Loading…

Finite State Automata Based Cryptosystem for Secure Data Sharing and De-duplication in Cloud Computing

In the era of high-speed internet access, a surge in redundant data generation is observed across different media sources and devices, posing challenges in computational and storage efficiency during data outsourcing and retrieval. Addressing this issue and optimizing storage efficiency is essential...

Full description

Saved in:
Bibliographic Details
Published in:SN computer science 2024-08, Vol.5 (6), p.774, Article 774
Main Authors: Kodada, Basappa B., D’Mello, Demian Antony, Kumar, D. K. Santhosh
Format: Article
Language:English
Subjects:
Citations: Items that this one cites
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:In the era of high-speed internet access, a surge in redundant data generation is observed across different media sources and devices, posing challenges in computational and storage efficiency during data outsourcing and retrieval. Addressing this issue and optimizing storage efficiency is essential to curtailing redundant data creation within storage servers. The potential compromise of sensitive data within outsourced information is susceptible to both internal and external threats. Thus, securing data during both data-in-transmission and data-at-storage is imperative. However, conventional cryptosystems alongside deduplication services face a dilemma due to the conflict between encryption and deduplication. Furthermore, prevailing cryptosystems pose false keys and false ownership claiming, bruit-force, and dictionary attacks during the secure deduplication process. To tackle these challenges, this paper utilizes a Finite State Automata (FSA) based cryptosystem alongside deduplication, complemented by Proof of Ownership (PoW) and Data Integrity Verification (DIV) protocols. This method ensures robust data security effectively by resolving the encryption-deduplication paradox. Empirical evaluation validates the efficacy of the proposed method, showcasing improvements over the existing system. It also demonstrates reduced communication and computational complexity and improved storage efficiency, and fortified security provisions during data deduplication.
ISSN:2661-8907
2662-995X
2661-8907
DOI:10.1007/s42979-024-03101-y