Call for Paper - August 2019 Edition
IJCA solicits original research papers for the August 2019 Edition. Last date of manuscript submission is July 20, 2019. Read More

Analysis of De-duplication Methods in Cloud Computing

Print
PDF
IJCA Proceedings on International Conference on Advances in Science and Technology
© 2015 by IJCA Journal
ICAST 2014 - Number 4
Year of Publication: 2015
Authors:
Preetika Singh
Meenakshi Sharma
Deepika Singh

Preetika Singh, Meenakshi Sharma and Deepika Singh. Article: Analysis of De-duplication Methods in Cloud Computing. IJCA Proceedings on International Conference on Advances in Science and Technology ICAST 2014(4):19-21, February 2015. Full text available. BibTeX

@article{key:article,
	author = {Preetika Singh and Meenakshi Sharma and Deepika Singh},
	title = {Article: Analysis of De-duplication Methods in Cloud Computing},
	journal = {IJCA Proceedings on International Conference on Advances in Science and Technology},
	year = {2015},
	volume = {ICAST 2014},
	number = {4},
	pages = {19-21},
	month = {February},
	note = {Full text available}
}

Abstract

Cloud computing has helped in minimizing the need for extra storage at the user's premises. De-duplication has largely contributed to the emergence of cloud computing as an efficient storage medium at small as well as large scale. However, De-duplication has invited serious concerns related to security as well as speed of access. Considering the amount of storage efficiency increased due to this method it becomes undesirable to avoid its use. This paper studies the emergence of these concerns and discusses the solutions proposed. Further the loopholes of solutions proposed and the future work that can be done in this aspect is studied.

References

  • D. Russell, "Data De-duplication Will Be Even Bigger in 2010", Gartner, February 2010.
  • M. Dutch. Understanding data De-duplication ratios. White paper, June 2008.
  • D. Harnik, B. Pinkas, and A. Shulman-Peleg. Side Channels in Cloud Services. De-duplication in Cloud Storage. IEEE Security & Privacy, 8(6), Nov. 2010.
  • Sun, Z. , Shen, J. & Yong, J. (2013). A novel approach to data De-duplication over the engineering-oriented cloud systems. Integrated Computer Aided Engineering, 20 (1), 45-57.
  • Mkandawire, Stephen, "Improving Backup and Restore Performance for De-duplication-based Cloud Backup Services" (2012). Computer science and Engineering: Theses, Dissertations, and Student Research. Paper 39.
  • A. Muthitacharoen, B. Chen, and D. Mazieres, "A low-bandwidth network file system," in Symposium on Operating Systems Principles, 2001, pp. 174–187. [Online]. Available: http://citeseer. ist. psu. edu/muthitacharoen01lowbandwidth. html
  • S. Quinlan and S. Dorward, "Venti: a new approach to archival storage," in First USENIX conference on File and Storage Technologies, Monterey,CA, 2002. [Online]. Available: http://citeseerx. ist. psu. edu/viewdoc/summary?doi=10. 1. 1. 18. 8085
  • D. Meister and A. Brinkmann. dedupv1: Improving De-duplication throughput using solid state drives (SSD). In IEEE 26th Symposium on Mass Storage Systems and Technologies (MSST), pages 1-6, 2010.
  • D. Bhagwat, K. Eshghi, D. D. E. Long, and M. Lillibridge. Extreme Binning: Scalable, parallel De-duplication for chunk-based file backup. In IEEE International Symposium on Modelling, Analysis & Simulation of Computer and Telecommunication Systems (MASCOTS), 2009.
  • Burton H. Bloom. Space/time trade-offs in hash coding with allowable errors. Communications of the ACM, 13(7):422–426, 1970.
  • S. Halevi, D. Harnik, B. Pinkas, and A. Shulman-Peleg, "Proofs of ownership in remote storage systems," in Proc. of CCS'11, 2011.