Journal articles on the topic 'Deduplication management'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Deduplication management.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Janka, Heidrun, and Maria-Inti Metzendorf. "High precision but variable recall – comparing the performance of five deduplication tools." Journal of EAHIL 20, no. 1 (2024): 12–17. http://dx.doi.org/10.32384/jeahil20607.
Full textP. Selvi. "Revolutionary Data Deduplication with Fuzzy C-Means: Advancing Data Quality Management." Communications on Applied Nonlinear Analysis 31, no. 6s (2024): 582–91. http://dx.doi.org/10.52783/cana.v31.1245.
Full textPatil, Janhavi Rahul. "DATA FINDING, SHARING AND DUPLICATION REMOVAL IN THE CLOUD." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 04 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem29587.
Full textNarwade, Aditya Rajesh. "CLOUD BASED DUPLICATION REMOVAL SYSTEM." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 03 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem29104.
Full textLee, Mira, and Minhye Seo. "Secure and Efficient Deduplication for Cloud Storage with Dynamic Ownership Management." Applied Sciences 13, no. 24 (2023): 13270. http://dx.doi.org/10.3390/app132413270.
Full textGnana Jeslin, J., and P. Mohan Kumar. "Decentralized and Privacy Sensitive Data De-Duplication Framework for Convenient Big Data Management in Cloud Backup Systems." Symmetry 14, no. 7 (2022): 1392. http://dx.doi.org/10.3390/sym14071392.
Full textGan, Chuang, Weichun Wang, Yuchong Hu, et al. "Coupling Secret Sharing with Decentralized Server-Aided Encryption in Encrypted Deduplication." Applied Sciences 15, no. 3 (2025): 1245. https://doi.org/10.3390/app15031245.
Full textZhao, Lihong, and Weiping Zhong. "Design and optimization of financial management information system in colleges and universities under the background of big data." Journal of Computational Methods in Sciences and Engineering 25, no. 2 (2024): 1906–22. https://doi.org/10.1177/14727978241307146.
Full textYoun, Taek-Young, Nam-Su Jho, Keonwoo Kim, Ku-Young Chang, and Ki-Woong Park. "Locked Deduplication of Encrypted Data to Counter Identification Attacks in Cloud Storage Platforms." Energies 13, no. 11 (2020): 2742. http://dx.doi.org/10.3390/en13112742.
Full textBALGOTRA, ANSH. "Data Duplication Detection and Removal System Using Machine Learning." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 05 (2025): 1–9. https://doi.org/10.55041/ijsrem46920.
Full textAbo Hussein, Safa Ali, R. Badlishah Ahmad, Naimah Yaakob, Fathey Mohammed, and Abdul Ghani Khan. "Content-Defined Chunking Algorithms in Data Deduplication: Performance, Trade-Offs and Future-Oriented Techniques." Journal of Advanced Research in Applied Sciences and Engineering Technology 52, no. 1 (2024): 21–34. http://dx.doi.org/10.37934/araset.52.1.2134.
Full textS. Seethalakshmi and Dr. B. Balakumar. "Efficient and Secure Data Deduplication in Distributed Cloud Storage: A Fault-Tolerant Model Using Active Learning for Big Data Management." International Journal of Enhanced Research in Science, Technology & Engineering 13, no. 10 (2024): 05–12. http://dx.doi.org/10.55948/ijerste.2024.0102.
Full textA., Mohamed Divan Masood, and K. Muthusundar S. "Cryptographic Hashing Method using for Secure and Similarity Detection in Distributed Cloud Data." Indonesian Journal of Electrical Engineering and Computer Science 9, no. 1 (2018): 107–10. https://doi.org/10.11591/ijeecs.v9.i1.pp107-110.
Full textMohamed Divan Masood, A., and S. K. Muthusundar. "Cryptographic Hashing Method using for Secure and Similarity Detection in Distributed Cloud Data." Indonesian Journal of Electrical Engineering and Computer Science 9, no. 1 (2018): 107. http://dx.doi.org/10.11591/ijeecs.v9.i1.pp107-110.
Full textArchana, K., and Mrs Shubangini Patil. "Secure Data Deduplication with Dynamic Ownership Management in Cloud Storage." International Journal of Trend in Scientific Research and Development Volume-2, Issue-4 (2018): 2273–77. http://dx.doi.org/10.31142/ijtsrd14486.
Full textNandhini, R. "Deduplication of Data Storage Management in Cloud Computing." Research Journal of Engineering and Technology 10, no. 1 (2019): 46. http://dx.doi.org/10.5958/2321-581x.2019.00009.6.
Full textYan, Zheng, Mingjun Wang, Yuxiang Li, and Athanasios V. Vasilakos. "Encrypted Data Management with Deduplication in Cloud Computing." IEEE Cloud Computing 3, no. 2 (2016): 28–35. http://dx.doi.org/10.1109/mcc.2016.29.
