Review of Various Encryption and Compression Mechanisms Used within Deduplication in Cloud Computing
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 107 | Views: 303

Review Papers | Computer Science & Engineering | India | Volume 6 Issue 3, March 2017 | Popularity: 6.2 / 10


     

Review of Various Encryption and Compression Mechanisms Used within Deduplication in Cloud Computing

Nancy Digra, Sandeep Sharma


Abstract: Data deduplication is the mechanism by which redundant data is eliminated from advanced computing architecture. Cost in advanced computing is due to storage use. Compression is the need of the hour to save bandwidth and storage space to reduce overhead. Security is also at stake since large number of users is using cloud. To enhance security, encryption mechanisms are utilized within deduplication process. Security techniques within deduplication are critical. Researchers are working towards this issue and uses different encryption mechanisms within deduplication. This paper highlighted the studies of various techniques which are part of deduplication. Comparative analysis is also presented to enhance determine optimal technique which can be used in future to enhance deduplication performance.


Keywords: Data Deduplication, Cost, Cloud, Security, Encryption


Edition: Volume 6 Issue 3, March 2017


Pages: 1613 - 1618



Make Sure to Disable the Pop-Up Blocker of Web Browser


Text copied to Clipboard!
Nancy Digra, Sandeep Sharma, "Review of Various Encryption and Compression Mechanisms Used within Deduplication in Cloud Computing", International Journal of Science and Research (IJSR), Volume 6 Issue 3, March 2017, pp. 1613-1618, https://www.ijsr.net/getabstract.php?paperid=ART20171839, DOI: https://www.doi.org/10.21275/ART20171839

Similar Articles

Downloads: 6 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Analysis Study Research Paper, Computer Science & Engineering, India, Volume 13 Issue 1, January 2024

Pages: 516 - 519

I-Vote Android Application for Internet-Voting

Rahul Kumar, Hima Saxena, Dr. Suman Sharma

Share this Article

Downloads: 159 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 11, November 2017

Pages: 338 - 384

Managing Uncertainty in Supply Chain Operating Cost Using Genetic Algorithm

Dr. Niju P. Joseph, Dr. Priyanka Surendran

Share this Article

Downloads: 124 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 991 - 995

A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats

M. Meena, A. Komathi

Share this Article

Downloads: 190 | Weekly Hits: ⮙6 | Monthly Hits: ⮙6

Survey Paper, Computer Science & Engineering, India, Volume 7 Issue 1, January 2018

Pages: 81 - 84

Novel Approach to Virtual Machine Migration In Cloud Computing Environment - A Survey

Priyanka H, Dr. Mary Cherian

Share this Article

Downloads: 138 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2246 - 2249

Packet Analysis with Network Intrusion Detection System

Rashmi Hebbar, Mohan K

Share this Article
Top