Skip to main content

Operations on Cloud Data (Classification and Data Redundancy)

  • Conference paper
  • First Online:
Advances in Computer and Computational Sciences

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 554))

  • 1312 Accesses

Abstract

Cloud computing is a turning in the field of information technology as it provides resources over network. Besides the features, cloud services are widely available for all. Content duplicacy increases the data redundancy problem in cloud. Files on cloud need an effective classification method so that the problem of cloud server efficiency may be optimized. In this paper, we have proposed two algorithms: Checker’s algorithm (to remove data redundancy from cloud) and Pronto-Key algorithm (to classify the files and enhance the performance of cloud) which overall increase the efficiency of the cloud.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. T.S. Dillon, C. Wu and E. Chang, “Cloud Computing: Issues and Challenges,” Advanced Information Networking and Applications (AINA), 2010 24th IEEE International Conference on. IEEE, pp. 27–33, 2010.

    Google Scholar 

  2. S. Tirodkar, Y. Baldawala, S. Ulane and A. Jori, “Improved 3-Dimensional Security in Cloud Computing,” International Journal of Computer Trends and Technology (IJCTT), Vol. 9, pp. 242–247, 2014.

    Google Scholar 

  3. J. Miao, Z. Fan, G. Chen, H. Mao, L. Wang, “A Private Cloud document management system with document clustering algorithm,” National Conference on Information Technology and Computer Science (CITCS 2012). Atlantis Press.

    Google Scholar 

  4. S. Suthaharan, “Big Data Classification: Problems and Challenges in Network Intrusion Prediction with Machine Learning,” Department of Computer Science, University of North Carolina at Greensboro, Greensboro, NC 27402, USA, 2012.

    Google Scholar 

  5. Dhanya P.M, Jathavedan M and Sreekumar A, “Implementation of Text clustering using Genetic Algorithm,” International Journal of Computer Science and Information Technologies (IJCSIT), Vol. 5, pp. 6138–6142, 2014.

    Google Scholar 

  6. M. A. Zardari, L.T. Jung and M.N. Zakaria, “Data Classification Based on Confidentiality in Virtual Cloud Environment”, Research Journal of Applied Sciences, Engineering and Technology, Vol. 8, pp. 1498–1509, 2014.

    Google Scholar 

  7. D. Anzelmi, D. Carlone, F. Rizzello, R. Thomsen and D.M. Akbar Hussain, “Plagiarism detection based on SCAM algorithm,” in Proceedings of the International MultiConference on Engineers and Computer Scientists, Vol. 1, pp. 272–277, 2011.

    Google Scholar 

  8. Praveen K Gupta, Nitin Rakesh, “Different job scheduling methodologies for web application and web server in a cloud computing environment”, 2010 3rd International Conference on Emerging Trends in Engineering and Technology (ICETET), pp. 569–572, 2010.

    Google Scholar 

  9. Nitin Rakesh, Vipin Tyagi, “Failure recovery in XOR’ed networks”, 2012 IEEE International Conference on Signal Processing, Computing and Control (ISPCC), pp. 1–6, 2012.

    Google Scholar 

  10. Kinjal Shah, Gagan Dua, Dharmendar Sharma, Priyanka Mishra, Nitin Rakesh, “Transmission of Successful Route Error Message (RERR) in Routing Aware Multiple Description Video Coding over Mobile Ad-Hoc Network”, International Journal of Multimedia & Its Applications (IJMA), Vol. 3, No. 3, 51–59, August 2011.

    Google Scholar 

  11. Z. Su, B. R. Ahn, K. Y. Eom, M. K. Kang, J. P. Kim, and M. K. Kim, “Plagiarism detection using the Levenshtein distance and Smith-Waterman algorithm,” in Proc. 3rd Int. Conf. Innovative Computing Information and Control, Dalian, Liaoning, 2008.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sandeep Khanna .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Singapore Pte Ltd.

About this paper

Cite this paper

Khanna, S., Rakesh, N., Chaturvedi, K.N. (2018). Operations on Cloud Data (Classification and Data Redundancy). In: Bhatia, S., Mishra, K., Tiwari, S., Singh, V. (eds) Advances in Computer and Computational Sciences. Advances in Intelligent Systems and Computing, vol 554. Springer, Singapore. https://doi.org/10.1007/978-981-10-3773-3_17

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-3773-3_17

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-3772-6

  • Online ISBN: 978-981-10-3773-3

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics