Deduplication of Cloud

Authors

  • Bhavesh R. Birhade Department of Computer Science and Engineering, Late G. N. Sapkal College of Engineering, Nashik, India
  • Aditi D. Ghumare Department of Computer Science and Engineering, Late G. N. Sapkal College of Engineering, Nashik, India
  • Swati S. Shinde Department of Computer Science and Engineering, Late G. N. Sapkal College of Engineering, Nashik, India
  • Kiran K. Nagare Department of Computer Science and Engineering, Late G. N. Sapkal College of Engineering, Nashik, India

Keywords:

Cloud computing, cloud solution, reliability, load balancing, encryption, secure de-duplication, data integrity

Abstract

Cloud computing enables on-demand network access to a shared pool of configurable computing resources such as servers, storage and applications. These shared resources can be rapidly provisioned to the consumers on the basis of paying only for whatever they use. Cloud storage refers to the delivery of storage resources to the consumers over the Internet. Private cloud storage is restricted to a particular organization and data security risks are high in cloud storage. Hence, private cloud storage is built by exploiting the commodity machines within the organization and the important data is stored in it. When the utilization of such private cloud storage increases, there will be an increase in the connection problem, performance & storage demand, privacy & security, data integrity. For connection problem we will implement offline data store & sync mechanism. Increase in storage demand leads to the expansion of the cloud storage with additional storage nodes. During such expansion, storage nodes in the cloud storage need to be balanced in terms of load. In order to maintain the load across several storage nodes, the data need to be migrated across the storage nodes. This data migration consumes more network bandwidth. The key idea behind this is to develop a dynamic load balancing algorithm based on de-duplication to balance the load across the storage nodes during the expansion of private cloud storage. For maintaining privacy, security & data integrity we will use AES algorithm & SHA algorithm. SHA algorithm also used to avoid duplication.

Downloads

Download data is not yet available.

Downloads

Published

23-05-2021

Issue

Section

Articles

How to Cite

[1]
B. R. Birhade, A. D. Ghumare, S. S. Shinde, and K. K. Nagare, “Deduplication of Cloud”, IJRESM, vol. 4, no. 5, pp. 113–116, May 2021, Accessed: Dec. 21, 2024. [Online]. Available: https://journal.ijresm.com/index.php/ijresm/article/view/743