Searching for just a few words should be enough to get started. If you need to make more complex queries, use the tips below to guide you.
Article type: Research Article
Authors: Rajkumar, K.a; * | Dhanakoti, V.b
Affiliations: [a] Research Scholar, Anna University, Chennai, Tamil Nadu, India | [b] Department of Computer Science and Engineering, SRM Valliammai Engineering College, Chennai, Tamil Nadu, India
Correspondence: [*] Corresponding author. K. Rajkumar, Research Scholar, Anna University, Chennai – 600 025, Tamil Nadu, India. E-mail: [email protected].
Abstract: Storage consumption is increasing significantly these days, with consumers trying to find an effective approach to safe storage space. In these situations, a deduplication in cloud storage services is a significant way to reduce bandwidth and service space by omitting unnecessary information and keeping only a single copy of the information. This raises computational, privacy and storage issues when large numbers of handlers outsource the similar data to cloud service storage. To overcome these problems, an effective Fuzzy-Dedup framework is designed in this research by integrating four steps namely is introduced, which breaks down the data into fixed size chunks and is immediately fingerprinted by a hashing algorithm for ensuring data authentication and then indexing is done with the help of traditional b-tree indexing, similarity function is calculated to compute the similarity value in the documents. After calculating the similar values, the fuzzy interference system is designed by formulating appropriate rules for the decision-making process that determines duplicate and non-duplicate files by obtaining an effective de-duplication ratio over existing methods. After detecting duplicate files, the inline based deduplication policy checks that the new data is ready to send for storage against existing data and does not store any redundant data it discovers. The proposed model is implemented in MATLAB software is carried out several performance metrics and these parameter attained better performance such as, deduplication ratio of 1.2, memory utilization of 12500 bytes in inline and 9550 bytes in offline, throughput of 32500 Mb/s in inline and 25500 Mb/s in offline and processing time of 0.4494 s in inline and 0.1139 s in offline. Thus when compared to previous methods, such as Two Thresholds Two Divisors deduplication (TTTD) approach proposed design shows high range of performance.
Keywords: De-duplication, Fuzzy-Dedup, cosine similarity, chunking, fingerprinting, indexing, fuzzy interference system, cloud storage, inline, encryption, decryption
DOI: 10.3233/JIFS-210511
Journal: Journal of Intelligent & Fuzzy Systems, vol. 43, no. 3, pp. 2819-2832, 2022
IOS Press, Inc.
6751 Tepper Drive
Clifton, VA 20124
USA
Tel: +1 703 830 6300
Fax: +1 703 830 2300
[email protected]
For editorial issues, like the status of your submitted paper or proposals, write to [email protected]
IOS Press
Nieuwe Hemweg 6B
1013 BG Amsterdam
The Netherlands
Tel: +31 20 688 3355
Fax: +31 20 687 0091
[email protected]
For editorial issues, permissions, book requests, submissions and proceedings, contact the Amsterdam office [email protected]
Inspirees International (China Office)
Ciyunsi Beili 207(CapitaLand), Bld 1, 7-901
100025, Beijing
China
Free service line: 400 661 8717
Fax: +86 10 8446 7947
[email protected]
For editorial issues, like the status of your submitted paper or proposals, write to [email protected]
如果您在出版方面需要帮助或有任何建, 件至: [email protected]