A Survey on Deduplication Scheme in Cloud Storage
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 101 | Views: 322

Survey Paper | Computer Science & Engineering | India | Volume 3 Issue 12, December 2014 | Popularity: 6.2 / 10


     

A Survey on Deduplication Scheme in Cloud Storage

Deepa.D, Revathi.M


Abstract: Due to less maintenance enterprises and organizations outsource data storage to third-party cloud providers. Due to increase in data volume there is a need of data management in cloud storages. Deduplication is a technique which eliminates duplicate copies of same data. To make data management scalable, deduplication has been a well-known technique to reduce storage space and upload bandwidth in cloud storage. So we are going to build a deduplication mechanism which makes use of a convergent encryption scheme for data confidentiality. We also enhance our deduplication mechanism by solving the key management problem cause by generating an enormous number of keys with the increasing number of users in the convergent encryption using the Ramp secret sharing scheme.


Keywords: deduplication, convergent, tag, encryption, hash


Edition: Volume 3 Issue 12, December 2014


Pages: 1812 - 1814



Make Sure to Disable the Pop-Up Blocker of Web Browser


Text copied to Clipboard!
Deepa.D, Revathi.M, "A Survey on Deduplication Scheme in Cloud Storage", International Journal of Science and Research (IJSR), Volume 3 Issue 12, December 2014, pp. 1812-1814, https://www.ijsr.net/getabstract.php?paperid=SUB14821, DOI: https://www.doi.org/10.21275/SUB14821

Similar Articles

Downloads: 6 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Analysis Study Research Paper, Computer Science & Engineering, India, Volume 13 Issue 1, January 2024

Pages: 516 - 519

I-Vote Android Application for Internet-Voting

Rahul Kumar, Hima Saxena, Dr. Suman Sharma

Share this Article

Downloads: 124 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 991 - 995

A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats

M. Meena, A. Komathi

Share this Article

Downloads: 160 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 8, August 2017

Pages: 868 - 874

Study of Power Management in Adhoc Networks

Anandhi Giri, S. K. Srivatsa

Share this Article

Downloads: 0

Research Paper, Computer Science & Engineering, India, Volume 11 Issue 6, June 2022

Pages: 654 - 659

Image Encryption using (k, n) Secret Sharing Scheme using Lagrange Polynomial

GVSS Jayanth Anish

Share this Article

Downloads: 0

Research Paper, Computer Science & Engineering, India, Volume 11 Issue 12, December 2022

Pages: 481 - 483

Data-Driven Approach for SOC Estimation of Battery using Long-Short Term Memory Network

S. Sai Rahul

Share this Article
Top