Skip to main content

Automatic Content Creation Mechanism and Rearranging Technique to Improve Cloud Storage Space

  • Conference paper
  • First Online:
Inventive Computation and Information Technologies

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 336))

  • 958 Accesses

Abstract

The storage of electronic data as well as the demand for it has become a major problem in today’s society. Data is becoming increasingly centralized in order to provide the flexibility to use it anywhere, at any time, and on any device. Due to the increasing mobility in modern devices, data productivity and accessibility in cloud storage are increasing. Data versatility is expanding on a daily basis, posing a management challenge. All methods of dumping data regularly over a period of time necessitated the deletion and rearrangement of a few data items in order to achieve greater efficiency in the data retrieval process. Currently, the researchers are focusing on the efficient searching algorithms and not on the combined technique of data prioritization, deletion, and rearrangement. The proposed automatic content creation mechanism (AACM) system will create new document after deleting unwanted contents and by merging few existing documents based on the top key words. Each and every document is associated with particular keywords. The proposed system leads to two outputs by considering the text, first to form core points with voting count and then to create new documentary on it. The proposed system can also focus on video, audio, and image in addition to text but however the major focus is given to text, which is the complex one of the four. The mechanism will move from lower priority/older one to higher priority/newer one on the basis of success rate with a particular cluster. This mechanism will save the valid information even from lower priority and older documents. It will also free up the space by deleting the unwanted sentences from older files, and all these depend on the threshold (confidence) value, which is auto-adjusted by the proposed mechanism on the basis of success rate. This will lead to a better memory management and prevention of core historical data.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 189.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 249.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. S. Karimunnisa, V. Kompalli, Cloud computing: Review on recent research progress and issues. Int. J. Adv. Trends Comput. Sci. Eng. 8(2), 216–223 (2019)

    Article  Google Scholar 

  2. W. Haoxiang, S. Smys, MC-SVM based work flow preparation in cloud with named entity identification. J. Soft Comput. Paradigm (JSCP) 2(02), 130–139 (2020)

    Article  Google Scholar 

  3. N. Vurukonda, R.B. Thirumala, DC-MAABE: data centric multi-authority attribute based encryption on cloud storage. J. Comput. Theor. Nanosci. 16(5–6), 1893–1901 (2019)

    Article  Google Scholar 

  4. A. Bashar, Sensor cloud based architecture with efficient data computation and security implantation for Internet of Things application. J. ISMAC 2(02), 96–105 (2020)

    Article  Google Scholar 

  5. R.M. Balajee, H. Mohapatra, K. Venkatesh, Comparative study on efficient cloud security, services, simulators, load balancing, resource scheduling and storage mechanisms. IOP Conf. Ser. Mater. Sci. Eng. 1070(1), 012053 (2021)

    Google Scholar 

  6. G. Sreeram, M.K. Kanumuri, M. Bodduluri, Improving cloud data storage performance based on calculating score using data transfer rate between the internetwork drives. Int. J. Eng. Adv. Technol. 8(4), 1830–1835 (2019)

    Google Scholar 

  7. S. Myla, S.T. Marella, K. Karthikeya, B. Preetham, S.K. Hasane Ahammad, The rise of big data in the field of cloud analytics. Int. J. Emerging Technol. 10(4), 125–130 (2019)

    Google Scholar 

  8. N. Srinivasu, B. Yashaswi, Dynamic user management for secure cloud deduplication using enhanced checksum approach. Int. J. Innov. Technol. Explor. Eng. 8(7), 1585–1588 (2019)

    Google Scholar 

  9. R. Kaur, I. Chana, J. Bhattacharya, Data deduplication techniques for efficient cloud storage management: a systematic review. J. Supercomput. 74(5), 2035–2085 (2018)

    Article  Google Scholar 

  10. K. Ravindranath, Y.S.V. Balaji, B.M.M. Kumar, C.H. Chowdary, An efficient cloud storage management optimal with deduplication. Int. J. Innov. Technol. Explor. Eng. 8(6), 54–58 (2019)

