| Shin et al. (2020) |
Data deduplication and security in MEC |
server less efficient encrypted deduplication (SEED) +Lazy encryption |
It takes 1000ms for processing128MB |
No |
yes |
| Wang, Wang & Zhang (2019) |
Double payment avoidance and data deduplication |
Block chain technology |
Avoids third party |
yes |
yes |
| Wu et al. (2019) |
File deduplication and integrity |
Confidentiality preserving deduplication using public auditing (CPDA) |
Computation of authentication tag is done by CSP |
No |
Yes |
| Shen, Su & Hao (2020) |
Deduplication and brute force dictionary attacks |
Light weight cloud storage auditing for deduplication |
light-weight computation on the user side |
yes |
No |
| Liu et al. (2020) |
Data deduplication in files |
Verifiable ABKS over encrypted cloud data is proposed |
realize indistinguishable keywords, unforgetability of signature and confidentiality of cipher texts |
No |
Yes |
| Bai, Yu & Gao (2020) |
cloud storage auditing and deduplication literatures fail to support the modifications of ownership |
re-encryption algorithm and the secure identity-based broadcast encryption technology |
ownership modification and integrity is maintained |
Yes |
No |
| Shynu et al. (2020) |
Data deduplication |
Modified Elliptic Curve Cryptography (MECC) algorithms |
Recognize data redundancy at the block level |
No |
Yes |