Secured Deduplication using Hybrid Cloud Approach
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

M.Tech / M.E / PhD Thesis | Information Technology | India | Volume 4 Issue 6, June 2015

Secured Deduplication using Hybrid Cloud Approach

Gaurav Kakariya, Sonali Rangdale

oday, there is wide range of scope for Cloud computing. Among those most popular is the infrastructure as a service facility of the cloud. The process of removing same files from the cloud and save the user space on the cloud is the data DE duplication in the cloud computing. In large organizations same data is stored on the different places by different users. This will increase the storage size. In the duplicate removal process one can remove the file duplicate with the original file and make space empty for the further storage. By using hybrid cloud we have proposed a novel method data DE duplication to avoid the data duplication and also to maintain the user confidentiality. The confidentiality of the user data as all credentials are stored on the private cloud, maintained the proposed system. To improve the data storage we have proposed a novel method. Proposed method insures data DE duplication securely. This method ensures the data DE duplication with securely.

Keywords: data DE duplication, hybrid cloud, public cloud, credentials, cloud storage

Edition: Volume 4 Issue 6, June 2015

Pages: 2109 - 2113

Share this Article

How to Cite this Article?

Gaurav Kakariya, Sonali Rangdale, "Secured Deduplication using Hybrid Cloud Approach", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB155801, Volume 4 Issue 6, June 2015, 2109 - 2113

98 PDF Views | 86 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'hybrid cloud'

Research Paper, Information Technology, India, Volume 4 Issue 5, May 2015

Pages: 1777 - 1781

A Secure Approach for Deduplication using Hybrid Cloud

Yusuf Aliyu Adamu

Share this Article

M.Tech / M.E / PhD Thesis, Information Technology, India, Volume 4 Issue 6, June 2015

Pages: 2109 - 2113

Secured Deduplication using Hybrid Cloud Approach

Gaurav Kakariya, Sonali Rangdale

Share this Article

Research Paper, Information Technology, India, Volume 5 Issue 2, February 2016

Pages: 1470 - 1474

Role Based Encryption with Efficient Access Control in Cloud Storage

G. V. Bandewar, R. H. Borhade

Share this Article

Similar Articles with Keyword 'public cloud'

Research Paper, Information Technology, India, Volume 5 Issue 9, September 2016

Pages: 1751 - 1754

Re-encryption based Attribute Revocation in Data Access Control for Multiauthority Cloud Storage

Kalyani G. Ktangale, Milind Penurkar

Share this Article

M.Tech / M.E / PhD Thesis, Information Technology, India, Volume 4 Issue 6, June 2015

Pages: 2109 - 2113

Secured Deduplication using Hybrid Cloud Approach

Gaurav Kakariya, Sonali Rangdale

Share this Article

Survey Paper, Information Technology, India, Volume 4 Issue 1, January 2015

Pages: 1570 - 1572

Survey on: Query Services in Cloud Security

Sapana S. Vasave, Dr. Kishor R. Kolhe

Share this Article

Similar Articles with Keyword 'credentials'

M.Tech / M.E / PhD Thesis, Information Technology, India, Volume 4 Issue 6, June 2015

Pages: 2109 - 2113

Secured Deduplication using Hybrid Cloud Approach

Gaurav Kakariya, Sonali Rangdale

Share this Article

Survey Paper, Information Technology, India, Volume 4 Issue 12, December 2015

Pages: 2032 - 2036

A Survey on CAPTCHA as Graphical Password

Priti P. Doke, S.A Nagtilak

Share this Article

Research Paper, Information Technology, India, Volume 4 Issue 4, April 2015

Pages: 1990 - 1993

Advanced Persistent Threat Detection System

Hanu Prasannan, Dharani.J

Share this Article

Similar Articles with Keyword 'cloud storage'

Research Paper, Information Technology, India, Volume 5 Issue 9, September 2016

Pages: 1751 - 1754

Re-encryption based Attribute Revocation in Data Access Control for Multiauthority Cloud Storage

Kalyani G. Ktangale, Milind Penurkar

Share this Article

Informative Article, Information Technology, Malaysia, Volume 3 Issue 12, December 2014

Pages: 570 - 576

How Much Privacy We Still Have?

Ayn Nur Azhana Binti Azhar Amanullah, Nur Faizah Binti Ab Aziz, Maya Novia Sari, Jamaludin Bin Ibrahim

Share this Article

M.Tech / M.E / PhD Thesis, Information Technology, India, Volume 4 Issue 5, May 2015

Pages: 2565 - 2567

Cloud Storage with Added Data Security and Integrity

Reshmi Das M V, R Charanya

Share this Article

Research Paper, Information Technology, India, Volume 4 Issue 7, July 2015

Pages: 2400 - 2403

Secure Deduplication in Cloud Backup Services

Nidhi Panpaliya, Prachi Sorte

Share this Article

Survey Paper, Information Technology, India, Volume 3 Issue 6, June 2014

Pages: 1470 - 1473

The Heartbleed Bug: An Open Secure Sockets Layer Vulnerability

Thabiso Peter Mpofu, Noe Elisa, Nicholaus Gati

Share this Article
Top