Secure Data Deduplication (SD2eDup ) in Cloud Computing: Threats, Techniques and Challenges

0Citations
Citations of this article
4Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Storage is the most important service provided by cloud computing technology helps many individuals from managing in-house storage infrastructure. To provide the availability of data at any time and anywhere, the cloud service provider will store the redundant copy of data in the cloud storage server. This will leads to the waste of storage space by duplicating the user’s data in the cloud. The data deduplication technique has attracted many cloud vendors to increase the storage space by deleting the same copy of data from the cloud storage server and reduce the storage cost for cloud users. The data deduplication comes with many security issues due to its exploration of metadata stored in the cloud. To deal with these security issues, many secure data deduplication techniques have been proposed. Hence, in this article, we present the taxonomy on the classification of data deduplication techniques for general data. And we discuss the secure data deduplication along with different security threat models during data deduplication process. In this article, we also discuss the various existing secure data deduplication schemes proposed by researchers and present in taxonomy. Finally, we identify some of the open research challenges and present for future research direction in the big data era.

Cite

CITATION STYLE

APA

Kodada, B. B., & Antony D’Mello, D. (2021). Secure Data Deduplication (SD2eDup ) in Cloud Computing: Threats, Techniques and Challenges. In Lecture Notes in Electrical Engineering (Vol. 668, pp. 1239–1251). Springer. https://doi.org/10.1007/978-981-15-5341-7_94

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free