Sasikumar et al., 2019 - Google Patents
Combining deduplication and string comparison for avoiding redundant data with enhanced authentication approach on cloudSasikumar et al., 2019
View PDF- Document ID
- 14244930686232271123
- Author
- Sasikumar R
- Priya S
- Publication year
- Publication venue
- IJARCCE
External Links
Snippet
Every day activity many number of data and file has been generated. Every organization wants to store and main that information with efficient manner. Efficient denotes, storage space utilization, securely maintaining the organization records, accessing records quickly …
- 238000013459 approach 0 title abstract description 9
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/06—Digital input from or digital output to record carriers, e.g. RAID, emulated record carriers, networked record carriers
- G06F3/0601—Dedicated interfaces to storage systems
- G06F3/0628—Dedicated interfaces to storage systems making use of a particular technique
- G06F3/0638—Organizing or formatting or addressing of data
- G06F3/064—Management of blocks
- G06F3/0641—De-duplication techniques
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30067—File systems; File servers
- G06F17/30091—File storage and access structures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30067—File systems; File servers
- G06F17/30129—Details of further file system functionalities
- G06F17/3015—Redundancy elimination performed by the file system
- G06F17/30156—De-duplication implemented within the file system, e.g. based on file segments
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30067—File systems; File servers
- G06F17/3007—File system administration
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30067—File systems; File servers
- G06F17/30182—File system types
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111147255B (en) | Data security service system, method and computer readable storage medium | |
JP6118778B2 (en) | System and method for securing data in motion | |
Ghani et al. | Issues and challenges in cloud storage architecture: a survey | |
Srinivasan | Is security realistic in cloud computing? | |
US9053343B1 (en) | Token-based debugging of access control policies | |
US10834289B2 (en) | Detection of steganography on the perimeter | |
KR20120029424A (en) | Secure and private backup storage and processing for trusted computing and data services | |
Gupta et al. | An approach towards big data—A review | |
Pandey | Implementation of DNA cryptography in cloud computing and using Huffman algorithm, socket programming and new approach to secure cloud data | |
Kamal et al. | Forensics chain for evidence preservation system: An evidence preservation forensics framework for internet of things‐based smart city security using blockchain | |
CA3171323A1 (en) | System and method for secure collection and display of sensitive data | |
Sasikumar et al. | Combining deduplication and string comparison for avoiding redundant data with enhanced authentication approach on cloud | |
CN109934008B (en) | Multi-task document management system based on permission level | |
Baligodugula et al. | A comparative study of secure and efficient data duplication mechanisms for cloud-based iot applications | |
Bhardwaj et al. | Dynamic Data Storage Auditing Services in Cloud Computing | |
Shahin et al. | Big data platform privacy and security, a review | |
Ghani et al. | Cloud storage architecture: research challenges and opportunities | |
Ramesh et al. | Public auditing for shared data with efficient user revocation in the cloud | |
Krylov et al. | Integration of distributed ledger technology into software electronic signature exchange service | |
Suresh | An Electronic Digital Library Using Integrated Security Methods and Cloud Storages | |
Patel et al. | An approach to analyze data corruption and identify misbehaving server | |
Zhang et al. | A survey on data security in network storage systems | |
Pavithra et al. | A New Approach for Security in Cloud Data Storage for IOT Applications Using Hybrid Cryptography Technique | |
Rijanandi et al. | Implementation of encrypt national ID card in Sinovi application use waterfall methodology | |
Jalil et al. | A survey on data integrity verification schemes in the cloud computing environment |