    Google Scholar 

  11. A.K. Bashir, R. Arul, S. Basheer, G. Raja, R. Jayaraman, N.M. Qureshi, An optimal multitier resource allocation of cloud RAN in 5G using machine learning. Trans. Emerging Telecommun. Technol. 30(8), e3627 (2019)

    Google Scholar 

  12. K.A. Kumari, J.K. Sastry, K.R. Rao, Energy efficient load balanced optimal resource allocation scheme for cloud environment. Int. J. Recent Technol. Eng. (IJRTE) 8(1S3) (2019)

    Google Scholar 

  13. A.S. Kumar, M. Venkatesan, Multi-objective task scheduling using hybrid genetic-ant colony optimization algorithm in cloud environment. Wireless Pers. Commun. 107(4), 1835–1848 (2019)

    Article  Google Scholar 

  14. S.P. Praveen, K.T. Rao, An effective multi-faceted cost model for auto-scaling of servers in cloud, in Smart Intelligent Computing and Applications (Springer, Singapore, 2019), pp. 591–601

    Google Scholar 

  15. S. Sindhura, S.P. Praveen, S. Syedbi, V.K. Pratap, T.B. Krishna, An effective secure storage of data in cloud using ISSE encryption technique. Ann. Romanian Soc. Cell Biol. 1, 5321–5329 (2021)

    Google Scholar 

  16. L. Voleti, R.M. Balajee, S.K. Vallepu, K. Bayoju, D. Srinivas, A secure image steganography using improved LSB technique and Vigenere cipher algorithm, in 2021 International Conference on Artificial Intelligence and Smart Systems (ICAIS) (IEEE, 2021 Mar 25), pp. 1005–1010

    Google Scholar 

  17. N. Sunanda, N. Sriyuktha, P.S. Sankar, Revocable identity based encryption for secure data storage in cloud. Int. J. Innov. Technol. Explor. Eng. 8(7), 382–678 (2019)

    Google Scholar 

  18. P. Saranya, S. Sharavanan, R. Vijai, R.M. Balajee, Authentication scheme for session passwords using color and image. Int. J. Smart Sensing Intell. Syst. 15, 10 (2017)

    Google Scholar 

  19. N. Bhuvaneswari, M. Trinathbasu, M. Srisathvik, R.K. Tenali, Identity based security auditing for data sharing with sensitive information hiding using cloud storage. Int. J. Innov. Technol. Explor. Eng. 8(6), 1327–1333 (2019)

    Google Scholar 

  20. C. Thirumallai, M.S. Mekala, V. Perumal, P. Rizwan, A.H. Gandomi, Machine learning inspired phishing detection (pd) for efficient classification and secure storage distribution (ssd) for cloud-IoT application, in 2020 IEEE Symposium Series on Computational Intelligence (SSCI) (IEEE, 2020 Dec 1), pp. 202–210

    Google Scholar 

  21. S. Chaudhari, S.K. Pathuri, A comprehensive survey on public auditing for secure cloud storage. Int. J. Eng. Technol. 7(2.7), 565–569 (2018)

    Google Scholar 

  22. N. Chandrakala, B.T. Rao, Migration of virtual machine to improve the security of cloud computing. Int. J. Electr. Comput. Eng. 8(1), 210 (2018)

    Google Scholar 

  23. T.Y. Youn, K.Y. Chang, K.H. Rhee, S.U. Shin, Efficient client-side deduplication of encrypted data with public auditing in cloud storage. IEEE Access 15(6), 26578–26587 (2018)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Balajee, R.M., Jayanthi Kannan, M.K., Murali Mohan, V. (2022). Automatic Content Creation Mechanism and Rearranging Technique to Improve Cloud Storage Space. In: Smys, S., Balas, V.E., Palanisamy, R. (eds) Inventive Computation and Information Technologies. Lecture Notes in Networks and Systems, vol 336. Springer, Singapore. https://doi.org/10.1007/978-981-16-6723-7_7

Download citation

  • DOI: https://doi.org/10.1007/978-981-16-6723-7_7

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-16-6722-0

  • Online ISBN: 978-981-16-6723-7

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics