A Hybrid Cloud Approach for Secure Authorized Deduplication

Published on February 2017 | Categories: Documents | Downloads: 27 | Comments: 0 | Views: 234
of 2
Download PDF   Embed   Report

Comments

Content

Enhanced In-Line Data Deduplication and Secure
Authorization in Hybrid Cloud
ABSTRACT:
Data deduplication is one of important data compression techniques for eliminating duplicate
copies of repeating data, and has been widely used in cloud storage to reduce the amount of storage space
and save bandwidth. To protect the confidentiality of sensitive data while supporting deduplication, the
convergent encryption technique has been proposed to encrypt the data before outsourcing. To better
protect data security, this paper makes the first attempt to formally address the problem of authorized data
deduplication. Different from traditional deduplication systems, the differential privileges of users are
further considered in duplicate check besides the data itself. We also present several new deduplication
constructions supporting authorized duplicate check in hybrid cloud architecture. Security analysis
demonstrates that our scheme is secure in terms of the definitions specified in the proposed security
model. As a proof of concept, we implement a prototype of our proposed authorized duplicate check
scheme and conduct test bed experiments using our prototype.
EXISTING SYSTEM:
Cloud computing provides seemingly unlimited “virtualized” resources to users as services across
the whole Internet, while hiding platform and implementation details.
Today’s cloud service providers offer both highly available storage and massively parallel
computing resources at relatively low costs.
As cloud computing becomes prevalent, an increasing amount of data is being stored in the cloud
and shared by users with specified privileges, which define the access rights of the stored data.
DRAWBACKS:
 One critical challenge of cloud storage services is the management of the ever-increasing
volume of data.
PROPOSED SYSTEM:
Data deduplication is a specialized data compression technique for eliminating duplicate copies
of repeating data in storage.
The technique is used to improve storage utilization and can also be applied to network data
transfers to reduce the number of bytes that must be sent.
Instead of keeping multiple data copies with the same content, deduplication eliminates redundant
data by keeping only one physical copy and referring other redundant data to that copy.
The convergent encryption technique has been proposed to encrypt the data before outsourcing.
To better protect data security, this paper makes the first attempt to formally address the problem of
authorized data deduplication.
Different from traditional deduplication systems, the differential privileges of users are further
considered in duplicate check besides the data itself.
We also present several new deduplication constructions supporting authorized duplicate check in
hybrid cloud architecture.
Security analysis demonstrates that our scheme is secure in terms of the definitions specified in
the proposed security model.
ADVANTAGES:
 Our proposed authorized duplicate check scheme incurs minimal overhead compared to
normal operations.

REQUIREMENT ANALYSIS:
HARDWARE SPECIFICATION:
 Pentium IV Processor
 512 MB RAM
 14 VGA Color Monitor
 104 Keyboards
SOFTWARE SPECIFIACTION:
 Platform
 Front End
 Back End
 IDE
 Operating System

:JAVA
:JAVA(JDK 1.6), HTML,JSP
:Microsoft SQL Server 2000, Tomcat
:Net Beans 6.9.1
:Microsoft Windows xp or 7

Sponsor Documents

Or use your account on DocShare.tips

Hide

Forgot your password?

Or register your new account on DocShare.tips

Hide

Lost your password? Please enter your email address. You will receive a link to create a new password.

Back to log-in

Close