This document summarizes a research paper on secured authorized deduplication in a hybrid cloud system. The system aims to provide data deduplication, differential authorization for access, and confidentiality of data files. It involves a public cloud for storage, a private cloud for managing access tokens, and users who generate keys for files stored on the public cloud. When uploading a file, the user encrypts it and sends it to the public cloud along with the key to the private cloud. To download, the user must provide the correct key to the private cloud to gain access to encrypted files from the public cloud. This hybrid cloud model uses deduplication for storage optimization while controlling access through differential authorization of private keys.
Implementation of De-Duplication AlgorithmIRJET Journal
The document describes an implementation of a data de-duplication algorithm using convergent encryption. It discusses how data de-duplication works to reduce storage usage by identifying and removing duplicate copies of data. Convergent encryption is used, which generates the same encrypted form of a file from the original file's hash, allowing duplicate encrypted files to be de-duplicated while preserving privacy. The algorithm divides files into blocks, generates hashes for each block, and encrypts the file blocks using the hashes as keys. When a file is uploaded, its hash is checked against existing hashes to identify duplicates, with duplicates replaced by pointers to the stored copy. This allows efficient de-duplication while encrypting data for privacy and security when stored
Secret keys and the packets transportation for privacy data forwarding method...eSAT Publishing House
This document proposes a method for improving data security and privacy in cloud data forwarding. The method involves splitting a data owner's encrypted file into multiple packets, encrypting each packet, and storing the packets and encryption keys across multiple cloud servers. If the data owner wants to forward the file, they send the encrypted packets and verify the recipient's identity. To further enhance security, the decryption key is sent as an SMS rather than over the cloud servers. This integrates concepts of encryption, encoding, and key distribution to improve data confidentiality when files are forwarded in the cloud.
Secret keys and the packets transportation for privacy data forwarding method...eSAT Journals
Abstract The Cloud computing is the process of storing the data in the Remote server. This process doesn‘t speak much about confidentiality and robustness of the data. To improve the security and confidentiality the uploaded file from a data owner is splitted into multiple packets and stored in multiple cloud servers. These packets are encrypted using the primary key. These different keys are also distributed in multiple key servers. User id is appended for verification. If the data owner forwards the file then the keys are verified for the data access. In this we are proposing sending the secret key as SMS to the shared or forwarded nodes for the process of proper Security. This technique integrates the concepts of encryption, encoding and forwarding. Keywords-cloud computing, encryption, storage system
A Hybrid Cloud Approach for Secure Authorized Deduplication1crore projects
- The document proposes a new deduplication system that supports differential or authorized duplicate checking in a hybrid cloud architecture consisting of a public and private cloud. This allows users to securely check for duplicates of files based on their privileges.
- Convergent encryption is used to encrypt files for deduplication while maintaining confidentiality. A new construction is presented that additionally encrypts files with keys derived from user privileges to enforce access control during duplicate checking.
- The system aims to efficiently solve the problem of deduplication with access control in cloud computing. It allows duplicate checking of files marked with a user's corresponding privileges to realize access control while preserving benefits of deduplication.
An efficient, secure deduplication data storing in cloud storage environmenteSAT Journals
This document proposes an efficient and secure method for deduplication of data stored in cloud environments. It describes encrypting data at the client side before uploading to the cloud using convergent encryption. A Merkle tree is used to generate a unique identifier for the encrypted data. Access to encrypted data files is controlled through authorization of decryption keys for authorized cloud users stored in a log file. This approach aims to provide privacy and prevent unauthorized access to outsourced data while allowing controlled sharing between cloud users.
Ijaems apr-2016-7 An Enhanced Multi-layered Cryptosystem Based Secure and Aut...INFOGAIN PUBLICATION
Data de-duplication is one of the essential data compression techniques for eliminating duplicate copies of repeating data, and it has been widely used in cloud storage to reduce the amount of storage space and save bandwidth. To protect the privacy of sensitive data while supporting de-duplication, the salt encryption technique has been proposed to encrypt the data before its outsourcing. To protect the data security in a better way, this paper makes the first attempt to formally address the problem of authorized data de-duplication. Different from traditional de-duplication systems, the derivative privileges of users are further considered in duplicate check besides the data itself. We also present various new de-duplication constructions which supports the authorized duplicate check in hybrid cloud architecture. Security analysis demonstrates that the scheme which we used is secure in terms of the definitions specified in the proposed security model. We enhance our system in security. Specially, we present a forward-looking scheme to support a stronger security by encrypting file with differential privilege keys. We show that our proposed authorized duplicate check scheme incurs minimal overhead compared to normal operations.
Implementation of De-Duplication AlgorithmIRJET Journal
The document describes an implementation of a data de-duplication algorithm using convergent encryption. It discusses how data de-duplication works to reduce storage usage by identifying and removing duplicate copies of data. Convergent encryption is used, which generates the same encrypted form of a file from the original file's hash, allowing duplicate encrypted files to be de-duplicated while preserving privacy. The algorithm divides files into blocks, generates hashes for each block, and encrypts the file blocks using the hashes as keys. When a file is uploaded, its hash is checked against existing hashes to identify duplicates, with duplicates replaced by pointers to the stored copy. This allows efficient de-duplication while encrypting data for privacy and security when stored
Secret keys and the packets transportation for privacy data forwarding method...eSAT Publishing House
This document proposes a method for improving data security and privacy in cloud data forwarding. The method involves splitting a data owner's encrypted file into multiple packets, encrypting each packet, and storing the packets and encryption keys across multiple cloud servers. If the data owner wants to forward the file, they send the encrypted packets and verify the recipient's identity. To further enhance security, the decryption key is sent as an SMS rather than over the cloud servers. This integrates concepts of encryption, encoding, and key distribution to improve data confidentiality when files are forwarded in the cloud.
Secret keys and the packets transportation for privacy data forwarding method...eSAT Journals
Abstract The Cloud computing is the process of storing the data in the Remote server. This process doesn‘t speak much about confidentiality and robustness of the data. To improve the security and confidentiality the uploaded file from a data owner is splitted into multiple packets and stored in multiple cloud servers. These packets are encrypted using the primary key. These different keys are also distributed in multiple key servers. User id is appended for verification. If the data owner forwards the file then the keys are verified for the data access. In this we are proposing sending the secret key as SMS to the shared or forwarded nodes for the process of proper Security. This technique integrates the concepts of encryption, encoding and forwarding. Keywords-cloud computing, encryption, storage system
A Hybrid Cloud Approach for Secure Authorized Deduplication1crore projects
- The document proposes a new deduplication system that supports differential or authorized duplicate checking in a hybrid cloud architecture consisting of a public and private cloud. This allows users to securely check for duplicates of files based on their privileges.
- Convergent encryption is used to encrypt files for deduplication while maintaining confidentiality. A new construction is presented that additionally encrypts files with keys derived from user privileges to enforce access control during duplicate checking.
- The system aims to efficiently solve the problem of deduplication with access control in cloud computing. It allows duplicate checking of files marked with a user's corresponding privileges to realize access control while preserving benefits of deduplication.
An efficient, secure deduplication data storing in cloud storage environmenteSAT Journals
This document proposes an efficient and secure method for deduplication of data stored in cloud environments. It describes encrypting data at the client side before uploading to the cloud using convergent encryption. A Merkle tree is used to generate a unique identifier for the encrypted data. Access to encrypted data files is controlled through authorization of decryption keys for authorized cloud users stored in a log file. This approach aims to provide privacy and prevent unauthorized access to outsourced data while allowing controlled sharing between cloud users.
