Cloud Storage Data Deduplication with Encryption

Cloud storage is a remote storage service, where users can upload and download their data anytime and anywhere. Data duplication, data leakage, space consumption are the main issues of cloud storage. During the time of uploading data is converted into binary data, using AES algorithm cipher text is...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:International journal of advanced research in computer science 2017-01, Vol.8 (1)
Hauptverfasser: Aruna, A S, Deepthi, K
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue 1
container_start_page
container_title International journal of advanced research in computer science
container_volume 8
creator Aruna, A S
Deepthi, K
description Cloud storage is a remote storage service, where users can upload and download their data anytime and anywhere. Data duplication, data leakage, space consumption are the main issues of cloud storage. During the time of uploading data is converted into binary data, using AES algorithm cipher text is formed it is stored in cloud .Using MD5 algorithm we create a hash value and it is stored in hash table. Parallel to this plagiarism is running, it involves content checking. From the different methods of plagiarism, syntactic based method is used here. Syntactic-based methods do not consider the meaning of words, phrases, or sentence. Content checking is performed to eliminate duplicate cipher text, here a threshold value is set, if contents similarity is smaller than threshold value user opinion is asked to upload the data. Here data compression is performed at the time of uploading data to cloud and this is done to reduce the amount of storage space. The plagiarism and compression techniques avoids the unwanted usage of memory. This method provides better security for data. User can download data as needed.
format Article
fullrecord <record><control><sourceid>proquest</sourceid><recordid>TN_cdi_proquest_journals_1901446086</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>1901446086</sourcerecordid><originalsourceid>FETCH-proquest_journals_19014460863</originalsourceid><addsrcrecordid>eNpjYuA0sDQ30zU1szTnYOAtLs4yAAJjS0szEwNOBgPnnPzSFIXgkvyixPRUBZfEkkQFl9SU0oKczOTEksz8PIXyzJIMBde85KLKAhCfh4E1LTGnOJUXSnMzKLu5hjh76BYU5ReWphaXxGfllxblAaXiDS0NDE1MzAwszIyJUwUAb40zLg</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1901446086</pqid></control><display><type>article</type><title>Cloud Storage Data Deduplication with Encryption</title><source>Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals</source><creator>Aruna, A S ; Deepthi, K</creator><creatorcontrib>Aruna, A S ; Deepthi, K</creatorcontrib><description>Cloud storage is a remote storage service, where users can upload and download their data anytime and anywhere. Data duplication, data leakage, space consumption are the main issues of cloud storage. During the time of uploading data is converted into binary data, using AES algorithm cipher text is formed it is stored in cloud .Using MD5 algorithm we create a hash value and it is stored in hash table. Parallel to this plagiarism is running, it involves content checking. From the different methods of plagiarism, syntactic based method is used here. Syntactic-based methods do not consider the meaning of words, phrases, or sentence. Content checking is performed to eliminate duplicate cipher text, here a threshold value is set, if contents similarity is smaller than threshold value user opinion is asked to upload the data. Here data compression is performed at the time of uploading data to cloud and this is done to reduce the amount of storage space. The plagiarism and compression techniques avoids the unwanted usage of memory. This method provides better security for data. User can download data as needed.</description><identifier>EISSN: 0976-5697</identifier><language>eng</language><publisher>Udaipur: International Journal of Advanced Research in Computer Science</publisher><subject>Binary data ; Cloud computing ; Consumption ; Cybersecurity ; Data compression ; Data storage ; Downloading ; Encryption ; Hash based algorithms ; Leakage ; Reproduction (copying) ; Similarity</subject><ispartof>International journal of advanced research in computer science, 2017-01, Vol.8 (1)</ispartof><rights>Copyright International Journal of Advanced Research in Computer Science Jan 2017</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,776,780</link.rule.ids></links><search><creatorcontrib>Aruna, A S</creatorcontrib><creatorcontrib>Deepthi, K</creatorcontrib><title>Cloud Storage Data Deduplication with Encryption</title><title>International journal of advanced research in computer science</title><description>Cloud storage is a remote storage service, where users can upload and download their data anytime and anywhere. Data duplication, data leakage, space consumption are the main issues of cloud storage. During the time of uploading data is converted into binary data, using AES algorithm cipher text is formed it is stored in cloud .Using MD5 algorithm we create a hash value and it is stored in hash table. Parallel to this plagiarism is running, it involves content checking. From the different methods of plagiarism, syntactic based method is used here. Syntactic-based methods do not consider the meaning of words, phrases, or sentence. Content checking is performed to eliminate duplicate cipher text, here a threshold value is set, if contents similarity is smaller than threshold value user opinion is asked to upload the data. Here data compression is performed at the time of uploading data to cloud and this is done to reduce the amount of storage space. The plagiarism and compression techniques avoids the unwanted usage of memory. This method provides better security for data. User can download data as needed.