Title: Security Based Deduplication with Efficient and Reliable Data Storage

Author(s): J.Sreejith, A. Jeno Kalaiselvi Sathya


(MCA, PSN College &Technology, Tirunelveli, Tamilnadu-627152, India)    

Email ID: This email address is being protected from spambots. You need JavaScript enabled to view it.  

(Assistant professor, PSN College &Technology, Tirunelveli, Tamilnadu-627152, India)

Email ID: This email address is being protected from spambots. You need JavaScript enabled to view it.  

             


Abstract

Data is a set of values of quantitative variable information. Data deduplication means that the data compression technique for eliminating duplicate copies of repeating data. In the deduplication process, unique types of data, or byte patterns or images, which are identified and stored during a process of analysis Data deduplication is increasingly accepted as a technique to reduce storage costs. In cloud computing system the data deduplication acts as a special role. The Cloud computing is a type of Internet-based computing, that provides shared computer processing that means data to computers and other devices on demand. The example of cloud services are computer networks, servers, storage, applications and in these most commonly using cloud service is data storage. The data are often stored in cloud in an encrypted form. One application of cryptographic splitting is to provide security for cloud computing. However encrypted data introduce new problems arise in cloud data deduplication, which is big data storage and processing. Existing system suffer from security weakness. They cannot flexibly support data access control and revocation. The cloud-based storage example such as Drop box, Google Drive, and Mozy can save on storage costs via deduplication. We make a data will be secure using a user key before he store in to the cloud. But common encryption modes are randomized. People upload personal or confidential data to the data center of a Cloud Service Provider (CSP) but it is do not give fully secure for the data because the data holders may not be always online or available for such a management, which could cause storage delay. And also create the Dekey is secure in terms of the definitions specified in the proposed security model


License: This work is licensed under a Creative Commons Attribution 4.0 International License.

 

Website: http://www.ijecs.in

e-ISSN:  2319-724

Call For Paper

VOLUME 06. ISSUE 04 [April 2017]

IJECS invites authors to submit manuscripts Reporting original engineering research, computer science , original article, research article, case report, systematic reviews, or educational Innovations for publication for the Current issues. Types of manuscripts suitable for IJECS include: Engineering Science, Computer Science, Educational Innovation, Brief Report, Reviews on Teaching In keeping with high quality scholarship

Read More

Online Submission

If any difficulty you can also submit to: This email address is being protected from spambots. You need JavaScript enabled to view it..in

ace.pngarx.pngcit.pngcomp.pngcross.pngdoaj.pngicn.pngino.pngres.pngresbib.pngsci.pngscic.pngscics.pngulrich.pngur.png

FaceBook

About Us

The“International Journal of Engineering  and computer science”(IJECS™) is an international online journal in English published monthly. The aim of IJECS is to publish peer reviewed research and review articles in rapidly developing field of engineering science and technology

Address

Address : 20 manglam vihar Mandsaur

State : Madhya Pradesh

Country : INDIA

Phone :+91 (777) 189 36 00

Email: editor@ijecs.in

Go to top