Ijaems apr-2016-7 An Enhanced Multi-layered Cryptosystem Based Secure and Aut...INFOGAIN PUBLICATION
Data de-duplication is one of the essential data compression techniques for eliminating duplicate copies of repeating data, and it has been widely used in cloud storage to reduce the amount of storage space and save bandwidth. To protect the privacy of sensitive data while supporting de-duplication, the salt encryption technique has been proposed to encrypt the data before its outsourcing. To protect the data security in a better way, this paper makes the first attempt to formally address the problem of authorized data de-duplication. Different from traditional de-duplication systems, the derivative privileges of users are further considered in duplicate check besides the data itself. We also present various new de-duplication constructions which supports the authorized duplicate check in hybrid cloud architecture. Security analysis demonstrates that the scheme which we used is secure in terms of the definitions specified in the proposed security model. We enhance our system in security. Specially, we present a forward-looking scheme to support a stronger security by encrypting file with differential privilege keys. We show that our proposed authorized duplicate check scheme incurs minimal overhead compared to normal operations.
This document summarizes various data encryption techniques for securing data in cloud computing. It discusses hybrid encryption algorithms that combine Caesar cipher, RSA, and monoalphabetic substitution. It also describes the DES algorithm and its structure. Finally, it explores identity-based encryption (IBE) where a third party generates public keys based on user identifiers like email addresses. The document concludes that data security is an important issue for cloud computing and more research is still needed to enhance security features using cryptographic techniques.
Hybrid Cloud Approach for Secure Authorized DeduplicationPrem Rao
This document proposes a hybrid cloud approach for secure authorized data deduplication. It discusses existing systems that use data deduplication to reduce storage usage but lack security features. The proposed system uses convergent encryption for data confidentiality while allowing deduplication. It also aims to support authorized duplicate checks by encrypting files with differential privilege keys. The system design involves data owner, encryption/decryption, private cloud, public cloud, and cloud server modules. Cryptographic techniques like hashing and encryption are used along with communication via HTTP. The development follows a waterfall model with phases for requirements analysis, design, implementation, testing, and maintenance.
International Journal of Engineering and Science Invention (IJESI)inventionjournals
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online
This document proposes and compares several privacy-preserving encrypted keyword search schemes for cloud storage. It introduces three main participants in such schemes: users, a key server, and a cloud service provider (CSP). It then describes three specific schemes - Public Key Encryption with Keyword Search (PEKS), Efficient and Privacy Preserving Keyword Search (EPPKS), and Secure and Privacy Preserving Keyword Search (SPKS). PEKS allows searching on encrypted keywords but requires the user to decrypt files. EPPKS offloads some computation to the CSP but is not resistant to statistical attacks. SPKS enables partial decryption by the CSP, reducing user computation costs while preserving privacy and flexibility. The document argues that SPKS provides the
SECRY - Secure file storage on cloud using hybrid cryptographyALIN BABU
Final project presentation of Final year B.tech CSE Project APJ Abdul Kalam Technological University.
About the project
Cloud computing has now become a major trend, it is a new data hosting technology that is very popular in recent years. In this project, we are developing an web application that can securely store the files to a cloud server. We proposes a system that uses hybrid cryptography technique to securely store the data in cloud. The hybrid approach when deployed in cloud environment makes the remote server more secure and thus, helps the users to fetch more trust of their data in the cloud. For data security and privacy protection issues, the fundamental challenge of separation of sensitive data and access control is fulfilled. Cryptography technique translates original data into unreadable format. This technique uses keys for translate data into unreadable form. So only authorized person can access data from cloud server.
We provide a cloud storage that uses multiple crypotraphic technique which is known by hybrid cryptography. The product provides confidentiality by using security for both upload and download. The data will be secured since we use multi level security techniques and multiple servers for storage.
A Hybrid Cloud Approach for Secure Authorized DeduplicationSWAMI06
Data deduplication is one of important data compression techniques for eliminating duplicate copies of repeating data,
and has been widely used in cloud storage to reduce the amount of storage space and save bandwidth. To protect the confidentiality
of sensitive data while supporting deduplication, the convergent encryption technique has been proposed to encrypt the data before
outsourcing. To better protect data security, this paper makes the first attempt to formally address the problem of authorized data
deduplication. Different from traditional deduplication systems, the differential privileges of users are further considered in duplicate
check besides the data itself.We also present several new deduplication constructions supporting authorized duplicate check in a hybrid
cloud architecture. Security analysis demonstrates that our scheme is secure in terms of the definitions specified in the proposed
security model. As a proof of concept, we implement a prototype of our proposed authorized duplicate check scheme and conduct
testbed experiments using our prototype. We show that our proposed authorized duplicate check scheme incurs minimal overhead
compared to normal operations.
IRJET- Multiple Keyword Search over Encrypted Cloud DataIRJET Journal
This document proposes a system for multi-keyword ranked search over encrypted cloud data. The system consists of four main components: data owners who upload encrypted data to the cloud server, data users who search for and access encrypted files, an administrator server that handles authentication and generates trapdoors for searches, and the cloud server that stores the encrypted data and indexes. When a data user performs a search, the administrator generates an encrypted trapdoor for the keywords to allow searching without revealing the plaintext to the cloud server. Search results are ranked based on factors like download frequency. The proposed system aims to provide secure, authenticated searches over outsourced encrypted data while preserving data privacy.
- The document discusses a thesis submitted on the Password Authenticated Key Exchange Protocol (PAKE) which allows two parties to establish a secure communication channel by exchanging a secret key based on a shared password.
- It proposes using public key cryptography like RSA to generate a session key, and symmetric key encryption like AES to generate a public key by encrypting the secret key along with the shared password. Hashing with SHA-1 is also used to provide data integrity.
- The implementation uses Java to encrypt and decrypt strings and files to demonstrate that the PAKE protocol provides security even when parties share a simple password.
The document proposes a secure client-side deduplication scheme called KeyD that uses identity-based broadcast encryption instead of independent key management to effectively manage convergent keys for deduplication. KeyD ensures data confidentiality and convergent key security while providing ownership privacy. Experimental results show that KeyD achieves better tradeoffs between storage costs, communication overhead, and computation overhead compared to traditional deduplication schemes.
Define and solve the problem of effective and secure ranked keyword search over encrypted cloud data.
Ranked search greatly enhances system usability by returning the matching files in a ranked order regarding to
certain relevance criteria (e.g., keyword frequency), thus making one step closer towards practical deployment of
privecy- preserving data hosting services in Cloud Computing. To improve the security for the data retrieval from
cloud environment, the One Time Password is used. The One Time Passwod is sent to the user mail to view the
original data. The Model exhibits the Querying Process over the cloud computing infrastructure using Secured and
Encrypted Data access and Ranking over the results would benefit the usre for the getting better results.
IRJET - A Secure Access Policies based on Data Deduplication SystemIRJET Journal
This document summarizes a research paper on a secure access policies based data deduplication system. The system uses attribute-based encryption and a hybrid cloud model with a private cloud for deduplication and a public cloud for storage. It allows defining access policies for encrypted data files. When a user uploads a duplicate file, the system checks for a matching file and replaces it with a reference to the existing copy to save storage. The system provides file and block-level deduplication for efficient storage and uses cryptographic techniques like MD5, 3DES and RSA for encryption, tagging and access control of encrypted duplicate data across clouds.
The document describes a secure cloud storage system that supports data forwarding without retrieving data. It uses a threshold proxy re-encryption scheme combined with a decentralized erasure code. This allows storage servers to directly re-encrypt and forward encrypted data to another user, without having the plaintext. The system has four phases: setup, storage, forwarding, and retrieval. It discusses parameters for the number of storage servers and key shares to provide security and robustness. The scheme supports encoding and forwarding of encrypted data in a distributed manner across independent servers.
This document proposes a hybrid cloud approach for authorized data deduplication that addresses confidentiality and access control. It presents a new deduplication system that supports differential duplicate checks based on user privileges under a hybrid cloud architecture. The system encrypts files with keys tied to privilege levels, allowing duplicate checks only for users with appropriate privileges. The system is implemented and tested, showing minimal overhead compared to normal cloud storage operations.
