Data De-Duplication Using SHA (Secure Hash Algorithm)
DOI:
https://doi.org/10.32628/CSEIT1952181Keywords:
Redundant, Encrypt, Hash value, Secure Hash Algorithm, AES, DeDuplication.Abstract
Now-a-days the number of users using cloud storage has increased so that the data stored has been increased in exponential rates. The data should be secured and the storage should be used efficiently. But a lot of duplicate data is present as two or more users may upload the same data. To make use of the cloud storage efficiently we have to reduce the redundant data hence improving the resources like storage space, disk I/O operations of the cloud vendors. Data De-Duplication is the process to remove redundant data and store only one instance of duplicate data. The objective of the proposed system is to increase the efficient comparison of hash values of a different data blocks and security of data. This paper includes a method for data deduplication using SHA (Secure Hash Algorithm) and AES. SHA is used as it is more secure than other hashing algorithms. The data is encrypted using AES at owner machine itself and using SHA the redundant data will be eliminated.
References
- Priyadharshini.P, Dhamodran.P, Kavitha.M.S “A Survey on De-Duplication in Cloud Computing” in IJCSMC vol.3, Issue 11 (November 2014), ||pp.149-155https://www.ijcsmc.com/docs/papers/November2014/V3I11201435.pdf
- https://data-flair.training/blogs/features-of-cloud-computing/
- https://docs.microsoft.com/en-us/windows-server/storage/data-deduplication/understand
- Rohini Sharma, “Data De-Duplication in Cloud Computing: A Review” in IJEAST vol. 2, Issue 2455-2143(February-March2017),||pp.26-29
- ttp://www.ijeast.com/papers/26-29,Tesma204,IJEAST.pdf
- Sachit-Ghimire,D.Venkata Subramanian “Chunking Algorithm for Data deduplication” in IJSRD Vol. 2, Issue(05,2014),||ISSN2321-0613 http://www.ijsrd.com/articles/IJSRDV2I5286.pdf
- Ider Lkhagvasuren1, Jung Min So1, Jeong Gun Lee1, Chuck Yoo2, Young Woong Ko1, “Byte-index Chunking Algorithm for Data Deduplication System”, in ijsia Vol. 7, No. 5(2013), ||pp.415-424 https://pdfs.semanticscholar.org/0880/325749067aefa23dce9bf63c4e92c6478773.pdf
- Tannu1, Karambir2, “Detection of De-Duplication Using SHA-512 and AES-256 in Cloud Storage” in IASIRhttp://iasir.net/AIJRSTEMpapers/AIJRSTEM17-323.pdf
- https://www.tutorialspoint.com/cryptography/advanced_encryption_standard.htm
- https://pibytes.wordpress.com/2013/02/09/deduplication-internals-hash-based-part-2
Downloads
Published
Issue
Section
License
Copyright (c) IJSRCSEIT

This work is licensed under a Creative Commons Attribution 4.0 International License.