An efficient enhanced prefix hash tree model for optimizing the storage and image deduplication in cloud

被引:0
|
作者
Sujatha, G. [1 ]
Retnaraj, R. Jeberson [1 ]
机构
[1] Sathyabama Inst Sci & Technol, Sch Comp, Chennai, Tamil Nadu, India
来源
关键词
cloud storage space; deduplication; digital data; hash value; images; public cloud;
D O I
10.1002/cpe.7199
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The popularity of the cloud storage space mainly attracted organizations to store their data in them. Therefore, the avoidance of duplicate data contents is unavoidable and several users share the cloud storage space for data storage, and sometimes this makes higher storage space utilization. Because of the extremely high duplicate copy, memory wastage arises in the case of multimedia data. Identifying the final duplicate copies in the cloud takes more time. To overcome this problem, we employ a significant storage optimization model for deduplication. The digital data hash value is stored by requiring an additional memory space. This study proposed an enhanced prefix hash tree (EPHT) method to optimize the image and text deduplication system to reduce the overhead caused by this procedure. The efficiency of the proposed approach is compared with the interpolation search technique using different levels of tree height (2, 4, 2, 8, 16) in terms of space and time complexity. The proposed EPHT technique shows improvements in terms of speed and space complexity when the number of levels in the EPHT increases.
引用
收藏
页数:19
相关论文
共 50 条
  • [41] Distributed deduplication with fingerprint index management model for big data storage in the cloud
    Saraswathi, S. Sabeetha
    Malarvizhi, N.
    [J]. EVOLUTIONARY INTELLIGENCE, 2021, 14 (02) : 683 - 690
  • [42] Enabling Ternary Hash Tree Based Integrity Verification for Secure Cloud Data Storage
    Thangavel, M.
    Varalakshmi, P.
    [J]. IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2020, 32 (12) : 2351 - 2362
  • [43] Dynamic Data Integrity Auditing Based on Hierarchical Merkle Hash Tree in Cloud Storage
    Liu, Zhenpeng
    Wang, Shuo
    Duan, Sichen
    Ren, Lele
    Wei, Jianhang
    [J]. ELECTRONICS, 2023, 12 (03)
  • [44] A chameleon hash authentication tree optimisation audit for data storage security in cloud calculation
    Bo, Yang
    [J]. Bo, Yang (bobogod08@163.com), 1600, Inderscience Publishers, 29, route de Pre-Bois, Case Postale 856, CH-1215 Geneva 15, CH-1215, Switzerland (11): : 2 - 3
  • [45] An Efficient Cloud Storage Model for Heterogeneous Cloud Infrastructures
    Wang, Dejun
    [J]. PEEA 2011, 2011, 23
  • [46] Combinatorial Optimization Design of Search Tree Model Based on Hash Storage
    Liu, Yun
    Li, Jiajun
    Chen, Jingjing
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2023, 14 (05) : 702 - 709
  • [47] FASTEN: Towards a FAult-tolerant and STorage EfficieNt Cloud: Balancing Between Replication and Deduplication
    Ahmed, Sabbir
    Nahiduzzaman, Md
    Islam, Tariqul
    Bappy, Faisal Haque
    Zaman, Tarannum Shaila
    Hasan, Raiful
    [J]. 2024 IEEE 21ST CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE, CCNC, 2024, : 44 - 50
  • [48] Enabling Efficient Deduplication and Secure Decentralized Public Auditing for Cloud Storage: A Redactable Blockchain Approach
    Mishra, Rahul
    Ramesh, Dharavath
    Kanhere, Salil S.
    Edla, Damodar Reddy
    [J]. ACM TRANSACTIONS ON MANAGEMENT INFORMATION SYSTEMS, 2023, 14 (03)
  • [49] Security-Aware and Efficient Data Deduplication for Edge-Assisted Cloud Storage Systems
    Xie, Qingyuan
    Zhang, Chen
    Jia, Xiaohua
    [J]. IEEE TRANSACTIONS ON SERVICES COMPUTING, 2023, 16 (03) : 2191 - 2202
  • [50] Two-party interactive secure deduplication with efficient data ownership management in cloud storage
    Guo, Cheng
    Wang, Litao
    Tang, Xinyu
    Feng, Bin
    Zhang, Guofeng
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2023, 73