📞 +91-7667918914 | ✉️ ijarcce@gmail.com
IJARCCE Logo
International Journal of Advanced Research in Computer and Communication Engineering A monthly Peer-reviewed & Refereed journal
ISSN Online 2278-1021ISSN Print 2319-5940Since 2012
IJARCCE adheres to the suggestive parameters outlined by the University Grants Commission (UGC) for peer-reviewed journals, upholding high standards of research quality, ethical publishing, and academic excellence.
← Back to VOLUME 4, ISSUE 10, OCTOBER 2015

DupliCut: Redundant File Finder and Remover

Sumita Chandak, Abhishek Kadam, Bhagyashree Gawade, Jidnyesh Sankhe, Rohish Badkar

DOI: 10.17148/IJARCCE.2015.41069

Abstract: Desktop environment provides storage as an essential service. Data storage is the aim when users outsource their data to be stored in a place irrespective of the locations. File systems are actually designed to control how files are stored and retrieved. Without knowing the context and semantics of the content, file systems often contain duplicate copies and result in redundant consumptions of storage space and network bandwidth. It has been a tedious and challenging issue for enterprises to seek reduplication technologies to reduce cost and increase the storage efficiency. In order to solve such problem, hash values for files have been computed. The hash function competition to design a new cryptographic hash standard `SHA-3' is currently one of the well-known topics in cryptologic research, its outcome largely depends on the public evaluation. Testing the finalists in the competition for a new SHA-3 standard shows generally fast, secure hashing algorithms with few collisions and problems. Focus of computation is performed for duplicate and redundant knowledge removal. Hash computation is done by the method of comparing files initially and followed by SHA3 signature comparison. Saves time and enhances accessibility. It helps you reclaim your valuable storage space and keep your data secure. It provides fast and efficient way to detect and remove duplicate files. Therefore, ample memory can be saved by running DupliCut.



Keywords: Redundant data, DupliCut, SHA-3, Storage efficiency.

How to Cite:

[1] Sumita Chandak, Abhishek Kadam, Bhagyashree Gawade, Jidnyesh Sankhe, Rohish Badkar, “DupliCut: Redundant File Finder and Remover,” International Journal of Advanced Research in Computer and Communication Engineering (IJARCCE), DOI: 10.17148/IJARCCE.2015.41069