CFP last date
22 April 2024
Reseach Article

A Review over Cloud based Data Deduplication and Related Security Constraints

Published on December 2015 by Laxmikant Malphedwar, Seema V. Karale, Sagar A. Suvarnakar, Harshada Patil, Mitali Aher
National Conference on Advances in Computing
Foundation of Computer Science USA
NCAC2015 - Number 7
December 2015
Authors: Laxmikant Malphedwar, Seema V. Karale, Sagar A. Suvarnakar, Harshada Patil, Mitali Aher
86499258-0bbe-488c-b5cc-bf9c1aedc5cc

Laxmikant Malphedwar, Seema V. Karale, Sagar A. Suvarnakar, Harshada Patil, Mitali Aher . A Review over Cloud based Data Deduplication and Related Security Constraints. National Conference on Advances in Computing. NCAC2015, 7 (December 2015), 7-13.

@article{
author = { Laxmikant Malphedwar, Seema V. Karale, Sagar A. Suvarnakar, Harshada Patil, Mitali Aher },
title = { A Review over Cloud based Data Deduplication and Related Security Constraints },
journal = { National Conference on Advances in Computing },
issue_date = { December 2015 },
volume = { NCAC2015 },
number = { 7 },
month = { December },
year = { 2015 },
issn = 0975-8887,
pages = { 7-13 },
numpages = 7,
url = { /proceedings/ncac2015/number7/23402-5072/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 National Conference on Advances in Computing
%A Laxmikant Malphedwar
%A Seema V. Karale
%A Sagar A. Suvarnakar
%A Harshada Patil
%A Mitali Aher
%T A Review over Cloud based Data Deduplication and Related Security Constraints
%J National Conference on Advances in Computing
%@ 0975-8887
%V NCAC2015
%N 7
%P 7-13
%D 2015
%I International Journal of Computer Applications
Abstract

The information change and exchange is specifically or in a roundabout way used by the greater part of the persons. This information should be put away at secure remote area and this can be accomplished by utilizing cloud computing. While concealing stage and usage points of interest. Cloud computing is presently crucial for quick and Remote access of information conjointly some significant issues are likewise should be looked into. One discriminating test of cloud storage administrations is the administration of the steadily expanding volume of information. A usage of better cloud dependably needs a strong stage and foundation fulfillment. A critical issue over Cloud storage is Scalability which is testing in light of element handling in put away information by the client. To make data administration versatile in cloud computing, deduplication has been a surely understood procedure. Despite the fact that information deduplication brings a ton of advantages, security and protection concerns emerge as clients delicate information are defenseless to both inside and pariah assaults on the grounds that conventional encryption, while giving data classifiedness, is inconsistent with information deduplication likewise identical information duplicates of distinctive clients will prompt diverse cipher texts, making deduplication inconceivable. In information deduplication document level check can likewise disregarded with piece level confirmation however it is additionally includes extreme test of similarity. In this paper the most part concentrating on different difficulties over usage on cloud information for most proficient, solid, powerful and quick data access.

References
  1. P. Anderson and L. Zhang. Fast and secure laptop backups with encrypted de-duplication. In Proc. ofUSENIX LISA, 2010.
  2. Jin Li, Xiaofeng Chen, Xinyi Huang, Shaohua Tang and Yang Xiang, Mohammad Mehedi Hassan and AbdulhameedAlelaiwi Member, IEEE . 2015 "Secure Distributed Deduplication Systems with Improved Reliability. "
  3. J. Li, X. Chen, M. Li, J. Li, P. Lee, and W. Lou, "Secure deduplication with efficient and reliable convergent key management," in IEEE Transactions on Parallel and Distributed Systems, 2014, pp. vol. 25(6).
  4. Mr. S. Venkatraman, Dr. D. Srinath, Mr. C. Prasanth A Secure Authorized NLP Based Duplicate Check Scheme For Data Deduplication ISSN 2348 – 9928 IJAICT Volume 1, Issue 12, April 2015
  5. Yinjin Fu, Hong Jian, NongXiao,LeiTian "AA-Dedupe: An Application-Aware Source Deduplication Approach for Cloud Backup Services in the Personal Computing Environment" Cluster Computing (CLUSTER), 2011 IEEE International Conference
  6. Tharam Dillon, Chen Wu and Elizabeth Chang "Cloud Computing: Issues and Challenges" 2010 24th IEEE International Conference on Advanced Information Networking and Applications.
  7. Yujuan Tan; Hong Jiang; Dan Feng; Lei Tian; Zhichao Yan, "CABdedupe: A Causality-Based Deduplication Performance Booster for Cloud Backup Services," in Parallel & Distributed Processing Symposium (IPDPS), 2011 IEEE International , vol. , no. , pp. 1266-1277, 16-20 May 2011
  8. Iuon –Chang Lin, Po-chingChien ,"Data Deduplication Scheme for Cloud Storage" International Journal of Computer and Control(IJ3C),Vol1,No. 2(2012)
  9. TanupriyaChaudhari , Himanshushrivastav, VasudhaVashisht, "A Secure Decentralized Cloud Computing Environment over Peer to Peer",IJCSMC,April,2013
  10. T. Sivashakthi, Dr. N Prabakaran "A Survey on Storage Techniques in Cloud Computing"International Journal of Emerging Technology and Advanced Engineering, Volume 3, Issue 12, December 2013.
  11. Mr. S. Venkatraman, Dr. D. Srinath, Mr. C. Prasanth A Secure Authorized NLP Based Duplicate Check Scheme For Data Deduplication ISSN 2348 – 9928 IJAICT Volume 1, Issue 12, April 2015
  12. Min Fu, Dan Feng, Yu Hua, , Xubin He, Zuoning Chen, Jingning Liu, Wen Xia, Fangting Huang, and Qing Liu "Reducing Fragmentation for In-line Deduplication Backup Storage via Exploiting Backup Historyand Cache Knowledge. " IEEE Transactions Volume: PP 2015
  13. BogaVenkatesh,Anamika Sharma,Gaurav Desai,DadaramJadhavSecure Authorised Deduplication by Using Hybrid Cloud Approach in International Journal of Innovative Research in Advanced Engineering (IJIRAE)
  14. J. Stanek, A. Sorniotti, E. Androulaki, and L. Kencl. A secure data deduplication scheme for cloud storage. In Technical Report, 2013.
  15. A Hybrid Cloud Approach for Secure Authorized Deduplication Jin Li; Yan Kit Li; Xiaofeng Chen; Lee, P. P. C. ; Wenjing Lou Parallel and Distributed Systems, IEEE Transactions on Year: 2015, Volume: 26, Issue: 5
  16. RajashreeShivshankarWalunj, Deepali Anil Lande,NilamShrikrushnaPansare "Secured Authorized Deduplication Based Hybrid Cloud" The International Journal Of Engineering And Science (IJES) Volume 3
  17. S. Bugiel, S. Nurnberger, A. Sadeghi, and T. Schneider. Twinclouds: An architecture for secure cloud computing. In Workshopon Cryptography and Security in Clouds (WCSC 2011), 2011.
Index Terms

Computer Science
Information Sciences

Keywords

Cloud Computing Hybrid Cloud Deduplication Flecs Constraints Challenges And Solutions.