Call for Paper - May 2019 Edition
IJCA solicits original research papers for the May 2019 Edition. Last date of manuscript submission is April 20, 2019. Read More

A Review over Cloud based Data Deduplication and Related Security Constraints

Print
PDF
IJCA Proceedings on National Conference on Advances in Computing
© 2015 by IJCA Journal
NCAC 2015 - Number 7
Year of Publication: 2015
Authors:
Laxmikant Malphedwar
Seema V. Karale
Sagar A. Suvarnakar
Harshada Patil
Mitali Aher

Laxmikant Malphedwar, Seema V Karale, Sagar A Suvarnakar, Harshada Patil and Mitali Aher. Article: A Review over Cloud based Data Deduplication and Related Security Constraints. IJCA Proceedings on National Conference on Advances in Computing NCAC 2015(7):7-13, December 2015. Full text available. BibTeX

@article{key:article,
	author = {Laxmikant Malphedwar and Seema V. Karale and Sagar A. Suvarnakar and Harshada Patil and Mitali Aher},
	title = {Article: A Review over Cloud based Data Deduplication and Related Security Constraints},
	journal = {IJCA Proceedings on National Conference on Advances in Computing},
	year = {2015},
	volume = {NCAC 2015},
	number = {7},
	pages = {7-13},
	month = {December},
	note = {Full text available}
}

Abstract

The information change and exchange is specifically or in a roundabout way used by the greater part of the persons. This information should be put away at secure remote area and this can be accomplished by utilizing cloud computing. While concealing stage and usage points of interest. Cloud computing is presently crucial for quick and Remote access of information conjointly some significant issues are likewise should be looked into. One discriminating test of cloud storage administrations is the administration of the steadily expanding volume of information. A usage of better cloud dependably needs a strong stage and foundation fulfillment. A critical issue over Cloud storage is Scalability which is testing in light of element handling in put away information by the client. To make data administration versatile in cloud computing, deduplication has been a surely understood procedure. Despite the fact that information deduplication brings a ton of advantages, security and protection concerns emerge as clients delicate information are defenseless to both inside and pariah assaults on the grounds that conventional encryption, while giving data classifiedness, is inconsistent with information deduplication likewise identical information duplicates of distinctive clients will prompt diverse cipher texts, making deduplication inconceivable. In information deduplication document level check can likewise disregarded with piece level confirmation however it is additionally includes extreme test of similarity. In this paper the most part concentrating on different difficulties over usage on cloud information for most proficient, solid, powerful and quick data access.

References

  • P. Anderson and L. Zhang. Fast and secure laptop backups with encrypted de-duplication. In Proc. ofUSENIX LISA, 2010.
  • Jin Li, Xiaofeng Chen, Xinyi Huang, Shaohua Tang and Yang Xiang, Mohammad Mehedi Hassan and AbdulhameedAlelaiwi Member, IEEE . 2015 "Secure Distributed Deduplication Systems with Improved Reliability. "
  • J. Li, X. Chen, M. Li, J. Li, P. Lee, and W. Lou, "Secure deduplication with efficient and reliable convergent key management," in IEEE Transactions on Parallel and Distributed Systems, 2014, pp. vol. 25(6).
  • Mr. S. Venkatraman, Dr. D. Srinath, Mr. C. Prasanth A Secure Authorized NLP Based Duplicate Check Scheme For Data Deduplication ISSN 2348 – 9928 IJAICT Volume 1, Issue 12, April 2015
  • Yinjin Fu, Hong Jian, NongXiao,LeiTian "AA-Dedupe: An Application-Aware Source Deduplication Approach for Cloud Backup Services in the Personal Computing Environment" Cluster Computing (CLUSTER), 2011 IEEE International Conference
  • Tharam Dillon, Chen Wu and Elizabeth Chang "Cloud Computing: Issues and Challenges" 2010 24th IEEE International Conference on Advanced Information Networking and Applications.
  • Yujuan Tan; Hong Jiang; Dan Feng; Lei Tian; Zhichao Yan, "CABdedupe: A Causality-Based Deduplication Performance Booster for Cloud Backup Services," in Parallel & Distributed Processing Symposium (IPDPS), 2011 IEEE International , vol. , no. , pp. 1266-1277, 16-20 May 2011
  • Iuon –Chang Lin, Po-chingChien ,"Data Deduplication Scheme for Cloud Storage" International Journal of Computer and Control(IJ3C),Vol1,No. 2(2012)
  • TanupriyaChaudhari , Himanshushrivastav, VasudhaVashisht, "A Secure Decentralized Cloud Computing Environment over Peer to Peer",IJCSMC,April,2013
  • T. Sivashakthi, Dr. N Prabakaran "A Survey on Storage Techniques in Cloud Computing"International Journal of Emerging Technology and Advanced Engineering, Volume 3, Issue 12, December 2013.
  • Mr. S. Venkatraman, Dr. D. Srinath, Mr. C. Prasanth A Secure Authorized NLP Based Duplicate Check Scheme For Data Deduplication ISSN 2348 – 9928 IJAICT Volume 1, Issue 12, April 2015
  • Min Fu, Dan Feng, Yu Hua, , Xubin He, Zuoning Chen, Jingning Liu, Wen Xia, Fangting Huang, and Qing Liu "Reducing Fragmentation for In-line Deduplication Backup Storage via Exploiting Backup Historyand Cache Knowledge. " IEEE Transactions Volume: PP 2015
  • BogaVenkatesh,Anamika Sharma,Gaurav Desai,DadaramJadhavSecure Authorised Deduplication by Using Hybrid Cloud Approach in International Journal of Innovative Research in Advanced Engineering (IJIRAE)
  • J. Stanek, A. Sorniotti, E. Androulaki, and L. Kencl. A secure data deduplication scheme for cloud storage. In Technical Report, 2013.
  • A Hybrid Cloud Approach for Secure Authorized Deduplication Jin Li; Yan Kit Li; Xiaofeng Chen; Lee, P. P. C. ; Wenjing Lou Parallel and Distributed Systems, IEEE Transactions on Year: 2015, Volume: 26, Issue: 5
  • RajashreeShivshankarWalunj, Deepali Anil Lande,NilamShrikrushnaPansare "Secured Authorized Deduplication Based Hybrid Cloud" The International Journal Of Engineering And Science (IJES) Volume 3
  • S. Bugiel, S. Nurnberger, A. Sadeghi, and T. Schneider. Twinclouds: An architecture for secure cloud computing. In Workshopon Cryptography and Security in Clouds (WCSC 2011), 2011.