Improving Security and Storage availability in Deduplication Storage System

International Journal of Computer Science and Engineering
© 2017 by SSRG - IJCSE Journal
Volume 4 Issue 5
Year of Publication : 2017
Authors : Miss. Jayashri Patil, Dr. Sunita Barve, Mrs. Mayura Kulkarni

pdf
How to Cite?

Miss. Jayashri Patil, Dr. Sunita Barve, Mrs. Mayura Kulkarni, "Improving Security and Storage availability in Deduplication Storage System," SSRG International Journal of Computer Science and Engineering , vol. 4,  no. 5, pp. 10-13, 2017. Crossref, https://doi.org/10.14445/23488387/IJCSE-V4I5P103

Abstract:

In large scale storage system, data Deduplication has gain more popularity and attention. Data Deduplication storage system, which manages detecting duplicate data and storing data over the nodes. To protect data T-coloring is used .This prevent unauthorized access of data from other users. Deduplication is one such storage optimization technique that avoids storing duplicate copies of data and only one occurrence of the data is stored on storage media. It is essentially a compression method for removing redundant data. As a Space efficient method data deduplication is used in storage system to data backup. Storage space is saved by removing redundant data and also in network storage system the transmission of duplicate data is minimize. Scalability of fingerprint-index search for centralized data Deduplication is main challenge. Fingerprint index is maintained of stored data. Fragmentation of file is done and stored on different nodes. We use fragment placement algorithm for placing the data on different storage node that effectively achieves high level of security in deduplication storage system.T-coloring is used for selecting node to place fragment of particular file

Keywords:

Deduplication, Similarity, Locality, Storage System.

References:

[1] W. Xia, H. Jiang, D. Feng and Y. Hua, ”Similarity and Locality Based Indexing for High Performance Data Deduplication,” in IEEE Transactions on Computers, vol. 64, no. 4, pp. 1162-1176, April 2015.
[2] M. Ali, K. Bilal,S. Khan, B. Veeravalli,K. Li, A. Zomaya, DROPS: Division and Replication of Data in the Cloud for Optimal Performance and Security, IEEE Transactions on Cloud Computing , vol.PP, no.99, pp.1-1.
[3] B. Mao, H. Jiang, S. Wu and L. Tian, POD: Performance Oriented I/O Deduplication for Primary Storage Systems in the Cloud,(2014) pp. 767-776.
[4] W. Xia, H. Jiang, D. Feng and L. Tian, DARE A Deduplication-Aware Resemblance Detection and Elimination Scheme for Data Reduction with Low Overheads, IEEE Transactions on Computers, vol. 65, no. 6, pp. 1692-1705, June 1 2016.
[5] T. Yang, H. Jiang, D. Feng, Z. Niu, K. Zhou and Y. Wan DEBAR: A scalable high-performance de-duplication storage system for backup and archiving,(2010) pp. 1-12.
[6] C. Li, S. Wang, Xiaochunyun, X. Zhou and G. Wu, MMD: An Approach to Improve Reading Performance in Deduplication Systems ( 2014)pp.93-97.
[7] J. Liu, Y. Chai, C. Yan and X. Wang, A Delayed Container Organization Approach to Improve Restore Speed for Deduplication Systems, IEEE Transactions on Parallel and Distributed Systems, vol. 27, no. 9, pp. 2477- 2491, Sept. 1 2016.
[8] J. Li, X. Chen, M. Li, J. Li, P. P. C. Lee and W. Lou, Secure Deduplication with Ecient and Reliable Convergent Key Management,in IEEE Transactions on Parallel and Distributed Systems, vol. 25, no. 6, pp. 1615-1625, June 2014.
[9] D. Meyer and W. Bolosky, A study of practical deduplication, Feb. 2011, pp. 229-241