International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 112 | Views: 241

Survey Paper | Computer Science & Engineering | India | Volume 4 Issue 12, December 2015 | Popularity: 6.8 / 10


     

A Secure and Authorized Duplication Check of Data Using Hybrid Cloud Approach

Sonali B. Motegaonkar, Prof. Chaitanya S. Kulkarni


Abstract: Current era is a cloud computing era. The use of cloud increasing daily. Cloud computing is nothing but the sharing of resources and pay as per we use. Now a days use of cloud computing is increasing rapidly. But the problem with cloud computing is every day data is get uploaded on the cloud. The increasing similar data. So to reduce the used size of cloud deduplication is best method in the data deduplication approach duplicate data is removed from the cloud. This will helps to save storage space and bandwidth also. To remove the duplicate data we have proposed a novel method in which user have assigned some privilege according to that duplication check is perform. We have used a hybrid cloud architecture to achieve the cloud data deduplication. Experimental result of our method shows that proposed method is more secure and consumes less resources of cloud We have shown that proposed scheme has minimal overhead in duplicate removal as compared to the normal deduplication technique.


Keywords: Authorization, data, security, privilege, deduplication, credentials, cloud


Edition: Volume 4 Issue 12, December 2015


Pages: 1645 - 1648


DOI: https://www.doi.org/10.21275/NOV152341



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Sonali B. Motegaonkar, Prof. Chaitanya S. Kulkarni, "A Secure and Authorized Duplication Check of Data Using Hybrid Cloud Approach", International Journal of Science and Research (IJSR), Volume 4 Issue 12, December 2015, pp. 1645-1648, https://www.ijsr.net/getabstract.php?paperid=NOV152341, DOI: https://www.doi.org/10.21275/NOV152341



Similar Articles

Downloads: 656 | Weekly Hits: ⮙1 | Monthly Hits: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 7, July 2020

Pages: 1454 - 1458

Heart Disease Prediction with Machine Learning Approaches

Megha Kamboj

Share this Article

Downloads: 124 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 991 - 995

A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats

M. Meena, A. Komathi

Share this Article

Downloads: 90 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 10, October 2020

Pages: 1626 - 1628

Image Noise Reduction with Autoencoder using Tensor Flow

Jai Sehgal, Dr Yojna Arora

Share this Article

Downloads: 190 | Weekly Hits: ⮙6 | Monthly Hits: ⮙6

Survey Paper, Computer Science & Engineering, India, Volume 7 Issue 1, January 2018

Pages: 81 - 84

Novel Approach to Virtual Machine Migration In Cloud Computing Environment - A Survey

Priyanka H, Dr. Mary Cherian

Share this Article

Downloads: 0

Research Paper, Computer Science & Engineering, India, Volume 11 Issue 5, May 2022

Pages: 885 - 888

Image Based Steganography

Bheeshma Rao J, Ujwal Sai Satya Jorige, Sai Praneetha Katragadda, Pradeep Kumar .V

Share this Article



Top