An Extensive Analysis on Examining Several Data Deduplication Techniques in Cloud Computing

International Journal of Electronics and Communication Engineering
© 2025 by SSRG - IJECE Journal
Volume 12 Issue 11
Year of Publication : 2025
Authors : Bharti Duhan, Anju Sangwan, Anupma Sangwan
pdf
How to Cite?

Bharti Duhan, Anju Sangwan, Anupma Sangwan, "An Extensive Analysis on Examining Several Data Deduplication Techniques in Cloud Computing," SSRG International Journal of Electronics and Communication Engineering, vol. 12,  no. 11, pp. 57-85, 2025. Crossref, https://doi.org/10.14445/23488549/IJECE-V12I11P106

Abstract:

As computer technologies and internet applications are developing at a fast rate, the volume of data is also increasing dramatically. It becomes necessary to store this huge amount of data in the cloud. Following the outbreak of COVID-19 (Coronavirus Disease 2019), it has been observed that offices started working from home and educational institutes began offering online education. As everything becomes online, the demand for storing online data grows. Cloud computing technology has existed long before COVID-19, but it has grown in popularity as a result of the pandemic. Sometimes the same data is being stored multiple times on the cloud by different users, which consumes more storage space, but the storage memory is limited. As a consequence, some storage optimization technique is required, which gives birth to a technique named Deduplication. It is a technique in which duplicated or redundant data is removed to save storage space. This paper presents an extensive analysis of several data deduplication techniques used in cloud computing. The goal is to study the existing techniques of deduplication and then to determine the tradeoff in terms of performance metrices. The graphical and tabular comparison between various existing deduplication techniques is done using parameters like efficiency, throughput, memory consumption, deduplication rate, and computation time. This paper aims to identify the appropriate technique to be used based on the user’s requirements.

Keywords:

Cloud Computing, Chunking, Data Deduplication, Hashing, Indexing.

References:

[1] Cloud Computing, Wikipedia. [Online]. Available: http://en.wikipedia.org/wiki/Cloud_computing [2] Ali Sunyaev, Cloud Computing, Internet Computing, Springer, pp. 1-413, 2020.
[Google Scholar] [Publisher Link]
[3] Safana Alzide, “Cloud Computing: Evolution, Challenges, and Future Prospects,” Journal of Information Technology, Cybersecurity, and Artificial Intelligence, vol. 1, no. 1, pp. 52-63, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[4] Aisha Hassan Abdalla Hashim et al., Cloud Computing's Transformative Power in Computing Environments, IGI Global Scientific Publishing, pp. 1-538, 2025.
[CrossRef] [Google Scholar] [Publisher Link]
[5] Gurmeher Singh Puri, Ravi Tiwary, and Shipra Shukla, “A Review on Cloud Computing,” 2019 9th International Conference on Cloud Computing, Data Science & Engineering (Confluence), Noida, India, pp. 63-68, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[6] Praveen Borra, “An Overview of Cloud Computing and Leading Cloud Service Providers,” International Journal of Computer Engineering and Technology (IJCET), vol. 15, no. 3, pp. 122-133, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[7] Nathaniel Brooks, Corinna Vance, and Dorian Ames, “Cloud Computing: A Review of Evolution, Challenges, and Emerging Trends,” Journal of Computer Science and Software Applications, vol. 5, no. 4, pp. 1-17, 2025.
[CrossRef] [Google Scholar] [Publisher Link]
[8] Priyanshu Srivastava, and Rizwan Khan, “A Review Paper on Cloud Computing,” International Journal of Advanced Research in Computer Science and Software Engineering, vol. 8, no. 6, pp. 17-20, 2018.
[Google Scholar]
[9] Kyle Chard et al., “Social Cloud: Cloud Computing in Social Networks,” 2010 IEEE 3rd International Conference on Cloud Computing, Miami, FL, USA, pp. 99-106, 2010.
[CrossRef] [Google Scholar] [Publisher Link]
[10] Sumit Goyal, “Public vs Private vs Hybrid vs Community - Cloud Computing: A Critical Review,” International Journal of Computer Network and Information Security, vol. 6, no. 3, pp. 20-28, 2014.
[CrossRef] [Google Scholar] [Publisher Link]
[11] Ali Ryadh Abdulhafidh, and Hebah H. O. Nasereddin, “Building of Private Cloud Computing Architecture to Support E-Learning,” High Technology Letters, vol. 26, no. 12, pp. 853-860, 2020.
[Google Scholar] [Publisher Link]
[12] State of the Cloud Report, Flexera, 2025. [Online]. Available: https://info.flexera.com/CM-REPORT-State-of-the-Cloud [13] Chunye Gong et al., “The Characteristics of Cloud Computing,” 2010 39th International Conference on Parallel Processing Workshops, San Diego, CA, USA, pp. 275-279, 2010.
[CrossRef] [Google Scholar] [Publisher Link]
[14] Mark Stieninger, and Dietmar Nedbal, “Characteristics of Cloud Computing in the Business Context: A Systematic Literature Review,” Global Journal of Flexible Systems Management, vol. 15, pp. 59-68, 2014.
[CrossRef] [Google Scholar] [Publisher Link]
[15] Aaqib Rashid, and Amit Chaturvedi, “Cloud Computing Characteristics and Services: A Brief Review,” International Journal of Computer Sciences and Engineering, vol. 7, no. 2, pp. 421-426, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[16] Andrew Joint, and Edwin Baker, “Knowing the Past to Understand the Present1 – Issues in the Contracting for Cloud Based Services,” Computer Law & Security Review, vol. 27, no. 4, pp. 407-415, 2011.
[CrossRef] [Google Scholar] [Publisher Link]
[17] Rehmana Younis et al., “A Comprehensive Analysis of Cloud Service Models: IaaS, PaaS, and SaaS in the Context of Emerging Technologies and Trend,” 2024 International Conference on Electrical, Communication and Computer Engineering (ICECCE), Kuala Lumpur, Malaysia, pp. 1-6, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[18] C.N. Höfer, and G. Karagiannis, “Cloud Computing Services: Taxonomy and Comparison,” Journal of Internet Services and Applications, vol. 2, pp. 81-94, 2011.
[CrossRef] [Google Scholar] [Publisher Link]
[19] Somya Agrawal, “A Survey on Recent Applications of Cloud Computing in Education: COVID-19 Perspective,” Journal of Physics: Conference Series: International Symposium on Automation, Information and Computing, Beijing, China, vol. 1828, pp. 1-8, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[20] Rashid Nazir et al., “Cloud Computing Applications: A Review,” EAI Endorsed Transactions on Cloud Systems, vol. 6, no. 17, pp. 1-11, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[21] Flexera Releases 2021 State of the Cloud Report, Flexera, 2021. [Online]. Available: https://www.flexera.com/about-us/press-center/flexera-releases-2021-state-of-the-cloud-report
[22] Deepika Saxena et al., “Secure Resource Management in Cloud Computing: Challenges, Strategies and Meta-Analysis,” IEEE Transactions on Systems, Man, and Cybernetics: Systems, vol. 55, no. 4, pp. 2897-2912, 2025.
[CrossRef] [Google Scholar] [Publisher Link]
[23] Fan Yunlong, and Luo Jie, “Incentive Approaches for Cloud Computing: Challenges and Solutions,” Journal of Engineering and Applied Science, vol. 71, pp. 1-18, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[24] Muhammed Golec et al., “Quantum Cloud Computing: Trends and Challenges,” Journal of Economy and Technology, vol. 2, pp. 190-199, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[25] Oluwafemi Clement Adeusi et al., “IT Standardization in Cloud Computing: Security Challenges, Benefits, and Future Directions,” World Journal of Advanced Research and Reviews, vol. 22, no. 5, pp. 2050-2057, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[26] Vinayak Raja, “Exploring Challenges and Solutions in Cloud Computing: A Review of Data Security and Privacy Concerns,” Journal of Artificial Intelligence General science (JAIGS), vol. 4, no. 1, pp. 121-144, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[27] Bader Alouffi et al., “A Systematic Literature Review on Cloud Computing Security: Threats and Mitigation Strategies,” IEEE Access, vol. 9, pp. 57792-57807, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[28] Doaa M. Bamasoud et al., “Privacy and Security Issues in Cloud Computing: A Survey Paper,” 2021 International Conference on Information Technology (ICIT), Amman, Jordan, pp. 387-392, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[29] Isaac Odun-Ayo et al., “An Overview of Data Storage in Cloud Computing,” 2017 International Conference on Next Generation Computing and Information Systems (ICNGCIS), Jammu, India, pp. 29-34, 2017.
