Secure & Efficient of Cloud Storage with Data De-Duplication

Authors

  • G. Geetha  PG Scholar, Department of Computer Science and Engineering, Prist University, Puducherry, Andhra Pradesh, India
  • Thersphine  Asst.Prof Department of Computer Science and Engineering, Prist University, Puducherry, Andhra Pradesh, India

Keywords:

Cloud Storage, De- Duplication, Hash Code, Load Balancing.

Abstract

Cloud computing is the most popular technique in emerging technology. It is highly useful for building the quality cloud user applications in developing projects to solve a researching problem. Cloud storages are mainly used for storing and distributing the files in the cloud environment which are handled by the cloud storage providers for the third parties by rental service. It will be useful to store number of files but the increasing the counts in storage, and then the manager cannot be guaranteed. The user may store the number of repeating files which is meant to redundancy. The file redundancy will occupy the huge number of space or storage in the cloud and lead to time complexity for searching a single file in cloud storage. That type of redundancy will be reduced by the technique called index name servers which is denoted as (INS), it will manage the file storage, and data de- duplication, to optimizing the data, to protecting the load balance and avoid the chunking match by collecting the information from the IP providers for the cloud storage. This will improve the performance of the system by the users and it will minimizing the workload of the storage and has to distribute the files.

References

  1. J. B.Connell, "A Huffman–Shannon– Fano code," Proc. IEEE, vol. 61, no. 7, pp. 1046–1047, Jul. 1973.
  2. J. Zha, J. Wang, R. Han, and M. Song, "Research on load balance of service capability interaction management," in Proc. 3rd IEEE Int. Conf. Broadband Netw. Multimedia Technol., Oct. 2008, pp. 212–217.
  3. R. Tong and X. Zhu,. "A load balancing strategy based on the com-bination of static and dynamic," in Proc. 2nd Int. Workshop Database Technol. Appl., Nov. 2010, pp. 1–4.
  4. T.-Y. Wu, W.-T. Lee, Y.-S. Lin, Y.-S. Lin, H.-L. Chan, and J.-S. Huang, "Dynamic load balancing mechanism based on cloud storage," in Proc. Comput. Com. Appl. Conf., Jan. 2012, pp. 102–106.
  5. Y. Zhang, C. Zhang, Y. Ji, and W. Mi, " A novel load balancing scheme for DHT- based server farm," in Proc. 3rd IEEE Int. Conf. Comput. Broadband Netw. Multimedia Technol., Oct. 2010, pp. 980–984.
  6. I. Keslassy, C.-S. Chang, N. Mckeown, and D.-S. Lee, "Optimal load- balancing," in Proc. IEEE Comput. Infocom, Mar. 2005, pp. 1712–1722.
  7. L. Zhou and H.-C. Chao. "Multimedia traffic security architecture for internet of things," IEEE Netw., vol. 25, no. 3, pp. 29–34, May 2011.
  8. Y.-X. Lai, C.-F. Lai, C.-C. Hu, H.-C. Chao, and Y.-M. Huang, "A personalized mobile IPTV system with seamless video reconstruction algorithm in cloud networks," Int. J. Commun. Syst., vol. 24, no. 10, pp. 1375–1387, Oct. 2011.
  9. T.-Y. Wu, C.-Y. Chen, L.-S. Kuo, W.-T. Lee, and H.-C. Chao, "Cloud-based image processing system with priority- based data distribution mechanism," Comp. Commun., vol. 35, no. 15, pp. 1809–1818, Sep. 2012.
  10. M. Chen, C. M. Leung, L. Shu, and H.- C. Chao, "On multipath balancing and expanding for wireless multimedia sensor networks," Int. J. Ad hoc Ubiquitous Comput., vol. 9, no. 2. pp. 95–103, Feb. 2012.
  11. Z. Feng, B. Bai, B. Zhao, and J. Su, "Redball: Throttling shrew attack in cloud data center networks," J. Internet Technol., vol. 13, no. 4, pp. 667–680, Jul. 2012.
  12. D. Han and F. Feng, "Research on self- adaptive distributed storage system," in Proc. Wireless Commun. Netw. Mobile Comput., Oct. 2008, pp. 1–4.
  13. J. Wang, P. Varman, and C. Xie, "Avoiding performance fluctuation in cloud storage," in Proc. Int. Conf. High Performance Comput., Dec. 2010, pp. 1–9.

Downloads

Published

2018-08-30

Issue

Section

Research Articles

How to Cite

[1]
G. Geetha, Thersphine, " Secure & Efficient of Cloud Storage with Data De-Duplication, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 3, Issue 6, pp.423-427, July-August-2018.