2022
DOI: 10.1155/2022/8354903
|View full text |Cite|
|
Sign up to set email alerts
|

Dynamic Deduplication Algorithm for Cross-User Duplicate Data in Hybrid Cloud Storage

Abstract: The escalating growth of distributed big data in hybrid cloud storage architecture introduces a new set of challenges. Constantly, content enrichment puts pressure on capacity. Nonetheless, the explosion of user data places a significant strain on broadband and storage capacity. Consequently, many cloud storage providers will implement deduplication to compress data, reduce transfer bandwidth, and reduce cloud storage space. In cloud storage systems, it is a data compression and storage optimization method. By… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(8 citation statements)
references
References 15 publications
0
8
0
Order By: Relevance
“…The economic model for Hybrid Encrypted Cloud Data Deduplication (H-DEDU) (Ref [11]) introduces an intriguing perspective by incorporating economic considerations into the decision-making process for stakeholders. MTHDedup's deduplication strategy (Ref [12]) stands out for its resilience against internal and external attacks through the use of Merkle hash trees. The hybrid deduplication technique using Euclidean distance and chromatic correlation clustering (Ref [13]) addresses the limitations of existing methods, presenting a cost-effective and time-e cient approach.…”
Section: Results and Analysismentioning
confidence: 99%
See 2 more Smart Citations
“…The economic model for Hybrid Encrypted Cloud Data Deduplication (H-DEDU) (Ref [11]) introduces an intriguing perspective by incorporating economic considerations into the decision-making process for stakeholders. MTHDedup's deduplication strategy (Ref [12]) stands out for its resilience against internal and external attacks through the use of Merkle hash trees. The hybrid deduplication technique using Euclidean distance and chromatic correlation clustering (Ref [13]) addresses the limitations of existing methods, presenting a cost-effective and time-e cient approach.…”
Section: Results and Analysismentioning
confidence: 99%
“…In ref [12] Presents an MTHDedup deduplication method based totally on Merkle hash bushes to deal with convergent encryption vulnerabilities. The approach complements records security by constructing Merkle hash timber and the usage of additional encryption algorithms at some stage in the report-and block-degree deduplication.…”
Section: Literature Reviewmentioning
confidence: 99%
See 1 more Smart Citation
“…An additional key managing server is used to generate encryption keys. For block-level deduplication, Gang et al [20] proposed a Merkle tree based deduplication model. This scheme deploys an additional server to compute blocklevel encryption keys.…”
Section: Related Workmentioning
confidence: 99%
“…In this way, convergent encryption allows the deduplication of the encrypted files. Several recent state-of-the-art schemes [18,20,24,25,46,47,52] present variants of convergent encryption. However, these schemes are vulnerable to dictionary attacks as they use deterministic encryption.…”
Section: Introductionmentioning
confidence: 99%