Optimizing Cloud Storage by Secure Data Deduplication

Authors

  • Monika Sharma  Department of Computer Science & Engineering, IES IPS Academy, Indore, Madhya Pradesh, India
  • Neeraj Shrivastava  Department of Computer Science & Engineering, IES IPS Academy, Indore, Madhya Pradesh, India

Keywords:

Cloud Storage, Cryptographic Data, Data Management, Data Deduplication, Hash Tree

Abstract

In Recent days, Cloud computing turns out to be exceptionally important which gives very accessible storage space on the cloud. Data deduplication is a most prominent data compression technique. This strategy is used to reduce the duplicity of information. To maintain capacity and decrease storage space in cloud storage information deduplication is used. Taking care of address following difficulties, this paper makes an endeavor to formalize the thought of secure and productive cloud storage. In this way, the component of openness and accessibility of the information. Text files are used as input. In the first module, the record is first processed for finding the essential features from the text files. For distinguishing the same sort of information these elements are utilized in this manner-containing comparative. This space based ordering of records is performed in advance. By Tiger, hash generation algorithm produces a key that will go through the 3DES algorithm for encoding. The results show the strategies proposed playing out a beneficial operation on contrasting and the customary system.

References

[1] Junbeaom Hur, et al., “Secure data deduplication with dynamic ownership management in cloud storage (Extended Abstract)” IEEE International Conference on Data Engineering. San Diego, CA, USA, 69-70,2017. [2] Nimgire Reshma , et al., “Deduplication & secure authorized data using hybrid cloud”. Imperial Journal of Interdisciplinary Research, 2(6), 415-419, 2016. [3] Sumedha A Telkar and Dr. MZ Shaikh “Secured and efficient cloud storage data deduplication system” International Journal of Advanced Research in Computer and communication Engineering, 5(1), 301-304, 2016. [4] Xin Yao, et al., “A Secure Hierarchical Deduplication System in Cloud Storage” IEEE/ACM 24th International Symposium on Quality of Service (IWQoS). Beijing, China, 1-10, 2016. [5] Junbeaom Hur, et al., “Secure data deduplication with dynamic ownership management in cloud storage” IEEE International Conference on Data Engineering. San Diego, CA, USA, 3113 – 3125, 2016. [6] Jingwei Li, et al., (2015) “Secure Auditing and Deduplication Data in Cloud” IEEE Transactions on Computers, 65(8), 2386 – 2396. [7] Zuhair S. Al-Sagar1, et al., “Optimizing the cloud storage by data deduplication : A Study” International Research Journal of Engineering and technology (IRJET), 2(9), 2524-2527, 2015. [8] Jadapalli Nandini and Ramireddy Navateja Reddy “Implementation of hybrid cloud approach for secure authorized deduplication” International Research Journal of Engineering and technology (IRJET), 2(3), 1297-1306, 2015. [9] Jin Li, et al., “Secure deduplication with efficient and reliable convergent key management” IEEE Transactions on Parallel and Distributed Systems, 25(6), 1615 – 1625, 2014. [10] Jin Li, et al., “Hybrid cloud approach for secure authorized deduplication” IEEE Transactions on Parallel and Distributed Systems, 26(5), 1206-1216, 2014. [11] Nesrine Kaaniche and Maryline Laurent “A secure client side deduplication scheme in cloud storage environments” 6th International Conference on New Technologies, Mobility and Security (NTMS). Dubai, United Arab Emirates, 1-7, 2014. [12] Pasquale Puzio, et al., “ClouDedup: Secure deduplication with encrypted data for cloud storage” IEEE 5th International Conference on Cloud Computing Technology and Science (CloudCom). Bristol, UK, 363-370, 2013. [13] Explain Dedupication. from http:// www. webopedia. Com /term /d/data_deduplication.html. [14] How deduplication works from http:// www.computer world.com /article / 2474479/data-center/data-deduplication-in-the-cloud-explained--part-one.html. [15] Difference between Hashing and indexing from https://www. quora.com /what-are- the-major- differences –between -hashing -and-indexing. [16] Difference between MD-5 and SHA-1 from http://lnxsysadm.blogspot.in/2010/12/what-is-difference-between -md5-and-sha.html. [17] What is Triple DES from https:// www.tutorials point.com /cryptography /triple_ des.htm.

Downloads

Published

2017-10-31

Issue

Section

Research Articles

How to Cite

[1]
Monika Sharma, Neeraj Shrivastava, " Optimizing Cloud Storage by Secure Data Deduplication, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 2, Issue 5, pp.38-42, September-October-2017.