{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,15]],"date-time":"2026-04-15T22:01:04Z","timestamp":1776290464786,"version":"3.50.1"},"reference-count":26,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2024,1,5]],"date-time":"2024-01-05T00:00:00Z","timestamp":1704412800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2024,1,5]],"date-time":"2024-01-05T00:00:00Z","timestamp":1704412800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Cloud Comp"],"abstract":"<jats:title>Abstract<\/jats:title>\n                  <jats:p>Cloud computing technology offers flexible and expedient services that carry a variety of profits for both societies as well as individuals. De-duplication techniques were developed to minimize redundant data in the cloud storage. But, one of the main challenges of cloud storage is data deduplication with secure data storage.To overcome the issue, we propose Boneh Goh Nissim Bilinear Attribute-based Optimal Cache Oblivious (BGNBA-OCO) access control and secure de-duplication for data storage in cloud computing in this paper. The proposed method achieves fne-grained access control with low computation consumption. We design Boneh Goh Nissim Privacy Preserving Revocable Attribute-based Encryption that reinforces attribute revocation and averts the discharge of sensitive information. Furthermore, we utilize Optimal Cache Oblivious algorithm to prevent disclosure of access patterns to hide the access patterns in cloud storage via rand pattern matching. We support updating both encrypted data and access control policies to minimize communication and computation overhead of data duplication and encryption processes concurrently. We perform secure data sharing to achieve higher data confidentiality and integrity. Finally, we conducted the extensive experiments in cloud and the results illustrated that our proposed BGNBA-OCO method is more efficient than related works.<\/jats:p>","DOI":"10.1186\/s13677-023-00544-1","type":"journal-article","created":{"date-parts":[[2024,1,5]],"date-time":"2024-01-05T05:02:29Z","timestamp":1704430949000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["BGNBA-OCO based privacy\u00a0preserving attribute based access control with data duplication for secure storage in cloud"],"prefix":"10.1186","volume":"13","author":[{"given":"M.","family":"Pavithra","sequence":"first","affiliation":[]},{"given":"M.","family":"Prakash","sequence":"additional","affiliation":[]},{"given":"V.","family":"Vennila","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,1,5]]},"reference":[{"key":"544_CR1","doi-asserted-by":"publisher","unstructured":"Wang Z, Gao W, Yang M, Hao (2022) Enabling Secure Data sharing with data deduplication and sensitive information hiding in cloud-assisted Electronic Medical Systems. Cluster Computing, Springer, 1\u201316. https:\/\/doi.org\/10.1007\/s10586-022-03785-y.","DOI":"10.1007\/s10586-022-03785-y"},{"issue":"1","key":"544_CR2","doi-asserted-by":"publisher","first-page":"635","DOI":"10.1109\/TDSC.2020.2987903","volume":"19","author":"K Xue","year":"2022","unstructured":"Xue K, Gai N, Hong J, Wei DSL, Hong P, Yu N (2022) Efficient and Secure Attribute-Based Access Control With Identical Sub-Policies Frequently Used in Cloud Storage. IEEE Trans Dependable Secure Comput 19(1):635\u2013646. https:\/\/doi.org\/10.1109\/TDSC.2020.2987903","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"544_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s13673-015-0027-0","volume":"5","author":"T Naruse","year":"2015","unstructured":"Naruse T, Mohri M, Shiraishi Y (2015) Provably secure attribute-based encryption with attribute revocation and grant function using proxy re-encryption and attribute key for updating. Human-centric Computing and Information Sciences, Springer 5:1\u201313. https:\/\/doi.org\/10.1186\/s13673-015-0027-0","journal-title":"Human-centric Computing and Information Sciences, Springer"},{"issue":"3","key":"544_CR4","doi-asserted-by":"publisher","first-page":"330","DOI":"10.1109\/TBDATA.2017.2656120","volume":"5","author":"H Cui","year":"2019","unstructured":"Cui H, Deng RH, Li Y, Wu G (2019) Attribute-Based Storage Supporting Secure Deduplication of Encrypted Data in Cloud. IEEE Transactions on Big Data 5(3):330\u2013342. https:\/\/doi.org\/10.1109\/TBDATA.2017.2656120","journal-title":"IEEE Transactions on Big Data"},{"key":"544_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s13677-020-00214-6","volume":"9","author":"PG Shynu","year":"2020","unstructured":"Shynu PG, Nadesh RK, Menon VG, Venu P, Abbasi M, Khosravi MR (2020) A secure data deduplication system for integrated cloud-edge networks. Journal of Cloud Computing: Advances, Systems and Applications 9:1\u201312. https:\/\/doi.org\/10.1186\/s13677-020-00214-6","journal-title":"Journal of Cloud Computing: Advances, Systems and Applications"},{"key":"544_CR6","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1016\/j.ins.2018.05.024","volume":"456","author":"H Yuana","year":"2018","unstructured":"Yuana H, Chena X, Jianga T, Zhanga X, Yana Z, Xiang Y (2018) DedupDUM: Secure and scalable data deduplication with dynamic user management. Information Sciences, Elsevier 456:159\u2013173. https:\/\/doi.org\/10.1016\/j.ins.2018.05.024","journal-title":"Information Sciences, Elsevier"},{"key":"544_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.csi.2021.103523","volume":"78","author":"Y Wang","year":"2021","unstructured":"Wang Y, Miao M, Wang J, Zhang X (2021) Secure deduplication with efficient user revocation in cloud storage. Computer Standards & Interfaces, Elsevier 78:1\u20138. https:\/\/doi.org\/10.1016\/j.csi.2021.103523","journal-title":"Computer Standards & Interfaces, Elsevier"},{"issue":"1","key":"544_CR8","doi-asserted-by":"publisher","first-page":"680","DOI":"10.1109\/TDSC.2022.3141521","volume":"20","author":"X Yu","year":"2023","unstructured":"Yu X, Bai H, Yan Z, Zhang R (2023) VeriDedup: A Verifiable Cloud Data Deduplication Scheme with Integrity and Duplication Proof. IEEE Trans Dependable Secure Comput 20(1):680\u2013694. https:\/\/doi.org\/10.1109\/TDSC.2022.3141521","journal-title":"IEEE Trans Dependable Secure Comput"},{"issue":"4","key":"544_CR9","doi-asserted-by":"publisher","first-page":"959","DOI":"10.1109\/TC.2021.3067326","volume":"71","author":"J Li","year":"2022","unstructured":"Li J, Huang S, Ren Y, Yang Z, Lee PPC, Zhang X, Hao Y (2022) Enabling Secure and Space-Efficient Metadata Management in Encrypted Deduplication. IEEE Trans Comput 71(4):959\u2013970. https:\/\/doi.org\/10.1109\/TC.2021.3067326","journal-title":"IEEE Trans Comput"},{"issue":"1","key":"544_CR10","doi-asserted-by":"publisher","first-page":"591","DOI":"10.1109\/TDSC.2020.2987793","volume":"19","author":"X Yang","year":"2022","unstructured":"Yang X, Lu R, Shao J, Tang X, Ghorbani AA (2022) Achieving Efficient Secure Deduplication With User-Defined Access Control in Cloud. IEEE Trans Dependable Secure Comput 19(1):591\u2013606. https:\/\/doi.org\/10.1109\/TDSC.2020.2987793","journal-title":"IEEE Trans Dependable Secure Comput"},{"issue":"1","key":"544_CR11","doi-asserted-by":"publisher","first-page":"442","DOI":"10.1109\/TSC.2019.2948007","volume":"15","author":"H Yuan","year":"2022","unstructured":"Yuan H, Chen X, Li J, Jiang T, Wang J, Deng RH (2022) Secure Cloud Data Deduplication with Efficient Re-encryption. IEEE Trans Serv Comput 15(1):442\u2013456. https:\/\/doi.org\/10.1109\/TSC.2019.2948007","journal-title":"IEEE Trans Serv Comput"},{"key":"544_CR12","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2022\/8354903","volume":"2022","author":"F Gang","year":"2022","unstructured":"Gang F, Wei D (2022) Dynamic Deduplication Algorithm for Cross-User Duplicate Data in Hybrid Cloud Storage. Security and Communication Networks, Hindawi 2022:1\u20139. https:\/\/doi.org\/10.1155\/2022\/8354903","journal-title":"Security and Communication Networks, Hindawi"},{"key":"544_CR13","doi-asserted-by":"publisher","first-page":"3309","DOI":"10.1007\/s11277-020-07989-6","volume":"117","author":"SE Ebinazer","year":"2021","unstructured":"Ebinazer SE, Savarimuthu N, Bhanu SMS (2021) ESKEA: Enhanced Symmetric Key Encryption Algorithm Based Secure Data Storage in Cloud Networks with Data Deduplication. Wireless