Abstract

Cloud storage providers have widely integrated data deduplication techniques to manage the exponential growth of data. Various secure strategies for data deduplication have been developed to bolster the security of client data within shared storage environments. One critical area of focus is ensuring Re- encrypting deduplicated encrypted data in a safe and effective manner, which has garnered significant attention from researchers. However, recent investigations have uncovered vulnerabilities in the lightweight encrypted deduplication technique with rekeying awareness (REED), particularly susceptible to an assault via a stub-reserved. In response, We provide a reliable data deduplication method that uses effective re-encryption. leveraging Combined Win Big or Bust Transformation (CAONT) and segments that were chosen at random from the Sprout channel. Our approach is resilient protects sensitive data privacy and is resistant to the stub- reserved assault through one-way hash functions. Furthermore, our method minimizes computation overheads by requiring data owners to re-encrypt only a fraction of the package using CAONT, rather than the entire package. Through rigorous security analysis andexperiments, we validate the efficacy and safety of our re- encryption strategy. KEY WORDS: - Cloud storage, data deduplication, security, sensitive information, outsourced storage.

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.