Article,

Analysis of Attack Techniques on Cloud Based Data Deduplication Techniques

.
International Journal on Cloud Computing: Services and Architecture (IJCCSA), 9 (1): 1-14 (February 2019)
DOI: 10.5121/ijccsa.2019.9101

Abstract

Data in the cloud is increasing rapidly. This huge amount of data is stored in various data centers around the world. Data deduplication allows lossless compression by removing the duplicate data. So, these data centers are able to utilize the storage efficiently by removing the redundant data. Attacks in the cloud computing infrastructure are not new, but attacks based on the deduplication feature in the cloud computing is relatively new and has made its urge nowadays. Attacks on deduplication features in the cloud environment can happen in several ways and can give away sensitive information. Though, deduplication feature facilitates efficient storage usage and bandwidth utilization, there are some drawbacks of this feature. In this paper, data deduplication features are closely examined. The behavior of data deduplication depending on its various parameters are explained and analyzed in this paper.

Tags

Users

  • @shaher

Comments and Reviews