[go: up one dir, main page]

Sasikumar et al., 2019 - Google Patents

Combining deduplication and string comparison for avoiding redundant data with enhanced authentication approach on cloud

Sasikumar et al., 2019

View PDF
Document ID
14244930686232271123
Author
Sasikumar R
Priya S
Publication year
Publication venue
IJARCCE

External Links

Snippet

Every day activity many number of data and file has been generated. Every organization wants to store and main that information with efficient manner. Efficient denotes, storage space utilization, securely maintaining the organization records, accessing records quickly …
Continue reading at www.researchgate.net (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from or digital output to record carriers, e.g. RAID, emulated record carriers, networked record carriers
    • G06F3/0601Dedicated interfaces to storage systems
    • G06F3/0628Dedicated interfaces to storage systems making use of a particular technique
    • G06F3/0638Organizing or formatting or addressing of data
    • G06F3/064Management of blocks
    • G06F3/0641De-duplication techniques
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30067File systems; File servers
    • G06F17/30091File storage and access structures
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30067File systems; File servers
    • G06F17/30129Details of further file system functionalities
    • G06F17/3015Redundancy elimination performed by the file system
    • G06F17/30156De-duplication implemented within the file system, e.g. based on file segments
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30067File systems; File servers
    • G06F17/3007File system administration
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30067File systems; File servers
    • G06F17/30182File system types

Similar Documents

Publication Publication Date Title
CN111147255B (en) Data security service system, method and computer readable storage medium
JP6118778B2 (en) System and method for securing data in motion
Ghani et al. Issues and challenges in cloud storage architecture: a survey
Srinivasan Is security realistic in cloud computing?
US9053343B1 (en) Token-based debugging of access control policies
US10834289B2 (en) Detection of steganography on the perimeter
KR20120029424A (en) Secure and private backup storage and processing for trusted computing and data services
Gupta et al. An approach towards big data—A review
Pandey Implementation of DNA cryptography in cloud computing and using Huffman algorithm, socket programming and new approach to secure cloud data
Kamal et al. Forensics chain for evidence preservation system: An evidence preservation forensics framework for internet of things‐based smart city security using blockchain
CA3171323A1 (en) System and method for secure collection and display of sensitive data
Sasikumar et al. Combining deduplication and string comparison for avoiding redundant data with enhanced authentication approach on cloud
CN109934008B (en) Multi-task document management system based on permission level
Baligodugula et al. A comparative study of secure and efficient data duplication mechanisms for cloud-based iot applications
Bhardwaj et al. Dynamic Data Storage Auditing Services in Cloud Computing
Shahin et al. Big data platform privacy and security, a review
Ghani et al. Cloud storage architecture: research challenges and opportunities
Ramesh et al. Public auditing for shared data with efficient user revocation in the cloud
Krylov et al. Integration of distributed ledger technology into software electronic signature exchange service
Suresh An Electronic Digital Library Using Integrated Security Methods and Cloud Storages
Patel et al. An approach to analyze data corruption and identify misbehaving server
Zhang et al. A survey on data security in network storage systems
Pavithra et al. A New Approach for Security in Cloud Data Storage for IOT Applications Using Hybrid Cryptography Technique
Rijanandi et al. Implementation of encrypt national ID card in Sinovi application use waterfall methodology
Jalil et al. A survey on data integrity verification schemes in the cloud computing environment