International Research Journal of Engineering and Technology (IRJET) Volume: 04 Issue: 02 | Feb -2017
e-ISSN: 2395 -0056
www.irjet.net
p-ISSN: 2395-0072
A Survey: Enhanced Block Level Message Locked Encryption for data Deduplication Priyanka Ahirwar1, Dr. Jitendra Agrawal2, Dr. Sanjiv Sharma3 M.Tech Scholar, School Of Information Technology, RGPV, Bhopal, Madhya Pradesh, India Associate professor, School Of Information Technology, RGPV, Madhya Pradesh, Bhopal India 3Professor, School Of Information Technology, RGPV, Madhya Pradesh, Bhopal India 1
2
------------------------------------------------------------------------------***--------------------------------------------------------------------------------
Abstract - Data deduplication is one of the emerging techniques to improve the capacity of the storage media (Hard disk, Tape, CD, DVD, ROM) by removing redundant data and provide storage only for unique data. That increases the storage efficiency of the storage media. There are techniques like a large scale deduplication in that a two stage deduplication scheme is used in that scheme first a sampling technique is used to generate subsets and in second stage an active selection technique is used to reduce redundancy in the document. In this paper a survey over various techniques which used to remove redundant data from the document and provide storage only for unique data.
Key Words - Deduplication, storage media, Redundant data. 1.INTRODUCTION : The world is producing large amount of data rapidly. According to a Survey, information that is producing per year is growing by fifty seven percent annually. Thirty five percent of this information is generated by large enterprises. so it is very critical for a disaster recovery site to backup data regularly. This rapidly growing data arises many challenges to the existing storage systems. Significance fraction of information contains duplicates. Thus deduplication techniques have been invented. Deduplication is the process to remove duplicate copies in the data, that also known as intelligent compression and single event storage. That technique put huge advantage over storage efficiency and also improves network efficiency to transfer data by reducing bits to transfer data. In that technique unique data samples, data chunks, or byte patterns are collected and stored into the storage when a match is found with the stored data then that data remove by a small reference. Thus storage based deduplication improve the efficiency of the storage and reduce the cost overhead of storing more files of the same data. But in that process data will be stored in different forms and deduplication process stored data that arise serious concern about integrity of the data. Mainly there are three type of deduplication is occurs in that in-line deduplication, post-process deduplication, Mutual cooperation based deduplication. (a)In-line deduplication: In –inline deduplication, the process of reducing duplicate data conducted before it stored in to the storage media, if there any redundant data is found in the process than that data is not stored at the device. (b)Post process deduplication: In post process deduplication first data stored at the devices and then the task of checking redundant data and then the process of removing redundancy is performed. If there any redundant data is found then that data will be removed. (c)Mutual co-operation based deduplication: In that both techniques inline deduplication and post process deduplication are used to provide better performance to the user. In that deduplication task performs at both ends, at client end and server end. There are some other techniques which can use various encryption techniques to provide secure deduplication for data that preserves the security of the data during the process of deduplication.
Š 2017, IRJET
|
Impact Factor value: 5.181
|
ISO 9001:2008 Certified Journal
|
Page 643