Cloud Storage Data Deduplication with Encryption
Cloud storage is a remote storage service, where users can upload and download their data anytime and anywhere. Data duplication, data leakage, space consumption are the main issues of cloud storage. During the time of uploading data is converted into binary data, using AES algorithm cipher text is...
Gespeichert in:
Veröffentlicht in: | International journal of advanced research in computer science 2017-01, Vol.8 (1) |
---|---|
Hauptverfasser: | , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | 1 |
container_start_page | |
container_title | International journal of advanced research in computer science |
container_volume | 8 |
creator | Aruna, A S Deepthi, K |
description | Cloud storage is a remote storage service, where users can upload and download their data anytime and anywhere. Data duplication, data leakage, space consumption are the main issues of cloud storage. During the time of uploading data is converted into binary data, using AES algorithm cipher text is formed it is stored in cloud .Using MD5 algorithm we create a hash value and it is stored in hash table. Parallel to this plagiarism is running, it involves content checking. From the different methods of plagiarism, syntactic based method is used here. Syntactic-based methods do not consider the meaning of words, phrases, or sentence. Content checking is performed to eliminate duplicate cipher text, here a threshold value is set, if contents similarity is smaller than threshold value user opinion is asked to upload the data. Here data compression is performed at the time of uploading data to cloud and this is done to reduce the amount of storage space. The plagiarism and compression techniques avoids the unwanted usage of memory. This method provides better security for data. User can download data as needed. |
format | Article |
fullrecord | <record><control><sourceid>proquest</sourceid><recordid>TN_cdi_proquest_journals_1901446086</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>1901446086</sourcerecordid><originalsourceid>FETCH-proquest_journals_19014460863</originalsourceid><addsrcrecordid>eNpjYuA0sDQ30zU1szTnYOAtLs4yAAJjS0szEwNOBgPnnPzSFIXgkvyixPRUBZfEkkQFl9SU0oKczOTEksz8PIXyzJIMBde85KLKAhCfh4E1LTGnOJUXSnMzKLu5hjh76BYU5ReWphaXxGfllxblAaXiDS0NDE1MzAwszIyJUwUAb40zLg</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1901446086</pqid></control><display><type>article</type><title>Cloud Storage Data Deduplication with Encryption</title><source>Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals</source><creator>Aruna, A S ; Deepthi, K</creator><creatorcontrib>Aruna, A S ; Deepthi, K</creatorcontrib><description>Cloud storage is a remote storage service, where users can upload and download their data anytime and anywhere. Data duplication, data leakage, space consumption are the main issues of cloud storage. During the time of uploading data is converted into binary data, using AES algorithm cipher text is formed it is stored in cloud .Using MD5 algorithm we create a hash value and it is stored in hash table. Parallel to this plagiarism is running, it involves content checking. From the different methods of plagiarism, syntactic based method is used here. Syntactic-based methods do not consider the meaning of words, phrases, or sentence. Content checking is performed to eliminate duplicate cipher text, here a threshold value is set, if contents similarity is smaller than threshold value user opinion is asked to upload the data. Here data compression is performed at the time of uploading data to cloud and this is done to reduce the amount of storage space. The plagiarism and compression techniques avoids the unwanted usage of memory. This method provides better security for data. User can download data as needed.</description><identifier>EISSN: 0976-5697</identifier><language>eng</language><publisher>Udaipur: International Journal of Advanced Research in Computer Science</publisher><subject>Binary data ; Cloud computing ; Consumption ; Cybersecurity ; Data compression ; Data storage ; Downloading ; Encryption ; Hash based algorithms ; Leakage ; Reproduction (copying) ; Similarity</subject><ispartof>International journal of advanced research in computer science, 2017-01, Vol.8 (1)</ispartof><rights>Copyright International Journal of Advanced Research in Computer Science Jan 2017</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,776,780</link.rule.ids></links><search><creatorcontrib>Aruna, A S</creatorcontrib><creatorcontrib>Deepthi, K</creatorcontrib><title>Cloud Storage Data Deduplication with Encryption</title><title>International journal of advanced research in computer science</title><description>Cloud storage is a remote storage service, where users can upload and download their data anytime and anywhere. Data duplication, data leakage, space consumption are the main issues of cloud storage. During the time of uploading data is converted into binary data, using AES algorithm cipher text is formed it is stored in cloud .Using MD5 algorithm we create a hash value and it is stored in hash table. Parallel to this plagiarism is running, it involves content checking. From the different methods of plagiarism, syntactic based method is used here. Syntactic-based methods do not consider the meaning of words, phrases, or sentence. Content checking is performed to eliminate duplicate cipher text, here a threshold value is set, if contents similarity is smaller than threshold value user opinion is asked to upload the data. Here data compression is performed at the time of uploading data to cloud and this is done to reduce the amount of storage space. The plagiarism and compression techniques avoids the unwanted usage of memory. This method provides better security for data. User can download data as needed.