Research Article

FogDedupe: A Fog-Centric Deduplication Approach Using Multi-Key Homomorphic Encryption Technique

Table 1

Summarization of related works.

Author (s)Technique usedDescriptionFindings

Halevi [13]Verifying the proof of ownership (PoW) to overcome the security vulnerabilities(i) Uses message digest to perform source - level deduplication and to verify the ownership of the data block(i) Uses Merkle tree to verify the ownership
(ii) Index table is not scalable
Blasco et al., [14]Proof of ownership for deduplication using Bloom filter(i) Cloud server maintains a Bloom filter to verify the ownership of the data by sending a challenge to the clients(i) Traditional Bloom filter is not scalable
(ii) The possibility of false-positive error is high
Agarwala et al. [17]Client-side secure image deduplication using DICE protocol(i) Data blocks of the images are encrypted using MLE and DICE protocol
(ii) Redundant blocks in the image are removed
(i) Ensures security against poison attacks
(ii) It fails to perform source-level deduplication when the same data block is received from different users
Youn et al. [18]Authorized client-side deduplication using CP-ABE in cloud storage(i) Provides authorized convergent encryption method using CP-ABE
(ii) Allows only authorized users to access critical data
(i) A third-party server is introduced for generating convergent keys. It increases security vulnerabilities
Yoosuf et al. [19]LDuAP: lightweight auditing with inline deduplication(i) Two-dimensional Bloom filter is created and managed on the cloud servers to perform inline deduplication(i) Bandwidth issues are not addressed as the inline deduplication is performed on the cloud servers
Bellari et al. [21]DupLESS: server-ided encryption for deduplicated storage(i) A separate key server is introduced to generate keys for the users(i) If the authenticity of the key server is compromised, then the entire data present in the cloud may get leaked or misused
Chen et al. [24]BL-MLE: block-level message-locked encryption for secure large file deduplication(i) Reduces the metadata that is generated by the MLE method
(ii) Allows to perform both file-level and block-level target deduplication
(i) Uses Bellaro et al.’s [21] method for POW