Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

A hybrid cloud approach for secure authorized deduplication

205 views

Published on

A hybrid cloud approach for secure authorized deduplication

Do Your Projects With Technology Experts
To Get this projects Call : 9566355386 / 99625 88976
Visit : www.lemenizinfotech.com / www.ieeemaster.com
Mail : projects@lemenizinfotech.com

Published in: Education
  • Be the first to comment

  • Be the first to like this

A hybrid cloud approach for secure authorized deduplication

  1. 1. Do Your Projects With Domain Experts… Copyright © 2015 LeMeniz Infotech. All rights reserved Page number 1 LeMeniz Infotech 36, 100 Feet Road, Natesan Nagar, Near Indira Gandhi Statue, Pondicherry-605 005. Call: 0413-4205444, +91 9566355386, 99625 88976. Web : www.lemenizinfotech.com / www.ieeemaster.com Mail : projects@lemenizinfotech.com A Hybrid Cloud Approach for Secure Authorized Deduplication Abstract Data deduplication is one of important data compression techniques for eliminating duplicate copies of repeating data, and has been widely used in cloud storage to reduce the amount of storage space and save bandwidth. To protect the confidentiality of sensitive data while supporting deduplication, the convergent encryption technique has been proposed to encrypt the data before outsourcing. To better protect data security, this paper makes the first attempt to formally address the problem of authorized data deduplication. Different from traditional deduplication systems, the differential privileges of users are further considered in duplicate check besides the data itself. We also present several new deduplication constructions supporting authorized duplicate check in a hybrid cloud architecture. Security analysis demonstrates that our scheme is secure in terms of the definitions specified in the proposed security model. As a proof of concept, we implement a prototype of our proposed authorized duplicate check scheme and conduct testbed experiments using our prototype. We show that our proposed authorized duplicate check scheme incurs minimal overhead compared to normal operations. EXISTING SYSTEM Data deduplication is one of important data compression techniques for eliminating duplicate copies of repeating data, and has been widely used in cloud storage to reduce the amount of storage space and save bandwidth.
  2. 2. Do Your Projects With Domain Experts… Copyright © 2015 LeMeniz Infotech. All rights reserved Page number 2 LeMeniz Infotech 36, 100 Feet Road, Natesan Nagar, Near Indira Gandhi Statue, Pondicherry-605 005. Call: 0413-4205444, +91 9566355386, 99625 88976. Web : www.lemenizinfotech.com / www.ieeemaster.com Mail : projects@lemenizinfotech.com DRAWBACK OF EXISTING SYSTEM  One critical challenge of cloud storage services is the management of the ever- increasing volume of data. PROPOSED SYSTEM The convergent encryption technique has been proposed to encrypt the data before outsourcing. To better protect data security, this paper makes the first attempt to formally address the problem of authorized data deduplication. Convergent encryption has been proposed to enforce data confidentiality while making deduplication feasible. ADVANTAGE OF PROPOSED SYSTEM  To improve storage utilization and can also be applied to network data transfers.  Reduce the number of bytes that must be sent.  Eliminating duplicate copies of repeating data.  Reduce the amount of storage space and save bandwidth. SYSTEM SPECIFICATION Hardware Requirements System : Pentium IV 2.4 GHz Hard Disk : 40 GB Floppy Drive : 1.44 Mb Monitor : 15 VGA Colour
  3. 3. Do Your Projects With Domain Experts… Copyright © 2015 LeMeniz Infotech. All rights reserved Page number 3 LeMeniz Infotech 36, 100 Feet Road, Natesan Nagar, Near Indira Gandhi Statue, Pondicherry-605 005. Call: 0413-4205444, +91 9566355386, 99625 88976. Web : www.lemenizinfotech.com / www.ieeemaster.com Mail : projects@lemenizinfotech.com Mouse : Logitech Ram : 512 Mb Software Requirements Operating system : Windows Family Tools : eclipse/Netbeans Technology Used : Java Backend Used : SQL Server

×