SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 11 | Nov 2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 422
Secure Data Deduplication for Cloud Server using HMAC Algorithm
P Jagadeesh1, K Narayana2, P Chandra Prakash3
1Student, Department of Computer Science and Engineering, Sechachala Institute of Technology, Puttur, Andhra
Pradesh, India.
2Associate Professor, HOD, Department of Computer Science and Engineering, Sechachala Institute of Technology,
Puttur, Andhra Pradesh, India.
3Assistant Professor, Department of Computer Science and Engineering, Sechachala Institute of Technology,
Puttur, Andhra Pradesh, India.
------------------------------------------------------------------------***-------------------------------------------------------------------------
Abstract - The elimination of duplicate or redundant data,
particularly in computer data is named deduplication. Data
deduplication is a method to regulate the explosive growth of
information within the cloud storage, most of the storage
providers are finding more secure and efficient methods for
their sensitive method. According to deduplication, we
introduce a method that can eliminate redundant encrypted
data owned by different users. This paper is a detail
description of secure cloud auditor which is used for the
maintaining integrity of shared data with efficient data
deduplication on cloud. This mechanism uses concept of
SecCloud system where user is able to generate data tags
before storing data on cloud which helps during performing
audit to check integrity of data.
Key Words: Cloud computing, Integrity, Auditing,
Advanced Encryption Standard (AES), Data deduplication.
1. INTRODUCTION
Cloud computing (The Fifth Generation of Computing) is a
term used to describe both a platform and type of
application. A cloud computing platform dynamically
provisions, configures, reconfigures, and DE provisions
servers as needed. Servers in the cloud can be physical
machines or virtual machines. Advanced clouds typically
include other computing resources such as storage area
networks (SANs), network equipment, firewall and other
security devices. Cloud computing also describes
Applications that are extended to be accessible through the
Internet. These cloud applications uselargedata centersand
powerful servers that host Web applications and Web
services. Anyone with a suitable Internet connection and a
standard browser can access a cloud application. As the
cloud computing technology developsduringthelastdecade,
outsourcing data to cloud service for storage becomes an
attractive trend, which benefits in sparing efforts on heavy
data maintenance and management. Nevertheless, since the
outsourced cloud storage is not fully trustworthy, it raises
security concerns on how to realize data DE duplication in
cloud
While achieving integrity auditing.Inthiswork,westudythe
problem of integrity auditing and secure DE duplication on
cloud data. Specifically, aiming at achieving both data
integrity and DE duplication incloud,weproposetwosecure
systems, namely SecCloud and SecCloud+. Sec Cloud
introduces an auditing entity with maintenance of a Map
Reduce cloud, which helps clients generate data tags before
uploading as well as audit the integrity of data having been
stored in cloud. Compared with previous work, the
computation by user in SecCloud.is greatly reduced during
the file uploadingandauditingphases.SecCloud+isdesigned
motivated by the fact that customers alwayswanttoencrypt
their data before uploading, and enables, integrity auditing
and secure DE duplication on encrypted data.
Even though cloud storage has been widely used adopted, it
fails to accommodate some important emerging needs such
as the abilities of auditing integrity of cloud files by cloud
clients and detecting duplicated files by cloud servers. We
disclose both problems.
The first problem is integrity auditing. Data integrity
demands maintaining and assuring the accuracy and
completeness of data. A data owner always expects that his
data in a cloud can be stored correctly and trustworthily. It
means that the data should not be illegally tampered,
improperly modified, deliberately deleted, or maliciously
fabricated. If any undesirable operations corrupt or delete
the data, the owner should be able to detect the corruption
or loss.
The second problem is secure deduplication. Data stored at
remote cloud servers are often duplicated. This fact raises a
technology named deduplication, in which the cloudservers
would like to de-duplicate by keeping only a single copy for
each file. It is generalized to how can the cloud server
efficiently confirms that the client owns the uploaded file
before creating a link to this file for him/her.
Accordingly, indistinguishable data duplicates of various
clients will prompt to various figure writings, making
deduplication unimaginable. It scrambles/decodes a data
duplicate with a private key, which isacquired bycomputing
the cryptographic hash estimation of the substance of the
data copy. Clients safeguard the keys and send the figure
content to the cloud. Since, indistinguishabledata duplicates
will cause the same focalized key and thus the equivalent
figure content.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 11 | Nov 2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 423
2. RELATED WORK
Secure deduplication is interesting for both industrial and
research communities; therefore, several secure
deduplication schemes have been proposed.Tosupportdata
integrity, two concepts, PDP (provable data possession)and
POR (proof of retrievability), have been introduced. PDP for
ensuring that the cloud storage providers actually possess
the files without retrieving or downloadingtheentiredata.It
is basically a challenge-response protocol between the
verifier (a client or TPA) and the prover (a cloud).Compared
to PDP, POR not only ensures that the cloud servers possess
the target files, but also guarantees their full recovery.
A simple combination of two independent techniques
designed for the two above mentioned issues does not
efficiently deal with the issues at once, because achieving
storage efficiency contradicts with the deduplication of
authentication tags. Public auditing with a deduplication
scheme based on homomorphic linear authentication tags
was proposed.
Integrity Auditing
From the perspective of the client, integrity auditing of the
outsourced data is one of the important issues for secure
outsourcing, as the outsourced data can be corrupted by
unintentional errors. Ateniese et al. [7] proposed a notion of
provable data possession (PDP) for ensuring integrity of
remote data, in which the client can audit the integrity ofthe
target file without maintaining the entire file. Ateniese et al.
[21] proposed a highly efficient PDP scheme based on
symmetric key cryptography, with the support of a dynamic
scenario except insertion. To supportdynamic scenariowith
insertion, Erway et al. [22] proposed dynamic-PDPbased on
a rank-based skip list. Wang et al. [23] proposed a proxy-
PDP, in order to relax the computational overhead for tag
generation. Zhu et al. [24] proposed a cooperative-PDP
scheme in a multicloud environment. Based on convergence
encryption, Liu et al. [25] proposed integrity auditing
scheme and considered integrity tag deduplication over
encrypted data.
Secure Client-Side Deduplicationwith IntegrityAuditing
As a method that provides both secure deduplication and
integrity auditing, Zheng and Xu [9] firstly proposedproof of
storage with deduplication (POSD), based on public key
cryptography. However, an error in security occurs if the
first uploader maliciously generates a pair of public and
private keys [31], and POSD does not ensure confidentiality
of the outsourced data as it is run over plaintext. Yuan and
Yu [2] proposed a scheme called PCAD that supports both
deduplication and integrity auditing with batch auditing, in
which the server can simultaneouslyprovethepossessionof
multiple files. Li et al. [1] proposed two schemes, namely
SecCloud and SecCloud+. In both schemes, the author
introduced an auditing entity that maintains a MapReduce
cloud, which helps the client to generate block tags for
integrity auditing. Additionally, SecCloud+ ensures
confidentiality, where the client encrypts files using a
message-derived encryption key distributed from the key
server. In terms of efficiency improvement, Youn el al. [32]
proposed a new scheme based on the homomorphic linear
authenticator [26].
3. PROPOSED METHODOLOGY
After analyzing different research paper on spam detection
in Twitter, I have considered Hash Message Authentication
Code (HMAC) for survey.
