|
Author (s) | Technique used | Description | Findings |
|
Halevi [13] | Verifying the proof of ownership (PoW) to overcome the security vulnerabilities | (i) Uses message digest to perform source - level deduplication and to verify the ownership of the data block | (i) Uses Merkle tree to verify the ownership (ii) Index table is not scalable |
Blasco et al., [14] | Proof of ownership for deduplication using Bloom filter | (i) Cloud server maintains a Bloom filter to verify the ownership of the data by sending a challenge to the clients | (i) Traditional Bloom filter is not scalable (ii) The possibility of false-positive error is high |
Agarwala et al. [17] | Client-side secure image deduplication using DICE protocol | (i) Data blocks of the images are encrypted using MLE and DICE protocol (ii) Redundant blocks in the image are removed | (i) Ensures security against poison attacks (ii) It fails to perform source-level deduplication when the same data block is received from different users |
Youn et al. [18] | Authorized client-side deduplication using CP-ABE in cloud storage | (i) Provides authorized convergent encryption method using CP-ABE (ii) Allows only authorized users to access critical data | (i) A third-party server is introduced for generating convergent keys. It increases security vulnerabilities |
Yoosuf et al. [19] | LDuAP: lightweight auditing with inline deduplication | (i) Two-dimensional Bloom filter is created and managed on the cloud servers to perform inline deduplication | (i) Bandwidth issues are not addressed as the inline deduplication is performed on the cloud servers |
Bellari et al. [21] | DupLESS: server-ided encryption for deduplicated storage | (i) A separate key server is introduced to generate keys for the users | (i) If the authenticity of the key server is compromised, then the entire data present in the cloud may get leaked or misused |
Chen et al. [24] | BL-MLE: block-level message-locked encryption for secure large file deduplication | (i) Reduces the metadata that is generated by the MLE method (ii) Allows to perform both file-level and block-level target deduplication | (i) Uses Bellaro et al.’s [21] method for POW |
|