SECUREDGE: Privacy-Preserving Deduplication with Homomorphic Encryption for Multi-Tenant Cloud Systems
-
https://doi.org/10.14419/6ekp0r85
Received date: June 16, 2025
Accepted date: July 12, 2025
Published date: July 24, 2025
-
Fully Homomorphic Encryption; Multi-Tenant Data Security; Privacy-Preserving Deduplication; Secure Cloud Deduplication; Homomorphic Encryption. -
Abstract
Cloud computing developments have pushed multi-tenant models to become widely used, allowing enterprises to share computing resources without mixing their data. Even though this approach works, using data deduplication to save space causes serious concerns for privacy. Conventional encryption techniques may not support deduplication since they mask similar data sections and may potentially expose concealed data when processing. Our work offers a novel approach called SECUREDGE. It encrypts data using Fully Homomorphic Encryption (FHE) to ensure security. Data privacy is guaranteed by encrypting information before deduplication. It employs an FHE-based method to identify and remove duplicate data without impacting the security edges between tenants. Businesses facing difficulties in the cloud may rest easy with SECUREDGE's intelligent storage solutions and state-of-the-art cryptography.
-
References
- Newman, L. H., “The worst hacks of 2024”, WIRED, 2024. https://www.wired.com/story/worst-hacks-2024/
- Mettela, T., “Americans in line to get $8,250 checks from ‘steel’ data breach settlement – and you only need a single recei. The US Sun, 2024.
- Shin, Y., Koo, D., & Hur, J., “A Survey of Secure Data Deduplication Schemes for Cloud Storage Systems”, ACM Computing Surveys (CSUR), 49, 1 – 38, 2017. https://doi.org/10.1145/3017428.
- Kaur, R., Chana, I., & Bhattacharya, J., “Data deduplication techniques for efficient cloud storage management: a systematic review”, The Journal of Supercomputing, 74, 2035 – 2085, 2017. https://doi.org/10.1007/s11227-017-2210-8.
- Prajapati, P., & Shah, P., “A Review on Secure Data Deduplication: Cloud Storage Security Issue”, J. King Saud Univ. Comput. Inf. Sci., 34, 3996-4007, 2020. https://doi.org/10.1016/j.jksuci.2020.10.021.
- Xie, Q., Zhang, C., & Jia, X., “Security-Aware and Efficient Data Deduplication for Edge-Assisted Cloud Storage Systems”, IEEE Transactions on Services Computing, 16, 2191-2202, 2023. https://doi.org/10.1109/TSC.2022.3195318.
- Jiang, S., Jiang, T., & Wang, L., “Secure and Efficient Cloud Data Deduplication with Ownership Management”, IEEE Transactions on Services Computing, 13, 1152-1165, 2020. https://doi.org/10.1109/TSC.2017.2771280.
- Song, M., Hua, Z., Zheng, Y., Xiang, T., & Jia, X., “Enabling Transparent Deduplication and Auditing for Encrypted Data in Cloud”, IEEE Trans-actions on Dependable and Secure Computing, 21, 3545-3561, 2024. https://doi.org/10.1109/TDSC.2023.3334475.
- Wang, L., Wang, B., Song, W., & Zhang, Z., “A key-sharing based secure deduplication scheme in cloud storage”, Inf. Sci., 504, 48-60, 2019. https://doi.org/10.1016/j.ins.2019.07.058.
- Fan, Y., Lin, X., Liang, W., Tan, G., & Nanda, P., “A secure privacy preserving deduplication scheme for cloud computing”, Future Gener. Com-put. Syst., 101, 127-135, 2019. https://doi.org/10.1016/j.future.2019.04.046.
- G. Crihan, M. Crăciun, and L. Dumitriu, “A comparative assessment of homomorphic encryption algorithms applied to biometric information,” In-ventions, vol. 8, no. 4, 102, 2023. https://doi.org/10.3390/inventions8040102.
- Ryu, J., Kim, K., & Won, D., “A Study on Partially Homomorphic Encryption”, 2023 17th International Conference on Ubiquitous Information Management and Communication (IMCOM), 1-4, 2023. https://doi.org/10.1109/IMCOM56909.2023.10035630.
- Alaya, B., Laouamer, L., & Msilini, N. (2020). Homomorphic encryption systems statement: Trends and challenges. Comput. Sci. Rev., 36, 100235. https://doi.org/10.1016/j.cosrev.2020.100235.
