Data De-Duplication Using SHA (Secure Hash Algorithm)

Authors

  • G. Kalyani  Department of Computer Science and Engineering, Vasireddy Venkatadri Institute of Technology, Guntur, Andhra Pradesh, India
  • D.S.L. Neethika  Department of Computer Science and Engineering, Vasireddy Venkatadri Institute of Technology, Guntur, Andhra Pradesh, India
  • Ch. Jayasri  Department of Computer Science and Engineering, Vasireddy Venkatadri Institute of Technology, Guntur, Andhra Pradesh, India

DOI:

https://doi.org//10.32628/CSEIT1952181

Keywords:

Redundant, Encrypt, Hash value, Secure Hash Algorithm, AES, DeDuplication.

Abstract

Now-a-days the number of users using cloud storage has increased so that the data stored has been increased in exponential rates. The data should be secured and the storage should be used efficiently. But a lot of duplicate data is present as two or more users may upload the same data. To make use of the cloud storage efficiently we have to reduce the redundant data hence improving the resources like storage space, disk I/O operations of the cloud vendors. Data De-Duplication is the process to remove redundant data and store only one instance of duplicate data. The objective of the proposed system is to increase the efficient comparison of hash values of a different data blocks and security of data. This paper includes a method for data deduplication using SHA (Secure Hash Algorithm) and AES. SHA is used as it is more secure than other hashing algorithms. The data is encrypted using AES at owner machine itself and using SHA the redundant data will be eliminated.

References

  1. Priyadharshini.P, Dhamodran.P, Kavitha.M.S “A Survey on De-Duplication in Cloud Computing” in IJCSMC vol.3, Issue 11 (November 2014), ||pp.149-155https://www.ijcsmc.com/docs/papers/November2014/V3I11201435.pdf
  2. https://data-flair.training/blogs/features-of-cloud-computing/
  3. https://docs.microsoft.com/en-us/windows-server/storage/data-deduplication/understand
  4. Rohini Sharma, “Data De-Duplication in Cloud Computing: A Review” in IJEAST vol. 2, Issue 2455-2143(February-March2017),||pp.26-29
  5. ttp://www.ijeast.com/papers/26-29,Tesma204,IJEAST.pdf
  6. Sachit-Ghimire,D.Venkata Subramanian “Chunking Algorithm for Data deduplication” in IJSRD Vol. 2, Issue(05,2014),||ISSN2321-0613 http://www.ijsrd.com/articles/IJSRDV2I5286.pdf
  7. Ider Lkhagvasuren1, Jung Min So1, Jeong Gun Lee1, Chuck Yoo2, Young Woong Ko1, “Byte-index Chunking Algorithm for Data Deduplication System”, in ijsia Vol. 7, No. 5(2013), ||pp.415-424 https://pdfs.semanticscholar.org/0880/325749067aefa23dce9bf63c4e92c6478773.pdf
  8. Tannu1, Karambir2, “Detection of De-Duplication Using SHA-512 and AES-256 in Cloud Storage” in IASIRhttp://iasir.net/AIJRSTEMpapers/AIJRSTEM17-323.pdf
  9. https://www.tutorialspoint.com/cryptography/advanced_encryption_standard.htm
  10. https://pibytes.wordpress.com/2013/02/09/deduplication-internals-hash-based-part-2

Downloads

Published

2019-05-30

Issue

Section

Research Articles

How to Cite

[1]
G. Kalyani, D.S.L. Neethika, Ch. Jayasri, " Data De-Duplication Using SHA (Secure Hash Algorithm) , IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 5, Issue 3, pp.01-05, May-June-2019. Available at doi : https://doi.org/10.32628/CSEIT1952181