Data Storage Management in Cloud Computing Using Deduplication Technique

International Journal of Computer Science and Engineering
© 2020 by SSRG - IJCSE Journal
Volume 7 Issue 7
Year of Publication : 2020
Authors : Marcel Chibuzor Amaechi, Matthias Daniel, Bennett E.O

pdf
How to Cite?

Marcel Chibuzor Amaechi, Matthias Daniel, Bennett E.O, "Data Storage Management in Cloud Computing Using Deduplication Technique," SSRG International Journal of Computer Science and Engineering , vol. 7,  no. 7, pp. 1-7, 2020. Crossref, https://doi.org/10.14445/23488387/IJCSE-V7I7P101

Abstract:

Duplication of data stored in the cloud occupies more space. However, during data update, duplicate data must be changed in more than one place, which is more complex to rectify and would increase operational cost in cloud. This research aim at developing data storage management in cloud computing using deduplication technique. Objectoriented methodology was used. Data deduplication has been achieved via block level deduplication and key generation (symmetric algorithm). The data file was divided into number of blocks and of fixed length. Each block was divided into segments and the files were saved only once. However, each file was converted into cipher text (key form) using symmetric algorithm, the system checked for existence of key and excluded redundant key maintaining only one copy of the key in the cloud storage, the stored key was shrinked to reduce the storage space using ShrinKey algorithm and rejection algorithm was used to remove replicated key. System was implemented in Java programming language. File in cloud appeared in encrypted key with size of 16bytes thereby storage space was minimized. The system supported data privacy since data stored in cloud was encrypted and user privacy was supported, as data was uploaded by different users.

Keywords:

Deduplication, Data storage management, Cloud computing

References:

[1] Chen, R. “Secure Data Storage and Retrieval in Cloud Computing. Doctor of Philosophy thesis, School of Computing and Information Technology”, University of Wollongong. http://www.ro.uow.edu.au/theses/4648,(2016).
[2] Kaanichie, N. “Cloud Data Storage Security based on Cryptographic Mechanisms”. Telecom Sudparis in Partnership with Pierre Et Marie Curie University. (2014).
[3] Sangeetha, A and Geetha, K. “Heterogeneous Data Storage Management with Deduplication in Cloud Computing.” Asian Journal of Applied Science and Technology (AJAST) (Open Access Quarterly International Journal) 2(2), pp (840-845). (2018).
[4] Li, J., Jia, C., Li, J and Liu, Z. “A Novel Framework for Outsourcing and Sharing Searchable Encrypted Data on Hybrid Cloud,” Fourth International Conference on Intelligent Networking and Collaborative Systems, pp(1–7). (2012).
[5] Yan, Z., Ding, W. X and Zhu, H. Q. "A scheme to manage encrypted data storage with deduplication in cloud," in Proc. of ICA3PP, pp (547-561), Springer, (2015).
[6] Bethencourt, J., Sahai, A and Waters, B. "Ciphertext-policy attribute-based encryption," in Proc. of IEEE Symp. Secure Privacy (07), pp(321-334), (2007).
[7] Hur, J., Koo, D., Shin, Y and Kang, K. “Secure Data Deduplication with Dynamic Ownership Management in Cloud Storage,” IEEE Trans. Knowl.Data Eng., 28, (11), pp (3113-3125), (2016).
[8] Singh, A and Tech, G. “Server-Storage Virtualization: Integration and Load Balancing in Data Centers,” In International Conference for High Performance Computing, Networking, Storage and Analysis, pp(1-12), (2008).
[9] Drago, I., Mellia, M., Munafo, M., Sperotto, A., Sadre, R and Pras, A. Inside Dropbox. The ACM Conference, 481. (2012).
[10] Geel, M. Cloud Storage: File Hosting and Synchronisation 2.0. [Online] Available at: https://www.vis.ethz.ch/de/visionen/pdfs/2012/visionen_20
12_3.pdf?end=15&start=11, (2013).[11] Abu-Libdeh, H., Princehouse L and Weatherspoon, H “Racs: a case for cloud storage diversity,” in Proceedings of the 1st ACM symposium on Cloud computing, ser. SoCC ’10, pp(229–240). [Online]. Available: http://www.cs.cornell.edu/projects/racs/pubs/racssocc2010. pdf, (2010).
[12] Bessani, A., Correia, M., Quaresma, B., André, F and Sousa, P. “Depsky: dependable and secure storage in a cloud-ofclouds,” in Proceedings of the sixth conference on Computer systems, ser. EuroSys ’11. ACM, pp(31–46). [Online]. Available: http://www.gsd.inescid. pt/~mpc/pubs/eurosys219-bessani.pdf, (2011).
[13] Bermbach, D., Klems, M., Tai, S and Menzel, M. “Metastorage: A federated cloud storage system to manage consistency-latency tradeoffs,” in Cloud Computing (CLOUD), IEEE International Conference on, pp (452–459), (2011).
[14] Blount, M., McGregor, C., James, A., Sow, D., Kamaleswaran, R., Tuuha, S., Percival, Jand Percival, N. On the Integration of an Artifact System and a Real-Time Healthcare Analytics System.In Proceedings of the 1st ACM International Health Informatics Symposium,Arlington, Virginia, USA.pp (647–655), (2010).