A Survey On Various Data Deduplication Techniques Applied In Cloud

Authors

  • Thilagavathi N  Associate professor, Department of Information Technology, SMVEC,Puducherry, Tamil Nadu, India
  • Praveena C   UG Student, Department of Information Technology, SMVEC, Puducherry, Tamil Nadu, India
  • Niranjani S  UG Student, Department of Information Technology, SMVEC, Puducherry, Tamil Nadu, India

Keywords:

Deduplication, Progressive, Convergent Encryption, Proxy Re-Encryption

Abstract

Data deduplication is useful for organizations dealing with highly redundant operations that requires constant copying and storing of data for future reference or recovery purpose. The technique is a part of backup and disaster recovery solution as it allows enterprises to save data repeatedly and promotes fast, reliable and cost-effective data recovery. Deduplication run an analysis and eliminates these sets of duplicate data and keeps only what is unique and essential, thus significantly clearing storage space. Here are some benefits of data deduplication for organizations

References

  1. Z. Sun, J. Shen, and J. M. Yong, "DeDu: Building a deduplication storage system over cloud computing," in Proc. IEEE Int. Conf. Comput. Supported Cooperative Work Des., 2011, pp. 348?355, doi:10.1109/CSCWD.2011.5960097.
  2. Z. C. Wen, J. M. Luo, H. J. Chen, J. X. Meng, X. Li, and J. Li, "A veri?able data deduplication scheme in cloud computing," in Proc. Int. Conf. Intell. Netw. Collaborative Syst., 2014, pp. 85?90, doi:10.1109/INCoS.2014.111.
  3. P. Meye, P. Raipin, F. Tronel, and E. Anceaume, "A secure twophase data deduplication scheme," in Proc. HPCC/CSS/ICESS, 2014, pp. 802?809, doi:10.1109/HPCC.2014.134.
  4. P. Puzio, R. Molva, M. Onen, and S. Loureiro, "ClouDedup: Secure deduplication with encrypted data for cloud storage," in Proc. IEEE Int. Cof. Cloud Comput. Technol. Sci., 2013, pp. 363?370, doi:10.1109/CloudCom.2013.54.
  5. M. Bellare, S. Keelveedhi, and T. Ristenpart, "DupLESS: Server aided encryption for deduplicated storage," in Proc. 22nd USENIX Conf. Secur., 2013, pp. 179?194.
  6. C. Y. Liu, X. J. Liu, and L. Wan, "Policy-based deduplication in secure cloud storage," in Proc. Trustworthy Comput. Serv., 2013, pp. 250?262, doi:10.1007/978-3-642-35795-4_32.
  7. Y.-K. Li, M. Xu, C.-H. Ng, and P. P. C. Lee, "Ef?cient hybrid inline and out-of-line deduplication for backup storage," ACM Trans. Storage, vol. 11, no. 1, pp. 2:1-2:21, 2014, doi:10.1145/2641572.
  8. M.Fu, et al., "Accelerating restore and garbage collection in deduplication-based backup systems via exploiting historical information," inProc.USENIXAnnu.Tech.Conf., 2014, pp.181?192.
  9. M. Kaczmarczyk, M. Barczynski, W. Kilian, and C. Dubnicki, "Reducing impact of data fragmentation caused by in-line deduplication," in Proc. 5th Annu. Int. Syst. Storage Conf., 2012, pp. 15:1?15:12, doi:10.1145/2367589.2367600.
  10. M. Lillibridge, K.Eshghi, and D.Bhagwat,"Improving restore speed for backup systems that use inline chunk-based deduplication," in Proc.USENIXConf.FileStorageTechnol.,2013,pp.183?198.
  11. Z. Yan, W. X. Ding, and H. Q. Zhu, "A scheme to manage encrypted data storage with deduplication in cloud," in Proc. ICA3PP2015, Zhangjiajie, China, Nov. 2015, pp. 547?561.
  12. D. Perttula, B. Warner, and Z. Wilcox-O'Hearn, "Attacks on convergent encryption." (2016). [Online]. Available: http://bit.ly/ yQxyvl
  13. C. Yang, J. Ren, and J. F. Ma, "Provable ownership of ?le in deduplication cloud storage," in Proc. IEEE Global Commun. Conf., 2013, pp. 695?700, doi:10.1109/GLOCOM.2013.6831153.
  14. J.W.Yuan and S.C.Yu, "Secure and constant cost public cloud storage auditing with deduplication," in Proc. IEEE Int.Conf. Communic. Netw.Secur.,2013, pp.145?153, doi:10.1109/CNS.2013.6682702.
  15. T. Y. Wu, J. S. Pan, and C. F. Lin, "Improving accessing ef?ciency of cloud storage using de-duplication and feedback schemes," IEEE Syst. J., vol. 8, no. 1, pp. 208?218, Mar. 2014, doi:10.1109/ JSYST.2013.2256715.
  16. C. Fan, S. Y. Huang, and W. C. Hsu, "Hybrid data deduplication in cloud environment," in Proc. Int. Conf. Inf. Secur. Intell. Control, 2012, pp. 174?177, doi:10.1109/ISIC.2012.6449734.

Downloads

Published

2018-04-30

Issue

Section

Research Articles

How to Cite

[1]
Thilagavathi N, Praveena C , Niranjani S, " A Survey On Various Data Deduplication Techniques Applied In Cloud, International Journal of Scientific Research in Science and Technology(IJSRST), Online ISSN : 2395-602X, Print ISSN : 2395-6011, Volume 4, Issue 5, pp.1897-1902, March-April-2018.