</description><subject>Binary data</subject><subject>Cloud computing</subject><subject>Consumption</subject><subject>Cybersecurity</subject><subject>Data compression</subject><subject>Data storage</subject><subject>Downloading</subject><subject>Encryption</subject><subject>Hash based algorithms</subject><subject>Leakage</subject><subject>Reproduction (copying)</subject><subject>Similarity</subject><issn>0976-5697</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2017</creationdate><recordtype>article</recordtype><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><sourceid>GNUQQ</sourceid><recordid>eNpjYuA0sDQ30zU1szTnYOAtLs4yAAJjS0szEwNOBgPnnPzSFIXgkvyixPRUBZfEkkQFl9SU0oKczOTEksz8PIXyzJIMBde85KLKAhCfh4E1LTGnOJUXSnMzKLu5hjh76BYU5ReWphaXxGfllxblAaXiDS0NDE1MzAwszIyJUwUAb40zLg</recordid><startdate>20170101</startdate><enddate>20170101</enddate><creator>Aruna, A S</creator><creator>Deepthi, K</creator><general>International Journal of Advanced Research in Computer Science</general><scope>3V.</scope><scope>7SC</scope><scope>7XB</scope><scope>8AL</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>8FK</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>M0N</scope><scope>P5Z</scope><scope>P62</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>Q9U</scope></search><sort><creationdate>20170101</creationdate><title>Cloud Storage Data Deduplication with Encryption</title><author>Aruna, A S ; Deepthi, K</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-proquest_journals_19014460863</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2017</creationdate><topic>Binary data</topic><topic>Cloud computing</topic><topic>Consumption</topic><topic>Cybersecurity</topic><topic>Data compression</topic><topic>Data storage</topic><topic>Downloading</topic><topic>Encryption</topic><topic>Hash based algorithms</topic><topic>Leakage</topic><topic>Reproduction (copying)</topic><topic>Similarity</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Aruna, A S</creatorcontrib><creatorcontrib>Deepthi, K</creatorcontrib><collection>ProQuest Central (Corporate)</collection><collection>Computer and Information Systems Abstracts</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>Computing Database (Alumni Edition)</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>Computing Database</collection><collection>Advanced Technologies &amp; Aerospace Database</collection><collection>ProQuest Advanced Technologies &amp; Aerospace Collection</collection><collection>Publicly Available Content Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>ProQuest Central Basic</collection><jtitle>International journal of advanced research in computer science</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Aruna, A S</au><au>Deepthi, K</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Cloud Storage Data Deduplication with Encryption</atitle><jtitle>International journal of advanced research in computer science</jtitle><date>2017-01-01</date><risdate>2017</risdate><volume>8</volume><issue>1</issue><eissn>0976-5697</eissn><abstract>Cloud storage is a remote storage service, where users can upload and download their data anytime and anywhere. Data duplication, data leakage, space consumption are the main issues of cloud storage. During the time of uploading data is converted into binary data, using AES algorithm cipher text is formed it is stored in cloud .Using MD5 algorithm we create a hash value and it is stored in hash table. Parallel to this plagiarism is running, it involves content checking. From the different methods of plagiarism, syntactic based method is used here. Syntactic-based methods do not consider the meaning of words, phrases, or sentence. Content checking is performed to eliminate duplicate cipher text, here a threshold value is set, if contents similarity is smaller than threshold value user opinion is asked to upload the data. Here data compression is performed at the time of uploading data to cloud and this is done to reduce the amount of storage space. The plagiarism and compression techniques avoids the unwanted usage of memory. This method provides better security for data. User can download data as needed.</abstract><cop>Udaipur</cop><pub>International Journal of Advanced Research in Computer Science</pub><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier EISSN: 0976-5697
ispartof International journal of advanced research in computer science, 2017-01, Vol.8 (1)
issn 0976-5697
language eng
recordid cdi_proquest_journals_1901446086
source Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals
subjects Binary data
Cloud computing
Consumption
Cybersecurity
Data compression
Data storage
Downloading
Encryption
Hash based algorithms
Leakage
Reproduction (copying)
Similarity
title Cloud Storage Data Deduplication with Encryption
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-24T00%3A17%3A11IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Cloud%20Storage%20Data%20Deduplication%20with%20Encryption&rft.jtitle=International%20journal%20of%20advanced%20research%20in%20computer%20science&rft.au=Aruna,%20A%20S&rft.date=2017-01-01&rft.volume=8&rft.issue=1&rft.eissn=0976-5697&rft_id=info:doi/&rft_dat=%3Cproquest%3E1901446086%3C/proquest%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1901446086&rft_id=info:pmid/&rfr_iscdi=true