Secure Static Data De-duplication

被引:0
|
作者
Pawar, Rohit [1 ]
Zanwar, Payal [1 ]
Bora, Shruti [1 ]
Kullkarni, Shweta [1 ]
机构
[1] Savitribai Phule Pune Univ, Sinhgad Coll Engn, Dept Comp Engn, Pune 411041, Maharashtra, India
关键词
SHA-Secure Hash Algorithm; TTTD-Two Threshold Two Divisor;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Data de-duplication is a technique used to improve storage efficiency. In static data de-duplication system, Hashing is carried out at client side. Firstly hashing is done at file level. The de-duplicator identifies duplication by comparing existing hash values in metadata server. If match is found, then logical pointers are created for storing redundant data. If match doesn't exist, then same process is carried out at chunk level. Duplicated data chunks are identified and only one replica of the data is stored in storage. Logical pointers are created for other copies, instead of storing redundant data. If it is a new hash value, it will be recorded in metadata server and the file or corresponding chunk will be stored in file server and its logical path in terms of logical pointers is also stored in metadata server. Basically static de-duplicator is implemented with three components: interface, de-duplicator and storage. Interface carries out hashing of uploaded file and interfaces client with de-duplicator. After receiving hash value, de-duplicator carries out its function as mentioned above. The last component storage consists of file server and metadata server. Thus, de-duplication can reduce both storage space and network bandwidth.
引用
收藏
页码:69 / 73
页数:5
相关论文
共 50 条
  • [1] Flexible yet Secure De-duplication Service for Enterprise Data on Cloud Storage
    Chuan, Wen Bing
    Ren, Shu Qin
    Keoh, Sye Loong
    Aung, Khin Mi Mi
    [J]. 2015 INTERNATIONAL CONFERENCE ON CLOUD COMPUTING RESEARCH AND INNOVATION (ICCCRI), 2015, : 37 - 44
  • [2] Data Secure De-Duplication and Recovery Based on Public Key Encryption With Keyword Search
    Li, Le
    Zheng, Dong
    Zhang, Haoyu
    Qin, Baodong
    [J]. IEEE ACCESS, 2023, 11 : 28688 - 28698
  • [3] Data De-duplication on Similar File Detection
    Zhu, Yueguang
    Zhang, Xingjun
    Zhao, Runting
    Dong, Xiaoshe
    [J]. 2014 EIGHTH INTERNATIONAL CONFERENCE ON INNOVATIVE MOBILE AND INTERNET SERVICES IN UBIQUITOUS COMPUTING (IMIS), 2014, : 66 - 73
  • [4] Research on Chunking Algorithms of Data De-duplication
    Bo, Cai
    Li, Zhang Feng
    Can, Wang
    [J]. PROCEEDINGS OF THE 2012 INTERNATIONAL CONFERENCE ON COMMUNICATION, ELECTRONICS AND AUTOMATION ENGINEERING, 2013, 181 : 1019 - 1025
  • [5] Overview of Secure Distributed De-duplication System with Improved Reliability
    Junghare, Shweta A.
    Mahalle, V. S.
    [J]. PROCEEDINGS OF THE 2017 INTERNATIONAL CONFERENCE ON INVENTIVE SYSTEMS AND CONTROL (ICISC 2017), 2017, : 684 - 687
  • [6] An incremental clustering scheme for data de-duplication
    Gianni Costa
    Giuseppe Manco
    Riccardo Ortale
    [J]. Data Mining and Knowledge Discovery, 2010, 20 : 152 - 187
  • [7] Secure biometric authentication with de-duplication on distributed cloud storage
    Kumar, Vinoth M.
    Venkatachalam, K.
    Prabu, P.
    Almutairi, Abdulwahab
    Abouhawwash, Mohamed
    [J]. PEERJ COMPUTER SCIENCE, 2021, 7
  • [8] An incremental clustering scheme for data de-duplication
    Costa, Gianni
    Manco, Giuseppe
    Ortale, Riccardo
    [J]. DATA MINING AND KNOWLEDGE DISCOVERY, 2010, 20 (01) : 152 - 187
  • [9] Sequence of hashes compression in data de-duplication
    Balachandran, Subashini
    Constantinescu, Cornel
    [J]. DCC: 2008 DATA COMPRESSION CONFERENCE, PROCEEDINGS, 2008, : 505 - 505
  • [10] Secure data de-duplication based on threshold blind signature and bloom filter in internet of things
    Mi, Bo
    Li, Yang
    Darong, Huang
    Wei, Tiancheng
    Zou, Qianqian
    [J]. IEEE Access, 2020, 8 : 167113 - 167122