SECUREDGE: Privacy-Preserving Deduplication with Homomorphic Encryption for Multi-Tenant Cloud Systems

  • Authors

    • Murala Vijaya Department of Computer Science and Engineering, GITAM Deemed to be University, Visakhapatnam, ‎ Andhra Pradesh, India
    • Dr. Lade Srinivasa Chakravarthy Department of Computer Science and Engineering, GITAM Deemed to be University, Visakhapatnam, ‎ Andhra Pradesh, India
    https://doi.org/10.14419/6ekp0r85

    Received date: June 16, 2025

    Accepted date: July 12, 2025

    Published date: July 24, 2025

  • Fully Homomorphic Encryption; Multi-Tenant Data Security; Privacy-Preserving Deduplication; Secure Cloud Deduplication; Homomorphic ‎Encryption.
  • Abstract

    Cloud computing developments have pushed multi-tenant models to become widely used, allowing enterprises to share computing resources ‎without mixing their data. Even though this approach works, using data deduplication to save space causes serious concerns for privacy. ‎Conventional encryption techniques may not support deduplication since they mask similar data sections and may potentially expose concealed data when processing. Our work offers a novel approach called SECUREDGE. It encrypts data using Fully Homomorphic Encryption (FHE) to ensure security. Data privacy is guaranteed by encrypting information before deduplication. It employs an FHE-based method ‎to identify and remove duplicate data without impacting the security edges between tenants. Businesses facing difficulties in the cloud may ‎rest easy with SECUREDGE's intelligent storage solutions and state-of-the-art cryptography‎.

