and computational complexity and improved storage efficiency, and fortified security provisions during data deduplication. |
---|---|
ISSN: | 2661-8907 2662-995X 2661-8907 |
DOI: | 10.1007/s42979-024-03101-y |