http://www.iaeme.com/IJARET/index.asp 535 editor@iaeme.com
International Journal of Advanced Research in Engineering and Technology (IJARET)
Volume 11, Issue 10, October 2020, pp. 535-544, Article ID: IJARET_11_10_057
Available online at http://www.iaeme.com/IJARET/issues.asp?JType=IJARET&VType=11&IType=10
ISSN Print: 0976-6480 and ISSN Online: 0976-6499
DOI: 10.34218/IJARET.11.10.2020.057
© IAEME Publication Scopus Indexed
PIONEER APPROACH DATA DEDUPLICATION
TO REMOVE REDUNDANT DATA FROM
CLOUD STORAGE
A. Vijayakumar
Research Scholar, PG and Research Department of Computer Science, Govt. Arts and Science
College, Lalgudi, Affliated to Bharathidasan University, Trichy, Tamilnadu, India.
Dr. A. Nisha Jebaseeli
Assistant Professor and Head, Department of Computer Science, Govt. Arts and Science
College, Lalgudi, Affliated to Bharathidasan University, Trichy, Tamilnadu, India.
ABSTRACT
Cloud is the newest technology in the IT world to provide vast virtual storage,
storage and retention of information. Cloud Storage is the leading service in the
cloud; it is used by all users at all levels. A challenge is to prevent the store of
unnecessary and duplicated data of various users by cloud storage providers.
Discharge from storage data replication is a vital task. Cloud data duplicate makes
cloud storage management incompatible. This paper recommends that redundant
cloud store data be eradicated. The proposed solution uses file and block
deduplication of data. For file level deductions, the data were reviewed. It separates
blocks and deduplicates blocks if the data file is not duplicated. Deduplication for safe
deduplication uses convergent key coding. A separate consumer with convergent
encryption with the same key can encrypt the same data file to protect deductibility.
Convergent key sharing is more attack prone Convergent key and other sensitive data
are safely maintained; the paper introduces the Cloud-based Creating and Managing
Keys (KGTMaaaS) service to remove duplicate data. This proposal removes
redundant data from cloud storage effectively and saves unwelcome storage allotment,
network bandwidth, and allows proper cloud storage.
Key words: Deduplication, Block-level deduplication, Convergent Encryption, File-
level deduplication
Cite this Article: A. Vijayakumar and Dr. A. Nisha Jebaseeli, Determining Risk
Factors in the Development of Road Traffic Infrastructure in PPP Form in Vietnam,
International Journal of Advanced Research in Engineering and Technology, 11(10),
2020, pp. 535-544.
http://www.iaeme.com/IJARET/issues.asp?JType=IJARET&VType=11&IType=10