Open Access   Article Go Back

Survey on Enhancing Cloud Storage Using Deduplication Technique

A. Vijayakumar1 , A. Nisha Jebaseeli2

Section:Survey Paper, Product Type: Journal Paper
Volume-06 , Issue-02 , Page no. 169-171, Mar-2018

Online published on Mar 31, 2018

Copyright © A. Vijayakumar, A. Nisha Jebaseeli . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: A. Vijayakumar, A. Nisha Jebaseeli, “Survey on Enhancing Cloud Storage Using Deduplication Technique,” International Journal of Computer Sciences and Engineering, Vol.06, Issue.02, pp.169-171, 2018.

MLA Style Citation: A. Vijayakumar, A. Nisha Jebaseeli "Survey on Enhancing Cloud Storage Using Deduplication Technique." International Journal of Computer Sciences and Engineering 06.02 (2018): 169-171.

APA Style Citation: A. Vijayakumar, A. Nisha Jebaseeli, (2018). Survey on Enhancing Cloud Storage Using Deduplication Technique. International Journal of Computer Sciences and Engineering, 06(02), 169-171.

BibTex Style Citation:
@article{Vijayakumar_2018,
author = {A. Vijayakumar, A. Nisha Jebaseeli},
title = {Survey on Enhancing Cloud Storage Using Deduplication Technique},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {3 2018},
volume = {06},
Issue = {02},
month = {3},
year = {2018},
issn = {2347-2693},
pages = {169-171},
url = {https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=226},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=226
TI - Survey on Enhancing Cloud Storage Using Deduplication Technique
T2 - International Journal of Computer Sciences and Engineering
AU - A. Vijayakumar, A. Nisha Jebaseeli
PY - 2018
DA - 2018/03/31
PB - IJCSE, Indore, INDIA
SP - 169-171
IS - 02
VL - 06
SN - 2347-2693
ER -

           

Abstract

Today we are in a highly informative and digital era, comparatively large amount of data are generated simultaneously day to day. All these data must be stored for processing the result and for future references. As the availability of data increases, we have to invest more amounts in maintaining the storage devices. To meet the cost on storage devices and to enhance storage efficiency. It is mandatory use a creative technique to store maximum data within the available storage devices. This can be achieved by data deduplication method. It eliminates redundant copies of data in order to minimize the storage requirement and achieves cost efficiency on storage devices. This paper will analyze various deduplication methods and give an ample survey.

Key-Words / Index Term

Keywords— Deduplication, genetic algorithm, Hash algorithm, bandwidth, chunking, compression, Jenkins hash function, file similarity

References

[1] Young Chan Moon1, Ho Min Jung1, Chuck Yoo2, and Young Woong Ko1 “Data Deduplication Using Dynamic Chunking Algorithm”, Springer ICCI 2012.
[2] RavikanthM*1,Dr.D.Vasumathi*2, B.Mallikarjuna Reddy*3, ”Enhanced Duplicate Detection Using Genetic Algorithm With Particle Swarm Optimization”, IJCSIET— International Journal of Computer Science information and Engg., Technologies ISSN 2277- 4408
[3] R.Supriya1, K. Sathyaseelan2,” Secure Deduplication Using Jenkins Hash Function” Ncraccess -2015.
[4] Sunita Sarawagi, Anuradha Bhamidipaty,” Interactive Deduplication using Active Learning”
[5] Amanpreet Kaur, 2Sonia Sharma “An Efficient Framework and Techniques of Data Deduplication in Cloud Computing ”, IJCST Vol. 8, Iss ue 2, April - June 2017.
[6] Lalitha. L1, Maheswari.B2,Dr.Karthik.S3, “A Detailed Survey on Various Record Deduplication Methods”, International Journal of Advanced Research in Computer Engineering & Technology (IJARCET)Volume 1, Issue 8, October 2012
[7] R.Supriya1, K. Sathyaseelan2,” Secure Deduplication Using Jenkins Hash Function” Ncraccess -2015.
[8] Amanpreet Kaur, 2Sonia Sharma “An Efficient Framework and Techniques of Data Deduplication in Cloud Computing ”, IJCST Vol. 8, Iss ue 2, April - June 2017.
[9] Lalitha. L1, Maheswari.B2,Dr.Karthik.S3, “A Detailed Survey on Various Record Deduplication Methods”, International Journal of Advanced Research in Computer Engineering & Technology (IJARCET)Volume 1, Issue 8, October 2012.
[10] Poonam R. Wagh, Amol D. Potgantwar, "Providing Security to Data Stored on HDFS Using Security Protocol", International Journal of Scientific Research in Network Security and Communication, Vol.5, Issue.4, pp.20-25, 2017.