Analytics, challenges and applications in big data environment: a survey

MR Bendre, VR Thool - Journal of Management Analytics, 2016 - Taylor & Francis
Big data refer to the massive amounts and varieties of information in the structured and
unstructured form, generated by social networking sites, biomedical equipment, financial …

[HTML][HTML] A secure and lightweight container migration technique in cloud computing

G Singh, P Singh, A Motii, M Hedabou - Journal of King Saud University …, 2024 - Elsevier
The present research has found that container virtualization systems are more effective and
more straightforward to handle in contrast to traditional virtualization systems. The live …

A comparative study of data deduplication strategies

N Chhabra, M Bala - 2018 First International Conference on …, 2018 - ieeexplore.ieee.org
Data Deduplication is a new way of compressing data which is helpful in efficient use of
storage space and proves to be a better technique to handle duplicate data. Deduplication …

Inde: An inline data deduplication approach via adaptive detection of valid container utilization

L Lin, Y Deng, Y Zhou, Y Zhu - ACM Transactions on Storage, 2023 - dl.acm.org
Inline deduplication removes redundant data in real-time as data is being sent to the storage
system. However, it causes data fragmentation: logically consecutive chunks are physically …

Secure data transmission on a distributed cloud server with the help of HMCA and data encryption using optimized CP-ABE-ECC

DVK Vengala, D Kavitha, APS Kumar - Cluster Computing, 2020 - Springer
The cloud computing (CC) model is diverse as well as has broad phenomena because of
which it is being preferred widely. Due to security challenges, the user cannot utilize CC to …

Similarity-based secure deduplication for iiot cloud management system

Y Gao, L Chen, J Han, S Yu… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
With the development of the Industrial Internet of Things (IIoT), the scale of IIoT data is
rapidly increasing, bringing significant challenges to existing data management systems. To …

[HTML][HTML] Lightweight hash-based de-duplication system using the self detection of most repeated patterns as chunks divisors

ST Ahmed, LE George - Journal of King Saud University-Computer and …, 2022 - Elsevier
Data reduction has gained growing emphasis due to the rapidly unsystematic increase in
digital data and has become a sensible approach to big data systems. Data deduplication is …

[HTML][HTML] A predictive checkpoint technique for iterative phase of container migration

G Singh, P Singh, M Hedabou, M Masud… - Sustainability, 2022 - mdpi.com
Cloud computing is a cost-effective method of delivering numerous services in Industry 4.0.
The demand for dynamic cloud services is rising day by day and, because of this, data …

SEEDDUP: a three-tier SEcurE data DedUPlication architecture-based storage and retrieval for cross-domains over cloud

B Rasina Begum, P Chitra - IETE Journal of Research, 2023 - Taylor & Francis
Data deduplication has become a promising technique that significantly reduces space
utilization of cloud storage servers and optimizes the network bandwidth. A variety of …

FASR: An efficient feature-aware deduplication method in distributed storage systems

W Yao, M Hao, Y Hou, X Li - IEEE Access, 2022 - ieeexplore.ieee.org
Deduplication technology can obtain higher space utilization by kee** only one duplicate.
But in a distributed storage system, the overall deduplication ratio will be limited due to …