HMAC Method
1) HMAC
In recent years, there has been increased interest in
developing a MAC derived from a cryptographic hash code,
such as MD5, SHA-1, or RIPEMD-160. The motivations for
this interest are:
Cryptographic hash works by and large execute quicker
in programming than symmetricsquarefigures,forexample,
DES. Library code for cryptographic hash capacities is
broadly accessible. There are no fare confinements for
cryptographic hash capacities, though symmetric square
figures, notwithstanding whenutilizedforMACs,arelimited.
A hash capacity, for example, MD5 was not intended for
use as a MAC and can't be utilized specifically for thatreason
since it doesn't depend on a mystery key. There have been
various recommendations to fuse a mystery enter into a
current hash calculation. HMAC got themosthelp.HMAChas
been picked as the required to-actualize MACforIPSecurity,
and is utilized in other Internet conventions, such as
Transport Layer Security (TLS, soon to replace Secure
Sockets Layer) and Secure Electronic Transaction (SET).
2) HMAC-Design Objectives
Design objectives that RFC 2104 lists for HMAC include:
• To use, without alterations, accessible hash
capacities. Specifically, hash works that perform well in
programming, and for which code is uninhibitedly and
generally accessible. To consider simplereplaceabilityofthe
inserted hash work in the event that quicker or more secure
hash capacities are found or required. To save the first
execution of the hash work without acquiring a noteworthy
debasement. To utilize and handle enters essentially.
• To have a surelyknewcryptographicexaminationof
the quality of the validation system dependent on sensible
suppositions on the implanted hash work.
The initial two targets are imperative to the adequacy of
HMAC. HMAC regards the hash work as a black box. This has
two advantages. Initial, a current usage of a hash capacity
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 11 | Nov 2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 424
can be utilized as a module in executing HMAC. The main
part of the HMAC code is prepackaged and prepared to use
without change. Second, to supplant a given hash work in a
HMAC execution, you should basically evacuate the current
hash work module and drop in the new module. This should
be possible if a quicker hash work were wanted. More
imperative, if the security of the implanted hash work were
imperiled, the security of HMAC could be held basically by
supplanting the installed hash work with a more secure one
(supplanting MD5 with SHA-1, for instance).
The last structure objective in the former rundown is, truth
be told, the primary preferred standpoint of HMAC over
other proposed hash-based plans. HMAC can be proven
secure provided that the embedded hash function has some
reasonable cryptographic strengths.
3) The HMAC Algorithm
Illustrates the overall operation of HMAC :
Affix zeros to one side end of K to make a b-bit string K+ (for
instance, if K is of length 160 bits and b = 512, at that point K
will be attached with 44 zero bytes 0x00).
Note the XOR with ipad brings about flipping one-portion of
the bits of K. Thus, the XOR with opadresults in flipping one-
portion of the bits of K, yet an alternate arrangement of bits.
As a result, by passing Si thus through the pressure capacity
of the hash calculation, you have pseudorandomlyproduced
two keys from K. HMAC ought to execute in around
indistinguishable time from the inserted hash work for long
messages. HMAC includes three executions of the hash
pressure work (for Si, So, and the square created from the
inward hash).
4) HMAC Security
The security of any MAC function based on an embedded
hash function depends in some way on the cryptographic
strength of the underlying hash function. The interest of
HMAC is that its creators have possessed the capacity to
demonstrate a correct connection between thequalityofthe
implanted hash work and the quality of HMAC. The security
of a MAC work is for the most part communicated as far as
the likelihood of effective fraud with a givenmeasureoftime
spent by the counterfeiter and a given number of message-
MAC sets made with a similar key. Generally, it very well
may be demonstrated that, for a givenlevel ofexertion(time,
message-MAC sets), on messages created by real clients and
seen by aggressors, the likelihood of an effective assault on
HMAC is comparable to one of the accompanyingassaultson
the installed hash work:
1. Assailants can process a yield of the pressure work even
with an Initial Value (IV) that is irregular, mystery, and
obscure to aggressors.
2. Aggressors discover crashes in the hash work
notwithstanding when the IV is irregular and mystery.
In the principal assault, you can see the pressure work as
proportionate to the hash work connected to a message
comprising of a solitary b-bit square. For this assault, the IV
of the hash work is supplanted by a mystery, arbitrary
estimation of n bits. An assault on this hash work requires
either a beast compel assault on the key, which is a level of
exertion on the request of 2n, or a birthday assault, which is
a unique instance of the second assault.
In the second assault, aggressors are searching for two
messages, M and M', that delivera similarhash:H(M)=H(M').
This requires a level of exertion of 2n/2 for a hash length of
n. On this premise, the security of MD5 is raiseddoubtabout,
on the grounds that a level of exertion of 264 looks doable
with the present innovation. Does this imply a 128-piece
hash capacity, for example, MD5 is inadmissible for HMAC?
The appropriate response is no. To assault MD5, aggressors
can pick any arrangement of messages and work on these
disconnected on a devoted figuringofficetodiscovera crash.
Since aggressors know the hash calculation and the default
IV, assailants can produce the hash code for every one of the
messages that aggressors create. Be that as it may, while
assaulting HMAC, assailants can't produce message/code
sets disconnected in light of the fact that aggressors don't
know K. In this manner, aggressorsmustwatcha groupingof
messages created by HMAC under a similar key and play out
the assault on these known messages. Fora hashcodelength
of 128 bits, this requires 264 watched squares (273 bits)
produced utilizing a similar key. On a 1-Gbps interface, you
would need to watch a ceaseless stream of messageswith no
adjustment in the key for around 250,000 years to succeed.
Thus, if speed is a concern, it is fully acceptable to use MD5
rather than SHA-1 or RIPEMD-160 as the embedded hash
function for HMAC.
4. CONCLUSION
With the help of Hybrid Cloud Approach and Convergent
Encryption we achieved secured data deduplication. To
discover copy information Proof of Ownership (PoW)
convention is utilized. Which gave reference of file which is
already present on Public Cloud.
5. FUTURE SCOPE
Currently By using HMAC Algorithm, Hash Value
computation for large File Size will be performance hit. So
further in future work we can use Attribute-Based
Encryption for encrypting the File Data. To compute the File
Tag, instead of using whole file data we will use File
Attributes. In Future Scope, It can be finding Video Spam
content & Image Spam Content.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 11 | Nov 2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 425
REFERENCES
[1] J. Li, X. Chen, M. Li, J. Li, P. Lee, and W. Lou, “Secure
deduplication with efficient and reliable convergent key
management,” in Proc. IEEE
Trans.ParallelDistrib.Syst.,http://doi.ieeecomputersocie
ty.org/10.1109/TPDS.2013.284,2013.
[2] A. Rahumed, H. C. H. Chen, Y. Tang, P. P. C. Lee, and J. C. S.
Lui, “A secure cloud backup system with assured deletion
and version control,” in Proc. 3rd Int. Workshop Secutiry
Cloud Comput., 2011,pp. 160–167.
[3] “Proofs of Ownership in Remote Storage Systems” Shai
Halevi1, Danny Harnik2, Benny Pinkas3, and Alexandra
Shulman-Peleg2 1IBM T. J. Watson Research Center, 2IBM
Haifa Research Lab, 3Bar Ilan University.
[4] M. Bellare, S. Keelveedhi, and T. Ristenpart, “Dupless:
Serveraided encryption for deduplicated storage,” in Proc.
22nd USENIX Conf. Sec. Symp., 2013, pp. 179– 194.
[5] S. Quinlan and S. Dorward, “Venti: A new approach to
archival storage,” in Proc. 1st USENIX Conf. File Storage
Technol., Jan. 2002.
[6] J. R. Douceur, A. Adya, W. J. Bolosky, D. Simon, and M.
Theimer, “Reclaiming space from duplicate files in a
serverless distributed file system, ” in Proc. Int.Conf.Distrib.
Comput. Syst., 2002.
[7] Jan Stanek, Alessandro Sorniotti, Elli Androulaki, and
Lukas Kencl, “A Secure Data DeduplicationSchemeforCloud
Storage,” Tech Rep. IBM Reasearch, Zurich.

