{"title":"云计算存储的安全重复数据删除技术比较研究","authors":"P. Malathi, S. Suganthidevi","doi":"10.1109/ICSES52305.2021.9633960","DOIUrl":null,"url":null,"abstract":"Cloud based communication is a tremendous growth in the world and which provides the services through virtualized resources with support of internet. In cloud computing, optimized storage techniques require to store the hugea mount of data. Performing the data deduplication technique over the encrypted data consider as the major challenging task. Eliminating the redundant data file from the optimized storage, which results the minimizing the band width and reduces the cost and disk usage. In Existing approach, the most of the research work are using Attribute Based Encryption to prevent the data security. However, the security protection issues during the Attribute Based Encryption are considered as challenging task. In the traditional method of cloud data storage, the data are usually encrypted in the server side and then securely stored in remote server. Many researchers proposed many algorithms in which it makes easier for user's convenience so that it makes them fulfil their requirements. In, this proposed work detailed comparative study for data deduplication techniques in cloud storage are analysed. The results indicate that the cloud computing allows the users to perform the limited outsourcing performance of computational task with extraordinary server. Our proposed deduplication scheme enhances to improve a secured connection for attribute-based encryption for an emerging source to use and it proved the secured against the application system.","PeriodicalId":6777,"journal":{"name":"2021 International Conference on Innovative Computing, Intelligent Communication and Smart Electrical Systems (ICSES)","volume":"62 1","pages":"1-5"},"PeriodicalIF":0.0000,"publicationDate":"2021-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Comparative Study and Secure Data Deduplication techniques for Cloud Computing storage\",\"authors\":\"P. Malathi, S. Suganthidevi\",\"doi\":\"10.1109/ICSES52305.2021.9633960\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Cloud based communication is a tremendous growth in the world and which provides the services through virtualized resources with support of internet. In cloud computing, optimized storage techniques require to store the hugea mount of data. Performing the data deduplication technique over the encrypted data consider as the major challenging task. Eliminating the redundant data file from the optimized storage, which results the minimizing the band width and reduces the cost and disk usage. In Existing approach, the most of the research work are using Attribute Based Encryption to prevent the data security. However, the security protection issues during the Attribute Based Encryption are considered as challenging task. In the traditional method of cloud data storage, the data are usually encrypted in the server side and then securely stored in remote server. Many researchers proposed many algorithms in which it makes easier for user's convenience so that it makes them fulfil their requirements. In, this proposed work detailed comparative study for data deduplication techniques in cloud storage are analysed. The results indicate that the cloud computing allows the users to perform the limited outsourcing performance of computational task with extraordinary server. Our proposed deduplication scheme enhances to improve a secured connection for attribute-based encryption for an emerging source to use and it proved the secured against the application system.\",\"PeriodicalId\":6777,\"journal\":{\"name\":\"2021 International Conference on Innovative Computing, Intelligent Communication and Smart Electrical Systems (ICSES)\",\"volume\":\"62 1\",\"pages\":\"1-5\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-09-24\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 International Conference on Innovative Computing, Intelligent Communication and Smart Electrical Systems (ICSES)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICSES52305.2021.9633960\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 International Conference on Innovative Computing, Intelligent Communication and Smart Electrical Systems (ICSES)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICSES52305.2021.9633960","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Comparative Study and Secure Data Deduplication techniques for Cloud Computing storage
Cloud based communication is a tremendous growth in the world and which provides the services through virtualized resources with support of internet. In cloud computing, optimized storage techniques require to store the hugea mount of data. Performing the data deduplication technique over the encrypted data consider as the major challenging task. Eliminating the redundant data file from the optimized storage, which results the minimizing the band width and reduces the cost and disk usage. In Existing approach, the most of the research work are using Attribute Based Encryption to prevent the data security. However, the security protection issues during the Attribute Based Encryption are considered as challenging task. In the traditional method of cloud data storage, the data are usually encrypted in the server side and then securely stored in remote server. Many researchers proposed many algorithms in which it makes easier for user's convenience so that it makes them fulfil their requirements. In, this proposed work detailed comparative study for data deduplication techniques in cloud storage are analysed. The results indicate that the cloud computing allows the users to perform the limited outsourcing performance of computational task with extraordinary server. Our proposed deduplication scheme enhances to improve a secured connection for attribute-based encryption for an emerging source to use and it proved the secured against the application system.