Survey Paper | Computer Science & Engineering | India | Volume 3 Issue 12, December 2014
A Survey on Deduplication Scheme in Cloud Storage
Due to less maintenance enterprises and organizations outsource data storage to third-party cloud providers. Due to increase in data volume there is a need of data management in cloud storages. Deduplication is a technique which eliminates duplicate copies of same data. To make data management scalable, deduplication has been a well-known technique to reduce storage space and upload bandwidth in cloud storage. So we are going to build a deduplication mechanism which makes use of a convergent encryption scheme for data confidentiality. We also enhance our deduplication mechanism by solving the key management problem cause by generating an enormous number of keys with the increasing number of users in the convergent encryption using the Ramp secret sharing scheme.
Keywords: deduplication, convergent, tag, encryption, hash
Edition: Volume 3 Issue 12, December 2014
Pages: 1812 - 1814
How to Cite this Article?
Deepa.D, Revathi.M, "A Survey on Deduplication Scheme in Cloud Storage", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB14821, Volume 3 Issue 12, December 2014, 1812 - 1814
Similar Articles with Keyword 'deduplication'
An Advanced Data De-duplication Using Novel Variable Size Hashing Technique for Text Files Using Hybrid Cloud Architecture
Haritha Nair, Varsha Botre, Hina Khan, Pritee Nalage, Hiranwale S.B.
Data Security Policies in Cloud: A Survey
Kasundra Punitkumar R., Shikha J. Pachouly
Similar Articles with Keyword 'convergent'
A Hybrid Cloud Approach for Secure Authorized Deduplication
Jagadish, Dr.Suvarna Nandyal
Security Analysis and Deduplication Using Convergent Algorithm
Rajkumar N Pagadi, Dr. Shubhangi D C
Similar Articles with Keyword 'tag'
Study of Power Management in Adhoc Networks
Anandhi Giri, S. K. Srivatsa
A Survey of Generating Multi-Document Summarizations
Patil Ajita S., P. M. Mane
Similar Articles with Keyword 'encryption'
Light Weight WSN Authentication Protocol Suite
Rahul K Drolia
Privacy Preserving Utility Verification of Data Published
Similar Articles with Keyword 'hash'
CBCD Methods in Video Copy Detection
Jan Mary Thomas
An Efficient Hash Count Indexing and Searching Scheme for Audio Fingerprinting
Simarjeet Singh Bhatia, Rupali Bhartiya