More Related Content

What's hot

An4201262267
An4201262267An4201262267
An4201262267
IJERA Editor
 
Survey On: Auditing Public Clouds
Survey On: Auditing Public Clouds Survey On: Auditing Public Clouds
Survey On: Auditing Public Clouds
IRJET Journal
 
Improved Data Integrity Protection Regenerating-Coding Based Cloud Storage
Improved Data Integrity Protection Regenerating-Coding Based Cloud StorageImproved Data Integrity Protection Regenerating-Coding Based Cloud Storage
Improved Data Integrity Protection Regenerating-Coding Based Cloud Storage
IJSRD
 
Centralized Data Verification Scheme for Encrypted Cloud Data Services
Centralized Data Verification Scheme for Encrypted Cloud Data ServicesCentralized Data Verification Scheme for Encrypted Cloud Data Services
Centralized Data Verification Scheme for Encrypted Cloud Data Services
Editor IJMTER
 
NEW SECURE CONCURRECY MANEGMENT APPROACH FOR DISTRIBUTED AND CONCURRENT ACCES...
NEW SECURE CONCURRECY MANEGMENT APPROACH FOR DISTRIBUTED AND CONCURRENT ACCES...NEW SECURE CONCURRECY MANEGMENT APPROACH FOR DISTRIBUTED AND CONCURRENT ACCES...
NEW SECURE CONCURRECY MANEGMENT APPROACH FOR DISTRIBUTED AND CONCURRENT ACCES...
ijiert bestjournal
 
PUBLIC AUDITING FOR SECURE CLOUD STORAGE ...
PUBLIC AUDITING 	             FOR SECURE CLOUD STORAGE                       ...PUBLIC AUDITING 	             FOR SECURE CLOUD STORAGE                       ...
PUBLIC AUDITING FOR SECURE CLOUD STORAGE ...
Bharath Nair
 
An efficient, secure deduplication data storing in cloud storage environment
An efficient, secure deduplication data storing in cloud storage environmentAn efficient, secure deduplication data storing in cloud storage environment
An efficient, secure deduplication data storing in cloud storage environment
eSAT Journals
 
Ppt 1
Ppt 1Ppt 1
Enabling Public Audit Ability and Data Dynamics for Storage Security in Clou...
Enabling Public Audit Ability and Data Dynamics for Storage  Security in Clou...Enabling Public Audit Ability and Data Dynamics for Storage  Security in Clou...
Enabling Public Audit Ability and Data Dynamics for Storage Security in Clou...
IOSR Journals
 
IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...
IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...
IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...
IRJET Journal
 
Privacy preserving public auditing for regenerating code based cloud storage
Privacy preserving public auditing for regenerating code based cloud storagePrivacy preserving public auditing for regenerating code based cloud storage
Privacy preserving public auditing for regenerating code based cloud storage
kitechsolutions
 
Oruta project report
Oruta project reportOruta project report
Oruta project report
Manasa Chowdary
 
A Novel privacy preserving public auditing for shared data in cloud
A Novel privacy preserving public auditing for shared data in cloudA Novel privacy preserving public auditing for shared data in cloud
A Novel privacy preserving public auditing for shared data in cloud
JAVVAJI VENKATA RAO
 
IRJET-Auditing and Resisting Key Exposure on Cloud Storage
IRJET-Auditing and Resisting Key Exposure on Cloud StorageIRJET-Auditing and Resisting Key Exposure on Cloud Storage
IRJET-Auditing and Resisting Key Exposure on Cloud Storage
IRJET Journal
 
Insuring Security for Outsourced Data Stored in Cloud Environment
Insuring Security for Outsourced Data Stored in Cloud EnvironmentInsuring Security for Outsourced Data Stored in Cloud Environment
Insuring Security for Outsourced Data Stored in Cloud Environment
Editor IJCATR
 
IRJET- Deduplication of Encrypted Bigdata on Cloud
IRJET- Deduplication of Encrypted Bigdata on CloudIRJET- Deduplication of Encrypted Bigdata on Cloud
IRJET- Deduplication of Encrypted Bigdata on Cloud
IRJET Journal
 
Survey on securing outsourced storages in cloud
Survey on securing outsourced storages in cloudSurvey on securing outsourced storages in cloud
Survey on securing outsourced storages in cloud
eSAT Journals
 
Survey on securing outsourced storages in cloud
Survey on securing outsourced storages in cloudSurvey on securing outsourced storages in cloud
Survey on securing outsourced storages in cloud
eSAT Publishing House
 
Privacy preserving public auditing
Privacy preserving public auditingPrivacy preserving public auditing
Privacy preserving public auditing
vmshimavm
 

What's hot (20)

An4201262267
An4201262267An4201262267
An4201262267
 
Survey On: Auditing Public Clouds
Survey On: Auditing Public Clouds Survey On: Auditing Public Clouds
Survey On: Auditing Public Clouds
 
Improved Data Integrity Protection Regenerating-Coding Based Cloud Storage
Improved Data Integrity Protection Regenerating-Coding Based Cloud StorageImproved Data Integrity Protection Regenerating-Coding Based Cloud Storage
Improved Data Integrity Protection Regenerating-Coding Based Cloud Storage
 
Centralized Data Verification Scheme for Encrypted Cloud Data Services
Centralized Data Verification Scheme for Encrypted Cloud Data ServicesCentralized Data Verification Scheme for Encrypted Cloud Data Services
Centralized Data Verification Scheme for Encrypted Cloud Data Services
 
NEW SECURE CONCURRECY MANEGMENT APPROACH FOR DISTRIBUTED AND CONCURRENT ACCES...
NEW SECURE CONCURRECY MANEGMENT APPROACH FOR DISTRIBUTED AND CONCURRENT ACCES...NEW SECURE CONCURRECY MANEGMENT APPROACH FOR DISTRIBUTED AND CONCURRENT ACCES...
NEW SECURE CONCURRECY MANEGMENT APPROACH FOR DISTRIBUTED AND CONCURRENT ACCES...
 
PUBLIC AUDITING FOR SECURE CLOUD STORAGE ...
PUBLIC AUDITING 	             FOR SECURE CLOUD STORAGE                       ...PUBLIC AUDITING 	             FOR SECURE CLOUD STORAGE                       ...
PUBLIC AUDITING FOR SECURE CLOUD STORAGE ...
 
An efficient, secure deduplication data storing in cloud storage environment
An efficient, secure deduplication data storing in cloud storage environmentAn efficient, secure deduplication data storing in cloud storage environment
An efficient, secure deduplication data storing in cloud storage environment
 
Ppt 1
Ppt 1Ppt 1
Ppt 1
 
Enabling Public Audit Ability and Data Dynamics for Storage Security in Clou...
Enabling Public Audit Ability and Data Dynamics for Storage  Security in Clou...Enabling Public Audit Ability and Data Dynamics for Storage  Security in Clou...
Enabling Public Audit Ability and Data Dynamics for Storage Security in Clou...
 
IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...
IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...
IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...
 
Privacy preserving public auditing for regenerating code based cloud storage
Privacy preserving public auditing for regenerating code based cloud storagePrivacy preserving public auditing for regenerating code based cloud storage
Privacy preserving public auditing for regenerating code based cloud storage
 
Oruta project report
Oruta project reportOruta project report
Oruta project report
 
L01246974
L01246974L01246974
L01246974
 
A Novel privacy preserving public auditing for shared data in cloud
A Novel privacy preserving public auditing for shared data in cloudA Novel privacy preserving public auditing for shared data in cloud
A Novel privacy preserving public auditing for shared data in cloud
 
IRJET-Auditing and Resisting Key Exposure on Cloud Storage
IRJET-Auditing and Resisting Key Exposure on Cloud StorageIRJET-Auditing and Resisting Key Exposure on Cloud Storage
IRJET-Auditing and Resisting Key Exposure on Cloud Storage
 
Insuring Security for Outsourced Data Stored in Cloud Environment
Insuring Security for Outsourced Data Stored in Cloud EnvironmentInsuring Security for Outsourced Data Stored in Cloud Environment
Insuring Security for Outsourced Data Stored in Cloud Environment
 
