Skip to main content
. 2021 Jul 30;7:e569. doi: 10.7717/peerj-cs.569

Table 1. Literature survey of existing techniques.

Authors Problem Methodology Advantages Integrity Confidentiality
Shin et al. (2020) Data deduplication and security in MEC server less efficient encrypted deduplication (SEED) +Lazy encryption It takes 1000ms for processing128MB No yes
Wang, Wang & Zhang (2019) Double payment avoidance and data deduplication Block chain technology Avoids third party yes yes
Wu et al. (2019) File deduplication and integrity Confidentiality preserving deduplication using public auditing (CPDA) Computation of authentication tag is done by CSP No Yes
Shen, Su & Hao (2020) Deduplication and brute force dictionary attacks Light weight cloud storage auditing for deduplication light-weight computation on the user side yes No
Liu et al. (2020) Data deduplication in files Verifiable ABKS over encrypted cloud data is proposed realize indistinguishable keywords, unforgetability of signature and confidentiality of cipher texts No Yes
Bai, Yu & Gao (2020) cloud storage auditing and deduplication literatures fail to support the modifications of ownership re-encryption algorithm and the secure identity-based broadcast encryption technology ownership modification and integrity is maintained Yes No
Shynu et al. (2020) Data deduplication Modified Elliptic Curve Cryptography (MECC) algorithms Recognize data redundancy at the block level No Yes