PREPARED BY
K.SHOBHIYA
A.SHABANA
 Providing Secure client side
deduplication for cloud storage.
 For saving resources consumption in both network
bandwidth and storage capacities, many cloud services,
namely Dropbox apply client side deduplication.
 Existing deduplication can make it easy for outsiders to
know what's already on storage servers.
 Proposed the use of the convergent encryption, i.e.,
deriving keys from the hash of plaintext and a security
model for secure data deduplication.
1 New Data File-
ď‚­ Client Request Verification
ď‚­ Client Response Verification
ď‚­ Client Request Storage
ď‚­ Client Response Storage
ď‚– Client Request Verification
ď‚– Client Ownership Request
ď‚– Client Response Ownership
ď‚– Response Storage
Block-level deduplication + convergent encryption
⇨ New requirement: key management
SOLUTION
â–Ş metadata manager
â–Ş deduplication on encrypted blocks
â–Ş management of block keys
â–Ş separation between data and metadata
⇨ independance from actual storage
H/W System Configuration:-
Processor - Core i3
Speed - 2.0 GHZ
RAM - 1024 MB
Hard Disk - 20 GB
Monitor - SVGA
 Operating System : Windows Vista/7/8
 Application Server : Tomcat5.0/6.X
 Front End : HTML, Java, Jsp
 Server side Script : Java Server Pages
 Database : Mysql 5.0
â—Ź Prototype for performance analysis (ongoing, current results are
promising)
â—Ź Typical operations such as edit, append and delete
â—Ź Data sharing
Performance
â—Ź Storage/retrieval cost is linear with
block count
â—Ź Deduplication cost is constant
â—Ź Confidentiality and block-level deduplication
â—Ź Countermeasure against CE vulnerabilities
â—Ź Negligible performance impact
â—Ź Storage agnostic
â—Ź Transparent to the storage provider
Securededuplicationschemeforcloudstorage 141128075306-conversion-gate01

Securededuplicationschemeforcloudstorage 141128075306-conversion-gate01

  • 1.
  • 3.
     Providing Secureclient side deduplication for cloud storage.
  • 4.
     For savingresources consumption in both network bandwidth and storage capacities, many cloud services, namely Dropbox apply client side deduplication.  Existing deduplication can make it easy for outsiders to know what's already on storage servers.
  • 5.
     Proposed theuse of the convergent encryption, i.e., deriving keys from the hash of plaintext and a security model for secure data deduplication.
  • 8.
    1 New DataFile- ď‚­ Client Request Verification ď‚­ Client Response Verification ď‚­ Client Request Storage ď‚­ Client Response Storage
  • 9.
    ď‚– Client RequestVerification ď‚– Client Ownership Request ď‚– Client Response Ownership ď‚– Response Storage
  • 11.
    Block-level deduplication +convergent encryption ⇨ New requirement: key management SOLUTION ▪ metadata manager ▪ deduplication on encrypted blocks ▪ management of block keys ▪ separation between data and metadata ⇨ independance from actual storage
  • 13.
    H/W System Configuration:- Processor- Core i3 Speed - 2.0 GHZ RAM - 1024 MB Hard Disk - 20 GB Monitor - SVGA
  • 14.
     Operating System: Windows Vista/7/8  Application Server : Tomcat5.0/6.X  Front End : HTML, Java, Jsp  Server side Script : Java Server Pages  Database : Mysql 5.0
  • 15.
    â—Ź Prototype forperformance analysis (ongoing, current results are promising) â—Ź Typical operations such as edit, append and delete â—Ź Data sharing Performance â—Ź Storage/retrieval cost is linear with block count â—Ź Deduplication cost is constant
  • 16.
    â—Ź Confidentiality andblock-level deduplication â—Ź Countermeasure against CE vulnerabilities â—Ź Negligible performance impact â—Ź Storage agnostic â—Ź Transparent to the storage provider