- Marcolla, C., Sucasas, V., Manzano, M., Bassoli, R., Fitzek, F., & Aaraj, N., “Survey on Fully Homomorphic Encryption, Theory, and Applica-tions”, Proceedings of the IEEE, 110, 1572-1609, 2022. https://doi.org/10.1109/JPROC.2022.3205665.
- J. S. Rauthan, “Fully homomorphic encryption: A case study,” Journal of Intelligent & Fuzzy Systems, vol. 43, no. 6, pp. 8417–8437, 2022. https://doi.org/10.3233/JIFS-221454.
- Bharath Babu, S., & J. R., “Secure deduplication with dynamic updates in multi-tenant cloud environment”, 2022 International Conference on Ad-vanced Computing Technologies and Applications (ICACTA), 1-4, 2022. https://doi.org/10.1109/ICACTA54488.2022.9752987.
- Fan, Y., Lin, X., Liang, W., Tan, G., & Nanda, P., “A secure privacy-preserving deduplication scheme for cloud computing”, Future Generation Computer Systems, 101, 127-135, 2019. https://doi.org/10.1016/j.future.2019.04.046.
- Yang, X., Lu, R., Shao, J., Tang, X., & Ghorbani, A., “Achieving efficient and privacy-preserving multi-domain big data deduplication in cloud”, IEEE Transactions on Services Computing, 14(6), 1292-1305, 2018. https://doi.org/10.1109/TSC.2018.2881147.
- Goyal, N., Pandey, A. K., Gupta, S. K., & Pandey, R., “Suppleness of multi-tenancy in cloud computing”, ERN: Other Econometrics, 2019. https://doi.org/10.2139/ssrn.3358249.
- Wang, J., He, J., Li, W., Lan, X., Liu, Q., & Li, T., “A secure duplicate data sharing method against untrusted cloud service providers”, 2023 IEEE 12th International Conference on Cloud Networking (CloudNet), 352-359, 2023. https://doi.org/10.1109/CloudNet59005.2023.10490032.
- Novković, B., Bozic, A., Golub, M., & Groš, S., “Confidential computing as an attempt to secure service provider's confidential client data”, 2021 44th International Convention on Information, Communication and Electronic Technology (MIPRO), 1213-1218, 2021. https://doi.org/10.23919/MIPRO52101.2021.9597198.
- Shri, M., & Srinivas, P., “Enhanced protection deduplicate data storage scheme for multiuser environments in cloud”, International Journal of Ad-vance Research in Science and Engineering, 2138-2142, 2017.
- M. El Ghazouani, A. Ikidid, C. Ait Zaouiat, L. Aziz, M. Y. Ichahane, and L. Er-Rajy, “Optimal Method Combining Blockchain and Multi-Agent System to Ensure Data Integrity and Deduplication in the Cloud Environment”, Int. J. Interact. Mob. Technol., vol. 18, no. 10, pp. pp. 90–105, May 2024. https://doi.org/10.3991/ijim.v18i10.43305.
- S. Madasu, P. Murugesan, H. V. Jaganathan and S. Pamulaparthyvenkata, "Elliptic Curve Diffie-Hellman based Privacy-Preserving Deduplication for Big Data in Cloud Systems," 2024 International Conference on Intelligent Algorithms for Computational Intelligence Systems (IACIS), Hassan, India, 2024, pp. 1-4, https://doi.org/10.1109/IACIS61494.2024.10721723.
- Rashid, F., Miri, A., & Woungang, I., “A secure data deduplication framework for cloud environments”, 2012 Tenth Annual International Confer-ence on Privacy, Security and Trust, 81-87, 2012. https://doi.org/10.1109/PST.2012.6297923.
- T. N. P. Madhuri, M. S. Rao, P. S. Santosh, P. Tejaswi, and S. Devendra, “Data Communication Protocol using Elliptic Curve Cryptography for Wireless Body Area Network,” 2022 6th International Conference on Computing Methodologies and Communication (ICCMC), pp. 133–139, Mar. 2022, https://doi.org/10.1109/ICCMC53470.2022.9753898.
-
Downloads
-
How to Cite
Vijaya, M., & Chakravarthy , D. L. S. . (2025). SECUREDGE: Privacy-Preserving Deduplication with Homomorphic Encryption for Multi-Tenant Cloud Systems. International Journal of Basic and Applied Sciences, 14(3), 242-257. https://doi.org/10.14419/6ekp0r85