IRJET- Comparative Analysis of Encryption TechniquesIRJET Journal
The document compares and analyzes different encryption techniques. It summarizes the Data Encryption Standard (DES), Triple DES (3DES), and Advanced Encryption Standard (AES). DES uses a 56-bit key and 64-bit block size, while 3DES extends DES to 168 bits for improved security. AES was developed later to replace DES and uses 128, 192, or 256 bit keys and block sizes. The document concludes that AES is more secure than DES and 3DES based on its longer key lengths and that it is the symmetric encryption algorithm of choice for future applications.
Secure deduplicaton with efficient and reliable convergentJayakrishnan U
This document proposes a new technique called Dekey for secure deduplication in cloud storage. Dekey distributes convergent keys across multiple key servers to reduce key overhead and improve security compared to traditional convergent encryption. The document outlines issues with traditional encryption approaches, describes the baseline convergent encryption approach and issues with it, and then introduces the Dekey approach. Dekey supports both file-level and block-level deduplication while providing cost efficiency, security, and reliability through distributed convergent key management across multiple servers.
Doc A hybrid cloud approach for secure authorized deduplicationShakas Technologie
This document summarizes a research paper that proposes a hybrid cloud approach for secure authorized data deduplication. The paper aims to address the problem of authorized duplicate data checks in cloud storage by considering the differential privileges of users. It presents a system that uses a private cloud as a proxy to allow users to securely perform duplicate checks with differential privileges in a public cloud storage system. The system encrypts files with differential privilege keys, so that unauthorized users without the proper privileges cannot access or perform duplicate checks on the encrypted files. An implementation of the proposed authorized duplicate check scheme was tested and shown to incur minimal overhead.
Alternative Contractual Models of Dredging Projects to Avoid Disputes (A Case...theijes
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The papers for publication in The International Journal of Engineering& Science are selected through rigorous peer reviews to ensure originality, timeliness, relevance, and readability.
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The papers for publication in The International Journal of Engineering& Science are selected through rigorous peer reviews to ensure originality, timeliness, relevance, and readability.
This document provides a survey and classification of new automatic road network extraction methods from remotely sensed imagery published between 2000-2014. The methods are classified into two broad categories: 1) general classification methods including segmentation, vectorization, neural networks etc. that detect roads from the original image, and 2) applied techniques classification based on preprocessing like using texture, morphology, spectral information with neural networks. Various techniques are discussed including directional mathematical morphology, texture analysis, ribbon/ziplock snakes, support vector machines etc. The aim is to provide a comprehensive overview of recent research in this area.
“Theory of Time” is a research and analysis report on integrated transformation system to find out reason for changes. I had found some systematic relational imbalance among the principles of AC Transformer, Ohm’s law, series parallel circuits and law of conservation of energy. I did systematic analysis and research on above said combination principles and System’s Relative components are determined and organized systematically for better understanding and reformed results are meeting with the natural principles of system.
I did systematic analysis on electro-magnetic circuits to understand the structure of the transformation system. Law of conservation of energy, Transformer’s principles, Newton’s laws and Ohm’s law are base for this theory. By doing relational analysis I could derive Equivalent mechanical transformation principles from Electricity Transformation principles and mechanical resistance to transformation equation has been successfully formulated. Finally Obtained / reformed results are compared with our practical science and found that the derived principles are meeting with the natural principles of system and its transformation process. Further, explaining about “how the time is running?”; “what are all the relative components of the time?”; Whether is it possible to stop the time running process?
This document summarizes various data encryption techniques for securing data in cloud computing. It discusses hybrid encryption algorithms that combine Caesar cipher, RSA, and monoalphabetic substitution. It also describes the DES algorithm and its structure. Finally, it explores identity-based encryption (IBE) where a third party generates public keys based on user identifiers like email addresses. The document concludes that data security is an important issue for cloud computing and more research is still needed to enhance security features using cryptographic techniques.
Hybrid Cloud Approach for Secure Authorized DeduplicationPrem Rao
This document proposes a hybrid cloud approach for secure authorized data deduplication. It discusses existing systems that use data deduplication to reduce storage usage but lack security features. The proposed system uses convergent encryption for data confidentiality while allowing deduplication. It also aims to support authorized duplicate checks by encrypting files with differential privilege keys. The system design involves data owner, encryption/decryption, private cloud, public cloud, and cloud server modules. Cryptographic techniques like hashing and encryption are used along with communication via HTTP. The development follows a waterfall model with phases for requirements analysis, design, implementation, testing, and maintenance.
International Journal of Engineering and Science Invention (IJESI)inventionjournals
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online
This document proposes and compares several privacy-preserving encrypted keyword search schemes for cloud storage. It introduces three main participants in such schemes: users, a key server, and a cloud service provider (CSP). It then describes three specific schemes - Public Key Encryption with Keyword Search (PEKS), Efficient and Privacy Preserving Keyword Search (EPPKS), and Secure and Privacy Preserving Keyword Search (SPKS). PEKS allows searching on encrypted keywords but requires the user to decrypt files. EPPKS offloads some computation to the CSP but is not resistant to statistical attacks. SPKS enables partial decryption by the CSP, reducing user computation costs while preserving privacy and flexibility. The document argues that SPKS provides the
SECRY - Secure file storage on cloud using hybrid cryptographyALIN BABU
Final project presentation of Final year B.tech CSE Project APJ Abdul Kalam Technological University.
About the project
Cloud computing has now become a major trend, it is a new data hosting technology that is very popular in recent years. In this project, we are developing an web application that can securely store the files to a cloud server. We proposes a system that uses hybrid cryptography technique to securely store the data in cloud. The hybrid approach when deployed in cloud environment makes the remote server more secure and thus, helps the users to fetch more trust of their data in the cloud. For data security and privacy protection issues, the fundamental challenge of separation of sensitive data and access control is fulfilled. Cryptography technique translates original data into unreadable format. This technique uses keys for translate data into unreadable form. So only authorized person can access data from cloud server.
We provide a cloud storage that uses multiple crypotraphic technique which is known by hybrid cryptography. The product provides confidentiality by using security for both upload and download. The data will be secured since we use multi level security techniques and multiple servers for storage.
A Hybrid Cloud Approach for Secure Authorized DeduplicationSWAMI06
Data deduplication is one of important data compression techniques for eliminating duplicate copies of repeating data,
and has been widely used in cloud storage to reduce the amount of storage space and save bandwidth. To protect the confidentiality
of sensitive data while supporting deduplication, the convergent encryption technique has been proposed to encrypt the data before
outsourcing. To better protect data security, this paper makes the first attempt to formally address the problem of authorized data
deduplication. Different from traditional deduplication systems, the differential privileges of users are further considered in duplicate
check besides the data itself.We also present several new deduplication constructions supporting authorized duplicate check in a hybrid
cloud architecture. Security analysis demonstrates that our scheme is secure in terms of the definitions specified in the proposed
security model. As a proof of concept, we implement a prototype of our proposed authorized duplicate check scheme and conduct
testbed experiments using our prototype. We show that our proposed authorized duplicate check scheme incurs minimal overhead
compared to normal operations.
IRJET- Multiple Keyword Search over Encrypted Cloud DataIRJET Journal
This document proposes a system for multi-keyword ranked search over encrypted cloud data. The system consists of four main components: data owners who upload encrypted data to the cloud server, data users who search for and access encrypted files, an administrator server that handles authentication and generates trapdoors for searches, and the cloud server that stores the encrypted data and indexes. When a data user performs a search, the administrator generates an encrypted trapdoor for the keywords to allow searching without revealing the plaintext to the cloud server. Search results are ranked based on factors like download frequency. The proposed system aims to provide secure, authenticated searches over outsourced encrypted data while preserving data privacy.
- The document discusses a thesis submitted on the Password Authenticated Key Exchange Protocol (PAKE) which allows two parties to establish a secure communication channel by exchanging a secret key based on a shared password.
