International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
|
Volume 148 - Issue 8 |
Published: Aug 2016 |
Authors: Ashwini Shete, B. M. Patil |
![]() |
Ashwini Shete, B. M. Patil . Deduplication in Hybrid Cloud with Secure Data. International Journal of Computer Applications. 148, 8 (Aug 2016), 32-36. DOI=10.5120/ijca2016911254
@article{ 10.5120/ijca2016911254, author = { Ashwini Shete,B. M. Patil }, title = { Deduplication in Hybrid Cloud with Secure Data }, journal = { International Journal of Computer Applications }, year = { 2016 }, volume = { 148 }, number = { 8 }, pages = { 32-36 }, doi = { 10.5120/ijca2016911254 }, publisher = { Foundation of Computer Science (FCS), NY, USA } }
%0 Journal Article %D 2016 %A Ashwini Shete %A B. M. Patil %T Deduplication in Hybrid Cloud with Secure Data%T %J International Journal of Computer Applications %V 148 %N 8 %P 32-36 %R 10.5120/ijca2016911254 %I Foundation of Computer Science (FCS), NY, USA
Deduplication is also called single instance technique, deduplication remove redundant data and stores original copy of data so it will saves the storage space to protect sensitive data. The data security and access to particular data is very much important in current days hence the features in deduplication have been widely used in cloud storage system. There was drawback in previous work where differential privileges of users are set permanently so any client can access any files which are not authorized to specific user. To overcome the drawback of the previous work, we are concentrated on client privileges which will grant or revoke the file access permissions to specific client. With deduplication technique, the client data is secured with advanced encryption algorithm rather than conventional encryption algorithm in hybrid cloud. In previous work convergent encryption technique was used with deduplication which does not provide the security to data. To better enhancement of the security of data, client has given specific permission to access the data, which is more enhanced security system for data security .Our simulation results shows that increase in security of data.