Full textLakshmi, Prasanna, and al. et. "Secure Approach to Textual Data Deduplication in Cloud Systems: A Process of Design." International Journal of Computational Learning & Intelligence 4, no. 4 (2025): 799–808. https://doi.org/10.5281/zenodo.15464489.
Full textHandijono, Ardijan, and Zaldy Suhatman. "Meningkatkan Deduplikasi Data melalui Kesamaan Teks dalam Pembelajaran Mesin: Pendekatan Komprehensif." AKADEMIK: Jurnal Mahasiswa Humanis 4, no. 2 (2024): 602–15. http://dx.doi.org/10.37481/jmh.v4i2.955.
Full textQueen, Sharon Ignatious. "A DATA BACKUP TECHNIQUE IN CLOUD COMPUTING." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 8, no. 4 (2019): 95–98. https://doi.org/10.5281/zenodo.2631167.
Full textVenkatesh Babu, S., P. Ramya, and Jeffin Gracewell. "Content Deduplication with Granularity Tweak Based on Base and Deviation for Large Text Dataset." Scientific Programming 2022 (November 22, 2022): 1–17. http://dx.doi.org/10.1155/2022/9515181.
Full textViji, D., and Dr S. Revathy. "Comparative Analysis for Content Defined Chunking Algorithms in Data Deduplication." Webology 18, Special Issue 02 (2021): 255–68. http://dx.doi.org/10.14704/web/v18si02/web18070.
Full textNeeli, Sethu Sesha Synam. "Economical Approaches to NetApp Storage for Effective Database Management." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 01 (2025): 1–6. https://doi.org/10.55041/ijsrem18719.
Full textK, Archana, and Shubangini Patil Mrs. "Secure Data Deduplication with Dynamic Ownership Management in Cloud Storage." International Journal of Trend in Scientific Research and Development 2, no. 4 (2018): 2273–77. https://doi.org/10.31142/ijtsrd14486.
Full textK, Sabeerath, and Manikandasaran S. Sundaram. "ESPoW: Efficient and secured proof of ownership method to enable authentic deduplicated data access in public cloud storage." Scientific Temper 15, no. 04 (2024): 3165–72. https://doi.org/10.58414/scientifictemper.2024.15.4.25.
Full textYan, Zheng, Lifang Zhang, Wenxiu Ding, and Qinghua Zheng. "Heterogeneous Data Storage Management with Deduplication in Cloud Computing." IEEE Transactions on Big Data 5, no. 3 (2019): 393–407. http://dx.doi.org/10.1109/tbdata.2017.2701352.
Full textLi, Jin, Xiaofeng Chen, Mingqiang Li, Jingwei Li, Patrick P. C. Lee, and Wenjing Lou. "Secure Deduplication with Efficient and Reliable Convergent Key Management." IEEE Transactions on Parallel and Distributed Systems 25, no. 6 (2014): 1615–25. http://dx.doi.org/10.1109/tpds.2013.284.
Full textLi, Mei, Hongjun Zhang, Yanjun Wu, and Chen Zhao. "Prefetch-aware fingerprint cache management for data deduplication systems." Frontiers of Computer Science 13, no. 3 (2018): 500–515. http://dx.doi.org/10.1007/s11704-017-7119-0.
Full textAmaechi, Marcel Chibuzor, Matthias Daniel, and Bennett E O. "Data Storage Management in Cloud Computing Using Deduplication Technique." International Journal of Computer Science and Engineering 7, no. 7 (2020): 1–7. http://dx.doi.org/10.14445/23488387/ijcse-v7i7p101.
Full textDP, Mishra, Amitha P, Reddy KS, Jami N, and Prasad MD. "Encrypted Data Management with Deduplication in Cloud Compu-ting." European Journal of Advances in Engineering and Technology 5, no. 1 (2018): 43–49. https://doi.org/10.5281/zenodo.10701833.
Full textGodavari, Amdewar, and Chapram Sudhakar. "A survey on deduplication systems." International Journal of Grid and Utility Computing 15, no. 2 (2024): 143–59. http://dx.doi.org/10.1504/ijguc.2024.137902.
Full textKUMAR, Mr M. A. R., and Mrs SRILATHA PULI. "FINDING DATA DEDUPLICATION USING CLOUD." YMER Digital 21, no. 05 (2022): 136–42. http://dx.doi.org/10.37896/ymer21.05/17.
Full textK, Sabeerath, and Manikandasaran S. Sundaram. "BTEDD: Block-level tokens for efficient data deduplication in public cloud infrastructures." Scientific Temper 15, no. 03 (2024): 2507–14. http://dx.doi.org/10.58414/scientifictemper.2024.15.3.16.
Full textKarthik, Kumar S. "SECURE AUDITING AND DEDUPLICATION OF DATA ON CLOUD." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 5, no. 5 (2016): 289–92. https://doi.org/10.5281/zenodo.51419.