[CrossRef] [Google Scholar] [Publisher Link]
[30] E. Manogar, and S. Abirami, “A Study on Data Deduplication Techniques for Optimized Storage,” 2014 Sixth International Conference on Advanced Computing (ICoAC), Chennai, India, pp. 161-166, 2014.
[CrossRef] [Google Scholar] [Publisher Link]
[31] Urs Niesen, “An Information-Theoretic Analysis of Deduplication,” IEEE Transactions on Information Theory, vol. 65, no. 9, pp. 5688-5704, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[32] Zheng Yan et al., “Encrypted Data Management with Deduplication in Cloud Computing,” IEEE Cloud Computing, vol. 3, no. 2, pp. 28-35, 2016.
[CrossRef] [Google Scholar] [Publisher Link]
[33] Ravneet Kaur, Inderveer Chana, and Jhilik Bhattacharya, “Data Deduplication Techniques for Efficient Cloud Storage Management: A Systematic Review,” The Journal of Supercomputing, vol. 74, pp. 2035-2085, 2018.
[CrossRef] [Google Scholar] [Publisher Link]
[34] A. Venish, and K. Siva Sankar, “Framework of Data Deduplication: A Survey,” Indian Journal of Science and Technology, vol. 8, no. 26, pp. 1-7, 2015.
[CrossRef] [Google Scholar] [Publisher Link]
[35] Wen Xia et al., “A Comprehensive Study of the Past, Present, and Future of Data Deduplication,” Proceedings of the IEEE, vol. 104, no. 9, pp. 1681-1710, 2016.
[CrossRef] [Google Scholar] [Publisher Link]
[36] Anmol Jyot Maan, “Analysis and Comparison of Algorithms for Lossless Data Compression,” International Journal of Information and Computation Technology, vol. 3, no. 3, pp. 139-146, 2013.
[Google Scholar]
[37] Wen Xia et al., “Ddelta: A Deduplication-Inspired Fast Delta Compression Approach,” Performance Evaluation, vol. 79, pp. 258-272, 2014.
[CrossRef] [Google Scholar] [Publisher Link]
[38] Min Gu, Xiangping Li, and Yaoyu Cao, “Optical Storage Arrays: A Perspective for Future Big Data Storage,” Light: Science & Applications, vol. 3, pp. 1-11, 2014.
[CrossRef] [Google Scholar] [Publisher Link]
[39] Jiwei Xu et al., “Clustering-based Acceleration for Virtual Machine Image Deduplication in the Cloud Environment,” Journal of Systems and Software, vol. 121, pp. 144-156, 2016.
[CrossRef] [Google Scholar] [Publisher Link]
[40] Basappa B. Kodada, and Demian Antony D’Mello, “Secure Data Deduplication (SD2 eDup) in Cloud Computing: Threats, Techniques and Challenges,” Advances in Communication and Computational Technology, pp. 1239-1251, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[41] Anjuli Goel et al., “Security Concerns and Data Breaches for Data Deduplication Techniques in Cloud Storage: A Brief Meta-Analysis,” International Journal of Safety & Security Engineering, vol. 14, no. 2, pp. 435-446, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[42] Philip Shilane, Ravi Chitloor, and Uday Kiran Jonnala, “99 Deduplication Problems,” Proceedings of the 8th USENIX Workshop on Hot Topics in Storage and File Systems (HotStorage’16), Denver, Colorado, pp. 1-5, 2016.
[Google Scholar] [Publisher Link]
[43] Nipun Chhabra, and Manju Bala, “A Comparative Study of Data Deduplication Strategies,” 2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC), Jalandhar, India, pp. 68-72, 2018.
[CrossRef] [Google Scholar] [Publisher Link]
[44] A. Venish, and K. Siva Sankar, “Study of Chunking Algorithm in Data Deduplication,” Proceedings of the International Conference on Soft Computing Systems, pp. 13-20, 2015.
