Abstract
Data deduplication is another method for compressing the information and it is useful in productive utilization of storing the space and ends up being a superior strategy to deal with duplicate information. Deduplication permits unique or single data copies are stored in the database initially and sequential duplicates are delivered with interfacing indicator to the authorized stored replica of information. This paper analyses the deduplication scheme and comparison between them and the idea about the methodology also. The study showed is structured in smooth way to carry out the crisp of improvement in the deduplication schemes.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Y. Fan, X. Lin, W. Liang, G. Tan, P. Nanda, A secure privacy preserving deduplication scheme for cloud computing. Future Gener. Comput. Syst. 101, 127–135 (2019)
R.V. Gode, R. Dalvim, An effective storage management in a twin cloud architecture using an authorized deduplication technique, in The Proceedings of International Conference on Power, Control, Signals and Instrumentation Engineering (ICPCSI) (IEEE, 2017), pp. 796–801
G. Uma, L. Jayasimman, Enhanced convergent encryption key generation for secured data deduplication in cloud storage. J. Phys. Conf. Ser. 1142(1), 012006 (2018)
V. Waghmare, S. Kapse, Authorized deduplication: an approach for secure cloud environment. Procedia Comput. Sci. 78, 815–823 (2016)
P. Singh, N. Agarwal, B. Raman, Secure data deduplication using secret sharing schemes over cloud. Future Gener. Comput. Syst. 88, 156–167 (2018)
G.S.S. Jose, C.S. Christopher, Secure cloud data storage approach in e-learning systems. Cluster Comput. 22(5), 12857–12862 (2019)
S. Wu, K.C. Li, B. Mao, M. Liao, DAC: improving storage availability with deduplication-assisted cloud-of-clouds. Future Gene. Comput. Syst. 74, 190–198 (2017)
N.A. Shafi’i Muhammad Abdulhamid, M.A. Sadiq, M. H. Nadim Rana, Development of Blowfish encryption scheme for secure data storage in public and commercial cloud computing environment (2018)
Pronika, S. Tyagi, Deduplication in cloud storage. Int. J. Innovative Technol. Exploring Eng. 9(2S), 364–368 (2019)
S. Hema, A. Kangaiammal, An analysis and comparison of data deduplication approaches to efficient storage. Int. J. Adv. Res. Comput. Sci. 9(2) (2018)
Z. Yan, W. Ding, H. Zhu, A scheme to manage encrypted data storage with deduplication in cloud, in The Proceedings of International Conference on Algorithms and Architectures for Parallel Processing (Springer, Cham, 2015), pp. 547–561
B.S. Rawal, V. Vijayakumar, G. Manogaran, R. Varatharajan., N. Chilamkurti, Secure disintegration protocol for privacy preserving cloud storage. Wirel. Pers. Commun. 103(2), 1161–1177 (2018)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Pronika, Tyagi, S.S. (2021). An Analysis and Comparative Study of Data Deduplication Scheme in Cloud Storage. In: Joshi, A., Khosravy, M., Gupta, N. (eds) Machine Learning for Predictive Analysis. Lecture Notes in Networks and Systems, vol 141. Springer, Singapore. https://doi.org/10.1007/978-981-15-7106-0_42
Download citation
DOI: https://doi.org/10.1007/978-981-15-7106-0_42
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-7105-3
Online ISBN: 978-981-15-7106-0
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)