Open Access Open Access  Restricted Access Subscription or Fee Access

A Very Robust Dedicated and Verified Technique by Applying the Hybridity of Cloud for Deduplication of Data

Aishwarya Shekhar, Devesh Kumar Srivastava

Abstract


This paper presents a review study on the data deduplication or single instancing originally refers to the removal of needless data. In this process, duplicate data is expunged, leaving only one copy means single instance of the data to be accumulated. Though, indexing of each and every data is still maintained. Data deduplication is an approach for minimizing the part of storage space an organization required to retain its data. In most of the company, the storage systems carry identical copies of numerous pieces of data. Deduplication terminates these additional copies by saving just one copy of the data and exchanging the other copies with pointers that assist back to the primary copy. To ignore this duplication of the data and to preserve the confidentiality in the cloud here we are applying the concept of hybrid nature of cloud. A hybrid cloud is a fusion of minimally one public and private cloud. To secure the confidentiality of sensitive data while encouraging deduplication, the convergent encryption technique must be used to encrypt the data before expanding. For better shielding the data security, this paper makes an attempt to formally address the problem of data deduplication.


Keywords


Confidentiality, Deduplication, Data Compression, Hybridity of Cloud

Full Text:

PDF

References


Rongbo Zhu, Zhili Sun and Jiankun Hu, “Special section: Green computing,” Future Generation Computer Systems 28, pp. 368-370, 2012.

Mladen A Vouk. “Cloud computing: Issues, research and implementations” ITI 2008 30th International Conference on Information Technology Interfaces, 16(4):31–40, 2008.

Jerry Gao, Xiaoying Bai, and Wei-Tek Tsai “Testing as a Service (TaaS) on Clouds” IEEE Seventh International Symposium on Service-Oriented System Engineering 2013.

Thesis by Ivailo P. Sokolov, 2009. Cloud Computing: Overview, Concepts and Business Deployment Scenarios. Bachelor’s 2009 Vienna University of Economics and Business..

Pankaj Goyal, 2009. Policy-based Event-driven Services-oriented Architecture for Cloud Services Operation & Management. Prceedings of IEEE International Conference on Cloud Computing (Cloud’09), pp135-138.

L.M. Riungu, O. Taipale, and K. Smolander, “ Research issues for software testing the cloud” IEEE Second International Conference on Cloud Computing Technology and Science, Dec. 2010.

L. Riungu-Kalliosaari, O. Taipale, K. Smolander, “Testing in the Cloud:Exploring the Practice, ”Special issue on Software Engineering for Cloud Computing, IEEE Software, March/April 2012..

N. Bonvin, T.G. Papaioannou, and K. Aberer, ‘‘A Self-Organized Fault-Tolerant and Scalable Replication Scheme for Cloud Storage,’’ in Proc. 1st ACM Symp. Cloud Comput., ser. SoCC’10, New York, NY, USA, 2010, pp. 205-216.

Massoud Pedram, “Energy-Efficient Datacenters,” IEEE Transactions on Computer –Aided Design of Integrated Circuits and Systems, Vol. 31, N0. 10, pp. 1465-1484, October 2012.

Peter Mell and Timothy Grance. The NIST definition of cloud computing (draft) recommendations of the national institute of standards and technology. Nist Special Publication, 145(6):7, 2011.

Marios D. Dikaiakos, George Pallis, Dimitrios Katsaros, Pankaj Mehra, and Athena Vakali, “Cloud Computing: Distributed Internet Computing for IT and Scientific,” 1089-7801/09 IEEE Computer Society, 2009.

Jin Li, Yan Kit Li, Xiaofeng Chen, Patrick P. C. Lee, Wenjing Lou, “A Hybrid Cloud Approach for Secure Authorized Deduplication”, IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEM VOL:PP NO:99 YEAR 2014.

J Gaurav Kakariya , Prof. Sonali Rangdale, “A HYBRID CLOUD APPROACH FOR SECURE AUTHORIZED DEDUPLICATION”, International Journal of Computer Engineering and Applications, Volume VIII, Issue I, October 14.

P. Anderson and L. Zhang, “Fast and secure laptop backups with encrypted de-duplication”,In Proc. of USENIX LISA, 2010..

Lijun Mei,W.K. Chan,T.H. Tse, “ A Tale of Clouds: Paradigm Comparisons and Some Thoughts on Research Issues” IEEE Asia-Pacific Services Computing Conference, APSCC’ 08, pp 464-469, 2008.

Hong Cai, Ning Wang, MingJun Zhou, 2010. “A Transparent Approach of Enabling SaaS Multi-tenancy in the Cloud, IEEE 6th World Congress on Services, 2010, pp 40-47.

Juniper Networks, Inc.1194 North Mathilda Avenue Sunnyvale, CA94089USA.Securing Multi-Tenancy and Cloud Computing.

K C. Ng and P. Lee. Revdedup, “A reverse deduplication storage system optimized for reads to latest backups”, In Proc. of APSYS, Apr 2013.

W. K. Ng, Y. Wen, and H. Zhu, “Private data Deduplication protocols in cloud storage”. In S. Ossowski and P. Lecca, editors, Proceedings of the 27th Annual ACM Symposium on Applied Computing, pages 441–446. ACM, 2012.

Y. M. W. Storer, K. Greenan, D. D. E. Long, and E. L. Miller. “Secure data Deduplication”, In Proc. of StorageSS, 2008.

S. Sivathanu, L. Liu, M. Yiduo, and X. Pu, ‘‘Storage Management in Virtualized Cloud Environment,’’ in Proc. 3rd IEEE Int’l Conf Cloud, 2010.

L.V.D Aalst, “Software testing as a service (STaaS),” http://www.tmap.net/Images/Paper%20STaaS_tcm8-47910.pdf.

M. Creeger, ‘‘Cloud Computing: An Overview,’’ ACM Queue vol. 7, no. 5, pp. 1-5, June 2009.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.