- It proposes using public key cryptography like RSA to generate a session key, and symmetric key encryption like AES to generate a public key by encrypting the secret key along with the shared password. Hashing with SHA-1 is also used to provide data integrity.
- The implementation uses Java to encrypt and decrypt strings and files to demonstrate that the PAKE protocol provides security even when parties share a simple password.
The document proposes a secure client-side deduplication scheme called KeyD that uses identity-based broadcast encryption instead of independent key management to effectively manage convergent keys for deduplication. KeyD ensures data confidentiality and convergent key security while providing ownership privacy. Experimental results show that KeyD achieves better tradeoffs between storage costs, communication overhead, and computation overhead compared to traditional deduplication schemes.
Define and solve the problem of effective and secure ranked keyword search over encrypted cloud data.
Ranked search greatly enhances system usability by returning the matching files in a ranked order regarding to
certain relevance criteria (e.g., keyword frequency), thus making one step closer towards practical deployment of
privecy- preserving data hosting services in Cloud Computing. To improve the security for the data retrieval from
cloud environment, the One Time Password is used. The One Time Passwod is sent to the user mail to view the
original data. The Model exhibits the Querying Process over the cloud computing infrastructure using Secured and
Encrypted Data access and Ranking over the results would benefit the usre for the getting better results.
IRJET - A Secure Access Policies based on Data Deduplication SystemIRJET Journal
This document summarizes a research paper on a secure access policies based data deduplication system. The system uses attribute-based encryption and a hybrid cloud model with a private cloud for deduplication and a public cloud for storage. It allows defining access policies for encrypted data files. When a user uploads a duplicate file, the system checks for a matching file and replaces it with a reference to the existing copy to save storage. The system provides file and block-level deduplication for efficient storage and uses cryptographic techniques like MD5, 3DES and RSA for encryption, tagging and access control of encrypted duplicate data across clouds.
The document describes a secure cloud storage system that supports data forwarding without retrieving data. It uses a threshold proxy re-encryption scheme combined with a decentralized erasure code. This allows storage servers to directly re-encrypt and forward encrypted data to another user, without having the plaintext. The system has four phases: setup, storage, forwarding, and retrieval. It discusses parameters for the number of storage servers and key shares to provide security and robustness. The scheme supports encoding and forwarding of encrypted data in a distributed manner across independent servers.
This document proposes a hybrid cloud approach for authorized data deduplication that addresses confidentiality and access control. It presents a new deduplication system that supports differential duplicate checks based on user privileges under a hybrid cloud architecture. The system encrypts files with keys tied to privilege levels, allowing duplicate checks only for users with appropriate privileges. The system is implemented and tested, showing minimal overhead compared to normal cloud storage operations.
IRJET- Comparative Analysis of Encryption TechniquesIRJET Journal
The document compares and analyzes different encryption techniques. It summarizes the Data Encryption Standard (DES), Triple DES (3DES), and Advanced Encryption Standard (AES). DES uses a 56-bit key and 64-bit block size, while 3DES extends DES to 168 bits for improved security. AES was developed later to replace DES and uses 128, 192, or 256 bit keys and block sizes. The document concludes that AES is more secure than DES and 3DES based on its longer key lengths and that it is the symmetric encryption algorithm of choice for future applications.
Secure deduplicaton with efficient and reliable convergentJayakrishnan U
This document proposes a new technique called Dekey for secure deduplication in cloud storage. Dekey distributes convergent keys across multiple key servers to reduce key overhead and improve security compared to traditional convergent encryption. The document outlines issues with traditional encryption approaches, describes the baseline convergent encryption approach and issues with it, and then introduces the Dekey approach. Dekey supports both file-level and block-level deduplication while providing cost efficiency, security, and reliability through distributed convergent key management across multiple servers.
Doc A hybrid cloud approach for secure authorized deduplicationShakas Technologie
This document summarizes a research paper that proposes a hybrid cloud approach for secure authorized data deduplication. The paper aims to address the problem of authorized duplicate data checks in cloud storage by considering the differential privileges of users. It presents a system that uses a private cloud as a proxy to allow users to securely perform duplicate checks with differential privileges in a public cloud storage system. The system encrypts files with differential privilege keys, so that unauthorized users without the proper privileges cannot access or perform duplicate checks on the encrypted files. An implementation of the proposed authorized duplicate check scheme was tested and shown to incur minimal overhead.
Alternative Contractual Models of Dredging Projects to Avoid Disputes (A Case...theijes
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The papers for publication in The International Journal of Engineering& Science are selected through rigorous peer reviews to ensure originality, timeliness, relevance, and readability.
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The papers for publication in The International Journal of Engineering& Science are selected through rigorous peer reviews to ensure originality, timeliness, relevance, and readability.
This document provides a survey and classification of new automatic road network extraction methods from remotely sensed imagery published between 2000-2014. The methods are classified into two broad categories: 1) general classification methods including segmentation, vectorization, neural networks etc. that detect roads from the original image, and 2) applied techniques classification based on preprocessing like using texture, morphology, spectral information with neural networks. Various techniques are discussed including directional mathematical morphology, texture analysis, ribbon/ziplock snakes, support vector machines etc. The aim is to provide a comprehensive overview of recent research in this area.
“Theory of Time” is a research and analysis report on integrated transformation system to find out reason for changes. I had found some systematic relational imbalance among the principles of AC Transformer, Ohm’s law, series parallel circuits and law of conservation of energy. I did systematic analysis and research on above said combination principles and System’s Relative components are determined and organized systematically for better understanding and reformed results are meeting with the natural principles of system.
I did systematic analysis on electro-magnetic circuits to understand the structure of the transformation system. Law of conservation of energy, Transformer’s principles, Newton’s laws and Ohm’s law are base for this theory. By doing relational analysis I could derive Equivalent mechanical transformation principles from Electricity Transformation principles and mechanical resistance to transformation equation has been successfully formulated. Finally Obtained / reformed results are compared with our practical science and found that the derived principles are meeting with the natural principles of system and its transformation process. Further, explaining about “how the time is running?”; “what are all the relative components of the time?”; Whether is it possible to stop the time running process?
Estimation of 3d Visualization for Medical Machinary Imagestheijes
This document discusses a study on 3D visualization of medical images. It presents four key modules: 1) 3D viewer using geometry and color information to generate 3D images from 2D X-ray images, 2) volume viewer representing anatomical structures as 3D distributions, 3) interactive 3D surface plot using image luminance as height, and 4) stack surface plot displaying 3D graphs of pixel intensities in image stacks. The study aims to improve analysis of medical imaging data through 3D visualization techniques.
The Effect of Business Strategy on Innovation and Firm Performance in the Sma...theijes
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The papers for publication in The International Journal of Engineering& Science are selected through rigorous peer reviews to ensure originality, timeliness, relevance, and readability.
Theoretical work submitted to the Journal should be original in its motivation or modeling structure. Empirical analysis should be based on a theoretical framework and should be capable of replication. It is expected that all materials required for replication (including computer programs and data sets) should be available upon request to the authors.
The International Journal of Engineering & Science would take much care in making your article published without much delay with your kind cooperation.
Structural, Economic and Environmental Study of Concrete and Timber as Struct...theijes
This study analyzed concrete and timber as structural materials for residential buildings in Nigeria from structural, economic, environmental and energy perspectives. A duplex building model was designed using each material and analyzed using structural engineering software. Cost analyses found the timber model was approximately N3.85 million cheaper than the concrete model. Environmental impact assessments using lifecycle analysis found the concrete model had significantly higher negative impacts across several metrics, including 235-6,970% higher smog potential, fossil fuel consumption, ozone depletion, and global warming potential compared to the timber model. The results provide justification for considering timber as a cost-effective and more sustainable alternative to concrete for residential construction in Nigeria.
Study, testing & analysis of composit material based on munja fibretheijes
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The papers for publication in The International Journal of Engineering& Science are selected through rigorous peer reviews to ensure originality, timeliness, relevance, and readability.
