{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T05:32:19Z","timestamp":1774330339597,"version":"3.50.1"},"publisher-location":"Cham","reference-count":34,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031337420","type":"print"},{"value":"9783031337437","type":"electronic"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-33743-7_46","type":"book-chapter","created":{"date-parts":[[2023,5,26]],"date-time":"2023-05-26T13:02:19Z","timestamp":1685106139000},"page":"569-586","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["A Comparative Study of Secure and Efficient Data Duplication Mechanisms for Cloud-Based IoT Applications"],"prefix":"10.1007","author":[{"given":"Vishnu Vardhan","family":"Baligodugula","sequence":"first","affiliation":[]},{"given":"Fathi","family":"Amsaad","sequence":"additional","affiliation":[]},{"given":"Varshitha Vunnam","family":"Tadepalli","sequence":"additional","affiliation":[]},{"given":"Vojjala","family":"Radhika","sequence":"additional","affiliation":[]},{"given":"Yetukuri","family":"Sanjana","sequence":"additional","affiliation":[]},{"given":"Sai","family":"Shiva","sequence":"additional","affiliation":[]},{"given":"Supriya","family":"Meduri","sequence":"additional","affiliation":[]},{"given":"Majdi","family":"Maabreh","sequence":"additional","affiliation":[]},{"given":"Naser","family":"Alsaadi","sequence":"additional","affiliation":[]},{"given":"Omar","family":"Darwish","sequence":"additional","affiliation":[]},{"given":"Abdul","family":"Razaque","sequence":"additional","affiliation":[]},{"given":"Yahya","family":"Tashtoush","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,5,27]]},"reference":[{"issue":"7","key":"46_CR1","first-page":"3996","volume":"34","author":"P Prajapati","year":"2022","unstructured":"Prajapati, P., Shah, P.: A review on secure data deduplication: cloud storage security issue. J. King Saud Univ. Comput. Inf. Sci. 34(7), 3996\u20134007 (2022)","journal-title":"J. King Saud Univ. Comput. Inf. Sci."},{"issue":"4","key":"46_CR2","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1109\/MSP.2009.87","volume":"7","author":"J Harauz","year":"2009","unstructured":"Harauz, J., Kaufman, L.M., Potter, B.: Data security in the world of cloud computing. IEEE Secur. Priv. 7(4), 61\u201364 (2009)","journal-title":"IEEE Secur. Priv."},{"issue":"3","key":"46_CR3","doi-asserted-by":"publisher","first-page":"583","DOI":"10.1016\/j.future.2010.12.006","volume":"28","author":"D Zissis","year":"2012","unstructured":"Zissis, D., Lekkas, D.: Addressing cloud computing security issues. Futur. Gener. Comput. Syst. 28(3), 583\u2013592 (2012)","journal-title":"Futur. Gener. Comput. Syst."},{"issue":"12","key":"46_CR4","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1109\/MC.2008.538","volume":"41","author":"D Geer","year":"2008","unstructured":"Geer, D.: Reducing the storage burden via data deduplication. IEEE Comput. 41(12), 15\u201317 (2008)","journal-title":"IEEE Comput."},{"key":"46_CR5","unstructured":"He, Q., Li, Z., Zhang, X.: Data deduplication techniques. In: Proceedings International Conference on Future Information Technology and Management Engineering (FITME 2010), pp. 430\u2013433 (2010)"},{"issue":"6","key":"46_CR6","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1109\/MSP.2010.187","volume":"8","author":"D Harnik","year":"2010","unstructured":"Harnik, D., Pinkas, B., Shulman-Peleg, A.: Side channels in cloud services: deduplication in cloud storage. IEEE Secur. Priv. 8(6), 40\u201347 (2010)","journal-title":"IEEE Secur. Priv."},{"key":"46_CR7","unstructured":"Xu, J., Chang, E., Zhou, J.: Leakage-resilient client-side deduplication of encrypted data in cloud storage. In: Cryptology ePrint Archive: Report 2011\/538 (2011)"},{"key":"46_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1007\/978-3-662-45472-5_8","volume-title":"Financial Cryptography and Data Security","author":"J Stanek","year":"2014","unstructured":"Stanek, J., Sorniotti, A., Androulaki, E., Kencl, L.: A secure data deduplication scheme for cloud storage. In: Christin, N., Safavi-Naini, R. (eds.) FC 2014. LNCS, vol. 8437, pp. 99\u2013118. Springer, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-662-45472-5_8"},{"key":"46_CR9","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-35795-4","volume-title":"Trustworthy computing and services","year":"2013","unstructured":"Yuan, Y., Wu, Xu., Lu, Y. (eds.): ISCTCS 2012. CCIS, vol. 320. