Abstract: A Secure and Authorized Duplication Check of Data Using Hybrid Cloud Approach
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Open Access | Fully Refereed | Peer Reviewed

ISSN: 2319-7064

Downloads: 112

Survey Paper | Computer Science & Engineering | India | Volume 4 Issue 12, December 2015

A Secure and Authorized Duplication Check of Data Using Hybrid Cloud Approach

Sonali B. Motegaonkar, Prof. Chaitanya S. Kulkarni

Current era is a cloud computing era. The use of cloud increasing daily. Cloud computing is nothing but the sharing of resources and pay as per we use. Now a days use of cloud computing is increasing rapidly. But the problem with cloud computing is every day data is get uploaded on the cloud. The increasing similar data. So to reduce the used size of cloud deduplication is best method in the data deduplication approach duplicate data is removed from the cloud. This will helps to save storage space and bandwidth also. To remove the duplicate data we have proposed a novel method in which user have assigned some privilege according to that duplication check is perform. We have used a hybrid cloud architecture to achieve the cloud data deduplication. Experimental result of our method shows that proposed method is more secure and consumes less resources of cloud We have shown that proposed scheme has minimal overhead in duplicate removal as compared to the normal deduplication technique.

Keywords: Authorization, data, security, privilege, deduplication, credentials, cloud

Edition: Volume 4 Issue 12, December 2015

Pages: 1645 - 1648

Share this Article

How to Cite this Article?

Sonali B. Motegaonkar, Prof. Chaitanya S. Kulkarni, "A Secure and Authorized Duplication Check of Data Using Hybrid Cloud Approach", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=NOV152341, Volume 4 Issue 12, December 2015, 1645 - 1648

Enter Your Email Address


Similar Articles with Keyword 'Authorization'

Downloads: 100

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 2483 - 2487

Accountability of Data usage in Cloud Computing

Nitin P. Doiphode, Hemlata Channe

Share this Article

Downloads: 103

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2338 - 2340

Remotely Counsel and Governing WLAN through Wi-Fi Enabled Android Device

Rohit Goudagaon, Harshal Pingle, Pankaj Jadhav, A. S. Sondkar

Share this Article

Similar Articles with Keyword 'data'

Downloads: 508 | Weekly Hits: ⮙1 | Monthly Hits: ⮙4

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 7, July 2020

Pages: 1454 - 1458

Heart Disease Prediction with Machine Learning Approaches

Megha Kamboj

Share this Article

Downloads: 85

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 10, October 2020

Pages: 1626 - 1628

Image Noise Reduction with Autoencoder using Tensor Flow

Jai Sehgal, Dr Yojna Arora

Share this Article

Similar Articles with Keyword 'security'

Downloads: 1

Student Project, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021

Pages: 475 - 485

Light Weight WSN Authentication Protocol Suite

Rahul K Drolia

Share this Article

Downloads: 1

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 6, June 2021

Pages: 1240 - 1249

Secure Methods for Supplychain Management to Protect from Attacks in Blockchain

B. Ratnakanth, K. Venkata Ramana

Share this Article

Similar Articles with Keyword 'privilege'

Downloads: 103

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1588 - 1591

Study of Controlling Cloud Data Access Privilege and Attribute Based Data Sharing with Attribute Revocation

Nishitara Shelke, Vidya Dhamdhere

Share this Article

Downloads: 106

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 1111 - 1114

Survey on EMI: Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage

Shilpa Singh, Padmavathi B.

Share this Article

Similar Articles with Keyword 'deduplication'

Downloads: 101

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1812 - 1814

A Survey on Deduplication Scheme in Cloud Storage

Deepa.D, Revathi.M

Share this Article

Downloads: 101

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 11, November 2016

Pages: 1685 - 1688

An Advanced Data De-duplication Using Novel Variable Size Hashing Technique for Text Files Using Hybrid Cloud Architecture

Haritha Nair, Varsha Botre, Hina Khan, Pritee Nalage, Hiranwale S.B.

Share this Article

Similar Articles with Keyword 'credentials'

Downloads: 101

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 11, November 2016

Pages: 1685 - 1688

An Advanced Data De-duplication Using Novel Variable Size Hashing Technique for Text Files Using Hybrid Cloud Architecture

Haritha Nair, Varsha Botre, Hina Khan, Pritee Nalage, Hiranwale S.B.

Share this Article

Downloads: 107

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 1235 - 1237

Single Sign-on Secure Password Mechanism for Distributed Computer Networks

Deepali M. Devkate, N. D. Kale

Share this Article

Similar Articles with Keyword 'cloud'

Downloads: 180

Survey Paper, Computer Science & Engineering, India, Volume 7 Issue 1, January 2018

Pages: 81 - 84

Novel Approach to Virtual Machine Migration In Cloud Computing Environment - A Survey

Priyanka H, Dr. Mary Cherian

Share this Article

Downloads: 5

Review Papers, Computer Science & Engineering, India, Volume 10 Issue 7, July 2021

Pages: 613 - 616

Categorize & Compare Cloud Automation & Devops Tools

Pardeep Singh Virdi

Share this Article
Top