Personal Communications, Springer 117:3309\u20133325. https:\/\/doi.org\/10.1007\/s11277-020-07989-6","journal-title":"Wireless Personal Communications, Springer"},{"issue":"2","key":"544_CR14","doi-asserted-by":"publisher","first-page":"706","DOI":"10.1109\/TDSC.2019.2946073","volume":"18","author":"R Xu","year":"2021","unstructured":"Xu R, Joshi J, Krishnamurthy P (2021) An Integrated Privacy Preserving Attribute-Based Access Control Framework Supporting Secure Deduplication. IEEE Trans Dependable Secure Comput 18(2):706\u2013721. https:\/\/doi.org\/10.1109\/TDSC.2019.2946073","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"544_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2021\/6686281","volume":"2021","author":"X Tang","year":"2021","unstructured":"Tang X, Zhou L, Hu B, Wu H (2021) Aggregation-Based Tag Deduplication for Cloud Storage with Resistance against Side Channel Attack\u201d. Security and Communication Networks, Hindawi 2021:1\u201315. https:\/\/doi.org\/10.1155\/2021\/6686281","journal-title":"Security and Communication Networks, Hindawi"},{"issue":"1","key":"544_CR16","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1109\/TBDATA.2017.2721444","volume":"8","author":"X Yang","year":"2022","unstructured":"Yang X, Lu R, Choo KKR, Yin F, Tang X (2022) Achieving Efficient and Privacy-Preserving Cross-Domain Big Data Deduplication in Cloud. IEEE Transactions on Big Data 8(1):73\u201384. https:\/\/doi.org\/10.1109\/TBDATA.2017.2721444","journal-title":"IEEE Transactions on Big Data"},{"issue":"5","key":"544_CR17","doi-asserted-by":"publisher","first-page":"3136","DOI":"10.1109\/TDSC.2021.3086089","volume":"19","author":"Y Fu","year":"2022","unstructured":"Fu Y, Xiao N, Chen T, Wang J (2022) Fog-to-MultiCloud Cooperative Ehealth Data Management with Application-Aware Secure Deduplication. IEEE Trans Dependable Secure Comput 19(5):3136\u20133148. https:\/\/doi.org\/10.1109\/TDSC.2021.3086089","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"544_CR18","doi-asserted-by":"publisher","first-page":"186323","DOI":"10.1109\/ACCESS.2020.3023387","volume":"8","author":"S Zhang","year":"2020","unstructured":"Zhang S, Xian H, Li Z, Wang L (2020) SecDedup: Secure Encrypted Data Deduplication with Dynamic Ownership Updating. IEEE Access 8:186323\u2013186334. https:\/\/doi.org\/10.1109\/ACCESS.2020.3023387","journal-title":"IEEE Access"},{"key":"544_CR19","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jisa.2021.102869","volume":"60","author":"VS Lakshmi","year":"2021","unstructured":"Lakshmi VS, Deepthi S, Deepthi PP (2021) Collusion resistant secret sharing scheme for secure data storage and processing over cloud. Journal of Information Security and Applications, Elsevier 60:1\u201316. https:\/\/doi.org\/10.1016\/j.jisa.2021.102869","journal-title":"Journal of Information Security and Applications, Elsevier"},{"key":"544_CR20","doi-asserted-by":"publisher","first-page":"1683","DOI":"10.1007\/s11277-020-07756-7","volume":"116","author":"BR Begum","year":"2021","unstructured":"Begum BR, Chitra P (2021) ECC-CRT: An Elliptical Curve Cryptographic Encryption and Chinese Remainder Theorem based Deduplication in Cloud\u201d. Wireless Personal Communications, Springer 116:1683\u20131702. https:\/\/doi.org\/10.1007\/s11277-020-07756-7","journal-title":"Wireless Personal Communications, Springer"},{"key":"544_CR21","doi-asserted-by":"publisher","unstructured":"Zhang T, Wang C, Chandrasena U, Blockchain-assisted data sharing supports deduplication for cloud storage. Connection Science, 35:1, 2174081 DOI: https:\/\/doi.org\/10.1080\/09540091.2023.2174081","DOI":"10.1080\/09540091.2023.2174081"},{"key":"544_CR22","doi-asserted-by":"publisher","first-page":"28688","DOI":"10.1109\/ACCESS.2023.3251370","volume":"11","author":"L Li","year":"2023","unstructured":"Li L, Zheng D, Zhang H, Qin B (2023) Data Secure De-Duplication and Recovery Based on Public Key Encryption With Keyword Search\u201d. IEEE Access 11:28688\u201328698. https:\/\/doi.org\/10.1109\/ACCESS.2023.3251370","journal-title":"IEEE Access"},{"key":"544_CR23","doi-asserted-by":"publisher","unstructured":"Gund, Avinash