Recognizing and removing of similar Data for Information Processing and Storing in Cloud

Authors

  • Gundluru PadmajaKumari  M.Tech, Department of Computer Science and Engineering, KMM Institute of Technology and Sciences, Tirupati, Andhra Pradesh, India
  • C. Govardhan  Assistant Professor, Department of Computer Science and Engineering, KMM Institute of Technology and Sciences, Tirupati, Andhra Pradesh, India

Keywords:

Data deduplication, delta compression, storage system, index structure, performance evaluation, ABE

Abstract

Attribute-based encryption (ABE) has been wide utilized in cloud computing wherever a data provider outsources his/her encrypted information to a cloud service provider, and might share the data with users possessing specific credentials (or attributes). However, the standard ABE system doesn't support secure deduplication, which is crucial for eliminating duplicate copies of identical data inorder to save lots of cupboard space and network information measure. During this paper, we have a tendency to gift DARE, a low-overhead Deduplication-Aware resemblance detection and Elimination theme that effectively exploits existing duplicate-adjacency data for extremely economical likeness detection in data deduplication based mostly backup/archiving storage systems. the most plan behind DARE is to use a theme, call Duplicate-Adjacency based mostly likeness Detection (DupAdj), by considering any 2 information chunks to be similar (i.e., candidates for delta compression) if their various adjacent information chunks are duplicate during a deduplication system, and so any enhance the resemblance detection efficiency by AN improved super-feature approach.

References

  1. G P. Shaikh, S. D. Chaudhary, P. Paygude, and D. Bhattacharyya, "Achieving secure deduplication by using private cloud and public cloud," International Journal of Security and Its Applications, vol. 10, no. 5, pp. 17-26, 2016.
  2. G. P. Shaikh, "De-duplication with authorization in hybrid cloud approach for security," International Journal of Computer Sciences and Engineering, vol. 4, special issue 4, pp. 1-4, 2016.
  3. G P. Shaikh, Prof. S. D. Chaudhary, and Prof. P. S. Paygude, "Achieving data confidentiality by usage of hybrid cloud and deduplication," International Journal of Computer Science and Mobile Computing, vol. 5, issue 7, pp. 245-252, 2016.
  4. G Shaikh, "A survey on deduplication strategies and storage systems," IOSR Journal of Computer Engineering (IOSR-JCE), pp. 85-90, 2015.
  5. A Ka, A. Ganesha, and Sunitha C, "A study on deduplication techniques over encrypted data," Procedia Computer Science, vol. 87, pp. 38-43, 2016.
  6. D T. Meyer and W. J. Bolosky, "A study of practical deduplication," ACM Transactions on Storage (TOS), vol. 7, issue 4, pp. 14, 2012.
  7. Halevi, D. Harnik, B. Pinkas, and A. Shulman-Peleg, "Proofs of ownership in remote storage systems," Proc. ACM Conf. Comput. Commun. Security, pp. 491-500, 2011.
  8. J R. Douceur, A. Adya, W. J. Bolosky, D. Simon, and M. Theimer. "Reclaiming space from duplicate files in a serverless distributed file system," IEEE Proceedings 22nd International Conference on Distributed Computing Systems, pp. 617-624, 2002.
  9. P Anderson and L. Zhang, "Fast and secure laptop backups with encrypted de-duplication," Proc. 24th Int. Conf. Large Installation Syst. Admin., pp. 29-40, 2010.
  10. B. Choudhary and A. Dravid "A study on authorized deduplication techniques in cloud computing," International Journal of Advanced Research in Computer Engineering & Technology (IJARCET), vol. 3, issue 12, pp. 4191-4194, 2014.
  11. Yingdan Shang and Huiba Li, "Data deduplication in cloud computing systems," International Workshop on Cloud Computing and Information Security (CCIS), pp. 483-486, 2013.

Downloads

Published

2018-07-30

Issue

Section

Research Articles

How to Cite

[1]
Gundluru PadmajaKumari, C. Govardhan, " Recognizing and removing of similar Data for Information Processing and Storing in Cloud, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 3, Issue 6, pp.527-534, July-August-2018.