a hybrid cloud approach for secure authorized deduplication
Post on 15-Jul-2015
Embed Size (px)
A PROJECT REPORT ON A HYBRID CLOUD APPROACH FOR SECURE AUTHORIZED DEDUPLICATIONSubmitted byT.CHANDU114P1A0551M.PRUDHVI KUMAR114P1A0530S.CHAITHANYA NAIK114P1A0548Esteemed Guidance bySHAIK ASEEF.(M.Tech) Asst.Professor. CSE Department.
YOGANANDA INSTITUTE OF TECHNOLOGY & SCIENCEDEPARTMENT OF COMPUTER SCIENCE & ENGINEERING (Approved by AICTE, New Delhi & Affiliated to JNTUA, Anantapur) Mohan reddynagar,yalamandyam(v),Renigunta(m),Tirupathi. 2014-2015 A HYBRID CLOUD APPROACH FOR SECURE AUTHORIZED DEDUPLICATION
2 Benefits of the Cloud YOU COULD ACHIEVE THESE BENEFITS:REDUCED COSTS
EASY TO IMPLEMENT
EASY TO IMPLEMENT
WITH AN INFRASTRUCTURE THAT IS: EFFICIENT
USAGE BASEDSCALABLE AND ELASTIC
ABSTRACTData deduplication is one of important data compression techniques for eliminating duplicate copies of repeating data, and has been widely used in cloud storage to reduce the amount of storage space and save bandwidth.
The first attempt to formally address the problem of authorized data deduplication. Different from traditional deduplication systems, the differential privileges of users are further considered in duplicate check besides the data itself.
our proposed authorized duplicate check scheme incurs minimal overhead compared to normal operations.our proposed authorized duplicate check scheme incurs minimal overhead compared to normal operations.
Cloud computing provides seemingly unlimited virtualized resources to users as services across the whole Internet, while hiding platform and implementation details.
Todays cloud service providers offer both highly available storage and massively parallel computing resources at relatively low costs.
Cloud computing becomes prevalent, an increasing amount of data is being stored in the cloud and shared by users with specified privileges, which define the access rights of the stored data.EXISTING SYSTEM
EXISTING SYSTEM DISADVANTAGESOne critical challenge of cloud storage services is the management of the ever-increasing volume of data.
Increasing of duplicate data in cloud storage and it increases size of occupation and increases bandwidth.
PROPOSED SYSTEMWe also present several new deduplication constructions supporting authorized duplicate check in a hybrid cloud architecture.
Security analysis demonstrates that our scheme is secure in terms of the definitions specified in the proposed security model.
Our proposed authorized duplicate check scheme incurs minimal overhead compared to normal operations.
PROPOSED SYSTEM ADVANTAGESDecreasing of duplicate data in cloud storage and save the server space.
It Decreases size of occupation and Decreases bandwidth.
One critical challenge of cloud storage services is the management of the ever-increasing volume of data.
ALGORITHMSKey Gen Algorithm.
Tag Gen Algorithm.
USECASE DIAGRAM :
SEQUENCE DIAGRAM :
ACCEPT REQUESTLOGINLOGINREGISTRATIONUSERADMINHOMESTARTSEND REQUESTUPLOAD FILESVIEW FILESDOWNLOAD FILESSEND KEY TO MAILLOGOUTSTOPVIEW FILESSTATE CHART DIAGRAM
User Login page
Token Request page
Admin Login page
Mail: Secret Key
Enter File Name
File uploaded Sucessfully
Processor-Pentium IIISpeed-1.GhzRAM-256 MB(min)Hard Disk-20 GB