secure distributed deduplication systems with improved reliability-ieee project 2015-2016

Download Secure Distributed Deduplication Systems with Improved Reliability-IEEE PROJECT 2015-2016

Post on 15-Aug-2015

51 views

Category:

Engineering

4 download

Embed Size (px)

TRANSCRIPT

  1. 1. micclnsinfotech +91 90036 28940 +91 94435 11725r 7 Years of Excellence in IEEE Project development for universities across INDIA,USA,UK,AUSTRALIA,and SWEEDEN. 3' Expert developers in JAVA ,DOT NET ,ANDROID ,PHP,MATLAB ,NS2 ,NS3 ,VLSI, CLOUD SIM,TANNER ,MICROWIND ,EMBEDDED ,ROBOTICS ,MECHANICAL ,MECHATRONICS ,WIRELESS NETWORS,OPNET ,OMNETr Over 11000+ projects ,425 clients - MICANS IFNFOTECH provides IEEE & application projects for CSE, IT, ECE, EEE, MECH, ClV| L,MCA, M.TECH, M.PHlLL, MBA,DME, MS, PHD. .. TT ..___. _ L. IEEE Projects 100% WORKING CODE + DOCUMENTAT| ON+ EXPLAINATION RESTLOW PRICE GUARANTEEDSECURE DISTRIBUTED DEDUPLICAT IMPROVED RELABSTRACTData deduplication is a t for liminating duplicate copies of data, and has been widely used loud age to reduce storage space and upload bandwidth.However,th one copy for each file stored in cloud even ifsuch a le is owned ber of users.As a result,deduplication systemimproves sto ' while reducing reliability.Fu1'therrnore, the challengeccnsinfotech,N028, 1oo FEET ROAD, PONDlcHERRY.WWW. MlcANSlNFOTECH. COM ;MICANSINFOTECHQGMAILCOIIII+91 90036 28940; +91 94435 11725
  2. 2. miccmsinfotech +91 90036 28940 +91 94435 11725 'l-4-Ii-*.oI"3:(-1-Illam-I-.11- I11: W-nu-I iI'I'l= IIIl_Il| Il= IIl I-1 | IIII'l= II~l'III= I-: =l0ll0LI: ~I9I? II,II-P,Ill,tlII~'1I: lI!73, . n[-i. Il'l_Ilj. Il. 9:1,-nu oI: t'r. II-1,-xciw-lat V/ . _IIllI l| _:iI mlpI: {0lI_|"ll-'9 l'II: I: v:I nI-'73 ll-Kr L! -'1I . I, l|I| I_| "-IIt'A.1.. IxIl| I-Il- I'lIII: (IIll'IIlI, | , Il'l| ?I? I,| l_| I;I!:(| I_: l%iIl7f~t t'lI! I2Ml| l."Il m| 1:r: I: m.Ilij: . WI: L=I! ,=I-I:lI_l| 'llIl: I~,IIrhI, =I' 3II'lII, =Iom-.1 ; '.; lIII{I=_-n-n-.1-It I: -I-'--III-. im. ~ I'lII ': hI--Iv"|5IlI(v1:~ _IIlIl'lIiI'I~ I, =l, =l, = -"V -.1,-1,-1II-1:111-mu): -Il= :-I-I: -mi-1 . '~l, =.. IL. ,=I Ii. .,= I!It. I'l| ,=(-2:L.2lVlIL. I'II-'5,. l'l. -I1?2:I. l'l. .rl: I|! L.l'l| ;1:.!lI'lI5.I'AI~. .": I!.IEEE Projects 100% WORKING CODE + DOCUMENTAT| ON+ EXPLAINATION BEST PRICELOW PRICE GUARANTEEDof privacy for sensitive data also arises when they are outsourced by users to cloud.Aiming to address the above security challenges,this paper makes the first attempt to formalize the notion of distributed reliable deduplication system.We propose new distributed deduplication systems with higher reliability in which the data chunks are distributed across multiple cloud servers.The security requirements of data condentiality and tag consistency are also achieved by introducing a deterministic secret sharing scheme in distributed storage systems,instead of using convergent encryption as in previous deduplication systems.Security analysis demonstrates that our deduplication systems are secure in termsof the definitions specified in the proposed security model.As a proof of concept, micemsinfotech,NO:8.100 FEET ROAD. PONDICHERRY.VWIlW. MlCAN SlNFOTECH. COM ;MlCANSINFOTEcH@GMAIL. COM+91 90036 28940; +91 94435 11725
