Efficient Deduplication of Data with Secure Encryption in Cloud Storage System

Authors

  • Gandham Lakshmi Koteswari  M.Tech, Department of Computer Science and Technology, SRKR Engineering College, Bhimavaram, West Godavari, Andhra Pradesh, India
  • K. Aruna Kumari  Assistant Professor, Department of Computer Science and Technology, SRKR Engineering College, Bhimavaram, West Godavari, Andhra Pradesh, India

Keywords:

Access Control, Deduplication, Authorized Duplicate Check, Confidentiality.

Abstract

Data de-duplication is one of important data compression techniques for eliminating duplicate copies of repeating data, and has been widely used in cloud storage to reduce the amount of storage space and save bandwidth. a data-oriented Deduplication form, to reinforce the appearance of optical disk arrangements inside the Cloud by leveraging testimony Deduplication round the I/O street to take away unnecessary address demands even as preservative distance for stockpile. The information will be that fact the small-scale I/O demands simplest take into consideration a negligible ratio on the storehouse strength obligation, producing Deduplication its fruitless and imaginably ineffective considering the really extensive Deduplication upward in contact. . The in paradigm of your POD plot is implemented human an ingrained segment in the block-device flatten in addition to a sub scrape Deduplication manner can be utilized. However, our developmental studies case a well-known right away applying testimony Deduplication to magnetic tape unit process determination most probably lead to distance hypothesis in the number one fantasy and data dissolution on discs. Select-Dedupe perform the call of duty characteristics of small-scale-I/O-request sovereignty in to the prepare factors. It deduplicates each of the scribble demands if their compose message is always saved sooner or later on flans, corresponding to the narrow tell demands which inclination properly be bypassed deriving out of during the capability-oriented Deduplication schemes. The indicator-lookup movement after which tries to earn the de troop testimony dollops in the dactylogram indication suggest in accordance with the jumble ethics. Whenever a superfluous goods block is found, it's succour a information inside the met goods. Just the original input dollops are penned vis-à-vis the discs.

References

  1. Jin Li, Yan Kit Li, Xiaofeng Chen, Patrick P. C. Lee, Wenjing Lou "A Hybrid Cloud Approach for Secure Authorized De-duplication" IEEE Transactions on Parallel and Distributed Systems: PP Year 2014
  2. Bo Mao, Member, IEEE, Hong Jiang, Fellow, IEEE, Suzhen Wu, Member, IEEE, andLeiTian, Senior Member, IEEE "Leveraging Data Deduplication to Improve the Performance of Primary Storage Systems in the Cloud" IEEE TRANSACTIONS ON COMPUTERS, VOL. 65, NO. 6, JUNE 2016
  3. Mr Vinod B Jadhav Prof Vinod S Wadne Secured Authorized De-duplication Based Hybrid Cloud Approach International Journal of Advanced Research in Computer Science and Software Engineering
  4. Abdul Samadhu, J. Rambabu, R. Pradeep Kumar, R. Santhya Detailed Investigation on a Hybrid Cloud Approach for Secure Authorized Deduplication International Journal for Research in Applied Science and Engineering Technology (IJRASET)
  5. JadapalliNandini, Rami reddyNavateja Reddy Implementation De-duplication System with Authorized Users International Research Journal of Engineering and Technology (IRJET)
  6. Sharma Bharat, Mandre B.R. A Secured and Authorized Data De-duplication with Public Auditing International Journal of Computer Applications (09758887)
  7. Wee Keong Ng SCE, NTU Yonggang Wen SCE, NTU Huafei Zhu Private Data De-duplication Protocols in Cloud Storage SAC12 March 2529, 2012, Riva del Garda, Italy. Copyright 2011 ACM 9781450308571/12/03
  8. Shweta D. Pochhi, Prof. Pradnya V. Kasture Encrypted Data Storage with De-duplication Approach on Twin Cloud International Journal of Innovative Research in Computer and Communication Engineering 9. Backialakshmi. N Manikandan. M SECURED AUTHORIZED DE-DUPLICATION IN DISTRIBUTED SYSTEM IJIRST International Journal for Innovative Research in Science and Technology— Volume 1 — Issue 9 — February 2015
  9. BhushanChoudhary, AmitDravid A Study On Secure Deduplication Techniques In Cloud Computing International Journal of Advanced Research in Computer Engineering and Technology (IJARCET) Volume 3, Issue 12, April 2014

Downloads

Published

2017-12-31

Issue

Section

Research Articles

How to Cite

[1]
Gandham Lakshmi Koteswari, K. Aruna Kumari, " Efficient Deduplication of Data with Secure Encryption in Cloud Storage System, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 2, Issue 6, pp.282-287, November-December-2017.