CFP last date
20 March 2024
Reseach Article

Data De-duplication Approach based on Hashing Techniques for Reducing Time Consumption over a Cloud Network

by Manreet Kaur, Jaspreet Singh
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 142 - Number 5
Year of Publication: 2016
Authors: Manreet Kaur, Jaspreet Singh
10.5120/ijca2016909783

Manreet Kaur, Jaspreet Singh . Data De-duplication Approach based on Hashing Techniques for Reducing Time Consumption over a Cloud Network. International Journal of Computer Applications. 142, 5 ( May 2016), 4-10. DOI=10.5120/ijca2016909783

@article{ 10.5120/ijca2016909783,
author = { Manreet Kaur, Jaspreet Singh },
title = { Data De-duplication Approach based on Hashing Techniques for Reducing Time Consumption over a Cloud Network },
journal = { International Journal of Computer Applications },
issue_date = { May 2016 },
volume = { 142 },
number = { 5 },
month = { May },
year = { 2016 },
issn = { 0975-8887 },
pages = { 4-10 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume142/number5/24890-2016909783/ },
doi = { 10.5120/ijca2016909783 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:44:07.747525+05:30
%A Manreet Kaur
%A Jaspreet Singh
%T Data De-duplication Approach based on Hashing Techniques for Reducing Time Consumption over a Cloud Network
%J International Journal of Computer Applications
%@ 0975-8887
%V 142
%N 5
%P 4-10
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Data de-duplication is a developing and widely engaged method for recent storage systems. Cloud storage is an isolated storage service, where users can upload and transfer their data anytime and anywhere. However, it raises problems regarding privacy and data secrecy because all the data are stored in the cloud storage. This is a focus of concern for users, and it affects their disposition to use cloud storage services. On the other hand, a cloud storage server classically performs a particular data de-duplication to remove duplicate data because the storage space is not infinite. Data de-duplication, which makes it possible for data possessors to share a copy of the same data, can be achieved to reduce the hashing time, memory consumption and detection time and accuracy. This study proposes a novel de-duplication MD5, SHA-1 and SHA-2 Hybridization. Due to the above concerns, there is a research on data de-duplication. In this script, we propose a hashing data de-duplication mechanism which makes the cloud storage server be able to abolish duplicate improves the privacy protection.

References
  1. J. Harauz, L. M. Kaufman, and B. Potter, “Data security in the world of cloud computing,” IEEE Security and Privacy, vol. 7, no. 4, pp. 61–64, 2009.
  2. Q. He, Z. Li, and X. Zhang, “Data deduplication techniques,” in Proc. 2010 Int. Conf. on Future Information Technology and Management Engineering (FITME 2010), 2010, pp. 430–433.
  3. D. Harnik, B. Pinkas, and A. Shulman-Peleg, “Side channels in cloud services: Deduplication in cloud storage,” IEEE Security and Privacy, vol. 8, no. 6, pp. 40–47, 2010.
  4. C. Liu, D. Ju, Y. Gu, Y. Zhang, D. Wang, and D. Du, “Semantic data de-duplication for archival storage systems,” in Proc. 13th IEEE Asia-Pacific Computer Systems Architecture Conference (ACSAC 2008), 2008, pp. 1–9.
  5. Luo, Shengmei, et al. "Boafft: Distributed Deduplication for Big Data Storage in the Cloud."IEEE TRANSACTIONS ON CLOUD COMPUTING, VOL. 61, NO. 11, JANUARY 2015.
  6. Wang, Jibin, et al. "I-sieve: an inline high performance deduplication system used in cloud storage." Tsinghua Science and Technology 20.1 (2015): 17-27.
  7. N. S. A. (NSA), “Secure hash standard (SHS),” United States National Institute of Standards and Technology (NIST), vol. Federal Information Processing Standards Publication 180-4, March 2012, http://csrc.nist.gov/publications/fips/fips180-4/fips-180-4.pdf
  8. C. Wang, Z. Qin, J. Peng, and J. Wang, “A novel encryption scheme for data deduplication system,” in Proc. IEEE Int. Conf. on Communications, Circuits and Systems (ICCCAS 2010), 2010, pp. 265–269
  9. Saritha, K., and S. Subasree. "Analysis of hybrid cloud approach for private cloud in the de-duplication mechanism." Engineering and Technology (ICETECH), 2015 IEEE International Conference on.IEEE, 2015.
  10. Backialakshmi, N., and M. Manikandan. "Data de duplication using N0SQL Databases in Cloud." Soft-Computing and Networks Security (ICSNS), 2015 International Conference on.IEEE, 2015.
  11. Kaushik, Vandna Dixit, et al. "Certain Reduction Rules Useful for De-Duplication Algorithm of Indian Demographic Data." Advanced Computing & Communication Technologies (ACCT), 2014 Fourth International Conference on. IEEE, 2014.
Index Terms

Computer Science
Information Sciences

Keywords

Data De-duplication MD-5 SHA1 and Enhanced the SHA-2 Algorithm Cloud computing and security.