International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
|
Volume 137 - Issue 8 |
Published: March 2016 |
Authors: Vruti Satish Radia, Dheeraj Kumar Singh |
![]() |
Vruti Satish Radia, Dheeraj Kumar Singh . Secure Deduplication Techniques: A Study. International Journal of Computer Applications. 137, 8 (March 2016), 41-43. DOI=10.5120/ijca2016908874
@article{ 10.5120/ijca2016908874, author = { Vruti Satish Radia,Dheeraj Kumar Singh }, title = { Secure Deduplication Techniques: A Study }, journal = { International Journal of Computer Applications }, year = { 2016 }, volume = { 137 }, number = { 8 }, pages = { 41-43 }, doi = { 10.5120/ijca2016908874 }, publisher = { Foundation of Computer Science (FCS), NY, USA } }
%0 Journal Article %D 2016 %A Vruti Satish Radia %A Dheeraj Kumar Singh %T Secure Deduplication Techniques: A Study%T %J International Journal of Computer Applications %V 137 %N 8 %P 41-43 %R 10.5120/ijca2016908874 %I Foundation of Computer Science (FCS), NY, USA
Currently usage of cloud storage is increasing and to overcome increasing data issue, Data deduplication techniques are used. Moreover the Cloud storage service is provided by third party cloud providers thus security of data is needed. Data Deduplication techniques cannot be applied directly with security mechanisms. Thus here in this paper we would be discussing data deduplication techniques along with securing techniques thus forming secure deduplication.