Data deduplication is noteworthy strategy for evacuating the imitation information. Rather than putting away the same record for various time, this method disposes of copies duplicates and store just single duplicate of the document. In the vast majority of the associations, the capacity framework contains numerous copy information. Deduplication procedure erases the copies duplicates by putting away only one information duplicate. Furthermore, if the client attempting to transfer document which as of now exists, it will simply give pointers to the client which offers access to the first duplicate. This is the information pressure procedure for capacity utilization and expansion the transmission capacity effectiveness. The information deduplication method has been most by and large utilized as a part of distributed computing. This procedure additionally ensure the secrecy of the information. Deduplication strategy work with focalized encryption system used to encode the document before transferring to the cloud. In the proposed framework, the approved deduplication check has been proposed, while supporting security for the touchy information utilizing the cross breed distributed computing.
In this paper, approved information deduplication was proposed to ensure the information security by counting differential power of clients in the copy check. In public cloud our information are safely store in encoded format, and likewise in private cloud our key is store with separate file. There is no compelling reason to client keep in mind the key. So without key anybody cannot get to our document or information from public cloud.
 M. Bellare, S. Keelveedhi, and T. Ristenpart. Dupless: Serveraided encryption for deduplicated storage. In USENIX Security Symposium, 2013.
J. Stanek, A. Sorniotti, E. Androulaki, and L. Kencl. A secure data deduplication scheme for cloud storage. In Technical Report, 2013.
R. D. Pietro and A. Sorniotti. Boosting efficiency and security in proof of ownership for deduplication. In H. Y. Youm and Y. Won, editors, ACM Symposium on Information, Computer and Communications Security, pages 81–82. ACM, 2012.
W. K. Ng, Y. Wen, and H. Zhu. Private data Deduplication protocols in cloud storage. In S. Ossowski and P. Lecca, editors, Proceedings of the 27th Annual ACM Symposium on Applied Computing, pages 441–446. ACM, 2012.
J. Yuan and S. Yu. Secure and constant cost public cloud storage auditing with deduplication. IACR Cryptology ePrint Archive, 2013:149, 2013.
 S. Bugiel, S. Nurnberger, A. Sadeghi, and T. Schneider. Twin clouds: An architecture for secure cloud computing. In Workshop on Cryptography and Security in Clouds (WCSC 2011), 2011.
All rights reserverd @ IJCSN International Journal www.IJCSN.org