Data De-duplication Using Cuckoo Hashing in Cloud Storage

被引:0
|
作者
Sridharan, J. [1 ]
Valliyammai, C. [1 ]
Karthika, R. N. [1 ]
Kulasekaran, L. Nihil [1 ]
机构
[1] Anna Univ, Dept Comp Technol, MIT Campus, Chennai 600044, Tamil Nadu, India
关键词
Data de-duplication; Cuckoo hashing; Compression; Metadata; DEDUPLICATION;
D O I
10.1007/978-981-13-0514-6_67
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Cloud computing facilitates on-demand and ubiquitous access to a centralized pool of resources such as applications, networks, and storage services. Redundant copies of the same data are stored in multiple places, thus occupying more space in servers. Recent increase in computing leads to enormous volume of data, which are backed up and stored in cloud and made available to address consent, real-time insights and in regulating the data. In order to address the above problem, an enhanced cuckoo hashing algorithm is proposed for identifying duplicate data. Cuckoo hashing performs insertion, deletion, and retrieval in constant time. The metadata of files such as the basic file attributes, user-defined attributes, and user principal owner attributes is preserved after de-duplication. The experimental results show the efficiency of cuckoo hashing in the de-duplication of data chunks in the cloud environment.
引用
收藏
页码:707 / 715
页数:9
相关论文
共 50 条
  • [1] A study on data de-duplication schemes in cloud storage
    Kumar, Priyan Malarvizhi
    Usha Devi, G.
    Basheer, Shakila
    Parthasarathy, P.
    [J]. International Journal of Grid and Utility Computing, 2020, 11 (04): : 509 - 516
  • [2] A study on data de-duplication schemes in cloud storage
    Kumar, Priyan Malarvizhi
    Devi, G. Usha
    Basheer, Shakila
    Parthasarathy, P.
    [J]. INTERNATIONAL JOURNAL OF GRID AND UTILITY COMPUTING, 2020, 11 (04) : 509 - 516
  • [3] An Effective Data Storage Model for Cloud Databases using Temporal Data De-duplication Approach
    Muthurajkumar, S.
    Vijayalakshmi, M.
    Kannan, A.
    [J]. 2016 EIGHTH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING (ICOAC), 2017, : 42 - 45
  • [4] Data De-Duplication Process and Authentication Using ERCE with Poisson Filter in Cloud Data Storage
    Venkatesan, B.
    Chitra, S.
    [J]. INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2022, 34 (03): : 1603 - 1615
  • [5] Hashing Fingerprints for Identity De-duplication
    Wang, Yi
    Yuen, Pong C.
    Cheung, Yiu-ming
    [J]. PROCEEDINGS OF THE 2013 IEEE INTERNATIONAL WORKSHOP ON INFORMATION FORENSICS AND SECURITY (WIFS'13), 2013, : 49 - 54
  • [6] An efficient technique for cloud storage using secured de-duplication algorithm
    Mohan, Prakash
    Sundaram, Manikandan
    Satpathy, Sambit
    Das, Sanchali
    [J]. JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2021, 41 (02) : 2969 - 2980
  • [7] Provable Ownership of File in De-duplication Cloud Storage
    Yang, Chao
    Ren, Jian
    Ma, Jianfeng
    [J]. 2013 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2013, : 695 - 700
  • [8] Flexible yet Secure De-duplication Service for Enterprise Data on Cloud Storage
    Chuan, Wen Bing
    Ren, Shu Qin
    Keoh, Sye Loong
    Aung, Khin Mi Mi
    [J]. 2015 INTERNATIONAL CONFERENCE ON CLOUD COMPUTING RESEARCH AND INNOVATION (ICCCRI), 2015, : 37 - 44
  • [9] A NOVEL APPROACH FOR SECURING DATA DE-DUPLICATION METHODOLOGY IN HYBRID CLOUD STORAGE
    Bhaskar, Kameswari
    Sathiyavathi, R.
    Jayashree, R.
    Gladence, L. Mary
    Anu, V. Maria
    [J]. 2017 INTERNATIONAL CONFERENCE ON INNOVATIONS IN INFORMATION, EMBEDDED AND COMMUNICATION SYSTEMS (ICIIECS), 2017,
  • [10] Improving Accessing Efficiency of Cloud Storage Using De-Duplication and Feedback Schemes
    Wu, Tin-Yu
    Pan, Jeng-Shyang
    Lin, Chia-Fan
    [J]. IEEE SYSTEMS JOURNAL, 2014, 8 (01): : 208 - 218