DEDUCT: A Secure Deduplication of Textual data in Cloud Environment

Authors

  • Mohd Abdul Muqeet B.E Students, Department of Information Technology, ISL Engineering College, Hyderabad, India. Author
  • Wahaj Iqbal B.E Students, Department of Information Technology, ISL Engineering College, Hyderabad, India. Author
  • Mohd Mohiuddin B.E Students, Department of Information Technology, ISL Engineering College, Hyderabad, India. Author
  • Mr. Syed Mujeeb Ul Hassan Associate Professor, Department of Information Technology, ISL Engineering College, Hyderabad, India. Author

DOI:

https://doi.org/10.62647/IJITCE2025V13I2sPP381-387

Keywords:

Data deduplication, Textual data compression, Cloud Storage, IOT devices, Storage efficiency, Secure data management, Touchdown dataset.

Abstract

The exponential growth of textual data in
Vision-and-Language Navigation tasks
poses significant challenges for data
management in large-scale storage
systems. Data deduplication has emerged
as a practical strategy for data reduction in
large-scale storage systems; however, it
has also raised security concerns. This
paper introduces DEDUCT, an innovative
data deduplication method for textual
data. DEDUCT employs a hybrid
approach that combines cloud-side and
client-side deduplication mechanisms to
achieve high compression rates while
maintaining data security. DEDUCT’s
lightweight preprocessing and client-side
deduplication make it suitable for
resource-constrained devices like IoT
devices. It has also been designed to resist
side-channel attacks. Experimental
evaluations on the touchdown dataset,
consisting of human written navigation
instructions for routers, demonstrate the
effectiveness of DEDUCT. It achieves
co,pression rates of nearly 66%, and
improved efficiency in large scale data
management systems.

Downloads

Download data is not yet available.

Downloads

Published

14-06-2025

How to Cite

DEDUCT: A Secure Deduplication of Textual data in Cloud Environment. (2025). International Journal of Information Technology and Computer Engineering, 13(2s), 381-387. https://doi.org/10.62647/IJITCE2025V13I2sPP381-387