Skip to main content

A Review on Data Deduplication Techniques in Cloud

  • Conference paper
  • First Online:
Embedded Systems and Artificial Intelligence

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1076))

Abstract

Day by day the usage of smart devices is increasing and communication between devices which improves data growth in cloud storage. The growth of data affects the performance of storage system. The data deduplication system can optimize performance of data storage by eliminating redundant data, reducing storage cost and improves storage utilization. Deduplication technique classified into few types based on that it produces results. Along with that data deduplication performs on encrypted data will be used to prevent unauthorized users from accessing data. Subsequently, various methods perform deduplication (file or block level) safely over encrypted data in cloud. This paper represents different methods which have used different deduplication technique.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. OpenDedup: OpenDedup, global inline deduplication for block storage and files. [Online] 2012 Available from: http://opendedup.org/index.php

  2. Douceur, J., Adya, A., Bolosky, W., Simon, D., Theimer, M.: Reclaiming space from duplicate files in a server less cloud file system. In: Cloud Computing Systems, 2002. Proceedings of 22nd International Conference on IEEE, pp. 617–624 (2002)

    Google Scholar 

  3. Drop Box: http://www.dropbox.com. Tion

  4. AmazonS3: http://aws/amazon.com/s3s

    Google Scholar 

  5. Google Drive: http://www.drive.google.com

  6. SNIA: Advanced deduplication concepts. [Online] 2011. Available from http://www.snia.org/sites/default/education/tutorials/2011/fall/DataProtectionManagement/ThomasRiveria_Advanced_Dedupe_Concepts_FINAL.pdf

  7. http://searchdatabackup.techtarget.com/tip/Where-and-how-to-use-data-deduplication-technology-in-disk-based-backup

  8. Meyer, D.T., Bolosky, W.J.: A study of practical deduplication. ACM Trans. Storage (TOS) 7(4), 14 (2012)

    Google Scholar 

  9. Yang, C., Ma, J., Ren, J.: Provable ownership of encrypted files in de-duplication cloud storage. Ad Hoc Sens. Wireless Netw. 26(1-4), 43–72 (2015)

    Google Scholar 

  10. Li, J., Li, Y.K., Chen, X., Lee, P.P.C., Lou, W.: A hybrid cloud approach for secure authorized deduplication. Parallel CloudSystems Trans. IEEE 26(5), 1206–1216 (2015)

    Article  Google Scholar 

  11. Halevi, S., Harnik, D., Pinkas, B., Shulman-Peleg, A.: Proofs of ownership in remote storage systems. In: Proceedings of ACM Conference on Computer and Communications Security, pp. 491–500 (2011)

    Google Scholar 

  12. Bellare, M., Keelveedhi, S., Ristenpart, T.: Message-locked encryption and secure deduplication. In: Advances in Cryptology–EUROCRYPT 2013, pp. 296–312. Springer, Berlin, Heidelberg (2013)

    Google Scholar 

  13. Miguel, R., Aung, K.M.M.: HEDup: secure deduplication with homomorphic encryption. In: International Conference on Networking, Architecture and Storage (NAS), 2015 IEEE, pp. 215–223 (2015)

    Google Scholar 

  14. Bellare, M., Keelveedhi, S., Ristenpart, T.: DupLess: server-aided encryption for deduplicated storage. In: Proceedings of the 22nd USENIX Conference on Security. USENIX Association (2013)

    Google Scholar 

  15. Chen, R., Mu, Y., Yang, G., Guo, F.: BL-MLE: block-level message-locked encryption for secure large file deduplication. Inf. Forensics Sec. IEEE Trans. 26(12), 2643–2652 (2015)

    Article  Google Scholar 

  16. Puzio, P., Molva, R., Önen, M., Loureiro, S.: ClouDedup: secure deduplication with encrypted data for cloud storage. In: 2013 IEEE 5th International Conference on Cloud Computing Technology and Science (CloudCom), vol. 1, pp. 363–370 (2013)

    Google Scholar 

  17. Bugiel, S., Nurnberger, S., Sadeghi, A., Schneider, T.: Twin clouds: an architecture for secure cloud computing. In: Proceedings of Workshop Cryptography Security Clouds, pp. 32–44 (2011)

    Google Scholar 

  18. Storer, M.W., Greenan, K., Long, D.D.E., Miller, E.L.: Secure data deduplication. In: Proceedings of 4th ACM International Workshop Storage Security Survivability, pp. 1–12 (2008)

    Google Scholar 

  19. Li, J., Chen, X., Huang, X., Tang, S., Xiang, Y., Hassan, M., Alelaiwi, A.H.: Secure cloud deduplication systems with improved reliability. Comput. IEEE Trans. 64(12), 3569–3579 (2015)

    Article  MathSciNet  Google Scholar 

  20. Blakley, G.R., Meadows, C.: Security of ramp schemes. Proc. Adv. Cryptol. 196, 242–268 (1985)

    Article  MathSciNet  Google Scholar 

  21. Santis, A.D., Masucci, B.: Multiple ramp schemes. IEEE Trans. Inf. Theory 45(5), 1720–1728 (1999)

    Article  MathSciNet  Google Scholar 

  22. Zhou, Y., Feng, D., Xia, W., Fu, M., Huang, F., Zhang, Y., Li, C.: SecDep: a user-aware efficient fine- grained secure deduplication scheme with multi-level key management. In: 2015 31st Symposium on Mass Storage Systems and Technologies (MSST), pp. 1–14 (2015)

    Google Scholar 

  23. Shamir, A.: How to share a secret. Commun. ACM 22(11), 612–613 (1979)

    Article  MathSciNet  Google Scholar 

  24. Stanek, J., Sorniotti, A., Androulaki, E., Kencl, L.: A secure data deduplication scheme for cloud storage. In: Technology Report IBM Research, Zurich, ZUR 1308-022 (2013)

    Google Scholar 

  25. Li, J., Chen, X., Li, M., Li, J., Lee, P.P.C., Lou, W.: Secure deduplication with efficient and reliable convergent key management. Parallel CloudSyst. IEEE Trans 25(6), 1615–1625 (2014)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to E. Swetha .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Mahesh, B., Pavan Kumar, K., Ramasubbareddy, S., Swetha, E. (2020). A Review on Data Deduplication Techniques in Cloud. In: Bhateja, V., Satapathy, S., Satori, H. (eds) Embedded Systems and Artificial Intelligence. Advances in Intelligent Systems and Computing, vol 1076. Springer, Singapore. https://doi.org/10.1007/978-981-15-0947-6_78

Download citation

Publish with us

Policies and ethics