Survey Paper | Computer Science & Engineering | India | Volume 5 Issue 3, March 2016
A Survey on Secure and Authorized Deduplication Techniques using Hybrid Cloud
Snehal Barvkar, Vaishali Mali
Presently a days utilization of distributed computing is expanding quickly. Distributed computing is vital in the information sharing application. Every day utilization of cloud is expanding. Be that as it may, the issue in distributed computing is each day information transferred on the cloud, so expanding comparative information in cloud. Along these lines we can decrease the measure of comparable information in cloud utilizing the information DE duplication strategy. These system primary point is that expel copy information from cloud. It can likewise spare storage room and data transfer capacity. Our proposed technique is to uproot the copy information however in which client have relegated some benefit as per that duplication check. Cloud DE duplication is accomplish utilizing the cross breed cloud building design. We proposed system is more secure and expends less assets of cloud. Likewise we have demonstrated that proposed plan has insignificant overhead in copy evacuation when contrasted with the ordinary DE duplication procedure.
Keywords: Authorization, data security, privilege, DE duplication, credentials, cloud
Edition: Volume 5 Issue 3, March 2016
Pages: 1382 - 1385
How to Cite this Article?
Snehal Barvkar, Vaishali Mali, "A Survey on Secure and Authorized Deduplication Techniques using Hybrid Cloud", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=NOV152544, Volume 5 Issue 3, March 2016, 1382 - 1385
Similar Articles with Keyword 'Authorization'
Accountability of Data usage in Cloud Computing
Nitin P. Doiphode, Hemlata Channe
Remotely Counsel and Governing WLAN through Wi-Fi Enabled Android Device
Rohit Goudagaon, Harshal Pingle, Pankaj Jadhav, A. S. Sondkar
Similar Articles with Keyword 'data security'
A Review of Enhanced Technique for Cloud Data Storage Security Using Data Slicing
Roshan M. Kawale, Bharti L. Dhote
A Review: Data Security and Privacy Advancement Approach on Webos with Desktop-As-A-Service
Pooja Saini, Kanchan Narula
Similar Articles with Keyword 'privilege'
Study of Controlling Cloud Data Access Privilege and Attribute Based Data Sharing with Attribute Revocation
Nishitara Shelke, Vidya Dhamdhere
Survey on EMI: Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
Shilpa Singh, Padmavathi B.
Similar Articles with Keyword 'credentials'
An Advanced Data De-duplication Using Novel Variable Size Hashing Technique for Text Files Using Hybrid Cloud Architecture
Haritha Nair, Varsha Botre, Hina Khan, Pritee Nalage, Hiranwale S.B.
Single Sign-on Secure Password Mechanism for Distributed Computer Networks
Deepali M. Devkate, N. D. Kale
Similar Articles with Keyword 'cloud'
Novel Approach to Virtual Machine Migration In Cloud Computing Environment - A Survey
Priyanka H, Dr. Mary Cherian
Categorize & Compare Cloud Automation & Devops Tools
Pardeep Singh Virdi