  3. 3. micclnsinfotech +91 90036 28940 +91 94435 11725r 7 Years of Excellence in IEEE Project development for universities across INDIA,USA,UK,AUSTRALIA,and SWEEDEN. Expert developers in JAVA ,DOT NET ,ANDROID ,PHP,MATLAB ,NS2 ,NS3 ,VLSI , CLOUD SIM,TANNER ,MICROWIND ,EMBEDDED ,ROBOTICS ,MECHANICAL ,MECHATRONICS ,WIRELESS NETWORS,OPNET ,OMNETr Over 11000+ projects ,425 clients - MICANS IFNFOTECH provides IEEE & application projects for CSE, IT, ECE, EEE, MECH, ClV| L,MCA, M.TECH, M.PHILL, MBA,DME, MS, PHD.>| _E. E_E_ProjBc18 100% WORKINGDOCUMENTAT| ON+ EXPLAINATION HESLOW PRICE GUARANTEEDwe implement the proposed systems and demonstrate ed overhead isvery limited in realistic environments.EXISTING SYSTEMThe challenge for data privac s more and more sensitive dataare being outsourced by users to tion mechanisms have usu-ally been utilized to protect the conf ore outsourcing data into cloud.Most are reluctant to apply encryption over the data because it makes impossible.The reason is that the traditionalencryption mec luding public key encryption and symmetric keyccnsinfotech,N028, 100 FEET ROAD, PONDlcHERRY.WWW. MIcANSlNFOTECH. COM ;MICANSINFOTECHQGMAILCOIIII+91 90036 28940; +91 94435 11725
  4. 4. miccinsinfotech +91 90036 28940 +91 94435 11725 I-.1-In-.oI"3:(-I-lllalu-I-.ll- | ,=l1= W-nan-I iI'I'l= IIIl_Il| Il= III I-1 | IIIl'l= II~iIlI= l~: =!0ll0LI: ~Nl? ",II-P,Ill,tlII~'1I: lI!7l,. n[-i. II'l_Ilj. II. ]1y! :lI oI: t'l-. l!-1,-I-. aw-IIIr: 'IA _I! llI I| _:il lIlpl: {0lI_|"ll-'9 I'll: IIv:1 II-'73 Il-Kr L! -'1I . I, l|I| I_| "-III'l.1.. IIII| I-Il- I'lIII: (IIll'IIIl, | , Il'l| ?I? I,| l_| I;I!:(| I_: !%iIl7f~I I'lI! I2MI| l."II I'll; l1:r: I: mIllij: . 'I'lI: L=l! ,=I-I:II_l| 'llIl: I~,IlrIl, =I' 3II'lll, =Iolvl-.1 ; '.; lIlI{I=_-Inn-.1-Ilr I: -I-'--III-. Im:I'll!': II--Iv"I|5IlIt1:~ _IIlIl'lIiI'I~ I, =l, =l, = -"I '-l_0I_IlII-IFIIIIIII-I9llII= l-Illi-I . '~l, =.. IL. ,=I Ii. .,= I!II. I'l| ,=(-2:L.2I'lIL. I'lI-'5,. I'l. -I1?2:I. I'l. .rl: I|! L.I'l| ;1:.!lI'lI5.I'lI~. .": I!.IEEE Projects 100% WORKING CODE + DOCUMENTAT| ON+ EXPLAINATION BEST PRICELOW PRICE GUARANTEEDencryption,require different users to encrypt their data with their own keys.As a result,identical data copies of different users will lead to different ciphertexts.To solve the problems of confidentiality and deduplication,the notion of convergent encryption has been pro-posed and widely adopted to enforce data condentiality while realizing deduplication.However,these systems achieved confidentiality ofoutsourced data at the cost of decreased error resilience.Therefore,how to protectboth condentiality and reliability while achieving deduplication in a cloud storagesystem is still a challenge. micemsinfotech,NO:8.100 FEET ROAD. PONDICHERRY.VWIlW. MlCAN SlNFOTECH. COM ;MlCANSlNFOTEcH@GMAlL. COM+91 90036 28940; +91 94435 11725
  5. 5. miccansinfotech +91 90036 28940 +91 94435 11725 I-1-II:-l"3:(-1-lI! =Iu-I-.II I11; "'nl| I o! -.w= lr-l_-mlzm I-1 "| III'l= II~iIII= L2:: l0ll| LI~-IBIPII,II-7,Ill,III-"lI: I*I! Il,clnl-I-lI'l_IIj. II. ]y! :lI iI: l'l~llII9Ili~I| L5V pull I| _:1l lllpl: {0lI_|I": I-'9 I'll: III~:1= II-ll II-Kr 'l~'1I . Z, llIlI| "-III'l.1.. IIII| I-Il~ I'lIII: (IIll'IIIl, | ? Il'l| ?I? I!l_| I?I!:(| I;! HII~. ~I I'lII-IIlMI| l."II I'll!l: r:I: (ilII| lfI: . 'l'Il: I,= l!, =I~$- II, l|W| llI-.lL"IIEl 3lI'lII|3Iolvl-.1 ; '.; lIlI: I= _III'In'l! $ 1!-I---III-. Im:I'll!': Il--lv"I|5IlI(.1'. 'l 9IlIl'lIiI'I~ I, =l, =l, = -"I '-I3I3lIIII1IIIIl| >l9llIII= lII| l~"IIll . '~l, =.. I. .,= I Ii. .,= I!II. I'l| ,=l-2.'