Academic literature on the topic 'Deduplication management'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Deduplication management.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Deduplication management"

1

Janka, Heidrun, and Maria-Inti Metzendorf. "High precision but variable recall – comparing the performance of five deduplication tools." Journal of EAHIL 20, no. 1 (2024): 12–17. http://dx.doi.org/10.32384/jeahil20607.

Full text
Abstract:
Deduplication methods for multiple database searches conducted for evidence syntheses differ in terms of time invested, accuracy, and comprehensiveness of identified duplicates. Deduplication tools can significantly contribute to a more efficient conduct of the search task in evidence syntheses. Widely-used tools for deduplication include reference management software (e.g. EndNote), built-in deduplication features in systematic review software (e.g. Covidence, Rayyan), and automated deduplication tools (e.g. Deduklick, SRA Deduplicator). Newer tools leverage machine learning algorithms crafte
APA, Harvard, Vancouver, ISO, and other styles
2

P. Selvi. "Revolutionary Data Deduplication with Fuzzy C-Means: Advancing Data Quality Management." Communications on Applied Nonlinear Analysis 31, no. 6s (2024): 582–91. http://dx.doi.org/10.52783/cana.v31.1245.

Full text
Abstract:
Maintaining the integrity and precision of data depends on the crucial process of data deduplication, the search and elimination of duplicate data from a database. Conventional deduplication methods may not be useful when dealing with data with variances and uncertainty as from time to time depend on spotting the closest matches. In this point, another procedure frequently applied in data clustering but especially for data deduplication is employed in this work to propose a new approach to data deduplication involving Fuzzy C-use (FCM) clustering. FCM allows to set as many data points as desir
APA, Harvard, Vancouver, ISO, and other styles
3

Patil, Janhavi Rahul. "DATA FINDING, SHARING AND DUPLICATION REMOVAL IN THE CLOUD." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 04 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem29587.

Full text
Abstract:
Deduplication involves eliminating duplicate or redundant data to reduce stored data volume, commonly used in data backup, network optimization, and storage management. However, traditional deduplication methods have limitations with encrypted data and security. The primary objective of this project is to develop new distributed deduplication systems that offer increased reliability. In these systems, data chunks are distributed across the Hadoop Distributed File System (HDFS), and a robust key management system is utilized to ensure secure deduplication with slave nodes. Instead of having mul
APA, Harvard, Vancouver, ISO, and other styles
4

Narwade, Aditya Rajesh. "CLOUD BASED DUPLICATION REMOVAL SYSTEM." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 03 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem29104.

Full text
Abstract:
Deduplication involves eliminating duplicate or redundant data to reduce stored data volume, commonly used in data backup, network optimization, and storage management. However, traditional deduplication methods have limitations with encrypted data and security. The primary objective of this project is to develop new distributed deduplication systems that offer increased reliability. In these systems, data chunks are distributed across the Hadoop Distributed File System (HDFS), and a robust key management system is utilized to ensure secure deduplication with slave nodes. Instead of having mul
APA, Harvard, Vancouver, ISO, and other styles
5

Lee, Mira, and Minhye Seo. "Secure and Efficient Deduplication for Cloud Storage with Dynamic Ownership Management." Applied Sciences 13, no. 24 (2023): 13270. http://dx.doi.org/10.3390/app132413270.

Full text
Abstract:
Cloud storage services have become indispensable in resolving the constraints of local storage and ensuring data accessibility from anywhere at any time. Data deduplication technology is utilized to decrease storage space and bandwidth requirements. This technology has the potential to save up to 90% of space by eliminating redundant data in cloud storage. The secure data sharing in cloud (SeDaSC) protocol is an efficient data-sharing solution supporting secure deduplication. In the SeDaSC protocol, a cryptographic server (CS) encrypts clients’ data on behalf of clients to reduce their computa
APA, Harvard, Vancouver, ISO, and other styles
6

Gnana Jeslin, J., and P. Mohan Kumar. "Decentralized and Privacy Sensitive Data De-Duplication Framework for Convenient Big Data Management in Cloud Backup Systems." Symmetry 14, no. 7 (2022): 1392. http://dx.doi.org/10.3390/sym14071392.