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-35795-4"},{"key":"46_CR10","doi-asserted-by":"crossref","unstructured":"Waghmare, M.B., Padwekar, S.V.: Survey on techniques for authorized deduplication of encrypted data in cloud. In: 2020 International Conference on Computer Communication and Informatics (ICCCI), pp. 1\u20135 (2020)","DOI":"10.1109\/ICCCI48352.2020.9104184"},{"key":"46_CR11","doi-asserted-by":"crossref","unstructured":"Chhabra, N., Bala, M.: A comparative study of data deduplication strategies. In: 1st International Conference on Secure Cyber Computing and Communication (ICSCCC), pp. 68\u201372 (2018)","DOI":"10.1109\/ICSCCC.2018.8703363"},{"key":"46_CR12","doi-asserted-by":"crossref","unstructured":"Zhu, Y., Zhang, X., Zhao, R., Dong, X.: Data de-duplication on similar file detection. In: 8th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, pp. 66\u201373 (2014)","DOI":"10.1109\/IMIS.2014.9"},{"key":"46_CR13","doi-asserted-by":"crossref","unstructured":"Hu, Q.: A data integrity verification scheme of deduplication for cloud ciphertexts. In: IEEE 9th Joint International Information Technology and Artificial Intelligence Conference (ITAIC), pp. 865\u2013869 (2020)","DOI":"10.1109\/ITAIC49862.2020.9339001"},{"key":"46_CR14","doi-asserted-by":"crossref","unstructured":"Wen, Z., Luo, J., Chen, H., Meng, J., Li, X., Li, J.: A verifiable data deduplication scheme in cloud computing. In: International Conference on Intelligent Networking and Collaborative Systems, pp. 85\u201390 (2014)","DOI":"10.1109\/INCoS.2014.111"},{"key":"46_CR15","doi-asserted-by":"crossref","unstructured":"Vijayalakshmi, K., Jayalakshmi, V.: Analysis on data deduplication techniques of storage of big data in cloud. In: 5th International Conference on Computing Methodologies and Communication (ICCMC), pp. 976\u2013983 (2021)","DOI":"10.1109\/ICCMC51019.2021.9418445"},{"key":"46_CR16","doi-asserted-by":"crossref","unstructured":"Fan, C.-I., Huang, S.-Y., Hsu, W.-C.: Hybrid data deduplication in cloud environment. In: International Conference on Information Security and Intelligent Control, pp. 174\u2013177 (2012)","DOI":"10.1109\/ISIC.2012.6449734"},{"key":"46_CR17","doi-asserted-by":"crossref","unstructured":"Rashid, F., Miri, A.: Secure image data deduplication through compressive sensing. In: 14th Annual Conference on Privacy, Security and Trust (PST), pp. 569\u2013572 (2016)","DOI":"10.1109\/PST.2016.7907018"},{"key":"46_CR18","doi-asserted-by":"crossref","unstructured":"Va\u00f1\u00f3-Garc\u00eda, F., Marco-Gisbert, H.: How kernel randomization is canceling memory deduplication in cloud computing systems. In: IEEE 17th International Symposium on Network Computing and Applications (NCA), pp. 1\u20134 (2018)","DOI":"10.1109\/NCA.2018.8548338"},{"key":"46_CR19","doi-asserted-by":"crossref","unstructured":"Manogar, E., Abirami, S.: A study on data deduplication techniques for optimized storage. In: 6th International Conference on Advanced Computing (ICoAC), pp. 161\u2013166 (2014)","DOI":"10.1109\/ICoAC.2014.7229702"},{"key":"46_CR20","doi-asserted-by":"crossref","unstructured":"Malathi, P., Suganthidevi, S.: Comparative study and secure data deduplication techniques for cloud computing storage. In: International Conference on Innovative Computing, Intelligent Communication and Smart Electrical Systems (ICSES), pp. 1\u20135 (2021)","DOI":"10.1109\/ICSES52305.2021.9633960"},{"key":"46_CR21","doi-asserted-by":"crossref","unstructured":"Tarun, S., Batth, R.S., Kaur, S.: A scheme for data deduplication using advance machine learning architecture in distributed systems. In: International Conference on Computing Sciences (ICCS), pp. 53\u201360 (2021)","DOI":"10.1109\/ICCS54944.2021.00019"},{"key":"46_CR22","doi-asserted-by":"crossref","unstructured":"Pooranian, Z., Chen, K.-C., Yu, C.