. L. 2I'lIL. I'lI-'5,. I'l. _I! ?2:I. I'l. .rl: I|! L.I'l| ;1:.,| lI'lI5.. I'lI-. .": |!.IEEE Projects 100% WORKING CODE + DOCUMENTAT| ON+ EXPLAINATION BEST PRICELOW PRICE GUARANTEEDDisadvantages0 Deduplication technique can save the storage space for the cloud storageservice providers,it reduces the reliability of the system. 0 Lots of deduplication systems and cloud storage systems are intended by users and applications for higher reliability,especially in archival storage systems where data are. critical and should be preserved over long timeperiods. micqnsinfotech,NO:8.100 FEET ROAD. PONDICHERRY.VWIlW. MlCAN SlNFOTECH. COM ;MlCANSlNFOTECH@GMAlL. COM+91 90036 28940; +91 94435 11725
  6. 6. micclnsinfotech +91 90036 28940 +91 94435 11725r 7 Years of Excellence in IEEE Project development for universities across INDIA,USA,UK,AUSTRALIA,and SWEEDEN. 3' Expert developers in JAVA ,DOT NET ,ANDROID ,PHP,MATLAB ,NS2 ,NS3 ,VLSI, CLOUD SIM,TANNER ,MICROWIND ,EMBEDDED ,ROBOTICS ,MECHANICAL ,MECHATRONICS ,WIRELESS NETWORS,OPNET ,OMNETr Over 11000+ projects ,425 clients - MICANS IFNFOTECH provides IEEE & application projects for CSE, IT, ECE, EEE, MECH, ClV| L,MCA, M.TECH, M.PHILL, MBA,DME, MS, PHD. IEEEProjocts 100% WORKINGDOCUMENTAT| ON+ EXPLAINATION BESTLOW PRICE GUARANTEEDPROPOSED SYSTEMTo design secure deduplication syste reliability in cloud servers into deduplication systems to provide better fault toleranc er protect data condentiality,thesecret sharing technique is utilize 0 compatible with the distributedstorage systems. Four new secure n systems are pro-posed to provide efcientdeduplication withccnsinfotech,N028, 100 FEET ROAD, PONDlcHERRY.WWW. MIcANSlNFOTECH. COM ;MICANSINFOTECHQGMAILCOIIII+91 90036 28940; +91 94435 11725
  7. 7. miccinsinfotech +91 90036 28940 +91 94435 11725 I-.1-In-.oI"3:(-I-lllalu-I-.ll- | ,=l1= W-Ra: -I iI'I'l= IIIl_Il| Il= III I-1 | IIIl'l= II~iIlI= l~: =!0ll0LI: ~Nl? ",II-P,Ill,tlII~'1I: lI!7l,. n[-i. II'l_Ilj. II. ]1y! :lI oI: t'l-. l!-1,-I-. aw-IIIr: 'IA _I! llI I| _:il lIlpl: {0lI_|"ll-'9 I'lI: Iv E II-'73 Il-Kr L! -'1I . :! IIlII, I"'-llI'l.1.-. TIlII; l:- I'lll': . l'I'lIIl, I ; lI'll; l;Iplpl; Ip : ul; mIlfZ: . I'll, =. :mI'| l.'lTl I'll; l1:r: I: mIllij: . 'I'lI: L=l! ,=I-I:II_l| 'llIl: I~,IlrIl, =I' 3II'lll, =Iolvl-.1 ; '.; lIlI{I=_-Inn-.1-Ilr I: -I-'--III-. Im:I'll!': II--Iv"I|5IlIt1:~ _IIlIl'lIiI'I~ I, =l, =l, = -"I '-l_0I_IlII-IFIIIIIII-I9llII= l-Illi-I . '~l, =.. IL. ,=I Ii. .,= I!II. I'l| ,=(-2:L.2I'lIL. I'lI-'5,. I'l. -I1?2:I. I'l. .rl: I|! L.I'l| ;1:.!lI'lI5.I'lI~. .": I!.IEEE Projects 100% WORKING CODE + DOCUMENTAT| ON+ EXPLAINATION BEST PRICELOW PRICE GUARANTEEDmethods,is utilized to protect data condentiality.Specifically,data are split into fragments by using secure secret sharing schemes and storedat different servers. Our proposed constructions support both lelevel and blocklevel deduplications. Security analysis demonstrates that the proposed deduplication systems are secure in terms of the definitions specied in the proposed security model.In more details,condentiality,reliability and integrity can be achieved in our proposed system.Two kinds of collusiori attacks are considered in our solutions.These are the collusion attack on the data and the collusion attack against servers.In particular,the data remains secure even if the adversary controls a limited numberof storage servers. micemsinfotech,NO:8.100 FEET ROAD.

Recommended

View more >