High Impact Factor : 4.396 icon | Submit Manuscript Online icon |

Secure Data Deduplication Scheme

Author(s):

Sonal Kajrolkar , VIDYALANKAR INSTITUTE OF TECHNOLOGY; Prof. Ajay Dhruv, Vidyalankar Institute Of Technology; Snehal Shete, Vidyalankar Institute Of Technology; Subodh Ambavane, Vidyalankar Institute Of Technology

Keywords:

Data De-duplication, Cloud Computing, Cloud Storage, Data Security

Abstract

In cloud storage utility, the de-duplication technique is frequently used to degrade the storage and bandwidth by eliminating duplicate data and storing just one copy of it. Convergent encryption has been affirmed to perform secure encrypted de-duplication in the mix user scenario. De-duplication is extremely helpful when there are many numbers of users stores the similar kind of data to the cloud storage, but the problem arises when it comes to security. Thus, security has been amended in the purpose system. To make data management scalable in cloud computing, De-duplication has been a well-known technique for eliminating duplicate copies of repeating data in storage. The technique is used to improve storage utilization and can also be applied to network data transfers to reduce the number of bytes that must be sent. As opposed to keeping various data copies with a comparative substance, De-duplication takes out overabundance data by keeping only a solitary physical copy and implying other dull data to that copy. De-duplication can take place at either the file level or the block level. For file level De-duplication, it eliminates duplicate copies of the same file. De-duplication can also take place at the block level, which eliminates duplicate blocks of data that occur in non-identical files and has attracted more and more attention recently. Data De-duplication is a specialized data compression.

Other Details

Paper ID: IJSRDV5I21005
Published in: Volume : 5, Issue : 2
Publication Date: 01/05/2017
Page(s): 1325-1328

Article Preview

Download Article