[CrossRef] [Google Scholar] [Publisher Link]
[45] João Paulo, and José Pereira, “A Survey and Classification of Storage Deduplication Systems,” ACM Computing Surveys (CSUR), vol. 47, no. 1, pp. 1-30, 2014.
[CrossRef] [Google Scholar[Publisher Link]
[46] Mihir Bellare, and Sriram Keelveedhi, “DupLESS: Server-Aided Encryption for Deduplicated Storage,” Proceedings of the 22nd USENIX Security Symposium, Washington, D.C., USA, pp. 179-194, 2013.
[Google Scholar] [Publisher Link]
[47] Himshai Kamboj, and Bharati Sinha, “DEDUP: Deduplication System for Encrypted Data in Cloud,” 2017 International Conference on Computing, Communication and Automation (ICCCA), Greater Noida, India, pp. 795-800, 2017.
[CrossRef] [Google Scholar] [Publisher Link]
[48] Jiwei Xu et al., “A Lightweight Virtual Machine Image Deduplication Backup Approach in Cloud Environment,” 2014 IEEE 38th Annual Computer Software and Applications Conference, Vasteras, Sweden, pp. 503-508, 2014.
[CrossRef] [Google Scholar] [Publisher Link]
[49] Hardik Gajera, and Manik Lal Das, “DeDOP: Deduplication with Cross-Server Ownership Over Encrypted Data,” 2020 Third ISEA Conference on Security and Privacy (ISEA-ISAP), Guwahati, India, pp. 36-40, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[50] Taek-Young Youn et al., “Efficient Client-Side Deduplication of Encrypted Data with Public Auditing in Cloud Storage,” IEEE Access, vol. 6, pp. 26578-26587, 2018.
[CrossRef] [Google Scholar] [Publisher Link]
[51] Jiaojiao Wu et al., “CPDA: A Confidentiality-Preserving Deduplication Cloud Storage with Public Cloud Auditing,” IEEE Access, vol. 7, pp. 160482-160497, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[52] Ankush R. Deshmukh, R.V. Mante, and P.N. Chatur, “Cloud Based Deduplication and Self Data Destruction,” 2017 International Conference on Recent Trends in Electrical, Electronics and Computing Technologies (ICRTEECT), Warangal, India, pp. 155-158, 2017.
[CrossRef] [Google Scholar] [Publisher Link]
[53] Shengmei Luo et al., “Boafft: Distributed Deduplication for Big Data Storage in the Cloud,” IEEE Transactions on Cloud Computing, vol. 8, no. 4, pp. 1199-1211, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[54] Jinbo Xiong et al., “Secure Encrypted Data with Authorized Deduplication in Cloud,” IEEE Access, vol. 7, pp. 75090-75104, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[55] Xueyan Liu et al., “Verifiable Attribute-Based Keyword Search Over Encrypted Cloud Data Supporting Data Deduplication,” IEEE Access, vol. 8, pp. 52062-52074, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[56] Priteshkumar Prajapati, and Parth Shah, “A Review on Secure Data Deduplication: Cloud Storage Security Issue,” Journal of King Saud University-Computer and Information Sciences, vol. 34, no. 7, pp. 3996-4007, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[57] Wande Chen et al., “Low-Overhead Inline Deduplication for Persistent Memory,” Transactions on Emerging Telecommunications Technologies, vol. 32, no. 8, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[58] Samiksha Chavhan, Pragati Patil, and Gajanan Patle, “Implementation of Improved Inline Deduplication Scheme for Distributed Cloud Storage,” 2020 5th International Conference on Communication and Electronics Systems (ICCES), Coimbatore, India, pp. 1406-1410, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[59] Xinyu Tang et al., “A Secure and Lightweight Cloud Data Deduplication Scheme with Efficient Access Control and Key Management,” Computer Communications, vol. 222, pp. 209-219, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[60] Neha Kaurav, “An Investigation on Data De-duplication Methods And it’s Recent Advancements,” International Conference on Advances in Engineering and Technology (ICAET), 2014.
[Google Scholar]
[61] Purushottam Kulkarni et al., “Redundancy Elimination within Large Collections of Files,” Proceedings of the General Track: USENIX Annual Technical Conference, Boston, MA, USA, pp. 1-15, 2004.
