Abstract: Desktop environment provides storage as an essential service. Data storage is the aim when users outsource their data to be stored in a place irrespective of the locations. File systems are actually designed to control how files are stored and retrieved. Without knowing the context and semantics of the content, file systems often contain duplicate copies and result in redundant consumptions of storage space and network bandwidth. It has been a tedious and challenging issue for enterprises to seek reduplication technologies to reduce cost and increase the storage efficiency. In order to solve such problem, hash values for files have been computed. The hash function competition to design a new cryptographic hash standard `SHA-3' is currently one of the well-known topics in cryptologic research, its outcome largely depends on the public evaluation. Testing the finalists in the competition for a new SHA-3 standard shows generally fast, secure hashing algorithms with few collisions and problems. Focus of computation is performed for duplicate and redundant knowledge removal. Hash computation is done by the method of comparing files initially and followed by SHA3 signature comparison. Saves time and enhances accessibility. It helps you reclaim your valuable storage space and keep your data secure. It provides fast and efficient way to detect and remove duplicate files. Therefore, ample memory can be saved by running DupliCut.
Keywords: Redundant data, DupliCut, SHA-3, Storage efficiency.