{"title":"A Comparative Study of Data Deduplication Strategies","authors":"Nipun Chhabra, M. Bala","doi":"10.1109/ICSCCC.2018.8703363","DOIUrl":null,"url":null,"abstract":"Data Deduplication is a new way of compressing data which is helpful in efficient use of storage space and proves to be a better technique to handle duplicate data. Deduplication allows unique data copy to be uploaded to the storage originally and successive copies are provided with connecting pointer to the authentic stored copy. In cloud computing, data privacy is a significant matter to be considered. This paper surveys the prevalent deduplication strategies and evaluates their methodologies. The survey thus conducted is organized in tabular form to bring out the crisp of progression in the deduplication and its types. We have observed during this survey that in deduplication, confidentiality of data is being compromised at many levels so, it paves a path for a more secure approach in data deduplication in cloud computing.","PeriodicalId":148491,"journal":{"name":"2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)","volume":"PP 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICSCCC.2018.8703363","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 5
Abstract
Data Deduplication is a new way of compressing data which is helpful in efficient use of storage space and proves to be a better technique to handle duplicate data. Deduplication allows unique data copy to be uploaded to the storage originally and successive copies are provided with connecting pointer to the authentic stored copy. In cloud computing, data privacy is a significant matter to be considered. This paper surveys the prevalent deduplication strategies and evaluates their methodologies. The survey thus conducted is organized in tabular form to bring out the crisp of progression in the deduplication and its types. We have observed during this survey that in deduplication, confidentiality of data is being compromised at many levels so, it paves a path for a more secure approach in data deduplication in cloud computing.