Survey of Various Data Duplication Method and Security Algorithm Issue in Cloud Computing |
Author(s): |
Liladhar M. Kuwar , BM College Of Technology, Indore (M.P.); Prof. Kapil Vyas, BM College Of Technology, Indore (M.P.) |
Keywords: |
Cloud Computing, Data De-Duplication, Security Algorithm |
Abstract |
Internet and network application are growing very fast and use of cloud computing has increased rapidly in today’s world. Cloud computing provides many advantages such as reducing cost, on-line, on-demand services and accessibility of data. Cloud computing defined different computing idea which includes huge number of peripheral device connected with real time communication like internet in computer networking. Now days due to benefited in storage technology and networking, larger function of data is being maintained in digital form. Similar data storage in disk is responsible for unnecessary storage space of data. Data de-duplication is effective way to reduce the storage space and optimize the utilization of storage space. Duplication records appear when uniform storage technique is used in data base. Identification of duplicate data is time consuming. In this paper we concentrate about data de-duplication technique and security mechanism because Organizations are transferring important information to the Cloud that increases concern over security of data. Cryptography is common approach to protect the sensitive information in Cloud. Encryption algorithm plays a main role in information security system. In this survey paper we examine bout various security algorithm comparison. |
Other Details |
Paper ID: IJSRDV4I70288 Published in: Volume : 4, Issue : 7 Publication Date: 01/10/2016 Page(s): 326-329 |
Article Preview |
|
|