International Journal on Science and Technology

E-ISSN: 2229-7677     Impact Factor: 9.88

A Widely Indexed Open Access Peer Reviewed Multidisciplinary Bi-monthly Scholarly International Journal

Call for Paper Volume 16 Issue 2 April-June 2025 Submit your research before last 3 days of June to publish your research paper in the issue of April-June.

Security Analysis with Fog Computing

Author(s) Mohit Sharama, Dr. Manish Jha
Country India
Abstract With numerous benefits of cloud storage such as cost savings, accessibility, scalability etc., users around the world tend to shift their invaluable data to cloud storage. As the data generation rates are increasing, it is a tedious task for cloud storage providers to provide efficient storage. Cloud storage providers uses different techniques to improve storage efficiency and one of leading technique employed by them is de duplication, which claims to be saving 90 to 95% of storage,. Data De duplication technique evolved as an simple storage optimization technique in secondary then widely adapted in primary storage as well as larger storage areas like cloud storage area. Now, data de duplication is widely used by various cloud storage providers. Data once deployed to cloud servers, it’s beyond the security premises of the data owner, thus most of them prefer to outsource their in an encrypted format.
Field Engineering
Published In Volume 16, Issue 2, April-June 2025
Published On 2025-06-14
DOI https://doi.org/10.71097/IJSAT.v16.i2.6318
Short DOI https://doi.org/g9qqx4

Share this