Effect of cultural and poem identity on the architectural designtheijes
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
Measures for Improving Undergraduate Engineering Education: An Emperical Stu...theijes
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The papers for publication in The International Journal of Engineering& Science are selected through rigorous peer reviews to ensure originality, timeliness, relevance, and readability.
Design Optimization for Vibration Level of Root Blower With No Load Conditiontheijes
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The papers for publication in The International Journal of Engineering& Science are selected through rigorous peer reviews to ensure originality, timeliness, relevance, and readability.
Theoretical work submitted to the Journal should be original in its motivation or modeling structure. Empirical analysis should be based on a theoretical framework and should be capable of replication. It is expected that all materials required for replication (including computer programs and data sets) should be available upon request to the authors.
The International Journal of Engineering & Science would take much care in making your article published without much delay with your kind cooperation.
This document identifies low-temperature waste heat potential in some Indian industries that is currently untapped, including hotels, molding plants, metal melting facilities, and rolling mills. It provides several case studies and recommendations for improving energy efficiency by utilizing low-grade heat from sources like compressor exhaust, furnace flue gases, and hot water. Implementing techniques like preheating air and fuels with waste heat could reduce steam, electricity, and fuel consumption, lowering costs with payback periods of less than two years for some options. While site-specific analysis is needed, these illustrations provide examples of low-cost waste heat recovery applicable to similar industrial processes.
Mixture Experiment Models for Predicting the Compressive Strength and Water A...theijes
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The papers for publication in The International Journal of Engineering& Science are selected through rigorous peer reviews to ensure originality, timeliness, relevance, and readability.
Theoretical work submitted to the Journal should be original in its motivation or modeling structure. Empirical analysis should be based on a theoretical framework and should be capable of replication. It is expected that all materials required for replication (including computer programs and data sets) should be available upon request to the authors.
The International Journal of Engineering & Science would take much care in making your article published without much delay with your kind cooperation.
The Application of Internet as an Indispensable Tool for Effective Teaching, ...theijes
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The papers for publication in The International Journal of Engineering& Science are selected through rigorous peer reviews to ensure originality, timeliness, relevance, and readability.
Theoretical work submitted to the Journal should be original in its motivation or modeling structure. Empirical analysis should be based on a theoretical framework and should be capable of replication. It is expected that all materials required for replication (including computer programs and data sets) should be available upon request to the authors.
The International Journal of Engineering & Science would take much care in making your article published without much delay with your kind cooperation.
This document discusses applying data mining techniques to construct a risk factor model for predicting building fire insurance claims. Specifically:
1. It analyzes building fire insurance claim data using a backpropagation neural network (BPN) model to identify important risk factors and their weightings for predicting claims.
2. The BPN model was trained on historical data and achieved 85.5% accuracy on the training data and 82.42% on test data, demonstrating its ability to generalize.
3. The identified risk factors included building structure, operations, fire equipment, electrical systems, security, and fire prevention measures. Analyzing these factors can help insurers better evaluate risks and make underwriting decisions.
This document presents a morphometric analysis of a semi-urban watershed located in Allahabad, India using Cartosat DEM data and GIS. Key findings include:
1) The watershed has an area of 289.41 km2 and exhibits a dendritic drainage pattern. Strahler stream ordering identified the watershed as having first to fifth order streams.
2) Morphometric parameters related to the linear and aerial aspects of the watershed were calculated using GIS, including stream length, bifurcation ratio, drainage density, and others.
3) The analysis revealed information on the watershed characteristics and drainage network. For example, first order streams had the highest total length and number, which decreased with
Data Processing Techniques for 3D Surface Morphologytheijes
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The papers for publication in The International Journal of Engineering& Science are selected through rigorous peer reviews to ensure originality, timeliness, relevance, and readability.
Theoretical work submitted to the Journal should be original in its motivation or modeling structure. Empirical analysis should be based on a theoretical framework and should be capable of replication. It is expected that all materials required for replication (including computer programs and data sets) should be available upon request to the authors.
The International Journal of Engineering & Science would take much care in making your article published without much delay with your kind cooperation.
Self Electricity Generation and Energy Saving By Solar Using Programmable Sys...theijes
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The papers for publication in The International Journal of Engineering& Science are selected through rigorous peer reviews to ensure originality, timeliness, relevance, and readability.
Theoretical work submitted to the Journal should be original in its motivation or modeling structure. Empirical analysis should be based on a theoretical framework and should be capable of replication. It is expected that all materials required for replication (including computer programs and data sets) should be available upon request to the authors.
The International Journal of Engineering & Science would take much care in making your article published without much delay with your kind cooperation.
This document describes a proposed system for authorized data deduplication in a hybrid cloud. It aims to allow duplicate checks of files while considering users' differential privileges. The system would use file tokens determined by the file and user privilege to control authorized access. It presents several deduplication constructions and security analysis, and discusses implementing a prototype to evaluate overhead. The main modules are user authentication, a secure deduplication system using file tokens, security of duplicate check tokens, and sending encryption keys.
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09666155510, 09849539085 or mail us - ieeefinalsemprojects@gmail.com-Visit Our Website: www.finalyearprojects.org
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09666155510, 09849539085 or mail us - ieeefinalsemprojects@gmail.com-Visit Our Website: www.finalyearprojects.org
Improving Efficiency of Security in Multi-CloudIJTET Journal
Abstract--Due to risk in service availability failure and the possibilities of malicious insiders in the single cloud, a movement towards “Multi-clouds” has emerged recently. In general a multi-cloud security system there is a possibility for third party to access the user files. Ensuring security in this stage has become tedious since, most of the activities are done in network. In this paper, an enhanced security methodology has been introduced in order to make the data stored in cloud more secure. Duple authentication process introduced in this concept defends malicious insiders and shields the private data. Various disadvantages in traditional systems like unauthorized access, hacking have been overcome in this proposed system and a comparison made with the traditional systems in terms of performance and computational time have shown better results.
This document proposes a hybrid cloud approach for secure authorized data deduplication. It discusses how traditional deduplication systems only check for duplicate data, but do not consider user privileges. The proposed system considers both the data and user privileges during duplicate checks. It presents new deduplication constructions that support authorized duplicate checks in a hybrid cloud. The system uses convergent encryption to encrypt data before outsourcing. A security analysis shows the scheme protects data confidentiality based on the proposed security model. A prototype was implemented and tested, with results showing minimal overhead.
This document proposes a new deduplication system that supports authorized duplicate checking in a hybrid cloud architecture. The key contributions are:
1) It considers differential user privileges for duplicate checking, where a user can only check duplicates of files marked with their privileges. Previous systems did not support this.
2) It presents a scheme that encrypts files with differential privilege keys, so unauthorized users cannot decrypt files even with cloud provider collaboration.
3) A prototype of the authorized duplicate check scheme was implemented and experiments showed minimal overhead compared to normal operations. The system aims to efficiently enable deduplication with access control based on user privileges in cloud storage.
IRJET - Virtual Data Auditing at Overcast EnvironmentIRJET Journal
This document discusses a proposed scheme for remote data integrity checking of files stored in the cloud while hiding sensitive confidential information. The scheme works as follows:
1) A user hides confidential data blocks in an original file and generates signatures before uploading the blinded file to a sanitizer.
2) The sanitizer cleans up the blinded data blocks to remove confidential information and converts the signatures to be valid for the cleaned file.
3) The cleaned file and signatures are then uploaded to the cloud. A third party auditor can remotely check the integrity of the stored data while the confidential information is protected. The scheme supports data sharing in the cloud while maintaining privacy and allowing for integrity audits.
Providing Secure Cloud for College Campusvivatechijri
In colleges data stored on the server can be access by any college staff, student or professor. Data is
very important and should not be altered or accessed without permission of its owner. But in these type of medium
scale organizations server can be access by anyone. A better approach to maintain the data security and
sustainable storage is cloud. Cloud provides user management for authentication and authorized access of stored
data. Since data is upload in cloud through network therefore its security during this phase is very important.
For this, encryption algorithms can be used to protect it from hacker. It provides efficient way to carryout
operations such as uploading and downloading data. An efficient use of storage should be a primary concern for
which data deduplication technique can be applied. Using this technique uploading of duplicate files can be
avoided.
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...Editor IJCATR
The Data sharing is an important functionality in cloud storage. In this article, we show how to securely, efficiently, and
flexibly share data with others in cloud storage. We describe new public-key cryptosystems which produce constant-size ciphertexts
such that efficient delegation of decryption rights for any set of ciphertexts are possible. The novelty is that one can aggregate any set
of secret keys and make them as compact as a single key, but encompassing the power of all the keys being aggregated. In other
words, the secret key holder can release a constant-size aggregate key for flexible choices of ciphertext set in cloud storage, but the
other encrypted files outside the set remain confidential. This compact aggregate key can be conveniently sent to others or be stored in
a smart card with very limited secure storage. We provide formal security analysis of our schemes in the standard model. We also
describe other application of our schemes. In particular, our schemes give the first public-key patient controlled encryption for flexible
hierarchy, which was yet to be known.
This document discusses a proposed system for secure multi-cloud data storage using cryptographic techniques. The key aspects are:
1) The system splits user files into multiple encrypted chunks and stores each chunk in different private or public clouds. This prevents any single entity from accessing the full file.
2) Encryption is performed on the file chunks before storage using a symmetric encryption algorithm (AES is proposed) with an encryption key only known to the user.
3) During access, the encrypted chunks are retrieved, decrypted and merged to reconstruct the original file.
Two Level Auditing Architecture to Maintain Consistent In Cloudtheijes
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The papers for publication in The International Journal of Engineering& Science are selected through rigorous peer reviews to ensure originality, timeliness, relevance, and readability.
Theoretical work submitted to the Journal should be original in its motivation or modeling structure. Empirical analysis should be based on a theoretical framework and should be capable of replication. It is expected that all materials required for replication (including computer programs and data sets) should be available upon request to the authors.
The International Journal of Engineering & Science would take much care in making your article published without much delay with your kind cooperation
IRJET - Confidential Image De-Duplication in Cloud StorageIRJET Journal
This document proposes a confidential image de-duplication system for cloud storage. It introduces a hybrid cloud architecture using both public and private clouds. To provide greater security, the private cloud employs tiered authentication. The system performs de-duplication by comparing hash values of files generated using MD5 and SHA algorithms, to detect duplicate files and reduce storage usage. It encrypts files using AES before storage in the cloud. The private cloud server manages encryption keys and performs de-duplication checks by comparing file hashes and contents. This allows detection of duplicate files while preserving data privacy through encryption.
IRJET- Improving Data Spillage in Multi-Cloud Capacity AdministrationIRJET Journal
This document discusses improving data security in multi-cloud storage systems. It proposes using fully homomorphic encryption to create multiple encrypted copies of user data and store them across different cloud servers. This helps prevent data loss if one server fails and reduces access times for users. The system allows authorized users to retrieve encrypted data files by requesting them from the cloud servers and getting decryption keys from the data owner. Key techniques discussed include fully homomorphic encryption, efficient measurement of information leakage between data files, and secure inner product computation to compare query vectors to encrypted data vectors.
IRJET- Improving Data Spillage in Multi-Cloud Capacity AdministrationIRJET Journal
This document discusses improving data security in multi-cloud storage systems. It proposes using fully homomorphic encryption to create multiple encrypted copies of user data files and store them across different cloud servers. This helps prevent data loss if one server fails and reduces access times for users. The system allows authorized users to retrieve encrypted files by requesting them from the cloud servers and getting decryption keys from the data owner. Key techniques discussed include fully homomorphic encryption, efficient measurement of information leakage between data files, and secure inner product computation to compare files during searches.
This document presents an authorized duplicate check scheme for deduplication in a hybrid cloud storage system. It discusses issues with traditional deduplication and encryption techniques, and proposes a system that uses convergent encryption and generates hash values of files to enable authorized duplicate checking while maintaining data security and confidentiality. The system architecture involves users uploading encrypted files, generating hash values for duplicate checking, and downloading referenced root files if duplicates are found. This allows storage space savings while protecting data through multiple authentication levels and encryption. Evaluation shows the scheme incurs minimal overhead compared to normal cloud storage operations.
Research Inventy : International Journal of Engineering and Science is published by the group of young academic and industrial researchers with 12 Issues per year. It is an online as well as print version open access journal that provides rapid publication (monthly) of articles in all areas of the subject such as: civil, mechanical, chemical, electronic and computer engineering as well as production and information technology. The Journal welcomes the submission of manuscripts that meet the general criteria of significance and scientific excellence. Papers will be published by rapid process within 20 days after acceptance and peer review process takes only 7 days. All articles published in Research Inventy will be peer-reviewed.
TO GET THIS PROJECT COMPLETE SOURCE CODE PLEASE CALL BEOLOW CONTACT DETAILS
MOBILE: 9791938249, 0413-2211159, WEB: WWW.NEXGENPROJECT.COM ,EMAIL:Praveen@nexgenproject.com
NEXGEN TECHNOLOGY provides total software solutions to its customers. Apsys works closely with the customers to identify their business processes for computerization and help them implement state-of-the-art solutions. By identifying and enhancing their processes through information technology solutions. NEXGEN TECHNOLOGY help it customers optimally use their resources.
TO GET THIS PROJECT COMPLETE SOURCE CODE PLEASE CALL BEOLOW CONTACT DETAILS
MOBILE: 9791938249, 0413-2211159, WEB: WWW.NEXGENPROJECT.COM ,EMAIL:Praveen@nexgenproject.com
NEXGEN TECHNOLOGY provides total software solutions to its customers. Apsys works closely with the customers to identify their business processes for computerization and help them implement state-of-the-art solutions. By identifying and enhancing their processes through information technology solutions. NEXGEN TECHNOLOGY help it customers optimally use their resources.
Secure Auditing and Deduplicating Data on CloudIJMTST Journal
Cloud computing is a technology that used for storing and accessing. The data on remote location. It is totally internet-based.it is self-service and on Demand technology. That’s why now days it’s mostly used and popular term. Enterprises and organizations used cloud storage for access data to third-party. As like, the single user also use the confidential data anywhere, anytime on earth It is now becoming business standard. Its simplify users accessibility. It is cost saving and flexible for better performance on internet. But is also occur drawbacks like security and integrity on data. Like many times the data is already available on storage but it contain slightly difference. So overcome this problems we introduce two secure system, namely seccloud and seccloud+. Seccloud is used for generating tags on data before uploading and seccloud+ is maintain the integrity auditing and secure de-duplication on data because every customer wants to encrypt their data before uploading. Data integrity and storage efficiency are tw o important aspect of cloud storage. Proof of Retrievability (POR) and Proof of Data Possession (PDP) techniques Assure data integrity for cloud storage. Proof of Ownership (POW) improves Storage efficiency by securely removing unnecessarily duplicated data on the Storage server. Cloud computing is one of the most talked about IT trends today.in cloud more application availability on the cloud. Also cloud increased growth in the market.
1. The International Journal Of Engineering And Science (IJES)
|| Volume || 3 || Issue || 11|| Pages || 34-39 || 2014 ||
ISSN (e): 2319 – 1813 ISSN (p): 2319 – 1805
www.theijes.com The IJES Page 34
Secured Authorized Deduplication Based Hybrid Cloud
1,
R.S.Walunj , 2,
D.A.Lande , 3,
N.S.Pansare
1,2,3,
Computer Engg. Jaihind College Of Engg,Kuran
------------------------------------------------ABSTRACT----------------------------------------------------------
Data deduplication is an important technique for eliminating redundant data.Insted of taking no. of same files,
it store only single copy of file.In most organizations,storage system contain many pieces of duplicate data. .
