{"id":"https://openalex.org/W3187314568","doi":"https://doi.org/10.3233/jifs-210038","title":"An efficient technique for cloud storage using secured de-duplication algorithm","display_name":"An efficient technique for cloud storage using secured de-duplication algorithm","publication_year":2021,"publication_date":"2021-07-30","ids":{"openalex":"https://openalex.org/W3187314568","doi":"https://doi.org/10.3233/jifs-210038","mag":"3187314568"},"language":"en","primary_location":{"id":"doi:10.3233/jifs-210038","is_oa":false,"landing_page_url":"https://doi.org/10.3233/jifs-210038","pdf_url":null,"source":{"id":"https://openalex.org/S179157397","display_name":"Journal of Intelligent & Fuzzy Systems","issn_l":"1064-1246","issn":["1064-1246","1875-8967"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Intelligent &amp; Fuzzy Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5102728992","display_name":"M. Prakash","orcid":"https://orcid.org/0000-0002-9476-3142"},"institutions":[{"id":"https://openalex.org/I65220239","display_name":"Karpagam Academy of Higher Education","ror":"https://ror.org/00ssvzv66","country_code":"IN","type":"education","lineage":["https://openalex.org/I65220239"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Prakash Mohan","raw_affiliation_strings":["Data Science and Analytics Center, Karpagam College of Engineering, Coimbatore, India"],"affiliations":[{"raw_affiliation_string":"Data Science and Analytics Center, Karpagam College of Engineering, Coimbatore, India","institution_ids":["https://openalex.org/I65220239"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5061104663","display_name":"Manikandan Sundaram","orcid":null},"institutions":[{"id":"https://openalex.org/I65220239","display_name":"Karpagam Academy of Higher Education","ror":"https://ror.org/00ssvzv66","country_code":"IN","type":"education","lineage":["https://openalex.org/I65220239"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Manikandan Sundaram","raw_affiliation_strings":["Data Science and Analytics Center, Karpagam College of Engineering, Coimbatore, India"],"affiliations":[{"raw_affiliation_string":"Data Science and Analytics Center, Karpagam College of Engineering, Coimbatore, India","institution_ids":["https://openalex.org/I65220239"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5027799921","display_name":"Sambit Satpathy","orcid":"https://orcid.org/0000-0003-2509-451X"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Sambit Satpathy","raw_affiliation_strings":["Noida Institute of Engineering and Technology, Greater Noida, Uttar Pradesh, India"],"affiliations":[{"raw_affiliation_string":"Noida Institute of Engineering and Technology, Greater Noida, Uttar Pradesh, India","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5060562525","display_name":"Sanchali Das","orcid":"https://orcid.org/0000-0002-9953-8155"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Sanchali Das","raw_affiliation_strings":["Noida Institute of Engineering and Technology, Greater Noida, Uttar Pradesh, India"],"affiliations":[{"raw_affiliation_string":"Noida Institute of Engineering and Technology, Greater Noida, Uttar Pradesh, India","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5102728992"],"corresponding_institution_ids":["https://openalex.org/I65220239"],"apc_list":null,"apc_paid":null,"fwci":7.1608,"has_fulltext":false,"cited_by_count":29,"citation_normalized_percentile":{"value":0.97054009,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":100},"biblio":{"volume":"41","issue":"2","first_page":"2969","last_page":"2980"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9936000108718872,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9772999882698059,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8649852275848389},{"id":"https://openalex.org/keywords/data-deduplication","display_name":"Data deduplication","score":0.6388500332832336},{"id":"https://openalex.org/keywords/cloud-storage","display_name":"Cloud storage","score":0.6235568523406982},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.5934921503067017},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5782055854797363},{"id":"https://openalex.org/keywords/wordnet","display_name":"WordNet","score":0.5184323787689209},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.5160557627677917},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.41815248131752014},{"id":"https://openalex.org/keywords/cosine-similarity","display_name":"Cosine similarity","score":0.4122595489025116},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.3169972598552704},{"id":"https://openalex.org/keywords/information-retrieval","display_name":"Information retrieval","score":0.2806219756603241},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.15627619624137878},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.13596680760383606},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.11434388160705566},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.11063438653945923}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8649852275848389},{"id":"https://openalex.org/C32587265","wikidata":"https://www.wikidata.org/wiki/Q1182260","display_name":"Data deduplication","level":2,"score":0.6388500332832336},{"id":"https://openalex.org/C2777059624","wikidata":"https://www.wikidata.org/wiki/Q914359","display_name":"Cloud