CFP last date
20 January 2025
Reseach Article

An Advanced Data Management Scheme for Secure De-duplication

by Riddhi Movaliya, Harshal Shah
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 177 - Number 13
Year of Publication: 2019
Authors: Riddhi Movaliya, Harshal Shah
10.5120/ijca2019919530

Riddhi Movaliya, Harshal Shah . An Advanced Data Management Scheme for Secure De-duplication. International Journal of Computer Applications. 177, 13 ( Oct 2019), 17-19. DOI=10.5120/ijca2019919530

@article{ 10.5120/ijca2019919530,
author = { Riddhi Movaliya, Harshal Shah },
title = { An Advanced Data Management Scheme for Secure De-duplication },
journal = { International Journal of Computer Applications },
issue_date = { Oct 2019 },
volume = { 177 },
number = { 13 },
month = { Oct },
year = { 2019 },
issn = { 0975-8887 },
pages = { 17-19 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume177/number13/30957-2019919530/ },
doi = { 10.5120/ijca2019919530 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:45:46.390283+05:30
%A Riddhi Movaliya
%A Harshal Shah
%T An Advanced Data Management Scheme for Secure De-duplication
%J International Journal of Computer Applications
%@ 0975-8887
%V 177
%N 13
%P 17-19
%D 2019
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Data De-duplication is one of the effective ways now a days employed in the cloud computing. Energy consumption ratio of IT companies is increasing day by day and reason for it is storing redundant copy of data. Data De-duplication is a cutting edge technology that is used to remove redundant copies of data and store only unique copy of data. It reduces network bandwidth and storage space as well. There are many Data De-duplication methods used however in proposed work main focus is on block level Data De-duplication along with security. In Block level Data De-duplication redundancy would be checked based on blocks of data.

References
  1. M. Bellare, S. Keelveedhi, and T. Ristenpart, “Dupless: Serveraided encryption for deduplicated storage,” in Proc. 22nd USENIX Conf. Sec. Symp., 2013, pp. 179–194.
  2. Nesrine Kaaniche, Maryline Laurent “A Secure Client Side Deduplication Scheme in Cloud Storage Environments” IEEE Transactions on Mobility and Security (NTMS) in Cloud Computing, Issue Date:April.2.2014
  3. Chun-I Fan, Shi-Yuan Huang, and Wen-Che Hsuz” Hybrid Data Deduplication in Cloud Environment” 978-1-4673-2588-2/12/$31.00 ©2012 IEEE
  4. Waraporn Leesakul, Paul Townend, Jie Xu” Dynamic Data Deduplication in Cloud Storage” 2014 IEEE 8th International Symposium on Service Oriented System Engineering
  5. Zhaocong Wen, Jinman Luo, Huajun Chen, Jiaxiao Meng, Xuan Liand Jin Li “A Verifiable Data Deduplication Scheme in Cloud Computing” 2014 International conference on Intelligent networking and collaborative System. 978-1-4799-6387-4/14 $31.00 © 2014 IEEE
  6. S. Bugiel, S. Nurnberger, A. Sadeghi, and T. Schneider, “Twin clouds: An architecture for secure cloud computing,” in Proc. Workshop Cryptography Security Clouds, 2011, pp. 32–44.
  7. Jin Li, Yan Kit Li, Xiaofeng Chen, Patrick P.C. Lee, and Wenjing Lou “A Hybrid Cloud Approach for Secure Authorized Deduplication” IEEE Transactions On Parallel And Distributed Systems, Vol. 26, No. 5, May 2015
  8. https://www.starwindsoftware.com/data-deduplication
  9. GoogleDrive : https://www.drive.google.com
  10. Mozy : https://www.mozy.com
  11. Dropbox : https://www.dropbox.com
  12. Mane Vidya Maruti, Mininath K.Nighot,” Authorized Data Deduplication Using Hybrid Cloud Technique” 978-1-4673-6817-9/15/$31.00 ©2015 IEEE
Index Terms

Computer Science
Information Sciences

Keywords

Cloud Storage Security Block-level Data De-duplication