Research Article
FogDedupe: A Fog-Centric Deduplication Approach Using Multi-Key Homomorphic Encryption Technique
Algorithm 2
Fog node—identifying the redundant data chunks.
| Input: Partial hash values (pα) | | Output: Redundancy verification results. | | Begin | | 1. Fog node receives the chunk id (Cid), file id (Fid), and hash values (pα) | | from the data owners. | | 2. Fog node identifies the location of each data chunk and stored it in the | | DIT. | | 3. Redundancy verification (incoming data chunks) | | If (all corresponding bit position of pα ==1) | | a. Data chunk ← Duplicate data chunk | | b. Create a tag to represent that the corresponding ciphertext of the | | data chunk is duplicate and the fog node prohibits the data owner | | from uploading redundant data to the cloud servers. | | c. Sends tag to the data owner. | | Else (bit position (SIT) ==0 or bit position (SIT) == at least one 0) | | a. Data chunk ← Non-duplicated data chunk | | b. Calculate the percentage of non-zero hash bits in the index table. | | c. Creates tag for the non-duplicated data chunk | | d. Sends the non-duplicated tag to the data owner. | | e. Sends the percentage of non-zero hash bits to the cloud admin. | | End |
|