[Google Scholar] [Publisher Link]
[62] Fanglu Guo, and Petros Efstathopoulos, “Building a High-Performance Deduplication System,” 2011 USENIX Annual Technical Conference (USENIX ATC 11), Portland, OR, 2011.
[Google Scholar] [Publisher Link]
[63] Dirk Meister et al., “A Study on Data Deduplication in HPC Storage Systems,” SC '12: Proceedings of the International Conference on High Performance Computing, Networking, Storage and Analysis, Salt Lake City, UT, USA, pp. 1-11, 2012. [CrossRef] [Google Scholar] [Publisher Link]
[64] Wen Xia et al., “P-Dedupe: Exploiting Parallelism in Data Deduplication System,” 2012 IEEE Seventh International Conference on Networking, Architecture, and Storage, Xiamen, China, pp. 338-347, 2012.
[CrossRef] [Google Scholar] [Publisher Link]
[65] Hongyang Yan et al., “Centralized Duplicate Removal Video Storage System with Privacy Preservation in IoT,” Sensors, vol. 18, no. 6, pp. 1-15, 2018.
[CrossRef] [Google Scholar] [Publisher Link]
[66] Haiyan Meng et al., “MMSD: A Metadata-Aware Multi-Tiered Source Deduplication Cloud Backup System in the Personal Computing Environment,” International Review on Computers and Software, vol. 8, no. 2, pp. 427-679, 2013.
[Google Scholar] [Publisher Link]
[67] Yu-Xuan Xing et al., “AR-dedupe: An Efficient Deduplication Approach for Cluster Deduplication System,” Journal of Shanghai Jiaotong University (Science), vol. 20, pp. 76-81, 2015.
[CrossRef] [Google Scholar] [Publisher Link]
[68] Yinjin Fu, Hong Jiang, and Nong Xiao, “A Scalable Inline Cluster Deduplication Framework for Big Data Protection,” ACM/IFIP/USENIX 13th International Middleware Conference, Montreal, Canada, pp. 354-373, 2012.
[CrossRef] [Google Scholar] [Publisher Link]
[69] Xingyu Zhang, and Jian Zhang, “Data Deduplication Cluster Based on Similarity-Locality Approach,” 2013 IEEE International Conference on Green Computing and Communications and IEEE Internet of Things and IEEE Cyber, Physical and Social Computing, Beijing, China, pp. 2168-2172, 2013.
[CrossRef] [Google Scholar] [Publisher Link]
[70] Walzade Arti, and Zine Datta, “Survey on Data Deduplication of Text File Over Cloud,” International Journal of Science and Research (IJSR), vol. 6, no. 1, pp. 402-405, 2017.
[Google Scholar] [Publisher Link]
[71] Ahmed El-Shimi et al., “Primary Data Deduplication—Large Scale Study and System Design,” 2012 USENIX Annual Technical Conference (USENIX ATC 12), Boston, MA, pp. 285-296, 2012.
[Google Scholar] [Publisher Link]
[72] S. Uthayashangar et al., “Image and Text Encrypted Data with Authorized Deduplication in Cloud,” 2020 International Conference on System, Computation, Automation and Networking (ICSCAN), Pondicherry, India, pp. 1-5, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[73] Zhou Lei et al., “An Improved Image File Storage Method Using Data Deduplication,” 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications, Beijing, China, pp. 638-643, 2014.
[CrossRef] [Google Scholar] [Publisher Link]
[74] Anuja A. Sawant, and Pravin S. Game, “Deduplication of Audio Files to Remove Redundancy in Cloud Storage,” 2018 Fourth International Conference on Computing Communication Control and Automation (ICCUBEA), Pune, India, pp. 1-4, 2018. [CrossRef] [Google Scholar] [Publisher Link]
[75] Suganthi Dewakar et al., “Storage Efficiency Opportunities and Analysis for Video Repositories,” 7th USENIX Workshop on Hot Topics in Storage and File Systems (HotStorage 15), Santa Clara, CA, pp. 1-5, 2015.
[Google Scholar] [Publisher Link]
[76] Fatema Rashid, Ali Miri, and Isaac Woungang, “Proof of Storage for Video Deduplication in the Cloud,” 2015 IEEE International Congress on Big Data, New York, NY, USA, pp. 499-505, 2015.