IRJET- Deduplication of Encrypted Bigdata on Cloud
IRJET- Deduplication of Encrypted Bigdata on CloudIRJET- Deduplication of Encrypted Bigdata on Cloud
IRJET- Deduplication of Encrypted Bigdata on Cloud
 
Survey on securing outsourced storages in cloud
Survey on securing outsourced storages in cloudSurvey on securing outsourced storages in cloud
Survey on securing outsourced storages in cloud
 
Survey on securing outsourced storages in cloud
Survey on securing outsourced storages in cloudSurvey on securing outsourced storages in cloud
Survey on securing outsourced storages in cloud
 
Privacy preserving public auditing
Privacy preserving public auditingPrivacy preserving public auditing
Privacy preserving public auditing
 

Similar to IRJET- Secure Data Deduplication for Cloud Server using HMAC Algorithm

EXPLORING WOMEN SECURITY BY DEDUPLICATION OF DATA
EXPLORING WOMEN SECURITY BY DEDUPLICATION OF DATAEXPLORING WOMEN SECURITY BY DEDUPLICATION OF DATA
EXPLORING WOMEN SECURITY BY DEDUPLICATION OF DATA
IRJET Journal
 
Efficient and Empiric Keyword Search Using Cloud
Efficient and Empiric Keyword Search Using CloudEfficient and Empiric Keyword Search Using Cloud
Efficient and Empiric Keyword Search Using Cloud
IRJET Journal
 
Remote data integrity checking with a third party auditor in public cloud usi...
Remote data integrity checking with a third party auditor in public cloud usi...Remote data integrity checking with a third party auditor in public cloud usi...
Remote data integrity checking with a third party auditor in public cloud usi...
IJSRED
 
A Novel Method of Directly Auditing Integrity On Encrypted Data
A Novel Method of Directly Auditing Integrity On Encrypted DataA Novel Method of Directly Auditing Integrity On Encrypted Data
A Novel Method of Directly Auditing Integrity On Encrypted Data
IRJET Journal
 
IRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET- Secure Cloud Data Using Attribute Based EncryptionIRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET Journal
 
Improving Efficiency of Security in Multi-Cloud
Improving Efficiency of Security in Multi-CloudImproving Efficiency of Security in Multi-Cloud
Improving Efficiency of Security in Multi-Cloud
IJTET Journal
 
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud ComputingDistributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
AIRCC Publishing Corporation
 
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
ijcsit
 
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
AIRCC Publishing Corporation
 
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET Journal
 
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generationImprove HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
Editor IJMTER
 
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IRJET Journal
 
Hierarchal attribute based cryptographic model to handle security services in...
Hierarchal attribute based cryptographic model to handle security services in...Hierarchal attribute based cryptographic model to handle security services in...
Hierarchal attribute based cryptographic model to handle security services in...
IJECEIAES
 
M.E Computer Science Cloud Computing Projects
M.E Computer Science Cloud Computing ProjectsM.E Computer Science Cloud Computing Projects
M.E Computer Science Cloud Computing Projects
Vijay Karan
 
IRJET- Usage of Multiple Clouds for Storing and Securing Data through Identit...
IRJET- Usage of Multiple Clouds for Storing and Securing Data through Identit...IRJET- Usage of Multiple Clouds for Storing and Securing Data through Identit...
IRJET- Usage of Multiple Clouds for Storing and Securing Data through Identit...
IRJET Journal
 
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
ijsrd.com
 
IRJET- A Survey on Remote Data Possession Verification Protocol in Cloud Storage
IRJET- A Survey on Remote Data Possession Verification Protocol in Cloud StorageIRJET- A Survey on Remote Data Possession Verification Protocol in Cloud Storage
IRJET- A Survey on Remote Data Possession Verification Protocol in Cloud Storage
IRJET Journal
 
M.Phil Computer Science Cloud Computing Projects
M.Phil Computer Science Cloud Computing ProjectsM.Phil Computer Science Cloud Computing Projects
M.Phil Computer Science Cloud Computing Projects
Vijay Karan
 
M.Phil Computer Science Cloud Computing Projects
M.Phil Computer Science Cloud Computing ProjectsM.Phil Computer Science Cloud Computing Projects
M.Phil Computer Science Cloud Computing Projects
Vijay Karan
 
IRJET- An Approach for Implemented Secure Proxy Server for Multi-User Searcha...
IRJET- An Approach for Implemented Secure Proxy Server for Multi-User Searcha...IRJET- An Approach for Implemented Secure Proxy Server for Multi-User Searcha...
IRJET- An Approach for Implemented Secure Proxy Server for Multi-User Searcha...
IRJET Journal
 

Similar to IRJET- Secure Data Deduplication for Cloud Server using HMAC Algorithm (20)

EXPLORING WOMEN SECURITY BY DEDUPLICATION OF DATA
EXPLORING WOMEN SECURITY BY DEDUPLICATION OF DATAEXPLORING WOMEN SECURITY BY DEDUPLICATION OF DATA
EXPLORING WOMEN SECURITY BY DEDUPLICATION OF DATA
 
Efficient and Empiric Keyword Search Using Cloud
Efficient and Empiric Keyword Search Using CloudEfficient and Empiric Keyword Search Using Cloud
Efficient and Empiric Keyword Search Using Cloud
 
Remote data integrity checking with a third party auditor in public cloud usi...
Remote data integrity checking with a third party auditor in public cloud usi...Remote data integrity checking with a third party auditor in public cloud usi...
Remote data integrity checking with a third party auditor in public cloud usi...
 
A Novel Method of Directly Auditing Integrity On Encrypted Data
A Novel Method of Directly Auditing Integrity On Encrypted DataA Novel Method of Directly Auditing Integrity On Encrypted Data
A Novel Method of Directly Auditing Integrity On Encrypted Data
 
IRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET- Secure Cloud Data Using Attribute Based EncryptionIRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET- Secure Cloud Data Using Attribute Based Encryption
 
Improving Efficiency of Security in Multi-Cloud
Improving Efficiency of Security in Multi-CloudImproving Efficiency of Security in Multi-Cloud
Improving Efficiency of Security in Multi-Cloud
 
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud ComputingDistributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
 
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
 
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
 
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
 
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generationImprove HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
 
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
 
Hierarchal attribute based cryptographic model to handle security services in...
Hierarchal attribute based cryptographic model to handle security services in...Hierarchal attribute based cryptographic model to handle security services in...
Hierarchal attribute based cryptographic model to handle security services in...
 