Full text
Abstract:
The number of customers transferring information to cloud storage has grown significantly, with the rising prevalence of cloud computing. The rapidly rising data volume in the cloud, mostly on one side, is followed by a large replication of data. On the other hand, if there is a single duplicate copy of stored symmetrical information in the de-duplicate cloud backup the manipulation or lack of a single copy may cause untold failure. Thus, the deduplication of files and the auditing of credibility are extremely necessary and how they are achieved safely and effectively must be addressed in acad
APA, Harvard, Vancouver, ISO, and other styles
7

Gan, Chuang, Weichun Wang, Yuchong Hu, et al. "Coupling Secret Sharing with Decentralized Server-Aided Encryption in Encrypted Deduplication." Applied Sciences 15, no. 3 (2025): 1245. https://doi.org/10.3390/app15031245.

Full text
Abstract:
Outsourcing storage to the cloud can save storage costs and is commonly used in businesses. It should fulfill two major goals: storage efficiency and data confidentiality. Encrypted deduplication can achieve both goals via performing deduplication to eliminate the duplicate data within encrypted data. Traditional encrypted deduplication generates the encryption key on the client side, which poses a risk of offline brute-force cracking of the outsourced data. Server-aided encryption schemes have been proposed to strengthen the confidentiality of encrypted deduplication by distributing the encry
APA, Harvard, Vancouver, ISO, and other styles
8

Zhao, Lihong, and Weiping Zhong. "Design and optimization of financial management information system in colleges and universities under the background of big data." Journal of Computational Methods in Sciences and Engineering 25, no. 2 (2024): 1906–22. https://doi.org/10.1177/14727978241307146.

Full text
Abstract:
In order to promote the effect of financial management (FM) informatization in colleges and universities (CAU), this paper combines the big data technology to design the FM informatization system in CAU and conducts a detailed study on the BF algorithm. Aiming at the problem of misjudgment in the process of URL deduplication, this paper proposes a BF algorithm based on Hash splitting with multiple eigenvalues and analyzes and compares its performance with experiments. Finally, the effectiveness of the algorithm in reducing the misjudgment rate of deduplication is confirmed. Then, this paper pr
APA, Harvard, Vancouver, ISO, and other styles
9

Youn, Taek-Young, Nam-Su Jho, Keonwoo Kim, Ku-Young Chang, and Ki-Woong Park. "Locked Deduplication of Encrypted Data to Counter Identification Attacks in Cloud Storage Platforms." Energies 13, no. 11 (2020): 2742. http://dx.doi.org/10.3390/en13112742.

Full text
Abstract:
Deduplication of encrypted data is a significant function for both the privacy of stored data and efficient storage management. Several deduplication techniques have been designed to provide improved security or efficiency. In this study, we focus on the client-side deduplication technique, which has more advantages than the server-side deduplication technique, particularly in communication overhead, owing to conditional data transmissions. From a security perspective, poison, dictionary, and identification attacks are considered as threats against client-side deduplication. Unfortunately, in
APA, Harvard, Vancouver, ISO, and other styles
10

BALGOTRA, ANSH. "Data Duplication Detection and Removal System Using Machine Learning." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 05 (2025): 1–9. https://doi.org/10.55041/ijsrem46920.

Full text
Abstract:
Abstract— The problem of missing data is a critical issue in various domains, as it can lead to inaccurate analysis and flawed decision-making. Traditional methods for handling missing values have been replaced by machine learning techniques, which offer more efficient solutions. Research in this area has explored various approaches to data imputation, analyzing their strengths and limitations. A systematic literature review of studies from 2016 to 2021 identified key factors influencing the effectiveness of thesemethods, providing valuable insights for researchers and data analysts. In parall
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Deduplication management"

1

Chen, Hui-Tsung, and 陳暉宗. "Dr. FTL: Flash Translation Layer with Adaptive Management for Deduplication and Replication." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/57536761093976292190.

