Efficient Deduplication with Security Using Jenkins and Recovery Techniques
Data deduplication is a method of tumbling stowage needs by eliminating redundant data. Only one unique occasion of the data is actually retained on storage broadcasting. Redundant data is replaced with a pointer to the unique data copy and it has been widely used in cloud packing to reduce the amount of storage space and save bandwidth. To protect the concealment of sensitive data while supporting deduplication, Jenkins hash function (JHF) techniques has been proposed to encrypt the data before outsourcing. To enhanced protect data security, it makes the first endeavour to formally address the problem of authorized data deduplication. The several deduplication techniques are implemented in hybrid Cloud architecture. In additionally implement the Log-based Recovery technique in hybrid cloud. Our proposed system is implemented for text file, pdf file, book,image and video, it also verify the confidentiality of private cloud. Simulation result shows that the proposed system authorized duplicate check scheme incurs minimal overhead when compared to normal operations and also it decreases the authorization parameters to above 60%.
To read the full article Download Full Article