M.E Computer Science Cloud Computing Projects
M.E Computer Science Cloud Computing ProjectsM.E Computer Science Cloud Computing Projects
M.E Computer Science Cloud Computing Projects
 
IRJET- Usage of Multiple Clouds for Storing and Securing Data through Identit...
IRJET- Usage of Multiple Clouds for Storing and Securing Data through Identit...IRJET- Usage of Multiple Clouds for Storing and Securing Data through Identit...
IRJET- Usage of Multiple Clouds for Storing and Securing Data through Identit...
 
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
 
IRJET- A Survey on Remote Data Possession Verification Protocol in Cloud Storage
IRJET- A Survey on Remote Data Possession Verification Protocol in Cloud StorageIRJET- A Survey on Remote Data Possession Verification Protocol in Cloud Storage
IRJET- A Survey on Remote Data Possession Verification Protocol in Cloud Storage
 
M.Phil Computer Science Cloud Computing Projects
M.Phil Computer Science Cloud Computing ProjectsM.Phil Computer Science Cloud Computing Projects
M.Phil Computer Science Cloud Computing Projects
 
M.Phil Computer Science Cloud Computing Projects
M.Phil Computer Science Cloud Computing ProjectsM.Phil Computer Science Cloud Computing Projects
M.Phil Computer Science Cloud Computing Projects
 
IRJET- An Approach for Implemented Secure Proxy Server for Multi-User Searcha...
IRJET- An Approach for Implemented Secure Proxy Server for Multi-User Searcha...IRJET- An Approach for Implemented Secure Proxy Server for Multi-User Searcha...
IRJET- An Approach for Implemented Secure Proxy Server for Multi-User Searcha...
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

AP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specificAP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specific
BrazilAccount1
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
AJAYKUMARPUND1
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
VENKATESHvenky89705
 
Investor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptxInvestor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptx
AmarGB2
 
English lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdfEnglish lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdf
BrazilAccount1
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
gerogepatton
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
FluxPrime1
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
AhmedHussein950959
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
Kerry Sado
 
Runway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptxRunway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptx
SupreethSP4
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
Divya Somashekar
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
R&R Consult
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
Kamal Acharya
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
Pipe Restoration Solutions
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
Jayaprasanna4
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
bakpo1
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
Amil Baba Dawood bangali
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
TeeVichai
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
ydteq
 

Recently uploaded (20)

AP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specificAP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specific
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
 
Investor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptxInvestor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptx
 
English lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdfEnglish lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdf
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
 
Runway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptxRunway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptx
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
 