storage","level":3,"score":0.6235568523406982},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.5934921503067017},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5782055854797363},{"id":"https://openalex.org/C157659113","wikidata":"https://www.wikidata.org/wiki/Q533822","display_name":"WordNet","level":2,"score":0.5184323787689209},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.5160557627677917},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.41815248131752014},{"id":"https://openalex.org/C2780762811","wikidata":"https://www.wikidata.org/wiki/Q1784941","display_name":"Cosine similarity","level":3,"score":0.4122595489025116},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.3169972598552704},{"id":"https://openalex.org/C23123220","wikidata":"https://www.wikidata.org/wiki/Q816826","display_name":"Information retrieval","level":1,"score":0.2806219756603241},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.15627619624137878},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.13596680760383606},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.11434388160705566},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.11063438653945923},{"id":"https://openalex.org/C73555534","wikidata":"https://www.wikidata.org/wiki/Q622825","display_name":"Cluster analysis","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.3233/jifs-210038","is_oa":false,"landing_page_url":"https://doi.org/10.3233/jifs-210038","pdf_url":null,"source":{"id":"https://openalex.org/S179157397","display_name":"Journal of Intelligent & Fuzzy Systems","issn_l":"1064-1246","issn":["1064-1246","1875-8967"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Intelligent &amp; Fuzzy Systems","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":23,"referenced_works":["https://openalex.org/W2067809562","https://openalex.org/W2085749377","https://openalex.org/W2134967412","https://openalex.org/W2188696149","https://openalex.org/W2189599699","https://openalex.org/W2403005236","https://openalex.org/W2408774838","https://openalex.org/W2467820268","https://openalex.org/W2511971673","https://openalex.org/W2540126579","https://openalex.org/W2592489084","https://openalex.org/W2610396733","https://openalex.org/W2615624292","https://openalex.org/W2888495535","https://openalex.org/W3094998779","https://openalex.org/W3113913633","https://openalex.org/W3129975510","https://openalex.org/W3131675795","https://openalex.org/W3173384905","https://openalex.org/W4244052628","https://openalex.org/W6686756578","https://openalex.org/W6687314585","https://openalex.org/W6920633242"],"related_works":["https://openalex.org/W2800638116","https://openalex.org/W2044129908","https://openalex.org/W2280769266","https://openalex.org/W3098351737","https://openalex.org/W2920851390","https://openalex.org/W2977986694","https://openalex.org/W2181638075","https://openalex.org/W2954486536","https://openalex.org/W3095441510","https://openalex.org/W3187314568"],"abstract_inverted_index":{"Techniques":[0],"of":[1,6,17,60,95,135,144],"data":[2,7,117],"compression":[3],"involve":[4],"de-duplication":[5,41],"that":[8,132,161],"plays":[9],"an":[10],"important":[11],"role":[12],"in":[13,24,53],"eliminating":[14],"duplicate":[15],"copies":[16],"information":[18,35,62,80],"and":[19,33,49,70,86,90,109,129,146,150,202,210],"has":[20],"been":[21,75],"widely":[22],"employed":[23,100],"cloud":[25,176],"storage":[26,31,177],"to":[27,77,101,110,126,186,198],"scale":[28],"back":[29],"the":[30,47,54,58,79,93,103,107,133,157,166,173],"capacity":[32],"save":[34],"measure.":[36],"A":[37],"secure":[38],"AES":[39,67,201],"encryption":[40,68],"system":[42],"for":[43,148,156,165,193],"finding":[44],"duplication":[45],"with":[46,92],"meaning":[48],"store":[50],"up":[51,197],"it":[52,206],"cloud.":[55],"To":[56],"protect":[57],"privacy":[59],"sensitive":[61],"whereas":[63],"supporting":[64],"de-duplication,":[65],"The":[66],"technique":[69],"SHA-256":[71,203],"hashing":[72],"algorithm":[73],"have":[74],"utilized":[76],"encrypt":[78],"before":[81],"outsourcing.":[82],"Pre-processing":[83],"is":[84,99,119,124,137,162,195],"completed":[85],"documents":[87,108],"are":[88,204],"compared":[89],"verified":[91],"use":[94],"wordnet.":[96],"Cosine":[97],"similarity":[98,104],"see":[102,127],"between":[105],"both":[106],"perform":[111],"this,":[112],"a":[113,141],"far":[114],"economical":[115],"VSM":[116],"structure":[118],"used.":[120],"Wordnet":[121],"hierarchical":[122],"corpus":[123],"used":[125,163,179],"syntax":[128],"semantics":[130],"so":[131],"identification":[134],"duplicates":[136],"done.":[138],"NLTK":[139],"provides":[140,207],"large":[142],"vary":[143],"libraries":[145],"programs":[147],"symbolic":[149],"statistical":[151],"natural":[152],"language":[153,160],"process":[154],"(NLP)":[155],"Python":[158],"programming":[159],"here":[164],"unidentified":[167],"words":[168],"by":[169],"cosine":[170],"similarity.":[171],"Within":[172],"previous":[174],"strategies,":[175],"was":[178],"abundantly":[180],"since":[181],"similar":[182],"files":[183],"were":[184],"allowed":[185],"store.":[187],"By":[188],"implementing":[189],"our":[190],"system,":[191],"space":[192],"storing":[194],"reduced":[196],"85%.":[199],"Since":[200],"employed,":[205],"high":[208],"security":[209],"efficiency.":[211]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":20}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