For example, the same file may be saved in several different places by different users. Deduplication eliminates
these extra copies by saving just one copy of the data and replacing the other copies with pointers that lead
back to the original copy. It is data compression technique for improve the bandwidth efficiency and storage
utilization.Data deduplication most widely used in cloud computing.It make data management scalable and
storage problem in cloud computing.Data deduplication protect the confidentiality of sensitive data.data
deduplication work with convergent encryption technique to encrypt the data before uploading. . Companies
frequently use deduplication in backup and disaster recovery applications.In this paper we attempt authorized
deduplication check, combine with convergent encryption for providing security to sensitive data using hybrid
cloud computing.
KEYWORDS : Deduplication, authorized duplicate check, confidentiality, hybrid cloud,covergent encryption.
---------------------------------------------------------------------------------------------------------------------------------------
Date of Submission: 30 October 2014 Date of Accepted: 20 November 2014
---------------------------------------------------------------------------------------------------------------------------------------
I. INTRODUCTION
Cloud computing technique which is most widely used todays.In that, computing is done over the large
communication network like Internet.It is an important solution for business storage in low cost.Cloud
computing provide vast storage in all sector like government, enterprise,also for storing our personal data on
cloud. Without background implementation details,platform user can access and share different resources on
cloud.The most important problem in cloud computing is that large amount of storage space and security issues.
One critical challenge of cloud storage to management of ever-increasing volume of data.To improve
scalability,storage problem data deduplication is most important technique and has attracted more attension
recently.It is an important technique for data compression ,It simply avoid the duplicate copies of data and store
single copy of data.Data deduplication take place in either block level or file level.In file level approach
duplicate files are eliminate,and in block level approach duplicate blocks of data that occur in non-identical
files.Deduplication reduce the storage needs by upto 90-95% for backup application,68% in standard file
system.Important issues in data deduplication that security and privacy to protect the data from insider or
outsider attack.For data confidentiality,encryption is used by different user for encrypt there files or data ,using a
secrete key user perform encryption and decryption operation.For uploading file to cloud user first generate
convergent key,encryption of file then load file to the cloud.To prevent unauthorize access proof of ownership
protocol is used to provide proof that the user indeed owns the same file when deduplication found.After the
proof,server provide a pointer to subsequent user for accessing same file without needing to upload same
file.When user want to download file he simply download encrypted file from cloud and decrypt this file using
convergent key.
PRELIMINARIES : In this section ,we first define notations used in this paper,review secure primitives .The
notation used in this paper are listed in Table 1.
Convergent encryption. Convergent encryption is used to encrypt and decrypt file.User can derives the
convergent key from each original data copy,then using that key encrpty data file.Also user derives tag for data
copy to check duplicate data.If tag are same then both files are same. Both convergent key and tag are
independently derives. Convergent encryption, also known as content hash keying, is used to produces identical
ciphertext from identical plaintext files. The simplest implementation of convergent encryption can be defined
as: Alice derives the encryption key from her file F such that K = H(F), where H is a cryptographic hash
function.Convergent encryption scheme can be defined with four primitive functions:
2. Secured Authorized Deduplication Based…
www.theijes.com The IJES Page 35
[1] KeyGenCE(M ) -> K is the key generation algorithm that maps a data copy M to a convergent key K;
[2] EncCE(K, M ) ->C is the symmetric encryption algorithm that takes both the convergent key K and the data
copy M as inputs and then outputs a ciphertext C;
[3] DecCE (K, C) ->M is the decryption algorithm that takes both the ciphertext C and the convergent key K as
inputs and then outputs the original data copy M ; and
[4] TagGen(M ) -> T (M ) is the tag generation algorithm that maps the original data copy M and outputs a tag
T (M ).
Proof of ownership. proof of ownership(PoW) is a protocol enables users to prove their ownership of data
copies to the storage server.PoW is implemented as an interactive algorithm run by user and storage server act
as prover and verifier. The verifier derives a short value ϕ(M )from a data copy M . To prove the ownership of
the data copy M , the prover needs to send ϕ to the verifier such that ϕ= ϕ(M ). The formal security definition for
PoW roughly follows the threat model in a content distribution network, where an attacker does not know the
entire file, but has accomplices who have the file. proof of-ownership is specified by a summary function S(.)
(which could be randomized and takes the input file F and a security parameter),and an interactive two-party
protocol ||(P V ). To solve the problem of using a small hash value as a proxy for the entire file, we want to
design a solution where a client proves to the server that it indeed has the file. We call a proof mechanism that
prevents such leakage amplification a proof of ownership (PoW).
Public hash function. To support cross-user deduplication, all users must use the same procedure for
identifying duplicate files. Hence this procedure must be public i.e. each user implement it, which means that a
determined attacker can learn it.
System Model and Adversary Model : In the client deduplication scenario, the S-CSP server keeps a single
copy of the original file, regardless of the number of user that request to store the file. All users that possess the
original file only use link to the single copy of the original file stored on the S-CSP server. Specifically, a client
user first sends the hash value of the original file to the server, and then the server checks whether the hash
value already exists in its database. If the hash value is the same as an existing hash value stored on the server,
the server will challenge the user to ask for the proof of possession of the original file. After a successful
challenge, the client does not have to upload the file again to the server. At the same time, the server marks the
client as an owner of the original file. From then on, there is no difference between the client and the users who
uploaded the original file. Thus, the deduplication process saves the communication bandwidth as well as the
storage space.
.
DESIGN GOALS : In this paper, we address the problem of privacy preserving deduplication in cloud
computing and propose a new deduplication system supporting for:
Differential Authorization. Each authorized user is able to access its individual token of his file to
perform duplicate check based on authority.Under this assumption, any user cannot generate a token for
duplicate check out of his access or without the aid from the private cloud server.
Authorized Duplicate Check. Authorized user is able to access his/her own token from private cloud,while
the public cloud performs duplicate check directly and tells the user if there is any duplicate. The security
requirements considered in this paper lie in two folds, including the security of file token and security of
data files. For the security of file token, two aspects are defined as unforgeability and indistinguishability of
file token. The details are given below.
Unforgeability of file token/duplicate-check token. User make registration in private cloud for generating
file token.Using respective file token he/she upload or download files on public cloud. The users are not
allowed to collude with the public cloud server to break the unforgeability of file tokens. In our system, the
S-CSP is honest but curious and will honestly perform the duplicate check upon receiving the duplicate
request from users. The duplicate check token of users should be issued from the private cloud server in our
scheme.
Indistinguishability of file token/duplicate-check token. It requires that any user without querying the
private cloud server for some file token, he cannot get any useful information from the token, which
includes the file information and key information.
3. Secured Authorized Deduplication Based…
www.theijes.com The IJES Page 36
Data Confidentiality. Unauthorized users without appropriate token , including the S-CSP and the private
cloud server, should be prevented from access to the underlying plaintext stored at S-CSP. In another word,
the goal of the adversary is to retrieve and recover the files that do not belong to them. In our system,
compared to the previous definition of data confidentiality based on convergent encryption, a higher level
confidentiality is defined and achieved.
Table 1. Notations Used in This Paper
Acronym Description
S-CSP Storage cloud service provider
POW Proof of Ownership
KF
Convergent encryption key for
file F
H Hash function
II. PROPOSED SYSTEM
In our system we implement a project that includes the public cloud and the private cloud and also the
hybrid cloud which is a combination of the both public cloud and private cloud. In general by if we used the
public cloud we can’t provide the security to our private data and hence our private data will be loss.So that we
have to provide the security to our data for that we make a use of private cloud also. When we use a private
clouds the greater security can be provided.In this system we also provides the data deduplication . which is
used to avoid the duplicate copies of data.User can upload and download the files from public cloud but private
cloudprovides the security for that data.that means only the authorized person can upload and download the files
from the
Fig 1:Architecture of Authorized Deduplication
public cloud.for that user generates the key and storeed that key onto the private cloud. at the time of
downloading user request to the private cloud for key and then access that
Particular file.
