This paper is published in Volume-2, Issue-4, 2016
Area
Computer Science Engineering
Author
Sonam Bhardwaj, Poonam Dabas
Org/Univ
UIET, Kurukshetra, India
Keywords
Deduplication, Cloud, SHA1
Citations
IEEE
Sonam Bhardwaj, Poonam Dabas. Review Data De-Duplication by Encryption Method, International Journal of Advance Research, Ideas and Innovations in Technology, www.IJARIIT.com.
APA
Sonam Bhardwaj, Poonam Dabas (2016). Review Data De-Duplication by Encryption Method. International Journal of Advance Research, Ideas and Innovations in Technology, 2(4) www.IJARIIT.com.
MLA
Sonam Bhardwaj, Poonam Dabas. "Review Data De-Duplication by Encryption Method." International Journal of Advance Research, Ideas and Innovations in Technology 2.4 (2016). www.IJARIIT.com.
Sonam Bhardwaj, Poonam Dabas. Review Data De-Duplication by Encryption Method, International Journal of Advance Research, Ideas and Innovations in Technology, www.IJARIIT.com.
APA
Sonam Bhardwaj, Poonam Dabas (2016). Review Data De-Duplication by Encryption Method. International Journal of Advance Research, Ideas and Innovations in Technology, 2(4) www.IJARIIT.com.
MLA
Sonam Bhardwaj, Poonam Dabas. "Review Data De-Duplication by Encryption Method." International Journal of Advance Research, Ideas and Innovations in Technology 2.4 (2016). www.IJARIIT.com.
Abstract
Data deduplication is a technique to improve the storage utilization. De-duplication technologies can be designed to work on primary storage as well as on secondary storage. De-duplication with the use of chunking Data that is passed through the de-duplication engine is chunked into smaller units and assigned identities using crystallographic hash functions. Thereafter, two chunks of data are compared to ascertain whether they have the same identity. Chunking for de-duplication can be frequency based or content based. Frequency based chunking identifies high frequencies of occurrences of data chunks. The algorithm uses this frequency information to enhance data duplication gain.