[CrossRef] [Google Scholar] [Publisher Link]
[77] Weijing You et al., “Deduplication-Friendly Watermarking for Multimedia Data in Public Clouds,” 25th European Symposium on Research in Computer Security, ESORICS 2020, Guildford, UK, pp. 67-87, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[78] Shunrong Jiang, Tao Jiang, and Liangmin Wang, “Secure and Efficient Cloud Data Deduplication with Ownership Management,” IEEE Transactions on Services Computing, vol. 13, no. 6, pp. 1152-1165, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[79] Vivek Waghmare, and Smita Kapse, “Authorized Deduplication: An Approach for Secure Cloud Environment,” Procedia Computer Science, vol. 78, pp. 815-823, 2016.
[CrossRef] [Google Scholar] [Publisher Link]
[80] M. Chandra Sekar, and H.J. Shanthi, “Secure Data Deduplication for Efficient Cloud Storage Using Blockchain Technologies,” 2024 7th International Conference on Circuit Power and Computing Technologies (ICCPCT), Kollam, India, pp. 1229-1235, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[81] Qing Liu et al., “Hadoop Based Scalable Cluster Deduplication for Big Data,” 2016 IEEE 36th International Conference on Distributed Computing Systems Workshops (ICDCSW), Nara, Japan, pp. 98-105, 2016.
[CrossRef] [Google Scholar] [Publisher Link]
[82] Rongmao Chen et al., “BL-MLE: Block-Level Message-Locked Encryption for Secure Large File Deduplication,” IEEE Transactions on Information Forensics and Security, vol. 10, no. 12, pp. 2643-2652, 2015.
[CrossRef] [Google Scholar] [Publisher Link]
[83] Shuguang Zhan et al., “SecDedup: Secure Encrypted Data Deduplication with Dynamic Ownership Updating,” IEEE Access, vol. 8, pp. 186323-186334, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[84] Ider Lkhagvasuren et al., “Byte-index Chunking Algorithm for Data Deduplication System,” International Journal of Security and its Applications, vol. 7, no. 5, pp. 415-424, 2013.
[CrossRef] [Google Scholar] [Publisher Link]
[85] D. Viji, and Dr.S. Revathy, “Comparative Analysis for Content Defined Chunking Algorithms in Data Deduplication,” Webology, vol. 18, pp. 255-268, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[86] Wen Xia et al., “The Design of Fast Content-Defined Chunking for Data Deduplication Based Storage Systems,” IEEE Transactions on Parallel and Distributed Systems, vol. 31, no. 9, pp. 2017-2031, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[87] Lauren Whitehouse, Data Deduplication Methods: Block-level Versus Byte-level Dedupe, TechTarget Park, 2016. [Online] Available: https://www.techtarget.com/searchdatabackup/tip/Data-deduplication-methods-Block-level-versus-byte-level-dedupe
[88] Jyoti Malhotra, and Jagdish Bakal, “A Survey and Comparative Study of Data Deduplication Techniques,” 2015 International Conference on Pervasive Computing (ICPC), Pune, India, pp. 1-5, 2015.
[CrossRef] [Google Scholar] [Publisher Link]
[89] Hala AbdulSalam Jasim, and Assmaa A. Fahad, “New Techniques to Enhance Data Deduplication using Content based-TTTD Chunking Algorithm,” International Journal of Advanced Computer Science and Applications, vol. 9, no. 5, pp. 116-121, 2018.
[CrossRef] [Google Scholar] [Publisher Link]
[90] Fei Xie, Michael Condict, and Sandip, “Estimating Duplication by Content-based Sampling,” 2013 USENIX Annual Technical Conference (USENIX ATC 13), San Jose, CA, pp. 181-186, 2013.
[Google Scholar] [Publisher Link]
[91] G. Sujatha, and Jeberson Retna Raj, “A Comprehensive Study of Different Types of Deduplication Technique in Various Dimensions,” International Journal of Advanced Computer Science and Applications, vol. 13, no. 3, pp. 316-323, 2022.[CrossRef] [Google Scholar] [Publisher Link]
[92] S. Hema, and A. Kangaiammal, “Distributed Storage Hash Algorithm (DSHA) for File-Based Deduplication in Cloud Computing,” Second International Conference on Computer Networks and Communication Technologies, pp. 572-581, 2020. [CrossRef] [Google Scholar] [Publisher Link]
[93] Yinjin Fu et al., “Application-Aware Local-Global Source Deduplication for Cloud Backup Services of Personal Storage,” IEEE Transactions on Parallel and Distributed Systems, vol. 25, no. 5, pp. 1155-1165, 2014.