System Model :Now we see the architecture of our system. in our architecture there are three modules .
[1] user
[2] public cloud
[3] private cloud.etc
4. Secured Authorized Deduplication Based…
www.theijes.com The IJES Page 37
First if the user want to upload the files on the public cloud then user first encrypt that file with the convergent
key and then sends it to the public cloud at the same time user also generates the key for that file and sends that
key to the private cloud for the purpose of security.In the public cloud we use one algorithm for deduplication.
Which is used to avoid the duplicate copies of files which is entered in the public cloud. Hence it also minimizes
the bandwidth. that means we requires the less storage space for storing the files on the public cloud.In the
public cloud any person that means the unauthorized person can also access or store the data so we can conclude
that in the public cloud the security is not provided. In general for providing more security user can use the
private cloud instead of using the public cloud.User generates the key at the time of uploading file and store it to
the private cloud.When user wants to downloads the file that he/she upload,.he/she sends the request to the
public cloud. Public cloud provides the list of files that are uploads the many user of the public cloud because
there is no security is provided in the public cloud.When user selects one of the file from the list of files then
private cloud sends a message like enter the key!. User has to enter the key that he generated for that file. When
user enter the key the private cloud checks the key for that file and if the key is correct that means user is valid
then private cloud give access to that user to download that file successufully. then user downloads the file from
the public cloud and decrypt that file by using the same convergent key which is used at the time of encrypt that
file.in this way user can make a use of the architecture.
III. ROLES OF ENTITIES
S-CSP:The purpose of this entity to work as a data storage service in public cloud.On the half of the user S-CSP
store the data.The S-CSP eliminate the duplicate data using deduplication and keep the unique data as it is.S-
SCP entity is used to reduce the storage cost.S-CSP han abundant storage capacity and computational
power.When user send respective token for accessing his file from public cloud S-CSP matches this token with
internally if it matched then an then only he send the file or ciphertext Cf with token, otherwise he send abort
signal to user.After receiving file user use convergent key KF to decrypt the file.
Data User: A user is an entity that want to access the data or files from S-SCP.User generate the key and store
that key in private cloud.In storage system supporting deduplication,The user only upload unique data but do not
upload any duplicate data to save the upload bandwidth,which may be owned by the same user or different
users.Each file is protected by convergent encryption key and can access by only athorized person.In our system
user must need to register in private cloud for storing token with respective file which are store on public
cloud.When he want to access that file he access respective token from private cloud and then access his files
from public cloud.token consist of file content F and convergent key KF.
Private Cloud: In general for providing more security user can use the private cloud instead of public
cloud.User store the generated key in private cloud.At the time of downloading system ask the key to download
the file.User can not store the secrete key internally.for providing proper protection to key we use private
cloud.Private cloud only store the convergent key with respective file.When user want to access the key he first
check authority of user then an then provide key.
Public Cloud:Public cloud entity is used for the storage purpose.User upload the files in public cloud.Public
cloud is similar as S-CSP.When the user want to download the files from public cloud,it will be ask the key
which is generated or stored in private cloud.When the users key is match with files key at that time user can
download the file,without key user can not access the file.Only authorized user can access the file.In public
cloud all files are stored in encrypted format.If any chance unauthorized person hack our file,but without the
secrete or convergent key he doesn’t access original file.On public cloud there are lots of files are store each
user access its respective file if its token matches with S-CSP server token.
Operations performed on Hybrid Cloud
File Uploading : When user want to upload the file to the public cloud then user first encrypt the file which
is to be upload by make a use of the symmetric key,and send it to the Public cloud. At the same time user
generates the key for that file and sends it to the private cloud. in this way user can upload the file in to the
public cloud.
File Downloading: When user wants to download the file that he/she has upload on the public
cloud.he/she make a request to the public cloud. then public cloud provide a list of files that many users
are upload on it.Among that user select one of the file form the list of files and enter the download
option.at that time private cloud sends a message that enter the key for the file generasted by the
user.then user enters the key for the file that he/she is generated.then private cloud checks the key for that
5. Secured Authorized Deduplication Based…
www.theijes.com The IJES Page 38
file and if the key is correct that means the user is valid.only then and then the user can download the file from
the public cloud otherwise user can’t download the file. When user download the file from the public cloud it is
in the encrypted format then user decrypt that file by using the same symmetric key.
IV. IMPLEMENTATION
We implement system with data deduplication,in which we model three entities as separate programs.
A Client program is used to model the data users to carry out the file upload/download process.
A Private Server program is used to model the private cloud which manages the private keys and handles the file
token computation. A Storage Server program is used to model the S-CSP which stores and deduplicates files.
Followings are function calls used in system:
FileTag(File) - It computes SHA-1 hash of the File as File Tag;
DupCheckReq(Token) - It requests the Storage Server for Duplicate Check of the file.
FileEncrypt(File) - It encrypts the File with Convergent Encryption using 256-bit AES algorithm in cipher
block chaining (CBC) mode, where the convergent key is from SHA-256 Hashing of the file;
FileUploadReq(FileID, File, Token) – It uploads the File Data to the Storage Server if the file is Unique and
updates the File Token stored.
FileStore(FileID, File, Token) - It stores the File on Disk and updates the Mapping.
V. CONCLUSION
In this paper, the idea of authorized data deduplication was proposed to protect the data security by
including differential authority of users in the duplicate check. In public cloud our data are securely store in
encrypted format,and also in private cloud our key is store with respective file.There is no need to user
remember the key.So without key anyone can not access our file or data from public cloud.
REFERENCES
[1] Open SSL Project. http://www.openssl.org/.
[2] P. Anderson and L.Zhang. Fast and secure laptop backups with encrypted de-duplication.In Proc.of USENIX LISA, 2010.
[3] M. Bellare, S. Keelveedhi, and T. Ristenpart. Dupless: Serveraided encryption for deduplicated storage. In USENIX Security
Symposium, 2013.
[4] M. Bellare, S. Keelveedhi, and T. Ristenpart. Message-locked encryption and secure deduplication. In EUROCRYPT, pages 296–
312, 2013.
[5] M. Bellare, C. Namprempre, and G. Neven. Security proofs for identity-based identification and signature schemes.
Cryptology,22(1):1–61, 2009.
[6] M. Bellare and A. Palacio. Gq and schnorr identification schemes:Proofs of security against impersonation under active and
concurrentattacks. In CRYPTO, pages 162–177, 2002.
[7] S. Bugiel, S. Nurnberger, A. Sadeghi, and T. Schneider. Twinclouds: An architecture for secure cloud computing. In Workshopon
Cryptography and Security in Clouds (WCSC 2011), 2011.
[8] J. R. Douceur, A. Adya, W. J. Bolosky, D. Simon, and M. Theimer.Reclaiming space from duplicate files in a serverless
distributedfile system. In ICDCS, pages 617–624, 2002.
[9] D. Ferraiolo and R. Kuhn. Role-based access controls. In 15thNIST-NCSC National Computer Security Conf., 1992.
[10] GNULibmicrohttpd.http://www.gnu.org/software/libmicrohttpd/.
R.S.Walunj completd diploma in computer engg(2012). Currently she is student of Department of Computer
Engineering at Jaihind college of engg,kuran in last year.She is interested to search latest information related
to security purpose.
6. Secured Authorized Deduplication Based…
www.theijes.com The IJES Page 39
N.S.Pansare completd diploma in computer engg(2012). Currently she is student of Department of Computer
Engineering at Jaihind college of engg,kuran in last year.She is interested to search latest information related
to cloud computing.
D.A.Lande completed diploma in computer engg(2012). Currently she is student of Department of Computer
Engineering at Jaihind college of engg,kuran in last year.She is interested to search latest information related
to hybrid cloud computing.