De-Duplication Techniques: A Study
S. Usharani1, K. Dhanalakshmi2, N. Dhanalakshmi3
1S. Usharani, Associate Professor, Department of CSE, IFET College of Engineering, Villupuram (Tamil Nadu), India.
2Dr. K. Dhanalakshmi, Professor, Department of CSE, PSNA College of Engineering and Technology, Dindugul (Tamil Nadu), India.
3Dr. N. Dhanalakshmi, Assistant Professor, Department of CSE, PSNA College of Engineering and Technology, Dindugul (Tamil Nadu), India.
Manuscript received on 15 May 2019 | Revised Manuscript received on 19 May 2019 | Manuscript Published on 23 May 2019 | PP: 2058-2065 | Volume-7 Issue-6S5 April 2019 | Retrieval Number: F13700476S519/2019©BEIESP
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: De-duplication is the growing technology in storing the data over the cloud. De-duplication means avoiding the duplicate data(i.e) multiple copies of same data can be identified and rectified by de-duplication technique. De-duplication technique can apply to any type of storage data such as cloud storage, primary storage and secondary storage. In this Paper, we are going to see, how the de-duplication techniques can applied to data stored in the cloud storage and what are the difficulties will arise while doing in it. Because for security purpose, cloud stored the data in an encrypted or cipher data format. But de-duplication technique can’t be applied for ciphered or encrypted data. So how the challenges can overcome and de-duplication technique can be performed over cloud storage data will learn in this paper.
Keywords: Duplication Techniques Cloud Data Security.
Scope of the Article: Data Mining Methods, Techniques, and Tools