
International Journal on Science and Technology
E-ISSN: 2229-7677
•
Impact Factor: 9.88
A Widely Indexed Open Access Peer Reviewed Multidisciplinary Bi-monthly Scholarly International Journal
Plagiarism is checked by the leading plagiarism checker
Call for Paper
Volume 16 Issue 2
April-June 2025
Indexing Partners



















Security Analysis with Fog Computing
Author(s) | Mohit Sharama, Dr. Manish Jha |
---|---|
Country | India |
Abstract | With numerous benefits of cloud storage such as cost savings, accessibility, scalability etc., users around the world tend to shift their invaluable data to cloud storage. As the data generation rates are increasing, it is a tedious task for cloud storage providers to provide efficient storage. Cloud storage providers uses different techniques to improve storage efficiency and one of leading technique employed by them is de duplication, which claims to be saving 90 to 95% of storage,. Data De duplication technique evolved as an simple storage optimization technique in secondary then widely adapted in primary storage as well as larger storage areas like cloud storage area. Now, data de duplication is widely used by various cloud storage providers. Data once deployed to cloud servers, it’s beyond the security premises of the data owner, thus most of them prefer to outsource their in an encrypted format. |
Field | Engineering |
Published In | Volume 16, Issue 2, April-June 2025 |
Published On | 2025-06-14 |
DOI | https://doi.org/10.71097/IJSAT.v16.i2.6318 |
Short DOI | https://doi.org/g9qqx4 |
Share this


CrossRef DOI is assigned to each research paper published in our journal.
IJSAT DOI prefix is
10.71097/IJSAT
Downloads
All research papers published on this website are licensed under Creative Commons Attribution-ShareAlike 4.0 International License, and all rights belong to their respective authors/researchers.
