Call for Paper - January 2023 Edition
IJCA solicits original research papers for the January 2023 Edition. Last date of manuscript submission is December 20, 2022. Read More

Data De-duplication Approach based on Hashing Techniques for Reducing Time Consumption over a Cloud Network

Print
PDF
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Year of Publication: 2016
Authors:
Manreet Kaur, Jaspreet Singh
10.5120/ijca2016909783

Manreet Kaur and Jaspreet Singh. Data De-duplication Approach based on Hashing Techniques for Reducing Time Consumption over a Cloud Network. International Journal of Computer Applications 142(5):4-10, May 2016. BibTeX

@article{10.5120/ijca2016909783,
	author = {Manreet Kaur and Jaspreet Singh},
	title = {Data De-duplication Approach based on Hashing Techniques for Reducing Time Consumption over a Cloud Network},
	journal = {International Journal of Computer Applications},
	issue_date = {May 2016},
	volume = {142},
	number = {5},
	month = {May},
	year = {2016},
	issn = {0975-8887},
	pages = {4-10},
	numpages = {7},
	url = {http://www.ijcaonline.org/archives/volume142/number5/24890-2016909783},
	doi = {10.5120/ijca2016909783},
	publisher = {Foundation of Computer Science (FCS), NY, USA},
	address = {New York, USA}
}

Abstract

Data de-duplication is a developing and widely engaged method for recent storage systems. Cloud storage is an isolated storage service, where users can upload and transfer their data anytime and anywhere. However, it raises problems regarding privacy and data secrecy because all the data are stored in the cloud storage. This is a focus of concern for users, and it affects their disposition to use cloud storage services. On the other hand, a cloud storage server classically performs a particular data de-duplication to remove duplicate data because the storage space is not infinite. Data de-duplication, which makes it possible for data possessors to share a copy of the same data, can be achieved to reduce the hashing time, memory consumption and detection time and accuracy. This study proposes a novel de-duplication MD5, SHA-1 and SHA-2 Hybridization. Due to the above concerns, there is a research on data de-duplication. In this script, we propose a hashing data de-duplication mechanism which makes the cloud storage server be able to abolish duplicate improves the privacy protection.

References

  1. J. Harauz, L. M. Kaufman, and B. Potter, “Data security in the world of cloud computing,” IEEE Security and Privacy, vol. 7, no. 4, pp. 61–64, 2009.
  2. Q. He, Z. Li, and X. Zhang, “Data deduplication techniques,” in Proc. 2010 Int. Conf. on Future Information Technology and Management Engineering (FITME 2010), 2010, pp. 430–433.
  3. D. Harnik, B. Pinkas, and A. Shulman-Peleg, “Side channels in cloud services: Deduplication in cloud storage,” IEEE Security and Privacy, vol. 8, no. 6, pp. 40–47, 2010.
  4. C. Liu, D. Ju, Y. Gu, Y. Zhang, D. Wang, and D. Du, “Semantic data de-duplication for archival storage systems,” in Proc. 13th IEEE Asia-Pacific Computer Systems Architecture Conference (ACSAC 2008), 2008, pp. 1–9.
  5. Luo, Shengmei, et al. "Boafft: Distributed Deduplication for Big Data Storage in the Cloud."IEEE TRANSACTIONS ON CLOUD COMPUTING, VOL. 61, NO. 11, JANUARY 2015.
  6. Wang, Jibin, et al. "I-sieve: an inline high performance deduplication system used in cloud storage." Tsinghua Science and Technology 20.1 (2015): 17-27.
  7. N. S. A. (NSA), “Secure hash standard (SHS),” United States National Institute of Standards and Technology (NIST), vol. Federal Information Processing Standards Publication 180-4, March 2012, http://csrc.nist.gov/publications/fips/fips180-4/fips-180-4.pdf
  8. C. Wang, Z. Qin, J. Peng, and J. Wang, “A novel encryption scheme for data deduplication system,” in Proc. IEEE Int. Conf. on Communications, Circuits and Systems (ICCCAS 2010), 2010, pp. 265–269
  9. Saritha, K., and S. Subasree. "Analysis of hybrid cloud approach for private cloud in the de-duplication mechanism." Engineering and Technology (ICETECH), 2015 IEEE International Conference on.IEEE, 2015.
  10. Backialakshmi, N., and M. Manikandan. "Data de duplication using N0SQL Databases in Cloud." Soft-Computing and Networks Security (ICSNS), 2015 International Conference on.IEEE, 2015.
  11. Kaushik, Vandna Dixit, et al. "Certain Reduction Rules Useful for De-Duplication Algorithm of Indian Demographic Data." Advanced Computing & Communication Technologies (ACCT), 2014 Fourth International Conference on. IEEE, 2014.

Keywords

Data De-duplication, MD-5, SHA1 and Enhanced the SHA-2 Algorithm, Cloud computing and security.