A Review: Various Data De-Duplication Techniques to reduce memory consumption over Cloud Storage
Faheem Ahmad Reegu1
Section:Review Paper, Product Type: Journal Paper
Volume-4 ,
Issue-8 , Page no. 111-116, Aug-2016
Online published on Aug 31, 2016
Copyright © Faheem Ahmad Reegu . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: Faheem Ahmad Reegu, “A Review: Various Data De-Duplication Techniques to reduce memory consumption over Cloud Storage,” International Journal of Computer Sciences and Engineering, Vol.4, Issue.8, pp.111-116, 2016.
MLA Style Citation: Faheem Ahmad Reegu "A Review: Various Data De-Duplication Techniques to reduce memory consumption over Cloud Storage." International Journal of Computer Sciences and Engineering 4.8 (2016): 111-116.
APA Style Citation: Faheem Ahmad Reegu, (2016). A Review: Various Data De-Duplication Techniques to reduce memory consumption over Cloud Storage. International Journal of Computer Sciences and Engineering, 4(8), 111-116.
BibTex Style Citation:
@article{Reegu_2016,
author = {Faheem Ahmad Reegu},
title = {A Review: Various Data De-Duplication Techniques to reduce memory consumption over Cloud Storage},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {8 2016},
volume = {4},
Issue = {8},
month = {8},
year = {2016},
issn = {2347-2693},
pages = {111-116},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=1046},
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=1046
TI - A Review: Various Data De-Duplication Techniques to reduce memory consumption over Cloud Storage
T2 - International Journal of Computer Sciences and Engineering
AU - Faheem Ahmad Reegu
PY - 2016
DA - 2016/08/31
PB - IJCSE, Indore, INDIA
SP - 111-116
IS - 8
VL - 4
SN - 2347-2693
ER -
VIEWS | XML | |
1779 | 1419 downloads | 1385 downloads |
Abstract
The growth amount of data, it has converted an important problem to minimize the storing space that form information conquers and the bandwidth ingestion through system broadcast. To attain advanced de-duplication elimination proportion, the out-dated way is to extend the variety of information for data de-duplication, but that would make meta-data areas larger and increase the several of meta-data objects. When identifying the redundant information meta-data needs to continuously introduced and transferred into the recollection and access block will be process. Data de-duplication is most significant methods for removing identical copies of frequent records. It has been mostly used in cloud storing to minimize the quantity of storing space. To defend the confidential approved identical check is used. Dissimilar from the out-dated duplicate scheme, dissimilar rights of consumer are measured also the records itself. We study this approved duplicate check in mixture cloud architecture. The crossbreed architecture suggests about together the Private and Public Cloud. The private cloud plays a significant role in this system, moreover the security of this system is less and the private cloud of this apparatus is not secure, unofficial data subsequent in fail in security. Basically, it provides more safety, the isolated cloud is providing with multilevel verification. We have showed that our system is providing privacy to data and more secure. This paper, brief study of existing scheme has been described along with the construction and algorithms.
Key-Words / Index Term
Data De-duplication, Hybrid Cloud,Private and Public Cloud,Secure Data Architecture and Algorithms
References
[1] Kaushik, Vandna Dixit, Amit Bendale, Aditya Nigam, and Phalguni Gupta. "Certain Reduction Rules Useful for De-Duplication Algorithm of Indian Demographic Data." In 2014 Fourth International Conference on Advanced Computing & Communication Technologies, pp. 79-84. IEEE, 2014.
[2] Li, Min, Shravan Gaonkar, Ali R. Butt, Deepak Kenchammana, and Kaladhar Voruganti. "Cooperative storage-level de-duplication for I/O reduction in virtualized data centers." In 2012 IEEE 20th International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems, pp. 209-218. IEEE, 2012.
[3] Backialakshmi, N., and M. Manikandan. "Data de duplication using N0SQL Databases in Cloud." In Soft-Computing and Networks Security (ICSNS), 2015 International Conference on, pp. 1-4. IEEE, 2015.
[4] Nagarajaiah, Harsha, Shambhu Upadhyaya, and Vinodh Gopal. "Data De-duplication and Event Processing for Security Applications on an Embedded Processor." In Reliable Distributed Systems (SRDS), 2012 IEEE 31st Symposium on, pp. 418-423. IEEE, 2012.
[5] Saritha, K., and S. Subasree. "Analysis of hybrid cloud approach for private cloud in the de-duplication mechanism." In Engineering and Technology (ICETECH), 2015 IEEE International Conference on, pp. 1-3. IEEE, 2015.
[6] VasiliosAndrikopoulos, Zhe Song, Frank Leymann, “Supporting the Migration of Applications to the Cloud through a Decision Support Systemâ€, Institute of Architecture of Application Systems, IEEE, pp. 565-672, 2013.
[7] Haitao Li, LiliZhong, Jiangchuan Li, , Bo Li, KeXu, “ Cost-effective Partial Migration of VoD Services toContent Cloudsâ€, 2011 IEEE 4th International Conference on Cloud Computing, pp. 203-110, 2011.
[8] C. Ward, N. Aravamudan, K. Bhattacharya, K. Cheng, R. Filepp, R. Kearney, B. Peterson, L. Shwartz, C. C. Young, “Workload Migration into Clouds – Challenges, Experiences, Opportunitiesâ€, 2010 IEEE 3rd International Conference on Cloud Computing, pp. 164-171, 2010.
[9] Kangkang Li, HuanyangZheng, & JieWu . “Migration-based Virtual Machine Placement in Cloud Systemsâ€, 2013 IEEE 2nd International Conference on Cloud Networking (CloudNet, IEEE, pp. 83-90, 2013.
[10] Andoni, Alexandr, and Piotr Indyk. "Near-optimal hashing algorithms for approximate nearest neighbor in high dimensions." In 2006 47th Annual IEEE Symposium on Foundations of Computer Science (FOCS06), pp. 459-468. IEEE, 2006.
[11] Venkatesan, Ramarathnam, S-M. Koon, Mariusz H. Jakubowski, and Pierre Moulin. "Robust image hashing." In Image Processing, 2000. Proceedings. 2000 International Conference on, vol. 3, pp. 664-666. IEEE, 2000.
[12] Swaminathan, Ashwin, Yinian Mao, and Min Wu. "Robust and secure image hashing." IEEE Transactions on Information Forensics and Security 1, no. 2 (2006): 215-230.
[13] Sengar, Seetendra Singh, and Manoj Mishra. "E-DAID: an efficient distributed architecture for in-line data de-duplication." In Communication Systems and Network Technologies (CSNT), 2012 International Conference on, pp. 438-442. IEEE, 2012.
[14] Rivest, Ronald L. "The RC5 encryption algorithm." In International Workshop on Fast Software Encryption, pp. 86-96. Springer Berlin Heidelberg, 1994.
[15] Barrett, Paul. "Implementing the Rivest Shamir and Adleman public key encryption algorithm on a standard digital signal processor." In Conference on the Theory and Application of Cryptographic Techniques, pp. 311-323. Springer Berlin Heidelberg, 1986.