a hybrid cloud approach for secure authorized deduplication
TRANSCRIPT
A PROJECT REPORT ON
A HYBRID CLOUD APPROACH FOR SECURE
AUTHORIZED DEDUPLICATION
Submitted by
T.CHANDU 114P1A0551
M.PRUDHVI KUMAR 114P1A0530
S.CHAITHANYA NAIK 114P1A0548
Esteemed Guidance by
SHAIK ASEEF.(M.Tech)
Asst.Professor.
CSE Department.
YOGANANDA INSTITUTE OF TECHNOLOGY & SCIENCEDEPARTMENT OF COMPUTER SCIENCE & ENGINEERING
(Approved by AICTE, New Delhi & Affiliated to JNTUA, Anantapur)
Mohan reddynagar,yalamandyam(v),Renigunta(m),Tirupathi.
2014-2015
REDUCED
COSTSFLEXIBILITY
MORE
MOBILITY
EASY TO
IMPLEMENT
AGILITY
HIGHLY
AUTOMATED
END USER
PRODUCTIVITY
REDUCED
COSTS FLEXIBILITYMORE
MOBILITY
EASY TO
IMPLEMENTAGILITYHIGHLY
AUTOMATED
END USER
PRODUCTIVITY
WITH AN INFRASTRUCTURE THAT IS:
EFFICIENTSELF
SERVICE
USAGE
BASED
SCALABLE
AND ELASTIC
ABSTRACT
• Data deduplication is one of important data compression techniques for eliminating duplicate
copies of repeating data, and has been widely used in cloud storage to reduce the amount of
storage space and save bandwidth.
• The first attempt to formally address the problem of authorized data deduplication. Different
from traditional deduplication systems, the differential privileges of users are further
considered in duplicate check besides the data itself.
• our proposed authorized duplicate check scheme incurs minimal overhead compared to
normal operations.our proposed authorized duplicate check scheme incurs minimal overhead
compared to normal operations.
• Cloud computing provides seemingly unlimited “virtualized” resources to users as
services across the whole Internet, while hiding platform and implementation details.
• Today’s cloud service providers offer both highly available storage and massively
parallel computing resources at relatively low costs.
• Cloud computing becomes prevalent, an increasing amount of data is being stored in
the cloud and shared by users with specified privileges, which define the access rights
of the stored data.
EXISTING SYSTEM
EXISTING SYSTEM DISADVANTAGES
• One critical challenge of cloud storage services is the management of the ever-
increasing volume of data.
• Increasing of duplicate data in cloud storage and it increases size of occupation and
increases bandwidth.
PROPOSED SYSTEM
• We also present several new deduplication constructions supporting authorized
duplicate check in a hybrid cloud architecture.
• Security analysis demonstrates that our scheme is secure in terms of the definitions
specified in the proposed security model.
• Our proposed authorized duplicate check scheme incurs minimal overhead
compared to normal operations.
PROPOSED SYSTEM ADVANTAGES
• Decreasing of duplicate data in cloud storage and save the server space.
• It Decreases size of occupation and Decreases bandwidth.
• One critical challenge of cloud storage services is the management of the ever-
increasing volume of data.
User
+user name+password
+registration()+login()+send request()+upload files()+view files()+download files()+logout()
Admin
+admin+password
+login()+accept request()+send key()+logout()
CLASS DIAGRAM:
registration
user admin
login
send request
upload files
view files
download files
accept request
logout
send key
USECASE DIAGRAM :
user system admin
registration
login
send request
login
accept request
send key to mail
logout
upload files
view files
download files
logout
SEQUENCE DIAGRAM :
ACCEPT REQUESTLOGIN
LOGINREGISTRATION
USER ADMIN
HOME
START
SEND REQUEST
UPLOAD FILES
VIEW FILES
DOWNLOAD FILES
SEND KEY TO MAIL
LOGOUT
STOP
VIEW FILES
STATE CHART DIAGRAM
SOFTWARE REQUIREMENTS
Operating System : Windows95/98/2000/XP
Front End : HTML, Java, Jsp
Scripts : JavaScript.
Database : MySql
IDE : Netbeans