IRJET- Secure Data Deduplication for Cloud Server using HMAC Algorithm

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 11 | Nov 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 422 Secure Data Deduplication for Cloud Server using HMAC Algorithm P Jagadeesh1, K Narayana2, P Chandra Prakash3 1Student, Department of Computer Science and Engineering, Sechachala Institute of Technology, Puttur, Andhra Pradesh, India. 2Associate Professor, HOD, Department of Computer Science and Engineering, Sechachala Institute of Technology, Puttur, Andhra Pradesh, India. 3Assistant Professor, Department of Computer Science and Engineering, Sechachala Institute of Technology, Puttur, Andhra Pradesh, India. ------------------------------------------------------------------------***------------------------------------------------------------------------- Abstract - The elimination of duplicate or redundant data, particularly in computer data is named deduplication. Data deduplication is a method to regulate the explosive growth of information within the cloud storage, most of the storage providers are finding more secure and efficient methods for their sensitive method. According to deduplication, we introduce a method that can eliminate redundant encrypted data owned by different users. This paper is a detail description of secure cloud auditor which is used for the maintaining integrity of shared data with efficient data deduplication on cloud. This mechanism uses concept of SecCloud system where user is able to generate data tags before storing data on cloud which helps during performing audit to check integrity of data. Key Words: Cloud computing, Integrity, Auditing, Advanced Encryption Standard (AES), Data deduplication. 1. INTRODUCTION Cloud computing (The Fifth Generation of Computing) is a term used to describe both a platform and type of application. A cloud computing platform dynamically provisions, configures, reconfigures, and DE provisions servers as needed. Servers in the cloud can be physical machines or virtual machines. Advanced clouds typically include other computing resources such as storage area networks (SANs), network equipment, firewall and other security devices. Cloud computing also describes Applications that are extended to be accessible through the Internet. These cloud applications uselargedata centersand powerful servers that host Web applications and Web services. Anyone with a suitable Internet connection and a standard browser can access a cloud application. As the cloud computing technology developsduringthelastdecade, outsourcing data to cloud service for storage becomes an attractive trend, which benefits in sparing efforts on heavy data maintenance and management. Nevertheless, since the outsourced cloud storage is not fully trustworthy, it raises security concerns on how to realize data DE duplication in cloud While achieving integrity auditing.Inthiswork,westudythe problem of integrity auditing and secure DE duplication on cloud data. Specifically, aiming at achieving both data integrity and DE duplication incloud,weproposetwosecure systems, namely SecCloud and SecCloud+. Sec Cloud introduces an auditing entity with maintenance of a Map Reduce cloud, which helps clients generate data tags before uploading as well as audit the integrity of data having been stored in cloud. Compared with previous work, the computation by user in SecCloud.is greatly reduced during the file uploadingandauditingphases.SecCloud+isdesigned motivated by the fact that customers alwayswanttoencrypt their data before uploading, and enables, integrity auditing and secure DE duplication on encrypted data. Even though cloud storage has been widely used adopted, it fails to accommodate some important emerging needs such as the abilities of auditing integrity of cloud files by cloud clients and detecting duplicated files by cloud servers. We disclose both problems. The first problem is integrity auditing. Data integrity demands maintaining and assuring the accuracy and completeness of data. A data owner always expects that his data in a cloud can be stored correctly and trustworthily. It means that the data should not be illegally tampered, improperly modified, deliberately deleted, or maliciously fabricated. If any undesirable operations corrupt or delete the data, the owner should be able to detect the corruption or loss. The second problem is secure deduplication. Data stored at remote cloud servers are often duplicated. This fact raises a technology named deduplication, in which the cloudservers would like to de-duplicate by keeping only a single copy for each file. It is generalized to how can the cloud server efficiently confirms that the client owns the uploaded file before creating a link to this file for him/her. Accordingly, indistinguishable data duplicates of various clients will prompt to various figure writings, making deduplication unimaginable. It scrambles/decodes a data duplicate with a private key, which isacquired bycomputing the cryptographic hash estimation of the substance of the data copy. Clients safeguard the keys and send the figure content to the cloud. Since, indistinguishabledata duplicates will cause the same focalized key and thus the equivalent figure content.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 11 | Nov 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 423 2. RELATED WORK Secure deduplication is interesting for both industrial and research communities; therefore, several secure deduplication schemes have been proposed.Tosupportdata integrity, two concepts, PDP (provable data possession)and POR (proof of retrievability), have been introduced. PDP for ensuring that the cloud storage providers actually possess the files without retrieving or downloadingtheentiredata.It is basically a challenge-response protocol between the verifier (a client or TPA) and the prover (a cloud).Compared to PDP, POR not only ensures that the cloud servers possess the target files, but also guarantees their full recovery. A simple combination of two independent techniques designed for the two above mentioned issues does not efficiently deal with the issues at once, because achieving storage efficiency contradicts with the deduplication of authentication tags. Public auditing with a deduplication scheme based on homomorphic linear authentication tags was proposed. Integrity Auditing From the perspective of the client, integrity auditing of the outsourced data is one of the important issues for secure outsourcing, as the outsourced data can be corrupted by unintentional errors. Ateniese et al. [7] proposed a notion of provable data possession (PDP) for ensuring integrity of remote data, in which the client can audit the integrity ofthe target file without maintaining the entire file. Ateniese et al. [21] proposed a highly efficient PDP scheme based on symmetric key cryptography, with the support of a dynamic scenario except insertion. To supportdynamic scenariowith insertion, Erway et al. [22] proposed dynamic-PDPbased on a rank-based skip list. Wang et al. [23] proposed a proxy- PDP, in order to relax the computational overhead for tag generation. Zhu et al. [24] proposed a cooperative-PDP scheme in a multicloud environment. Based on convergence encryption, Liu et al. [25] proposed integrity auditing scheme and considered integrity tag deduplication over encrypted data. Secure Client-Side Deduplicationwith IntegrityAuditing As a method that provides both secure deduplication and integrity auditing, Zheng and Xu [9] firstly proposedproof of storage with deduplication (POSD), based on public key cryptography. However, an error in security occurs if the first uploader maliciously generates a pair of public and private keys [31], and POSD does not ensure confidentiality of the outsourced data as it is run over plaintext. Yuan and Yu [2] proposed a scheme called PCAD that supports both deduplication and integrity auditing with batch auditing, in which the server can simultaneouslyprovethepossessionof multiple files. Li et al. [1] proposed two schemes, namely SecCloud and SecCloud+. In both schemes, the author introduced an auditing entity that maintains a MapReduce cloud, which helps the client to generate block tags for integrity auditing. Additionally, SecCloud+ ensures confidentiality, where the client encrypts files using a message-derived encryption key distributed from the key server. In terms of efficiency improvement, Youn el al. [32] proposed a new scheme based on the homomorphic linear authenticator [26]. 