and Mahadik, Prerna and Thorat, Ashvini R and Yevle, Ganesh K, Data De-Duplication Using Blockchain with Advanced Security in Cloud Computing, August 5, 2022. https:\/\/doi.org\/10.2139\/ssrn.4289505","DOI":"10.2139\/ssrn.4289505"},{"key":"544_CR24","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1016\/j.ins.2020.08.021","volume":"156","author":"X Gao","year":"2021","unstructured":"Gao X, Yu J, Shen W-T, Chang Y, Zhang S-B, Yang M, Wu B (2021) Achieving lowentropy secure cloud data auditing with file and authenticator deduplication. Inf Sci 156:177\u2013191. https:\/\/doi.org\/10.1016\/j.ins.2020.08.021","journal-title":"Inf Sci"},{"issue":"21","key":"544_CR25","doi-asserted-by":"publisher","first-page":"21398","DOI":"10.1109\/JIOT.2022.3181136","volume":"9","author":"L Qi","year":"2022","unstructured":"Qi L, Liu Y, Zhang Y, Xu X, Bilal M, Song H (2022) Privacy-Aware Point-of-Interest Category Recommendation in Internet of Things. IEEE Internet Things J 9(21):21398\u201321408. https:\/\/doi.org\/10.1109\/JIOT.2022.3181136","journal-title":"IEEE Internet Things J"},{"key":"544_CR26","doi-asserted-by":"publisher","unstructured":"Liu Y, Zhou X, Kou H, Zhao Y, Xu X, Zhang X, Qi L (20213) Privacy-Preserving Point-of-Interest Recommendation based on Simplified Graph Convolutional Network for Geological Traveling. ACM Transactions on Intelligent Systems and Technology, 1\u201317. https:\/\/doi.org\/10.1145\/3620677","DOI":"10.1145\/3620677"}],"container-title":["Journal of Cloud Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13677-023-00544-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s13677-023-00544-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13677-023-00544-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,24]],"date-time":"2024-06-24T07:07:43Z","timestamp":1719212863000},"score":1,"resource":{"primary":{"URL":"https:\/\/journalofcloudcomputing.springeropen.com\/articles\/10.1186\/s13677-023-00544-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,1,5]]},"references-count":26,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2024,12]]}},"alternative-id":["544"],"URL":"https:\/\/doi.org\/10.1186\/s13677-023-00544-1","relation":{"has-preprint":[{"id-type":"doi","id":"10.21203\/rs.3.rs-3121722\/v1","asserted-by":"object"}]},"ISSN":["2192-113X"],"issn-type":[{"value":"2192-113X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,1,5]]},"assertion":[{"value":"28 June 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 November 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 January 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"This article does not contain any studies with human participants or animals carried out by some of the authors.Yes, All authors have participated in (a) conception and design, or analysis and interpretation of data; (b) drafting the article or revising it seriously for significant intellectual content; and (c) approval of the final version.Yes, The authors have no affiliation with any organization with a direct or indirect financial interest in the subject matter discussed in the paper.The article does not contain any studies with human participants carried out by any of the authors.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"We are the Authors, submitting this article for your consideration in the titled \" BGNBA-OCO Based Privacy\u00a0Preserving Attribute Based Access Control With Data Duplication For Secure Storage In Cloud\u201d. Kindly review the article soon and provide us the comments as early as possible. Since we are ready to clarify any issues pointed out by the editor and reviewer.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"Yes, All authors have participated in (a) conception and design, or analysis and interpretation of the data; (b) drafting the article or revising it critically for important intellectual content; and (c) approval of the final version. Yes, The authors have no affiliation with any organization with a direct or indirect financial interest in the subject matter discussed in the manuscript.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"8"}}