A Survey on Secure and Authorized Deduplication Techniques using Hybrid Cloud
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 109 | Views: 282

Survey Paper | Computer Science & Engineering | India | Volume 5 Issue 3, March 2016 | Popularity: 6.4 / 10


     

A Survey on Secure and Authorized Deduplication Techniques using Hybrid Cloud

Snehal Barvkar, Vaishali Mali


Abstract: Presently a days utilization of distributed computing is expanding quickly. Distributed computing is vital in the information sharing application. Every day utilization of cloud is expanding. Be that as it may, the issue in distributed computing is each day information transferred on the cloud, so expanding comparative information in cloud. Along these lines we can decrease the measure of comparable information in cloud utilizing the information DE duplication strategy. These system primary point is that expel copy information from cloud. It can likewise spare storage room and data transfer capacity. Our proposed technique is to uproot the copy information however in which client have relegated some benefit as per that duplication check. Cloud DE duplication is accomplish utilizing the cross breed cloud building design. We proposed system is more secure and expends less assets of cloud. Likewise we have demonstrated that proposed plan has insignificant overhead in copy evacuation when contrasted with the ordinary DE duplication procedure.


Keywords: Authorization, data security, privilege, DE duplication, credentials, cloud


Edition: Volume 5 Issue 3, March 2016


Pages: 1382 - 1385


DOI: https://www.doi.org/10.21275/NOV152544



Make Sure to Disable the Pop-Up Blocker of Web Browser


Text copied to Clipboard!
Snehal Barvkar, Vaishali Mali, "A Survey on Secure and Authorized Deduplication Techniques using Hybrid Cloud", International Journal of Science and Research (IJSR), Volume 5 Issue 3, March 2016, pp. 1382-1385, https://www.ijsr.net/getabstract.php?paperid=NOV152544, DOI: https://www.doi.org/10.21275/NOV152544

Similar Articles

Downloads: 8 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Review Papers, Computer Science & Engineering, India, Volume 13 Issue 8, August 2024

Pages: 1059 - 1065

Unlocking the Coverts: How 'Machine Learning' is Revolutionizing Covert Communication

Veena N D, Anitha Devi M D

Share this Article

Downloads: 101

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 11, November 2016

Pages: 1685 - 1688

An Advanced Data De-duplication Using Novel Variable Size Hashing Technique for Text Files Using Hybrid Cloud Architecture

Haritha Nair, Varsha Botre, Hina Khan, Pritee Nalage, Hiranwale S.B.

Share this Article

Downloads: 103

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1588 - 1591

Study of Controlling Cloud Data Access Privilege and Attribute Based Data Sharing with Attribute Revocation

Nishitara Shelke, Vidya Dhamdhere

Share this Article

Downloads: 106

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 1111 - 1114

Survey on EMI: Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage

Shilpa Singh, Padmavathi B.

Share this Article

Downloads: 107

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 1235 - 1237

Single Sign-on Secure Password Mechanism for Distributed Computer Networks

Deepali M. Devkate, N. D. Kale

Share this Article
Top