Combination Methodology For Protected Formal Deduplication In Cloud Computing

Joykumar S, chandra bushana rao k

Abstract


Data Deduplication is an significant method in favour get rid of redundant data as an alternative of captivating  files, it provisions merely distinct copy of file. Among the entire organizations many organizations, storage schema enclose more pieces of duplicate data. . For example, Different users stores similar files in several different places. Deduplication abolish these additional copies by saving as single copy of data and reinstate the other copies along with pointers that flipside to the original copy. It be the data compression technique for to increase the bandwidth efficiency and storage exploitation. Data Deduplication is enormously using  in cloud computing now a days. It formulate data management scalable and storage setback in cloud computing. Data Deduplication defend the confidentiality of sensitive information. It  works with convergent encryption technique to encrypt the data before

 

uploading. . Companies regularly use Deduplication in backup and calamity recovery applications. In this paper we attempt the authorized Deduplication check, merge with convergent encryption to afford security for sensitive data with hybrid cloud computing.


Keywords


Deduplication, authorized duplicate check, confidentiality

Full Text: PDF[FULL TEXT]

Refbacks

  • There are currently no refbacks.


Copyright © 2013, All rights reserved.| ijseat.com

Creative Commons License
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.