</description><subject>Binary data</subject><subject>Cloud computing</subject><subject>Consumption</subject><subject>Cybersecurity</subject><subject>Data compression</subject><subject>Data storage</subject><subject>Downloading</subject><subject>Encryption</subject><subject>Hash based algorithms</subject><subject>Leakage</subject><subject>Reproduction (copying)</subject><subject>Similarity</subject><issn>0976-5697</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2017</creationdate><recordtype>article</recordtype><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><sourceid>GNUQQ</sourceid><recordid>eNpjYuA0sDQ30zU1szTnYOAtLs4yAAJjS0szEwNOBgPnnPzSFIXgkvyixPRUBZfEkkQFl9SU0oKczOTEksz8PIXyzJIMBde85KLKAhCfh4E1LTGnOJUXSnMzKLu5hjh76BYU5ReWphaXxGfllxblAaXiDS0NDE1MzAwszIyJUwUAb40zLg</recordid><startdate>20170101</startdate><enddate>20170101</enddate><creator>Aruna, A S</creator><creator>Deepthi, K</creator><general>International Journal of Advanced Research in Computer Science</general><scope>3V.</scope><scope>7SC</scope><scope>7XB</scope><scope>8AL</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>8FK</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>M0N</scope><scope>P5Z</scope><scope>P62</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>Q9U</scope></search><sort><creationdate>20170101</creationdate><title>Cloud Storage Data Deduplication with Encryption</title><author>Aruna, A S ; Deepthi, K</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-proquest_journals_19014460863</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2017</creationdate><topic>Binary data</topic><topic>Cloud computing</topic><topic>Consumption</topic><topic>Cybersecurity</topic><topic>Data compression</topic><topic>Data storage</topic><topic>Downloading</topic><topic>Encryption</topic><topic>Hash based algorithms</topic><topic>Leakage</topic><topic>Reproduction (copying)</topic><topic>Similarity</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Aruna, A S</creatorcontrib><creatorcontrib>Deepthi, K</creatorcontrib><collection>ProQuest Central (Corporate)</collection><collection>Computer and Information Systems Abstracts</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>Computing Database (Alumni Edition)</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies & Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>Computing Database</collection><collection>Advanced Technologies & Aerospace Database</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>Publicly Available Content Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>ProQuest Central Basic</collection><jtitle>International journal of advanced research in computer science</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Aruna, A S</au><au>Deepthi, K</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Cloud Storage Data Deduplication with Encryption</atitle><jtitle>International journal of advanced research in computer science</jtitle><date>2017-01-01</date><risdate>2017</risdate><volume>8</volume><issue>1</issue><eissn>0976-5697</eissn><abstract>Cloud storage is a remote storage service, where users can upload and download their data anytime and anywhere. Data duplication, data leakage, space consumption are the main issues of cloud storage. During the time of uploading data is converted into binary data, using AES algorithm cipher text is formed it is stored in cloud .Using MD5 algorithm we create a hash value and it is stored in hash table. Parallel to this plagiarism is running, it involves content checking. From the different methods of plagiarism, syntactic based method is used here. Syntactic-based methods do not consider the meaning of words, phrases, or sentence. Content checking is performed to eliminate duplicate cipher text, here a threshold value is set, if contents similarity is smaller than threshold value user opinion is asked to upload the data. Here data compression is performed at the time of uploading data to cloud and this is done to reduce the amount of storage space. The plagiarism and compression techniques avoids the unwanted usage of memory. This method provides better security for data. User can download data as needed.</abstract><cop>Udaipur</cop><pub>International Journal of Advanced Research in Computer Science</pub><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | EISSN: 0976-5697 |
ispartof | International journal of advanced research in computer science, 2017-01, Vol.8 (1) |
issn | 0976-5697 |
language | eng |
recordid | cdi_proquest_journals_1901446086 |
source | Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals |
subjects | Binary data Cloud computing Consumption Cybersecurity Data compression Data storage Downloading Encryption Hash based algorithms Leakage Reproduction (copying) Similarity |
title | Cloud Storage Data Deduplication with Encryption |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-24T00%3A17%3A11IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Cloud%20Storage%20Data%20Deduplication%20with%20Encryption&rft.jtitle=International%20journal%20of%20advanced%20research%20in%20computer%20science&rft.au=Aruna,%20A%20S&rft.date=2017-01-01&rft.volume=8&rft.issue=1&rft.eissn=0976-5697&rft_id=info:doi/&rft_dat=%3Cproquest%3E1901446086%3C/proquest%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1901446086&rft_id=info:pmid/&rfr_iscdi=true |