This paper is published in Volume 2, Issue 8, 2017
Cloud Computing
Arpitha .R
Pavithra G. S
SJB Institute of Technology, Bengaluru, India
Pub. Date
08 August, 2017
Paper ID
Deduplication, Encryption Technique, Decryption Technique


Arpitha .R, Pavithra G. S. Secure Data Deduplication in Cloud, International Journal of Advance Research, Ideas and Innovations in Technology,

Arpitha .R, Pavithra G. S (2017). Secure Data Deduplication in Cloud. International Journal of Advance Research, Ideas and Innovations in Technology, 2(8)

Arpitha .R, Pavithra G. S. "Secure Data Deduplication in Cloud." International Journal of Advance Research, Ideas and Innovations in Technology 2.8 (2017).


Deduplication is a process that eliminates redundant copies of data and reduces storage overhead. Data deduplication becomes more and more a necessity for cloud storage providers because of the continuous and exponential increase of the number of users and the size of their data. Storage and data transfer costs will be reduced by their cloud providers by storing a unique copy of duplicate data. Cloud computing offers a new way of service provision by re-arranging various resources over the Internet. The most often known, important and popular cloud service is data storage. The privacy of data holders are more important, So in order to preserve the privacy of the data holders , data is often stored in cloud in an encrypted form. In cloud data deduplication, encrypted data will introduce new challenges, which becomes crucial for data storage and processing in cloud. There are some of the traditional schemes for deduplication that cannot work on encrypted data. Some of the Existing solutions are present for encrypted data deduplication which suffer from security weakness i.e. brute force attacks means they cannot flexibly support data access control and revocation. Therefore, few of them can be readily deployed in practice. In this paper, we propose a scheme to deduplicate the encrypted data which is stored in cloud. And also we use RAS and AES algorithm for encryption and hash code generation The results show the sequence diagram over deduplication process and test cases for login purpose , especially for data deduplication in cloud storage.
Paper PDF