Thursday, 25 Feb, 2021

+91-9899775880

011-28082485

011-47044510

Prevention of Big Data by Secure Deduplication in Cloud Storage

International Journal of Research in Signal Processing, Computing & Communication System Design

Volume 4 Issue 2

Published: 2018
Author(s) Name: Rashmi Gopalrao Mate and Mohd. Saif Wajid | Author(s) Affiliation: M.Tech Student, CSE Department, Babu Banarasi Das University, Lucknow, Uttar Pradesh. India.
Locked Subscribed Available for All

Abstract

As we seen Big data include a huge amount of data or massive data. Nowadays generation big data increases everywhere like microblogs and cloud storage also. Big data have three basic characteristics, velocity, volume, and variety. It is important to think about the storage capacity of cloud, speed and time while uploading and downloading the data in the cloud. Deduplication scheme utilizes to reduce the area and bandwidth requirements of services by removing redundant data and storing a single instance of them in the cloud storage. The powerfulness of deduplication method has occurred when multiple utiliser outsource the same data to turn out to cloud storage server. But somewhere we can get a problem of security and ownership. Recently several deduplication techniques have been seen to solve this matter of security, ownership, and operation on big data can generate in the cloud. Consideration to this we devise a server-side deduplication method to prevent big data in cloud storage for encrypted data. It permits utiliser to outsource the data even when ownership changes dynamically by exploiting randomized convergent encryption and secure ownership group key distribution. By using deduplication we try to reduce space and save the time while uploading and downloading the data in cloud storage. The proposed scheme is almost effective, preventing big data and saving time. In this paper we use this method in cloud storage onwards we try to use anywhere if there is big data available.

Keywords: Big data, Cloud storage, Deduplication, Dynamic ownership, Encryption.

View PDF

Refund policy | Privacy policy | Copyright Information | Contact Us | Feedback © Publishingindia.com, All rights reserved