Survey Paper | Computer Science & Engineering | India | Volume 3 Issue 12, December 2014
A Survey on Deduplication Scheme in Cloud Storage
Deepa.D, Revathi.M
Due to less maintenance enterprises and organizations outsource data storage to third-party cloud providers. Due to increase in data volume there is a need of data management in cloud storages. Deduplication is a technique which eliminates duplicate copies of same data. To make data management scalable, deduplication has been a well-known technique to reduce storage space and upload bandwidth in cloud storage. So we are going to build a deduplication mechanism which makes use of a convergent encryption scheme for data confidentiality. We also enhance our deduplication mechanism by solving the key management problem cause by generating an enormous number of keys with the increasing number of users in the convergent encryption using the Ramp secret sharing scheme.
Keywords: deduplication, convergent, tag, encryption, hash
Edition: Volume 3 Issue 12, December 2014
Pages: 1812 - 1814
How to Cite this Article?
Deepa.D, Revathi.M, "A Survey on Deduplication Scheme in Cloud Storage", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB14821, Volume 3 Issue 12, December 2014, 1812 - 1814
111 PDF Views | 88 PDF Downloads
Similar Articles with Keyword 'deduplication'
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 1812 - 1814A Survey on Deduplication Scheme in Cloud Storage
Deepa.D, Revathi.M
Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 11, November 2016
Pages: 1685 - 1688An Advanced Data De-duplication Using Novel Variable Size Hashing Technique for Text Files Using Hybrid Cloud Architecture
Haritha Nair, Varsha Botre, Hina Khan, Pritee Nalage, Hiranwale S.B.
Research Paper, Computer Science & Engineering, India, Volume 5 Issue 4, April 2016
Pages: 1258 - 1261Multilevel Cryptosystem for Authorized Deduplication in Hybrid Cloud
P. Narasimhulu, Jayavarthini.C
Review Papers, Computer Science & Engineering, India, Volume 6 Issue 3, March 2017
Pages: 1613 - 1618Review of Various Encryption and Compression Mechanisms Used within Deduplication in Cloud Computing
Nancy Digra, Sandeep Sharma
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 1696 - 1700Data Security Policies in Cloud: A Survey
Kasundra Punitkumar R., Shikha J. Pachouly
Similar Articles with Keyword 'convergent'
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 1812 - 1814A Survey on Deduplication Scheme in Cloud Storage
Deepa.D, Revathi.M
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015
Pages: 1806 - 1810A Hybrid Cloud Approach for Secure Authorized Deduplication
Jagadish, Dr.Suvarna Nandyal
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 1696 - 1698A Survey on Secure and Authorized Data Deduplication
Shweta Pochhi, Vanita Babanne
Research Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016
Pages: 2141 - 2143Duplication Removal and Auditing Check Over Cloud
Pranita B. Wadavkar, Prashant M. Mane
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1728 - 1730A Trusted Framework for Data Security in Cloud Environment
Mannem Sindhuja, Punugoti Pavan Kumar
Similar Articles with Keyword 'tag'
Research Paper, Computer Science & Engineering, India, Volume 6 Issue 8, August 2017
Pages: 868 - 874Study of Power Management in Adhoc Networks
Anandhi Giri, S. K. Srivatsa
Research Paper, Computer Science & Engineering, India, Volume 10 Issue 2, February 2021
Pages: 1663 - 1668PAPR Reduction in OFDM System using Clipping and Filtering based new Hybrid VLM Pre-Coded SLM
Muneeb Manzoor Bhat, Preeti Sondhi
Research Paper, Computer Science & Engineering, India, Volume 10 Issue 2, February 2021
Pages: 1682 - 1686Support Vector Machine Based MRI Brain Tumor Detection
Nazima Yousuf, Mrigana Walia
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 2205 - 2207A Survey of Generating Multi-Document Summarizations
Patil Ajita S., P. M. Mane
Research Paper, Computer Science & Engineering, India, Volume 9 Issue 12, December 2020
Pages: 1615 - 1620Traffic Sign Detection via Graph Based Ranking and Segmentation Algorithm
Premsai Cheedella
Similar Articles with Keyword 'encryption'
Research Paper, Computer Science & Engineering, India, Volume 9 Issue 11, November 2020
Pages: 470 - 478Ensuring Video Integrity Using Watermark - Chaining by SVD and DWT
Aditya Tiwari, Ayush Pandey
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015
Pages: 1069 - 1073Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN
Rucha Agrawal, Simran Khiani
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1200 - 1203Efficient Hardware Encryption Using Lightweight Process
Deeksha Bhardwaj, Rohit Pawar, Aman Jain
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 1525 - 1529Blowfish Algorithm by Modify Randomness for S-Boxes using Fuzzy Value and Apply Encryption or Decryption on Image
Maulik P. Chaudhari, Neha Parmar
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2025 - 2029Investigation of Security in Cloud Computing
Annu Devi
Similar Articles with Keyword 'hash'
Informative Article, Computer Science & Engineering, India, Volume 9 Issue 12, December 2020
Pages: 85 - 88CBCD Methods in Video Copy Detection
Jan Mary Thomas
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 2394 - 2397Multilayered Security Approach for Cloud Data Centers using Hash Functions
Jashanpreet Pal Kaur, Rajbhupinder Kaur
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014
Pages: 1910 - 1915An Efficient Hash Count Indexing and Searching Scheme for Audio Fingerprinting
Simarjeet Singh Bhatia, Rupali Bhartiya
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 1812 - 1814A Survey on Deduplication Scheme in Cloud Storage
Deepa.D, Revathi.M
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 10, October 2015
Pages: 1548 - 1550Survey on Distributed Mobile Cloud Computing Services: Signature Scheme for a Privacy-Aware Authentication
Chaitali P. Kathar, Vidya Dhamdhere