Full textPratibha, Miss Dive. "Secure Data-Deduplication with Dynamic Ownership Management in Cloud Storage." International Journal for Research in Applied Science and Engineering Technology V, no. III (2017): 603–5. http://dx.doi.org/10.22214/ijraset.2017.3112.
Full textHur, Junbeom, Dongyoung Koo, Youngjoo Shin, and Kyungtae Kang. "Secure Data Deduplication with Dynamic Ownership Management in Cloud Storage." IEEE Transactions on Knowledge and Data Engineering 28, no. 11 (2016): 3113–25. http://dx.doi.org/10.1109/tkde.2016.2580139.
Full textYuan, Haoran, Xiaofeng Chen, Tao Jiang, Xiaoyu Zhang, Zheng Yan, and Yang Xiang. "DedupDUM: Secure and scalable data deduplication with dynamic user management." Information Sciences 456 (August 2018): 159–73. http://dx.doi.org/10.1016/j.ins.2018.05.024.
Full textPanse, Fabian, Maurice van Keulen, and Norbert Ritter. "Indeterministic Handling of Uncertain Decisions in Deduplication." Journal of Data and Information Quality 4, no. 2 (2013): 1–25. http://dx.doi.org/10.1145/2435221.2435225.
Full textManghi, Paolo, Claudio Atzori, Michele De Bonis, and Alessia Bardi. "Entity deduplication in big data graphs for scholarly communication." Data Technologies and Applications 54, no. 4 (2020): 409–35. http://dx.doi.org/10.1108/dta-09-2019-0163.
Full textSinghal, Shubhanshi, Akanksha Kaushik, and Pooja Sharma. "A Novel approach of data deduplication for distributed storage." International Journal of Engineering & Technology 7, no. 2.4 (2018): 46. http://dx.doi.org/10.14419/ijet.v7i2.4.10040.
Full textMohanaprakash, Thottipalayam Andavan, and Vairaperumal Nirmalrani. "Privacy protection domain-user integra tag deduplication in cloud data server." International Journal of Electrical and Computer Engineering (IJECE) 12, no. 4 (2022): 4155–63. https://doi.org/10.11591/ijece.v12i4.pp4155-4163.
Full textTian, Guohua, Hua Ma, Ying Xie, and Zhenhua Liu. "Randomized deduplication with ownership management and data sharing in cloud storage." Journal of Information Security and Applications 51 (April 2020): 102432. http://dx.doi.org/10.1016/j.jisa.2019.102432.
Full textKwon, Hyunsoo, Changhee Hahn, Kyungtae Kang, and Junbeom Hur. "Secure deduplication with reliable and revocable key management in fog computing." Peer-to-Peer Networking and Applications 12, no. 4 (2018): 850–64. http://dx.doi.org/10.1007/s12083-018-0682-9.
Full textKaur, Ravneet, Inderveer Chana, and Jhilik Bhattacharya. "Data deduplication techniques for efficient cloud storage management: a systematic review." Journal of Supercomputing 74, no. 5 (2017): 2035–85. http://dx.doi.org/10.1007/s11227-017-2210-8.
Full textZhou, Lixi, Jiaqing Chen, Amitabh Das, et al. "Serving deep learning models with deduplication from relational databases." Proceedings of the VLDB Endowment 15, no. 10 (2022): 2230–43. http://dx.doi.org/10.14778/3547305.3547325.
Full textR. Vignesh, R. Vignesh, and J. Preethi R. Vignesh. "Secure Data Deduplication System with Efficient and Reliable Multi-Key Management in Cloud Storage." 網際網路技術學刊 23, no. 4 (2022): 811–25. http://dx.doi.org/10.53106/160792642022072304016.
Full textMeenambigai., D., and V. Mathavan. "User Data Integrating with Anti Collusion Scheme and SVC in Cloud Groups." International Journal of Trend in Scientific Research and Development 2, no. 2 (2018): 1039–44. https://doi.org/10.31142/ijtsrd9607.
Full textS, Janakiraman. "Cloud Clean: Cloud Storage Space Sustainability using Data Life Cycle Guard Scheme." International Journal for Research in Applied Science and Engineering Technology 13, no. 6 (2025): 165–72. https://doi.org/10.22214/ijraset.2025.71988.
Full textSingh, A. "Secure Auditing and Deduplicating Data in Cloud." International Journal for Research in Applied Science and Engineering Technology 11, no. 5 (2023): 6530–34. http://dx.doi.org/10.22214/ijraset.2023.53343.
Full textSohail, Asif, and Syed Waqar Jaffry. "Ranking the Blocking Keys for Data Deduplication in Information Systems." International Journal of Business Information Systems 1, no. 1 (2021): 1. http://dx.doi.org/10.1504/ijbis.2021.10044941.
Full text