A Survey on Deduplication Scheme in Cloud Storage
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Downloads: 101

Survey Paper | Computer Science & Engineering | India | Volume 3 Issue 12, December 2014

A Survey on Deduplication Scheme in Cloud Storage

Deepa.D, Revathi.M

Due to less maintenance enterprises and organizations outsource data storage to third-party cloud providers. Due to increase in data volume there is a need of data management in cloud storages. Deduplication is a technique which eliminates duplicate copies of same data. To make data management scalable, deduplication has been a well-known technique to reduce storage space and upload bandwidth in cloud storage. So we are going to build a deduplication mechanism which makes use of a convergent encryption scheme for data confidentiality. We also enhance our deduplication mechanism by solving the key management problem cause by generating an enormous number of keys with the increasing number of users in the convergent encryption using the Ramp secret sharing scheme.

Keywords: deduplication, convergent, tag, encryption, hash

Edition: Volume 3 Issue 12, December 2014

Pages: 1812 - 1814

Share this Article

How to Cite this Article?

Deepa.D, Revathi.M, "A Survey on Deduplication Scheme in Cloud Storage", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB14821, Volume 3 Issue 12, December 2014, 1812 - 1814

Enter Your Email Address




Similar Articles with Keyword 'deduplication'

Downloads: 101

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1812 - 1814

A Survey on Deduplication Scheme in Cloud Storage

Deepa.D, Revathi.M

Share this Article

Downloads: 101

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 11, November 2016

Pages: 1685 - 1688

An Advanced Data De-duplication Using Novel Variable Size Hashing Technique for Text Files Using Hybrid Cloud Architecture

Haritha Nair, Varsha Botre, Hina Khan, Pritee Nalage, Hiranwale S.B.

Share this Article

Downloads: 105

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1696 - 1700

Data Security Policies in Cloud: A Survey

Kasundra Punitkumar R., Shikha J. Pachouly

Share this Article

Downloads: 106 | Weekly Hits: ⮙3 | Monthly Hits: ⮙13

Review Papers, Computer Science & Engineering, India, Volume 6 Issue 3, March 2017

Pages: 1613 - 1618

Review of Various Encryption and Compression Mechanisms Used within Deduplication in Cloud Computing

Nancy Digra, Sandeep Sharma

Share this Article

Downloads: 109

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 3, March 2016

Pages: 1382 - 1385

A Survey on Secure and Authorized Deduplication Techniques using Hybrid Cloud

Snehal Barvkar, Vaishali Mali

Share this Article

Similar Articles with Keyword 'convergent'

Downloads: 101

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1812 - 1814

A Survey on Deduplication Scheme in Cloud Storage

Deepa.D, Revathi.M

Share this Article

Downloads: 110

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015

Pages: 1806 - 1810

A Hybrid Cloud Approach for Secure Authorized Deduplication

Jagadish, Dr.Suvarna Nandyal

Share this Article

Downloads: 111

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1395 - 1398

Security Analysis and Deduplication Using Convergent Algorithm

Rajkumar N Pagadi, Dr. Shubhangi D C

Share this Article

Downloads: 111

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 6, June 2016

Pages: 1491 - 1494

DCT Image Compression and Secure Deduplication with Efficient Convergent Key Management

Soofiya MS, Sreetha V Kumar

Share this Article

Downloads: 112

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 1696 - 1698

A Survey on Secure and Authorized Data Deduplication

Shweta Pochhi, Vanita Babanne

Share this Article

Similar Articles with Keyword 'tag'

Downloads: 153

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 8, August 2017

Pages: 868 - 874

Study of Power Management in Adhoc Networks

Anandhi Giri, S. K. Srivatsa

Share this Article

Downloads: 1

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2205 - 2207

A Survey of Generating Multi-Document Summarizations

Patil Ajita S., P. M. Mane

Share this Article

Downloads: 1

Research Paper, Computer Science & Engineering, Russia, Volume 10 Issue 4, April 2021

Pages: 1115 - 1121

Conceptual Modeling of a Tramcar

Iftikhar B. Abbasov, Viacheslav V. Orekhov

Share this Article

Downloads: 1 | Monthly Hits: ⮙1

Survey Paper, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021

Pages: 948 - 951

Survey on Various Image Segmentation Techniques

Babita Chauhan

Share this Article

Downloads: 2 | Weekly Hits: ⮙1 | Monthly Hits: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021

Pages: 720 - 724

Review on Deep Learning and IoT Techniques on Corono Virus

Mansi Kambli

Share this Article

Similar Articles with Keyword 'encryption'

Downloads: 1 | Monthly Hits: ⮙1

Student Project, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021

Pages: 475 - 485

Light Weight WSN Authentication Protocol Suite

Rahul K Drolia

Share this Article

Downloads: 9 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 4, April 2021

Pages: 788 - 791

A New Cryptography Algorithm Based on ASCII Code

Yaser M.A. Abualkas

Share this Article

Downloads: 73

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 11, November 2020

Pages: 470 - 478

Ensuring Video Integrity Using Watermark - Chaining by SVD and DWT

Aditya Tiwari, Ayush Pandey

Share this Article

Downloads: 94

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1069 - 1073

Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN

Rucha Agrawal, Simran Khiani

Share this Article

Downloads: 100

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1709 - 1712

A Business Framework for Securing Data Storage over Cloud Environment using ECC Crypto System

Nara Venkata Surendra Reddy, DLS Reddy

Share this Article

Similar Articles with Keyword 'hash'

Downloads: 93

Informative Article, Computer Science & Engineering, India, Volume 9 Issue 12, December 2020

Pages: 85 - 88

CBCD Methods in Video Copy Detection

Jan Mary Thomas

Share this Article

Downloads: 97 | Weekly Hits: ⮙3 | Monthly Hits: ⮙8

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 1910 - 1915

An Efficient Hash Count Indexing and Searching Scheme for Audio Fingerprinting

Simarjeet Singh Bhatia, Rupali Bhartiya

Share this Article

Downloads: 99

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2394 - 2397

Multilayered Security Approach for Cloud Data Centers using Hash Functions

Jashanpreet Pal Kaur, Rajbhupinder Kaur

Share this Article

Downloads: 100

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1709 - 1712

A Business Framework for Securing Data Storage over Cloud Environment using ECC Crypto System

Nara Venkata Surendra Reddy, DLS Reddy

Share this Article

Downloads: 101

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1812 - 1814

A Survey on Deduplication Scheme in Cloud Storage

Deepa.D, Revathi.M

Share this Article



Top