ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

A Survey on Secure and Authorized Deduplication Techniques using Hybrid Cloud

Journal: International Journal of Science and Research (IJSR) (Vol.5, No. 3)

Publication Date:

Authors : ; ;

Page : 1382-1385

Keywords : Authorization; data security; privilege; DE duplication; credentials; cloud;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

Presently a days utilization of distributed computing is expanding quickly. Distributed computing is vital in the information sharing application. Every day utilization of cloud is expanding. Be that as it may, the issue in distributed computing is each day information transferred on the cloud, so expanding comparative information in cloud. Along these lines we can decrease the measure of comparable information in cloud utilizing the information DE duplication strategy. These system primary point is that expel copy information from cloud. It can likewise spare storage room and data transfer capacity. Our proposed technique is to uproot the copy information however in which client have relegated some benefit as per that duplication check. Cloud DE duplication is accomplish utilizing the cross breed cloud building design. We proposed system is more secure and expends less assets of cloud. Likewise we have demonstrated that proposed plan has insignificant overhead in copy evacuation when contrasted with the ordinary DE duplication procedure.

Last modified: 2021-07-01 14:32:41