[CrossRef] [Google Scholar] [Publisher Link]
[94] Yinjin Fu et al., “AA-Dedupe: An Application-Aware Source Deduplication Approach for Cloud Backup Services in the Personal Computing Environment,” 2011 IEEE International Conference on Cluster Computing, Austin, TX, USA, pp. 112-120, 2011.
[CrossRef] [Google Scholar] [Publisher Link]
[95] Jonathan Takeshita, Ryan Karl, and Taeho Jung, “Secure Single-Server Nearly-Identical Image Deduplication,” 2020 29th International Conference on Computer Communications and Networks (ICCCN), Honolulu, HI, USA, pp. 1-6, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[96] Yinjin Fu et al., “Application-Aware Big Data Deduplication in Cloud Environment,” IEEE Transactions on Cloud Computing, vol. 7, no. 4, pp. 921-934, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[97] P.G. Shynu et al., “A Secure Data Deduplication System for Integrated Cloud-Edge Networks,” Journal of Cloud Computing, vol. 9, pp. 1-12, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[98] Silambarasan Elkana Ebinazer, Nickolas Savarimuthu, and S. Mary Saira Bhanu, “An Efficient Secure Data Deduplication Method using Radix Trie with Bloom Filter (SDD-RT-BF) in Cloud Environment,” Peer-to-Peer Networking and Applications, vol. 14, pp. 2443-2451, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[99] Guipeng Zhang et al., “BDKM: A Blockchain-Based Secure Deduplication Scheme with Reliable Key Management,” Neural Processing Letters, vol. 54, pp. 2657-2674, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[100] Yunling Wang et al., “Secure Deduplication with Efficient user Revocation in Cloud Storage,” Computer Standards & Interfaces, vol. 78, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[101] N. Mageshkumar, and L. Lakshmanan, “RETRACTED ARTICLE: An Improved Secure File Deduplication Avoidance using CKHO based Deep Learning Model in a Cloud Environment,” The Journal of Supercomputing, vol. 78, pp. 14892-14918, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[102] Priyanka Singh, Nishant Agarwal, and Balasubramanian Raman, “Secure Data Deduplication using Secret Sharing Schemes Over Cloud,” Future Generation Computer Systems, vol. 88, pp. 156-167, 2018.
[CrossRef] [Google Scholar] [Publisher Link]
[103] Jinfeng Liu et al., “Secure Similarity-Based Cloud Data Deduplication in Ubiquitous City,” Pervasive and Mobile Computing, vol. 41, pp. 231-242, 2017.
[CrossRef] [Google Scholar] [Publisher Link]
[104] J.R. Douceur et al., “Reclaiming Space from Duplicate files in a Serverless Distributed File System,” Proceedings 22nd International Conference on Distributed Computing Systems, Vienna, Austria, pp. 617-624, 2002.
[CrossRef] [Google Scholar] [Publisher Link]
[105] Cheng Guo et al., “R-Dedup: Secure Client-Side Deduplication for Encrypted Data without Involving a Third-Party Entity,” Journal of Network and Computer Applications, vol. 162, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[106] Jian Liu, N. Asokan, and Benny Pinkas, “Secure Deduplication of Encrypted Data without Additional Independent Servers,” Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, Denver Colorado USA, pp. 874-885, 2015.
[CrossRef] [Google Scholar] [Publisher Link]
[107] Mihir Bellare, Sriram Keelveedhi, and Thomas Ristenpart, “Message-Locked Encryption and Secure Deduplication,” Advances in Cryptology – EUROCRYPT 2013: 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, pp. 296-312, 2013.
[CrossRef] [Google Scholar] [Publisher Link]
[108] Wenbin Yao, and Pengdi Ye, “Simdedup: A New Deduplication Scheme Based on Simhash,” Web-Age Information Management: WAIM 2013 International Workshops: HardBD, MDSP, BigEM, TMSN, LQPM, BDMS, Beidaihe, China, pp. 79-88, 2013.