-M., Conti, M.: RARE: defeating side channels based on data-deduplication in cloud storage. In: IEEE INFOCOM & IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), pp. 444\u2013449 (2018)","DOI":"10.1109\/INFCOMW.2018.8406888"},{"key":"46_CR23","doi-asserted-by":"crossref","unstructured":"Backialakshmi, N., Manikandan, M.: Data de-duplication using N0SQL databases in cloud. In: International Conference on Soft-Computing and Networks Security (ICSNS), pp. 1\u20134 (2015)","DOI":"10.1109\/ICSNS.2015.7292436"},{"key":"46_CR24","doi-asserted-by":"crossref","unstructured":"Li, S.: EF-dedup: enabling collaborative data deduplication at the network edge. In: IEEE 39th International Conference on Distributed Computing Systems (ICDCS), pp. 986\u2013996 (2019)","DOI":"10.1109\/ICDCS.2019.00102"},{"key":"46_CR25","doi-asserted-by":"crossref","unstructured":"Li, D., et al.: A parallel and pipelined architecture for accelerating fingerprint computation in high throughput data storages. In: IEEE 23rd Annual International Symposium on Field-Programmable Custom Computing Machines, pp. 203\u2013206 (2015)","DOI":"10.1109\/FCCM.2015.43"},{"key":"46_CR26","doi-asserted-by":"crossref","unstructured":"Xu, X., Hu, N., Tu, Q.: Two-side data deduplication mechanism for non-center cloud storage systems. In: IEEE International Conference on Ubiquitous Wireless Broadband (ICUWB), pp. 1\u20134 (2016)","DOI":"10.1109\/ICUWB.2016.7790427"},{"issue":"9","key":"46_CR27","doi-asserted-by":"publisher","first-page":"1681","DOI":"10.1109\/JPROC.2016.2571298","volume":"104","author":"W Xia","year":"2016","unstructured":"Xia, W., et al.: A comprehensive study of the past, present, and future of data deduplication. Proc. IEEE 104(9), 1681\u20131710 (2016)","journal-title":"Proc. IEEE"},{"issue":"7","key":"46_CR28","first-page":"1284","volume":"5","author":"S Baravkar","year":"2016","unstructured":"Baravkar, S.: Vaishali mali \u201cauthorized data deduplication using hybrid cloud technique.\u201d Int. J. Sci. Res. (IJSR) 5(7), 1284\u20131289 (2016)","journal-title":"Int. J. Sci. Res. (IJSR)"},{"key":"46_CR29","doi-asserted-by":"crossref","unstructured":"Liu, Q., Fu, Y., Ni, G., Hou, R.: Hadoop based scalable cluster deduplication for big data. In: IEEE 36th International Conference on Distributed Computing Systems Workshops (ICDCSW), pp. 98\u2013105 (2016)","DOI":"10.1109\/ICDCSW.2016.17"},{"key":"46_CR30","doi-asserted-by":"crossref","unstructured":"Sun, Y., Zeng, C.Y., Chung, J., Huang, Z.: Online data deduplication for in-memory big-data analytic systems. IEEE International Conference on Communications (ICC), pp. 1\u20137 (2017)","DOI":"10.1109\/ICC.2017.7996543"},{"key":"46_CR31","doi-asserted-by":"crossref","unstructured":"Zhang, Z., Jiang, Z., Peng, C., Liu, Z.: Analysis of data fragments in deduplication system. In: International Conference System Science and Engineering (ICSSE), pp. 559\u2013563 (2012)","DOI":"10.1109\/ICSSE.2012.6257249"},{"key":"46_CR32","unstructured":"Bellovin, S.M., Rescorla, E.K.: Deploying a new hash algorithm. In: Presentation at Rump Session of CRYPTO (2005)"},{"key":"46_CR33","unstructured":"Kulkarni, V.R., Mujawar, S., Apte, S.: Hash function implementation using artificial neural networks. Int. J. Soft Comput. 1(1) (2010)"},{"key":"46_CR34","unstructured":"Srikantaswamy, S.G.: Hash function design using matrix multiplication, ex-or, checksum generation and compression technique approach. Int. J. Comput. Sci. Inf. Technol. Secur. 3(1) (2013)"}],"container-title":["Lecture Notes in Networks and Systems","Proceedings of the 2023 International Conference on Advances in Computing Research (ACR\u201923)"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-33743-7_46","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,26]],"date-time":"2023-05-26T13:03:20Z","timestamp":1685106200000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-33743-7_46"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031337420","9783031337437"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-33743-7_46","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"value":"2367-3370","type":"print"},{"value":"2367-3389","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"27 May 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ACR","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advances in Computing Research","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Orlando, FL","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 May 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 May 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"acr2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/iicser.org\/ACR23\/call_papers.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}