Notification: Our email services are now fully restored after a brief, temporary outage caused by a denial-of-service (DoS) attack. If you sent an email on Dec 6 and haven't received a response, please resend your email.
CFP last date
20 December 2024
Reseach Article

Security of Various Data De- Duplication Approaches

by Divya Jain, Vivek Sharma
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 151 - Number 11
Year of Publication: 2016
Authors: Divya Jain, Vivek Sharma
10.5120/ijca2016911691

Divya Jain, Vivek Sharma . Security of Various Data De- Duplication Approaches. International Journal of Computer Applications. 151, 11 ( Oct 2016), 34-37. DOI=10.5120/ijca2016911691

@article{ 10.5120/ijca2016911691,
author = { Divya Jain, Vivek Sharma },
title = { Security of Various Data De- Duplication Approaches },
journal = { International Journal of Computer Applications },
issue_date = { Oct 2016 },
volume = { 151 },
number = { 11 },
month = { Oct },
year = { 2016 },
issn = { 0975-8887 },
pages = { 34-37 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume151/number11/26357-2016911691/ },
doi = { 10.5120/ijca2016911691 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:56:52.121883+05:30
%A Divya Jain
%A Vivek Sharma
%T Security of Various Data De- Duplication Approaches
%J International Journal of Computer Applications
%@ 0975-8887
%V 151
%N 11
%P 34-37
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In this paper, the cloud computing has develop into more and more admired. It brings revolutionary innovation with regards to cost, reserve organization and utilization. Cloud computing offer nearly unlimited resources, highly reliable on-demand services with minimal infrastructure and operational cost and storage system. In the cloud storage system with data de-duplication, un-trusted entities including a cloud server and users may cause security threats to the storage system. These services offers to end-users rather than a product by sharing resources, software and information, hence economic benefit and data de-duplication is the key for Cloud terms of capital and operational expenditure.

References
  1. M. Armbrust, A. Fox, R. Griffith, A. Joseph, R. Katz, A. Konwinski, G. Lee, D. Patterson, A. Rabkin, I. Stoica, et al., “Above the clouds: A berkeley view of cloud computing," Technical Report UCB/EECS-2009-28, Dept. EECS, UC Berkerely, 2009.
  2. B. Narasimhan and R. Nichols, “State of cloud applications and platforms: The cloud adopters’ view,” Computer, vol. 44, no. 3, pp. 24–28, 2011.
  3. Pearson, S., & Benameur, A. Privacy, security and trust issues arising from cloud computing. In Cloud Computing Technology and Science (CloudCom), 2010 IEEE Second International Conference on (pp. 693-702).
  4. Tweney, A., & Crane, S. (2007). Trustguide2: An exploration of privacy preferences in an online world. Expanding the Knowledge Economy: Issues, Applications, Case Studies.
  5. Meyer, D. T., and Bolosky, W. J. A study of practical deduplication. ACM Transactions on Storage (TOS), 2012.
  6. Jin Li, Yan Kit Li, Xiaofeng Chen, Patrick P. C. Lee, Wenjing Lou, “A Hybrid Cloud Approach for Secure Authorized Deduplication”, IEEE Transactions on Parallel and Distributed Systems, 2014.
  7. N.B. Kadu, Mr. Amit Tickoo, Mr.Saurabh I. Patil, Mr. Nilesh B. Bhagat , Mr. Ganesh B. Divte, “A Hybrid Cloud Approach for Secure Authorized Deduplication” International Journal of Scientific and Research Publications, Volume 5, Issue 4, April 2015.
  8. Gade Swati,Prof.Prashant Kumbharkar, “Cryptosystem For Secure Data Sharing In Cloud Storage” IJIRT Volume 1 Issue 6 2014.
  9. Lukas Malina and Jan Hajny, “Efficient Security Solution for Privacy-Preserving Cloud Services” 6th International Conference On Telecommunications Signal Processing Year 2013.
  10. Pardeep Kumar, Vivek Kumar Sehgal, Durg Singh Chauhan, P. K. Gupta and Manoj Diwakar, “Effective Ways of Secure, Private and Trusted Cloud Computing “JCSI International Journal of Computer Science Issues, Vol. 8, Issue 3, No. 2, May 2011.
  11. Wee Keong Ng, Yonggang Wen, Huafei Zhu, “Private Data De-duplication Protocols in Cloud Storage” ACM 978-1-4503-0857-1/12/03, 2011.
  12. Sharma Bharat, Mandre B.R. “A Secured and Authorized Data Deduplication in Hybrid Cloud with Public Auditing” International Journal of Computer Applications (0975 – 8887) Volume 120 – No.16, June 2015
Index Terms

Computer Science
Information Sciences

Keywords

Cloud Computing Data De-duplication style styling insert.