A Secure and Authorized Duplication Check of Data Using Hybrid Cloud Approach
Journal: International Journal of Science and Research (IJSR) (Vol.4, No. 12)Publication Date: 2015-12-05
Authors : Sonali B. Motegaonkar; Chaitanya S. Kulkarni;
Page : 1645-1648
Keywords : Authorization; data; security; privilege; deduplication; credentials; cloud;
Abstract
Current era is a cloud computing era. The use of cloud increasing daily. Cloud computing is nothing but the sharing of resources and pay as per we use. Now a days use of cloud computing is increasing rapidly. But the problem with cloud computing is every day data is get uploaded on the cloud. The increasing similar data. So to reduce the used size of cloud deduplication is best method in the data deduplication approach duplicate data is removed from the cloud. This will helps to save storage space and bandwidth also. To remove the duplicate data we have proposed a novel method in which user have assigned some privilege according to that duplication check is perform. We have used a hybrid cloud architecture to achieve the cloud data deduplication. Experimental result of our method shows that proposed method is more secure and consumes less resources of cloud We have shown that proposed scheme has minimal overhead in duplicate removal as compared to the normal deduplication technique.
Other Latest Articles
- Up-Regulation of S-Phase Kinase Associated Protein-2 Antisense Induces Cell Growth and Migration Chemotactic Suppression and Apoptosis in a Malignant Oral Burkitts Lymphoma Cells
- The Transformation of the Urban Block in the City of Tirana from 1920 to 1960
- The Impact of Urban Texture in Outdoor Thermal Comfort
- Survey on Text Mining with Identification of Text Corpus
- Smart Predictor: A Road Incident Prediction System using Hybrid Data Mining Approach on Traffic Data
Last modified: 2021-07-01 14:28:06