z-logo
open-access-imgOpen Access
Data De-Duplication Using SHA (Secure Hash Algorithm)
Author(s) -
G. Kalyani,
D.S.L. Neethika,
Ch. Jayasri
Publication year - 2019
Publication title -
international journal of scientific research in computer science, engineering and information technology
Language(s) - English
Resource type - Journals
ISSN - 2456-3307
DOI - 10.32628/cseit1952181
Subject(s) - data deduplication , computer science , hash function , secure hash algorithm , upload , cloud storage , encryption , cloud computing , computer data storage , merkle tree , database , hash chain , sha 2 , data integrity , algorithm , computer network , computer security , operating system
Now-a-days the number of users using cloud storage has increased so that the data stored has been increased in exponential rates. The data should be secured and the storage should be used efficiently. But a lot of duplicate data is present as two or more users may upload the same data. To make use of the cloud storage efficiently we have to reduce the redundant data hence improving the resources like storage space, disk I/O operations of the cloud vendors. Data De-Duplication is the process to remove redundant data and store only one instance of duplicate data. The objective of the proposed system is to increase the efficient comparison of hash values of a different data blocks and security of data. This paper includes a method for data deduplication using SHA (Secure Hash Algorithm) and AES. SHA is used as it is more secure than other hashing algorithms. The data is encrypted using AES at owner machine itself and using SHA the redundant data will be eliminated.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here