Abstract

Accessing of data from cloud storage is growing as many users are getting in to the internet use. Data are stored in at multiple locations and can access services of different layers. Hackers and malicious intruders are active always and confidential data can be using in other ways. This led to decrease the trust of users from Cloud Service Provider (CSP). Cloud storage security and efficient access of data are main concern of this paper. In current scenario, chunk calculation, distributed hash table and bloom filter has contributed to load balancing management are common techniques of cloud storage in cloud computing systems. To maintain the trust between CSP and user, removal of duplication of data is very essential. This paper reviews the existing model of data de-duplication in cloud computing research.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call