Abstract: A Survey on Deduplication Scheme in Cloud Storage
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Open Access | Fully Refereed | Peer Reviewed

ISSN: 2319-7064

Downloads: 101

Survey Paper | Computer Science & Engineering | India | Volume 3 Issue 12, December 2014

A Survey on Deduplication Scheme in Cloud Storage

Deepa.D, Revathi.M

Due to less maintenance enterprises and organizations outsource data storage to third-party cloud providers. Due to increase in data volume there is a need of data management in cloud storages. Deduplication is a technique which eliminates duplicate copies of same data. To make data management scalable, deduplication has been a well-known technique to reduce storage space and upload bandwidth in cloud storage. So we are going to build a deduplication mechanism which makes use of a convergent encryption scheme for data confidentiality. We also enhance our deduplication mechanism by solving the key management problem cause by generating an enormous number of keys with the increasing number of users in the convergent encryption using the Ramp secret sharing scheme.

Keywords: deduplication, convergent, tag, encryption, hash

Edition: Volume 3 Issue 12, December 2014

Pages: 1812 - 1814

Share this Article

How to Cite this Article?

Deepa.D, Revathi.M, "A Survey on Deduplication Scheme in Cloud Storage", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB14821, Volume 3 Issue 12, December 2014, 1812 - 1814

Enter Your Email Address


Similar Articles with Keyword 'deduplication'

Downloads: 101

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 11, November 2016

Pages: 1685 - 1688

An Advanced Data De-duplication Using Novel Variable Size Hashing Technique for Text Files Using Hybrid Cloud Architecture

Haritha Nair, Varsha Botre, Hina Khan, Pritee Nalage, Hiranwale S.B.

Share this Article

Downloads: 105

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1696 - 1700

Data Security Policies in Cloud: A Survey

Kasundra Punitkumar R., Shikha J. Pachouly

Share this Article

Similar Articles with Keyword 'convergent'

Downloads: 110

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015

Pages: 1806 - 1810

A Hybrid Cloud Approach for Secure Authorized Deduplication

Jagadish, Dr.Suvarna Nandyal

Share this Article

Downloads: 111

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1395 - 1398

Security Analysis and Deduplication Using Convergent Algorithm

Rajkumar N Pagadi, Dr. Shubhangi D C

Share this Article

Similar Articles with Keyword 'tag'

Downloads: 155 | Weekly Hits: ⮙1 | Monthly Hits: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 8, August 2017

Pages: 868 - 874

Study of Power Management in Adhoc Networks

Anandhi Giri, S. K. Srivatsa

Share this Article

Downloads: 1

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2205 - 2207

A Survey of Generating Multi-Document Summarizations

Patil Ajita S., P. M. Mane

Share this Article

Similar Articles with Keyword 'encryption'

Downloads: 1

Student Project, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021

Pages: 475 - 485

Light Weight WSN Authentication Protocol Suite

Rahul K Drolia

Share this Article

Downloads: 1 | Monthly Hits: ⮙1

Review Papers, Computer Science & Engineering, India, Volume 10 Issue 8, August 2021

Pages: 1126 - 1129

Privacy Preserving Utility Verification of Data Published

Madhushree M

Share this Article

Similar Articles with Keyword 'hash'

Downloads: 93

Informative Article, Computer Science & Engineering, India, Volume 9 Issue 12, December 2020

Pages: 85 - 88

CBCD Methods in Video Copy Detection

Jan Mary Thomas

Share this Article

Downloads: 98

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 1910 - 1915

An Efficient Hash Count Indexing and Searching Scheme for Audio Fingerprinting

Simarjeet Singh Bhatia, Rupali Bhartiya

Share this Article
Top