Full text
Abstract:
碩士<br>國立臺灣科技大學<br>資訊工程系<br>102<br>Flash memory has been widely used as a storage medium for portable device, personal computer and data center due to non-volatility, high performance, low power consumption and shock resistance. Some techniques have been proposed to achieve better lifetime or performance of flash memory. Data deduplication has been proposed for reducing the duplicated data to reduce the write traffic to extend the lifetime of flash memory and achieving higher performance. Data Replication replicated the data to achieve higher reliability. However, blindly doing data deduplicati
APA, Harvard, Vancouver, ISO, and other styles
2

"Kernel-space inline deduplication file systems for virtual machine image storage." 2013. http://library.cuhk.edu.hk/record=b5549294.

Full text
Abstract:
從文件系統設計的角度,我們探索了利用重復數據删除技術來消除硬盤陣列存儲設備當中的重復數據。我們提出了ScaleDFS,一個重復數據删除技術的文件系統, 旨在硬盤陣列存儲設備上實現可擴展的吞吐性能。ScaleDFS有三個主要的特點。第一,利用多核CPU並行計算出用作識別重復數據的加密指紋,以提高寫入速度。第二,緩存曾經讀取過的重復數據塊,以顯著提高讀取速度。第三,優化用作查找指紋的內存數據結構,以更加節省內存。ScaleDFS是一個以Linux系統內核模塊開發的,與POSIX兼容的,可以用在一般低成本硬件配置上的文件系統。我們進行了一系列的微觀性能測試,以及用42個不同版本的Linux虛擬鏡像文件進行了宏觀性能測試。我們證實,ScaleDFS在磁盤陣列上比目前已有的開源重復數據删除文件系統擁有更好的讀寫性能。<br>We explore the use of deduplication for eliminating the storage of redundant data in RAID from a file-system design perspective. We propose ScaleDFS, a deduplication file system that seeks to achieve scalable read/write throughput in RAID
APA, Harvard, Vancouver, ISO, and other styles
3

"Data security and reliability in cloud backup systems with deduplication." 2012. http://library.cuhk.edu.hk/record=b5549075.

Full text
Abstract:
雲存儲是一個新興的服務模式,讓個人和企業的數據備份外包予較低成本的遠程雲服務提供商。本論文提出的方法,以確保數據的安全性和雲備份系統的可靠性。<br>在本論文的第一部分,我們提出 FadeVersion,安全的雲備份作為今天的雲存儲服務上的安全層服務的系統。 FadeVersion實現標準的版本控制備份設計,從而消除跨不同版本備份的冗餘數據存儲。此外,FadeVersion在此設計上加入了加密技術以保護備份。具體來說,它實現細粒度安全删除,那就是,雲客戶可以穩妥地在雲上删除特定的備份版本或文件,使有關文件永久無法被解讀,而其它共用被删除數據的備份版本或文件將不受影響。我們實現了試驗性原型的 FadeVersion並在亞馬遜S3之上進行實證評價。我們證明了,相對於不支援度安全删除技術傳統的雲備份服務 FadeVersion只增加小量額外開鎖。<br>在本論文的第二部分,提出 CFTDedup一個分佈式代理系統,利用通過重複數據删除增加雲存儲的效率,而同時確保代理之間的崩潰容錯。代理之間會進行同步以保持重複數據删除元數據的一致性。另外,它也分批更新元數據減輕同步帶來的開銷。我們實現了初步的原型CFTDedup並通過試驗台試驗,以存儲虛擬機映像評估其重複數據删除的運行性能。我們還討論了幾個開放問題,例如如何提供可靠、高性能的重複數據删除的存儲。我們的CFTDedup原型提供了一個平台來探
APA, Harvard, Vancouver, ISO, and other styles
4

"Live deduplication storage of virtual machine images in an open-source cloud." 2012. http://library.cuhk.edu.hk/record=b5549139.

Full text
Abstract:
重覆數據删除技術是一個消除冗餘數據存儲塊的技術。尤其是,在儲存數兆位元組的虛擬機器影像時,它已被證明可以減少使用磁碟空間。但是,在會經常加入和讀取虛擬機器影像的雲端平台,部署重覆數據删除技術仍然存在挑戰。我們提出了一個在內核運行的重覆數據删除檔案系統LiveDFS,它可以在一個在低成本硬件配置的開源雲端平台中作為儲存虛擬機器影像的後端。LiveDFS有幾個新穎的特點。具體來說,LiveDFS中最重要的特點是在考慮檔案系統佈局時,它利用空間局部性放置重覆數據删除中繼資料。LiveDFS是POSIX兼容的Linux內核檔案系統。我們透過使用42個不同Linux發行版的虛擬機器影像,在實驗平台測試了LiveDFS的讀取和寫入性能。我們的工作證明了在低成本硬件配置的雲端平台部署LiveDFS的可行性。<br>Deduplication is a technique that eliminates the storage of redundant data blocks. In particular, it has been shown to effectively reduce the disk space for storing multi-gigabyte virtual machine (VM) images. However, there remain challenging de
APA, Harvard, Vancouver, ISO, and other styles
5

