2020 5th International Conference on Communication and Electronics Systems (ICCES) 2020
DOI: 10.1109/icces48766.2020.9137963
|View full text |Cite
|
Sign up to set email alerts
|

Implementation of Improved Inline Deduplication Scheme for Distributed Cloud Storage

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 7 publications
0
3
0
Order By: Relevance
“…The field of duplication and its treatment methods is immense in the literature. It is addressed from different perspectives and domains, started from an overview of the duplication and techniques [21]- [23], improving the detection techniques [24], [25], evaluating the impact of the duplicates [26], and proposing new frameworks [27], [28] and methods [29], [30] to effectively enhance the detection process. However, little research addresses the impact of duplicates on the analysis results.…”
Section: Related Workmentioning
confidence: 99%
“…The field of duplication and its treatment methods is immense in the literature. It is addressed from different perspectives and domains, started from an overview of the duplication and techniques [21]- [23], improving the detection techniques [24], [25], evaluating the impact of the duplicates [26], and proposing new frameworks [27], [28] and methods [29], [30] to effectively enhance the detection process. However, little research addresses the impact of duplicates on the analysis results.…”
Section: Related Workmentioning
confidence: 99%
“…The proposed model in [ 70 ] uses two level of deduplication: cross-user deduplication at enterprise-level and cross-enterprise deduplication which checks uploaded data by different enterprises. Basically, there are three major camps of deduplication, i.e., Storage, Data Distribution, and Network Communication [ 72 , 73 ]. The model in [ 74 ] uses deduplication mechanism for the validation of encrypted images stored on cloud storage.…”
Section: Mechanismsmentioning
confidence: 99%
“…In addition to reducing the amount of data, inline deduplication also helps prevent the duplication of data by comparing the current state of the data with the incoming ones. This method is different from post processing deduplication, which only takes out the redundant data after the data has been written [1], [2].…”
Section: Introductionmentioning
confidence: 99%