  • References

    1. Newman, L. H., “The worst hacks of 2024”, WIRED, 2024. https://www.wired.com/story/worst-hacks-2024/
    2. Mettela, T., “Americans in line to get $8,250 checks from ‘steel’ data breach settlement – and you only need a single recei. The US Sun, 2024.
    3. Shin, Y., Koo, D., & Hur, J., “A Survey of Secure Data Deduplication Schemes for Cloud Storage Systems”, ACM Computing Surveys (CSUR), 49, 1 – 38, 2017. https://doi.org/10.1145/3017428.
    4. Kaur, R., Chana, I., & Bhattacharya, J., “Data deduplication techniques for efficient cloud storage management: a systematic review”, The Journal of Supercomputing, 74, 2035 – 2085, 2017. https://doi.org/10.1007/s11227-017-2210-8.
    5. Prajapati, P., & Shah, P., “A Review on Secure Data Deduplication: Cloud Storage Security Issue”, J. King Saud Univ. Comput. Inf. Sci., 34, 3996-4007, 2020. https://doi.org/10.1016/j.jksuci.2020.10.021.
    6. Xie, Q., Zhang, C., & Jia, X., “Security-Aware and Efficient Data Deduplication for Edge-Assisted Cloud Storage Systems”, IEEE Transactions on Services Computing, 16, 2191-2202, 2023. https://doi.org/10.1109/TSC.2022.3195318.
    7. Jiang, S., Jiang, T., & Wang, L., “Secure and Efficient Cloud Data Deduplication with Ownership Management”, IEEE Transactions on Services Computing, 13, 1152-1165, 2020. https://doi.org/10.1109/TSC.2017.2771280.
    8. Song, M., Hua, Z., Zheng, Y., Xiang, T., & Jia, X., “Enabling Transparent Deduplication and Auditing for Encrypted Data in Cloud”, IEEE Trans-actions on Dependable and Secure Computing, 21, 3545-3561, 2024. https://doi.org/10.1109/TDSC.2023.3334475.
    9. Wang, L., Wang, B., Song, W., & Zhang, Z., “A key-sharing based secure deduplication scheme in cloud storage”, Inf. Sci., 504, 48-60, 2019. https://doi.org/10.1016/j.ins.2019.07.058.
    10. Fan, Y., Lin, X., Liang, W., Tan, G., & Nanda, P., “A secure privacy preserving deduplication scheme for cloud computing”, Future Gener. Com-put. Syst., 101, 127-135, 2019. https://doi.org/10.1016/j.future.2019.04.046.
    11. G. Crihan, M. Crăciun, and L. Dumitriu, “A comparative assessment of homomorphic encryption algorithms applied to biometric information,” In-ventions, vol. 8, no. 4, 102, 2023. https://doi.org/10.3390/inventions8040102.
    12. Ryu, J., Kim, K., & Won, D., “A Study on Partially Homomorphic Encryption”, 2023 17th International Conference on Ubiquitous Information Management and Communication (IMCOM), 1-4, 2023. https://doi.org/10.1109/IMCOM56909.2023.10035630.
    13. Alaya, B., Laouamer, L., & Msilini, N. (2020). Homomorphic encryption systems statement: Trends and challenges. Comput. Sci. Rev., 36, 100235. https://doi.org/10.1016/j.cosrev.2020.100235.
    14. Marcolla, C., Sucasas, V., Manzano, M., Bassoli, R., Fitzek, F., & Aaraj, N., “Survey on Fully Homomorphic Encryption, Theory, and Applica-tions”, Proceedings of the IEEE, 110, 1572-1609, 2022. https://doi.org/10.1109/JPROC.2022.3205665.
    15. J. S. Rauthan, “Fully homomorphic encryption: A case study,” Journal of Intelligent & Fuzzy Systems, vol. 43, no. 6, pp. 8417–8437, 2022. https://doi.org/10.3233/JIFS-221454.
    16. Bharath Babu, S., & J. R., “Secure deduplication with dynamic updates in multi-tenant cloud environment”, 2022 International Conference on Ad-vanced Computing Technologies and Applications (ICACTA), 1-4, 2022. https://doi.org/10.1109/ICACTA54488.2022.9752987.
    17. Fan, Y., Lin, X., Liang, W., Tan, G., & Nanda, P., “A secure privacy-preserving deduplication scheme for cloud computing”, Future Generation Computer Systems, 101, 127-135, 2019. https://doi.org/10.1016/j.future.2019.04.046.
    18. Yang, X., Lu, R., Shao, J., Tang, X., & Ghorbani, A., “Achieving efficient and privacy-preserving multi-domain big data deduplication in cloud”, IEEE Transactions on Services Computing, 14(6), 1292-1305, 2018. https://doi.org/10.1109/TSC.2018.2881147.
    19. Goyal, N., Pandey, A. K., Gupta, S. K., & Pandey, R., “Suppleness of multi-tenancy in cloud computing”, ERN: Other Econometrics, 2019. https://doi.org/10.2139/ssrn.3358249.
    20. Wang, J., He, J., Li, W., Lan, X., Liu, Q., & Li, T., “A secure duplicate data sharing method against untrusted cloud service providers”, 2023 IEEE 12th International Conference on Cloud Networking (CloudNet), 352-359, 2023. https://doi.org/10.1109/CloudNet59005.2023.10490032.
    21. Novković, B., Bozic, A., Golub, M., & Groš, S., “Confidential computing as an attempt to secure service provider's confidential client data”, 2021 44th International Convention on Information, Communication and Electronic Technology (MIPRO), 1213-1218, 2021. https://doi.org/10.23919/MIPRO52101.2021.9597198.
    22. Shri, M., & Srinivas, P., “Enhanced protection deduplicate data storage scheme for multiuser environments in cloud”, International Journal of Ad-vance Research in Science and Engineering, 2138-2142, 2017.
    23. M. El Ghazouani, A. Ikidid, C. Ait Zaouiat, L. Aziz, M. Y. Ichahane, and L. Er-Rajy, “Optimal Method Combining Blockchain and Multi-Agent System to Ensure Data Integrity and Deduplication in the Cloud Environment”, Int. J. Interact. Mob. Technol., vol. 18, no. 10, pp. pp. 90–105, May 2024. https://doi.org/10.3991/ijim.v18i10.43305.
    24. S. Madasu, P. Murugesan, H. V. Jaganathan and S. Pamulaparthyvenkata, "Elliptic Curve Diffie-Hellman based Privacy-Preserving Deduplication for Big Data in Cloud Systems," 2024 International Conference on Intelligent Algorithms for Computational Intelligence Systems (IACIS), Hassan, India, 2024, pp. 1-4, https://doi.org/10.1109/IACIS61494.2024.10721723.
    25. Rashid, F., Miri, A., & Woungang, I., “A secure data deduplication framework for cloud environments”, 2012 Tenth Annual International Confer-ence on Privacy, Security and Trust, 81-87, 2012. https://doi.org/10.1109/PST.2012.6297923.
    26. T. N. P. Madhuri, M. S. Rao, P. S. Santosh, P. Tejaswi, and S. Devendra, “Data Communication Protocol using Elliptic Curve Cryptography for Wireless Body Area Network,” 2022 6th International Conference on Computing Methodologies and Communication (ICCMC), pp. 133–139, Mar. 2022, https://doi.org/10.1109/ICCMC53470.2022.9753898.
  • Downloads

  • How to Cite

    Vijaya, M., & Chakravarthy , D. L. S. . (2025). SECUREDGE: Privacy-Preserving Deduplication with Homomorphic Encryption for Multi-Tenant Cloud Systems. International Journal of Basic and Applied Sciences, 14(3), 242-257. https://doi.org/10.14419/6ekp0r85