Dobiášovský, Jan. "Přibližná shoda znakových řetězců a její aplikace na ztotožňování metadat vědeckých publikací." Master's thesis, 2020. http://www.nusl.cz/ntk/nusl-415121.

Full text
Abstract:
The thesis explores the application of approximate string matching in scientific publication record linkage process. An introduction to record matching along with five commonly used metrics for string distance (Levenshtein, Jaro, Jaro-Winkler, Cosine distances and Jaccard coefficient) are provided. These metrics are applied on publication metadata from V3S current research information system of the Czech Technical University in Prague. Based on the findings, optimal thresholds in the F​1​, F​2​ and F​3​-measures are determined for each metric.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Deduplication management"

1

International Business Machines Corporation. International Technical Support Organization, ed. IBM System Storage N Series A-SIS deduplication. IBM, International Technical Support Organization, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Corporation, International Business Machines, ed. TS7680 Deduplication ProtecTIER Gateway for System z. Vervante, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Deduplication management"

1

Fan, Wenfei, and Floris Geerts. "Data Deduplication." In Foundations of Data Quality Management. Springer International Publishing, 2012. http://dx.doi.org/10.1007/978-3-031-01892-3_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Yao, Wenbin, and Pengdi Ye. "Simdedup: A New Deduplication Scheme Based on Simhash." In Web-Age Information Management. Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-39527-7_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Ebinazer, Silambarasan Elkana, and Shinde Soham Santosh. "Robust Ownership Management for Secure Deduplication in Cloud." In Intelligent Sustainable Systems. Springer Nature Singapore, 2024. http://dx.doi.org/10.1007/978-981-99-7886-1_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

He, Wanhui, Nong Xiao, Fang Liu, Zhiguang Chen, and Yinjin Fu. "DL-Dedupe: Dual-Level Deduplication Scheme for Flash-Based SSDs." In Web-Age Information Management. Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-39527-7_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Vijay, K., R. Pradeep, Sorna D. Shanthi, K. R. Sowmia, and Eugene I. Berna. "Deduplication in Cloud Computing for Heterogeneous Data Storage Management." In Recent Trends in Computational Intelligence and Its Application. CRC Press, 2023. http://dx.doi.org/10.1201/9781003388913-65.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Deepa, D., Yunus Parvez, Y. Dheeraj, Anitha Ponraj, and M. S. Roobini. "Data Deduplication on Multi-domain Big Data to Overcome Communication Overheads." In Advances in Power Systems and Energy Management. Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-15-7504-4_55.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Silambarasan, E., S. Nickolas, and S. Mary Saira Bhanu. "Attribute-Based Convergent Encryption Key Management for Secure Deduplication in Cloud." In Advances in Intelligent Systems and Computing. Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-1081-6_46.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Gonthireddy, Srinivas, and Syam Kumar Pasupuleti. "Secure Big Data Deduplication with Dynamic Ownership Management in Cloud Computing." In Advances in Intelligent Systems and Computing. Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-1483-8_22.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Bae, Seungyeon, Taehun Kim, Woomin Lee, and Youngjoo Shin. "Exploiting Memory Page Management in KSM for Remote Memory Deduplication Attack." In Information Security Applications. Springer Nature Singapore, 2024. http://dx.doi.org/10.1007/978-981-99-8024-6_19.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Ma, Hua, Guohua Tian, Zhenhua Liu, and Linchao Zhang. "Secure Data Deduplication with Ownership Management and Sharing in Cloud Storage." In Communications in Computer and Information Science. Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-13-3095-7_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Deduplication management"

1

Wang, Sibo, Xiaokui Xiao, and Chun-Hee Lee. "Crowd-Based Deduplication." In SIGMOD/PODS'15: International Conference on Management of Data. ACM, 2015. http://dx.doi.org/10.1145/2723372.2723739.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Esteves, João Victor, Sérgio Lifschitz, Rosa Maria Costa, and Ana Carolina Almeida. "Streaming state management methods for real-time data deduplication." In XXXV Simpósio Brasileiro de Banco de Dados. Sociedade Brasileira de Computação - SBC, 2020. http://dx.doi.org/10.5753/sbbd.2020.13652.