[CrossRef] [Google Scholar] [Publisher Link]
[109] G. Madhubala et al., “Nature - Inspired Enhanced Data Deduplication for Efficient Cloud Storage,” 2014 International Conference on Recent Trends in Information Technology, Chennai, India, pp. 1-6, 2014.
[CrossRef] [Google Scholar] [Publisher Link]
[110] Yan-Kit Li et al., “Efficient Hybrid Inline and Out-of-Line Deduplication for Backup Storage,” ACM Transactions on Storage, vol. 11, no. 1, 1-21, 2014.
[CrossRef] [Google Scholar] [Publisher Link]
[111] Yan Tang et al., “DIODE: Dynamic Inline-Offline DE Duplication Providing Efficient Space-Saving and Read/Write Performance for Primary Storage Systems,” 2016 IEEE 24th International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS), London, UK, pp. 481-486, 2016.
[CrossRef] [Google Scholar] [Publisher Link]
[112] João Paulo, and José Pereira, “Efficient Deduplication in a Distributed Primary Storage Infrastructure,” ACM Transactions on Storage (TOS), vol. 12, no. 4, pp. 1-35, 2016.
[CrossRef] [Google Scholar] [Publisher Link]
[113] Panfeng Zhang et al., “Resemblance and Mergence Based Indexing for High Performance Data Deduplication,” Journal of Systems and Software, vol. 128, pp. 11-24, 2017.
[CrossRef] [Google Scholar] [Publisher Link]
[114] Awais Khan, Prince Hamandawana, and Youngjae Kim, “A Content Fingerprint-Based Cluster-Wide Inline Deduplication for Shared-Nothing Storage Systems,” IEEE Access, vol. 8, pp. 209163-209180, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[115] Wen Xia et al., “Similarity and Locality Based Indexing for High Performance Data Deduplication,” IEEE Transactions on Computers, vol. 64, no. 4, pp. 1162-1176, 2015.
[CrossRef] [Google Scholar] [Publisher Link]
[116] Peizhen Guo, and Wenjun Hu, “Potluck: Cross-Application Approximate Deduplication for Computation-Intensive Mobile Applications,” Proceedings of the Twenty-Third International Conference on Architectural Support for Programming Languages and Operating Systems, Williamsburg VA USA, pp. 271-284, 2018.
[CrossRef] [Google Scholar] [Publisher Link]
[117] Qinlu He et al., “Research on Routing Strategy in Cluster Deduplication System,” IEEE Access, vol. 9, pp. 135485-135495, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[118] Niteesha Sharma, A. V. Krishna Prasad, and V. Kakulapati, “File-level Deduplication by using Text Files - Hive Integration,” 2021 International Conference on Computer Communication and Informatics (ICCCI), Coimbatore, India, pp. 1-6, 2021. [CrossRef] [Google Scholar] [Publisher Link]
[119] Fatema Rashid, and Ali Miri, Deduplication Practices for Multimedia Data in the Cloud, Guide to Big Data Applications, Springer, pp. 245-271, 2017.
[CrossRef] [Google Scholar] [Publisher Link]
[120] P.M. Ashok Kumar, E. Pugazhendhi, and Rudra Kalyan Nayak, “Cloud Storage Performance Improvement Using Deduplication and Compression Techniques,” 2022 4th International Conference on Smart Systems and Inventive Technology (ICSSIT), Tirunelveli, India, pp. 443-449, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[121] Manogar Ellappan, and Abirami Murugappan, “A Smart Hybrid Content-Defined Chunking Algorithm for Data Deduplication in Cloud Storage,” Soft Computing, vol. 28, pp. 9037-9052, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[122] Lianghong Xu et al., “Online Deduplication for Databases,” Proceedings of the 2017 ACM International Conference on Management of Data, Chicago Illinois USA, pp. 1355-1368, 2017.
[CrossRef] [Google Scholar] [Publisher Link]
[123] Shweta Pal, Kiran More, and Priya Pise, “Content-Based Deduplication of Data Using Erasure Technique for RTO Cloud,” 2018 International Conference On Advances in Communication and Computing Technology (ICACCT), Sangamner, India, pp. 109-113, 2018.
[CrossRef] [Google Scholar] [Publisher Link]