a hybrid cloud approach for secure authorized deduplication

36
A PROJECT REPORT ON A HYBRID CLOUD APPROACH FOR SECURE AUTHORIZED DEDUPLICATION Submitted by T.CHANDU 114P1A0551 M.PRUDHVI KUMAR 114P1A0530 S.CHAITHANYA NAIK 114P1A0548 Esteemed Guidance by SHAIK ASEEF.(M.Tech) Asst.Professor. CSE Department. YOGANANDA INSTITUTE OF TECHNOLOGY & SCIENCE DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING (Approved by AICTE, New Delhi & Affiliated to JNTUA, Anantapur) Mohan reddynagar,yalamandyam(v),Renigunta(m),Tirupathi. 2014-2015

Upload: prudhvikumar-madithati

Post on 15-Jul-2015

220 views

Category:

Education


6 download

TRANSCRIPT

A PROJECT REPORT ON

A HYBRID CLOUD APPROACH FOR SECURE

AUTHORIZED DEDUPLICATION

Submitted by

T.CHANDU 114P1A0551

M.PRUDHVI KUMAR 114P1A0530

S.CHAITHANYA NAIK 114P1A0548

Esteemed Guidance by

SHAIK ASEEF.(M.Tech)

Asst.Professor.

CSE Department.

YOGANANDA INSTITUTE OF TECHNOLOGY & SCIENCEDEPARTMENT OF COMPUTER SCIENCE & ENGINEERING

(Approved by AICTE, New Delhi & Affiliated to JNTUA, Anantapur)

Mohan reddynagar,yalamandyam(v),Renigunta(m),Tirupathi.

2014-2015

A HYBRID CLOUD APPROACH FOR SECURE

AUTHORIZED DEDUPLICATION

REDUCED

COSTSFLEXIBILITY

MORE

MOBILITY

EASY TO

IMPLEMENT

AGILITY

HIGHLY

AUTOMATED

END USER

PRODUCTIVITY

REDUCED

COSTS FLEXIBILITYMORE

MOBILITY

EASY TO

IMPLEMENTAGILITYHIGHLY

AUTOMATED

END USER

PRODUCTIVITY

WITH AN INFRASTRUCTURE THAT IS:

EFFICIENTSELF

SERVICE

USAGE

BASED

SCALABLE

AND ELASTIC

ABSTRACT

• Data deduplication is one of important data compression techniques for eliminating duplicate

copies of repeating data, and has been widely used in cloud storage to reduce the amount of

storage space and save bandwidth.

• The first attempt to formally address the problem of authorized data deduplication. Different

from traditional deduplication systems, the differential privileges of users are further

considered in duplicate check besides the data itself.

• our proposed authorized duplicate check scheme incurs minimal overhead compared to

normal operations.our proposed authorized duplicate check scheme incurs minimal overhead

compared to normal operations.

ARCHITECTURE

• Cloud computing provides seemingly unlimited “virtualized” resources to users as

services across the whole Internet, while hiding platform and implementation details.

• Today’s cloud service providers offer both highly available storage and massively

parallel computing resources at relatively low costs.

• Cloud computing becomes prevalent, an increasing amount of data is being stored in

the cloud and shared by users with specified privileges, which define the access rights

of the stored data.

EXISTING SYSTEM

EXISTING SYSTEM DISADVANTAGES

• One critical challenge of cloud storage services is the management of the ever-

increasing volume of data.

• Increasing of duplicate data in cloud storage and it increases size of occupation and

increases bandwidth.

PROPOSED SYSTEM

• We also present several new deduplication constructions supporting authorized

duplicate check in a hybrid cloud architecture.

• Security analysis demonstrates that our scheme is secure in terms of the definitions

specified in the proposed security model.

• Our proposed authorized duplicate check scheme incurs minimal overhead

compared to normal operations.

PROPOSED SYSTEM ADVANTAGES

• Decreasing of duplicate data in cloud storage and save the server space.

• It Decreases size of occupation and Decreases bandwidth.

• One critical challenge of cloud storage services is the management of the ever-

increasing volume of data.

ALGORITHMS

• Key Gen Algorithm.

• AES Algorithm.

• Tag Gen Algorithm.

User

+user name+password

+registration()+login()+send request()+upload files()+view files()+download files()+logout()

Admin

+admin+password

+login()+accept request()+send key()+logout()

CLASS DIAGRAM:

registration

user admin

login

send request

upload files

view files

download files

accept request

logout

send key

USECASE DIAGRAM :

user system admin

registration

login

send request

login

accept request

send key to mail

logout

upload files

view files

download files

logout

SEQUENCE DIAGRAM :

ACCEPT REQUESTLOGIN

LOGINREGISTRATION

USER ADMIN

HOME

START

SEND REQUEST

UPLOAD FILES

VIEW FILES

DOWNLOAD FILES

SEND KEY TO MAIL

LOGOUT

STOP

VIEW FILES

STATE CHART DIAGRAM

SCREENSHOTSHome page

SCREENSHOTSRegistration page

SCREENSHOTSUser Login page

SCREENSHOTSUser page

SCREENSHOTSToken Request page

SCREENSHOTSAdmin Login page

SCREENSHOTSAdmin page

SCREENSHOTSMail page

SCREENSHOTSMail: Secret Key

SCREENSHOTSEnter Key

SCREENSHOTSEnter File Name

SCREENSHOTSUpload File

SCREENSHOTSFile uploading

SCREENSHOTSFile uploaded Sucessfully

SCREENSHOTSFile Download

SCREENSHOTSEnter Key

SCREENSHOTSSelected File

HARDWARE REQUIREMENTS

Processor - Pentium –III

Speed - 1.Ghz

RAM - 256 MB(min)

Hard Disk - 20 GB

SOFTWARE REQUIREMENTS

Operating System : Windows95/98/2000/XP

Front End : HTML, Java, Jsp

Scripts : JavaScript.

Database : MySql

IDE : Netbeans

Requirements

AnalysisDesign

Coding

TestingDeployment

CONCLUSION

QUERIES….?

THANK YOU