Full text
Abstract:
Data duplication is a common problem on data streams processing applications that occurs due to software error or adoption of data loss prevention measures, jeopardizing real-time data analyses. This paper explores stream-based deduplication methods to identify challenges from these methods and proposes a decision method to choose the most appropriate strategy for a domain. This work investigates native solutions and auxiliary tools to provide data deduplication and fault tolerance. The experimental results show that it is necessary to use fast additional storage to persist the read keys, as l
APA, Harvard, Vancouver, ISO, and other styles
3

Qinlu He, Zhanhuai Li, and Xiao Zhang. "Data deduplication techniques." In 2010 International Conference on Future Information Technology and Management Engineering (FITME). IEEE, 2010. http://dx.doi.org/10.1109/fitme.2010.5656539.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Xu, Lianghong, Andrew Pavlo, Sudipta Sengupta, and Gregory R. Ganger. "Online Deduplication for Databases." In SIGMOD/PODS'17: International Conference on Management of Data. ACM, 2017. http://dx.doi.org/10.1145/3035918.3035938.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Pal, Rita, and Mr Shyam Dwivedi. "REVOLUTIONIZING CLOUD SECURITY- BIG DATA DYNAMIC OWNERSHIP AND ROBUST DATA DEDUPLICATION IN STORAGE SOLUTIONS." In Computing for Sustainable Innovation: Shaping Tomorrow’s World. Innovative Research Publication, 2024. http://dx.doi.org/10.55524/csistw.2024.12.1.45.

Full text
Abstract:
In the era of exponentially growing data, securing sensitive information in cloud storage environments is paramount. This paper introduces a ground-breaking approach to cloud security through the integration of Big Data dynamic ownership management and robust data deduplication techniques. The proposed framework not only addresses the challenges of ownership dynamics in large-scale cloud storage but also ensures data security through advanced deduplication mechanisms. By dynamically adapting ownership structures to evolving data needs and implementing secure deduplication processes, our soluti
APA, Harvard, Vancouver, ISO, and other styles
6

Wu, Yunpeng, Yiting Lv, Yuping Sun, et al. "A Method of Deduplication based on Inconsistency." In 2015 International conference on Engineering Management, Engineering Education and Information Technology. Atlantis Press, 2015. http://dx.doi.org/10.2991/emeeit-15.2015.68.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Krause, Alexander, Jannis Kowalick, Johannes Pietrzyk, Dirk Habich, and Wolfgang Lehner. "De²Dup: Extended Deduplication for Multi-Tenant Databases." In SIGMOD/PODS '25: International Conference on Management of Data. ACM, 2025. https://doi.org/10.1145/3736227.3736236.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Nahlah Aslam, K. P., and K. P. Swaraj. "Data Deduplication with Encrypted Big Data Management in Cloud Computing." In 2019 International Conference on Communication and Electronics Systems (ICCES). IEEE, 2019. http://dx.doi.org/10.1109/icces45898.2019.9002170.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Hur, Junbeom, Dongyoung Koo, Youngjoo Shin, and Kyungtae Kang. "Secure Data Deduplication with Dynamic Ownership Management in Cloud Storage." In 2017 IEEE 33rd International Conference on Data Engineering (ICDE). IEEE, 2017. http://dx.doi.org/10.1109/icde.2017.41.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Kwon, Hyunsoo, Changhee Hahn, Dongyoung Koo, and Junbeom Hur. "Scalable and Reliable Key Management for Secure Deduplication in Cloud Storage." In 2017 IEEE 10th International Conference on Cloud Computing (CLOUD). IEEE, 2017. http://dx.doi.org/10.1109/cloud.2017.57.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!