We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

Analysis of De-duplication Methods in Cloud Computing

Published on February 2015 by Preetika Singh, Meenakshi Sharma, Deepika Singh
International Conference on Advances in Science and Technology
Foundation of Computer Science USA
ICAST2014 - Number 4
February 2015
Authors: Preetika Singh, Meenakshi Sharma, Deepika Singh
634e7a25-ff19-4146-a9ae-6941ffbb2de7

Preetika Singh, Meenakshi Sharma, Deepika Singh . Analysis of De-duplication Methods in Cloud Computing. International Conference on Advances in Science and Technology. ICAST2014, 4 (February 2015), 19-21.

@article{
author = { Preetika Singh, Meenakshi Sharma, Deepika Singh },
title = { Analysis of De-duplication Methods in Cloud Computing },
journal = { International Conference on Advances in Science and Technology },
issue_date = { February 2015 },
volume = { ICAST2014 },
number = { 4 },
month = { February },
year = { 2015 },
issn = 0975-8887,
pages = { 19-21 },
numpages = 3,
url = { /proceedings/icast2014/number4/19494-5044/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Conference on Advances in Science and Technology
%A Preetika Singh
%A Meenakshi Sharma
%A Deepika Singh
%T Analysis of De-duplication Methods in Cloud Computing
%J International Conference on Advances in Science and Technology
%@ 0975-8887
%V ICAST2014
%N 4
%P 19-21
%D 2015
%I International Journal of Computer Applications
Abstract

Cloud computing has helped in minimizing the need for extra storage at the user's premises. De-duplication has largely contributed to the emergence of cloud computing as an efficient storage medium at small as well as large scale. However, De-duplication has invited serious concerns related to security as well as speed of access. Considering the amount of storage efficiency increased due to this method it becomes undesirable to avoid its use. This paper studies the emergence of these concerns and discusses the solutions proposed. Further the loopholes of solutions proposed and the future work that can be done in this aspect is studied.

References
  1. D. Russell, "Data De-duplication Will Be Even Bigger in 2010", Gartner, February 2010.
  2. M. Dutch. Understanding data De-duplication ratios. White paper, June 2008.
  3. D. Harnik, B. Pinkas, and A. Shulman-Peleg. Side Channels in Cloud Services. De-duplication in Cloud Storage. IEEE Security & Privacy, 8(6), Nov. 2010.
  4. Sun, Z. , Shen, J. & Yong, J. (2013). A novel approach to data De-duplication over the engineering-oriented cloud systems. Integrated Computer Aided Engineering, 20 (1), 45-57.
  5. Mkandawire, Stephen, "Improving Backup and Restore Performance for De-duplication-based Cloud Backup Services" (2012). Computer science and Engineering: Theses, Dissertations, and Student Research. Paper 39.
  6. A. Muthitacharoen, B. Chen, and D. Mazieres, "A low-bandwidth network file system," in Symposium on Operating Systems Principles, 2001, pp. 174–187. [Online]. Available: http://citeseer. ist. psu. edu/muthitacharoen01lowbandwidth. html
  7. S. Quinlan and S. Dorward, "Venti: a new approach to archival storage," in First USENIX conference on File and Storage Technologies, Monterey,CA, 2002. [Online]. Available: http://citeseerx. ist. psu. edu/viewdoc/summary?doi=10. 1. 1. 18. 8085
  8. D. Meister and A. Brinkmann. dedupv1: Improving De-duplication throughput using solid state drives (SSD). In IEEE 26th Symposium on Mass Storage Systems and Technologies (MSST), pages 1-6, 2010.
  9. D. Bhagwat, K. Eshghi, D. D. E. Long, and M. Lillibridge. Extreme Binning: Scalable, parallel De-duplication for chunk-based file backup. In IEEE International Symposium on Modelling, Analysis & Simulation of Computer and Telecommunication Systems (MASCOTS), 2009.
  10. Burton H. Bloom. Space/time trade-offs in hash coding with allowable errors. Communications of the ACM, 13(7):422–426, 1970.
  11. S. Halevi, D. Harnik, B. Pinkas, and A. Shulman-Peleg, "Proofs of ownership in remote storage systems," in Proc. of CCS'11, 2011.
Index Terms

Computer Science
Information Sciences

Keywords

Cloud Computing De-duplication Speed Efficiency Security.