3. PROPOSED METHODOLOGY After analyzing different research paper on spam detection in Twitter, I have considered Hash Message Authentication Code (HMAC) for survey. HMAC Method 1) HMAC In recent years, there has been increased interest in developing a MAC derived from a cryptographic hash code, such as MD5, SHA-1, or RIPEMD-160. The motivations for this interest are: Cryptographic hash works by and large execute quicker in programming than symmetricsquarefigures,forexample, DES. Library code for cryptographic hash capacities is broadly accessible. There are no fare confinements for cryptographic hash capacities, though symmetric square figures, notwithstanding whenutilizedforMACs,arelimited. A hash capacity, for example, MD5 was not intended for use as a MAC and can't be utilized specifically for thatreason since it doesn't depend on a mystery key. There have been various recommendations to fuse a mystery enter into a current hash calculation. HMAC got themosthelp.HMAChas been picked as the required to-actualize MACforIPSecurity, and is utilized in other Internet conventions, such as Transport Layer Security (TLS, soon to replace Secure Sockets Layer) and Secure Electronic Transaction (SET). 2) HMAC-Design Objectives Design objectives that RFC 2104 lists for HMAC include: • To use, without alterations, accessible hash capacities. Specifically, hash works that perform well in programming, and for which code is uninhibitedly and generally accessible. To consider simplereplaceabilityofthe inserted hash work in the event that quicker or more secure hash capacities are found or required. To save the first execution of the hash work without acquiring a noteworthy debasement. To utilize and handle enters essentially. • To have a surelyknewcryptographicexaminationof the quality of the validation system dependent on sensible suppositions on the implanted hash work. The initial two targets are imperative to the adequacy of HMAC. HMAC regards the hash work as a black box. This has two advantages. Initial, a current usage of a hash capacity
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 11 | Nov 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 424 can be utilized as a module in executing HMAC. The main part of the HMAC code is prepackaged and prepared to use without change. Second, to supplant a given hash work in a HMAC execution, you should basically evacuate the current hash work module and drop in the new module. This should be possible if a quicker hash work were wanted. More imperative, if the security of the implanted hash work were imperiled, the security of HMAC could be held basically by supplanting the installed hash work with a more secure one (supplanting MD5 with SHA-1, for instance). The last structure objective in the former rundown is, truth be told, the primary preferred standpoint of HMAC over other proposed hash-based plans. HMAC can be proven secure provided that the embedded hash function has some reasonable cryptographic strengths. 3) The HMAC Algorithm Illustrates the overall operation of HMAC : Affix zeros to one side end of K to make a b-bit string K+ (for instance, if K is of length 160 bits and b = 512, at that point K will be attached with 44 zero bytes 0x00). Note the XOR with ipad brings about flipping one-portion of the bits of K. Thus, the XOR with opadresults in flipping one- portion of the bits of K, yet an alternate arrangement of bits. As a result, by passing Si thus through the pressure capacity of the hash calculation, you have pseudorandomlyproduced two keys from K. HMAC ought to execute in around indistinguishable time from the inserted hash work for long messages. HMAC includes three executions of the hash pressure work (for Si, So, and the square created from the inward hash). 4) HMAC Security The security of any MAC function based on an embedded hash function depends in some way on the cryptographic strength of the underlying hash function. The interest of HMAC is that its creators have possessed the capacity to demonstrate a correct connection between thequalityofthe implanted hash work and the quality of HMAC. The security of a MAC work is for the most part communicated as far as the likelihood of effective fraud with a givenmeasureoftime spent by the counterfeiter and a given number of message- MAC sets made with a similar key. Generally, it very well may be demonstrated that, for a givenlevel ofexertion(time, message-MAC sets), on messages created by real clients and seen by aggressors, the likelihood of an effective assault on HMAC is comparable to one of the accompanyingassaultson the installed hash work: 1. Assailants can process a yield of the pressure work even with an Initial Value (IV) that is irregular, mystery, and obscure to aggressors. 2. Aggressors discover crashes in the hash work notwithstanding when the IV is irregular and mystery. In the principal assault, you can see the pressure work as proportionate to the hash work connected to a message comprising of a solitary b-bit square. For this assault, the IV of the hash work is supplanted by a mystery, arbitrary estimation of n bits. An assault on this hash work requires either a beast compel assault on the key, which is a level of exertion on the request of 2n, or a birthday assault, which is a unique instance of the second assault. In the second assault, aggressors are searching for two messages, M and M', that delivera similarhash:H(M)=H(M'). This requires a level of exertion of 2n/2 for a hash length of n. On this premise, the security of MD5 is raiseddoubtabout, on the grounds that a level of exertion of 264 looks doable with the present innovation. Does this imply a 128-piece hash capacity, for example, MD5 is inadmissible for HMAC? The appropriate response is no. To assault MD5, aggressors can pick any arrangement of messages and work on these disconnected on a devoted figuringofficetodiscovera crash. Since aggressors know the hash calculation and the default IV, assailants can produce the hash code for every one of the messages that aggressors create. Be that as it may, while assaulting HMAC, assailants can't produce message/code sets disconnected in light of the fact that aggressors don't know K. In this manner, aggressorsmustwatcha groupingof messages created by HMAC under a similar key and play out the assault on these known messages. Fora hashcodelength of 128 bits, this requires 264 watched squares (273 bits) produced utilizing a similar key. On a 1-Gbps interface, you would need to watch a ceaseless stream of messageswith no adjustment in the key for around 250,000 years to succeed. Thus, if speed is a concern, it is fully acceptable to use MD5 rather than SHA-1 or RIPEMD-160 as the embedded hash function for HMAC. 4. CONCLUSION With the help of Hybrid Cloud Approach and Convergent Encryption we achieved secured data deduplication. To discover copy information Proof of Ownership (PoW) convention is utilized. Which gave reference of file which is already present on Public Cloud. 5. FUTURE SCOPE Currently By using HMAC Algorithm, Hash Value computation for large File Size will be performance hit. So further in future work we can use Attribute-Based Encryption for encrypting the File Data. To compute the File Tag, instead of using whole file data we will use File Attributes. In Future Scope, It can be finding Video Spam content & Image Spam Content.
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 11 | Nov 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 425 REFERENCES [1] J. Li, X. Chen, M. Li, J. Li, P. Lee, and W. Lou, “Secure deduplication with efficient and reliable convergent key management,” in Proc. IEEE Trans.ParallelDistrib.Syst.,http://doi.ieeecomputersocie ty.org/10.1109/TPDS.2013.284,2013. [2] A. Rahumed, H. C. H. Chen, Y. Tang, P. P. C. Lee, and J. C. S. Lui, “A secure cloud backup system with assured deletion and version control,” in Proc. 3rd Int. Workshop Secutiry Cloud Comput., 2011,pp. 160–167. [3] “Proofs of Ownership in Remote Storage Systems” Shai Halevi1, Danny Harnik2, Benny Pinkas3, and Alexandra Shulman-Peleg2 1IBM T. J. Watson Research Center, 2IBM Haifa Research Lab, 3Bar Ilan University. [4] M. Bellare, S. Keelveedhi, and T. Ristenpart, “Dupless: Serveraided encryption for deduplicated storage,” in Proc. 22nd USENIX Conf. Sec. Symp., 2013, pp. 179– 194. [5] S. Quinlan and S. Dorward, “Venti: A new approach to archival storage,” in Proc. 1st USENIX Conf. File Storage Technol., Jan. 2002. [6] J. R. Douceur, A. Adya, W. J. Bolosky, D. Simon, and M. Theimer, “Reclaiming space from duplicate files in a serverless distributed file system, ” in Proc. Int.Conf.Distrib. Comput. Syst., 2002. [7] Jan Stanek, Alessandro Sorniotti, Elli Androulaki, and Lukas Kencl, “A Secure Data DeduplicationSchemeforCloud Storage,” Tech Rep. IBM Reasearch, Zurich.