ABSTRACT
Data deduplication is one of important data
compression techniques for eliminating duplicate copies of repeating data, and
has been widely used in cloud storage to reduce the amount of storage space and
save bandwidth. To protect the confidentiality of sensitive data while
supporting deduplication, the convergent encryption technique has been proposed
to encrypt the data before outsourcing. To better protect data security, this
paper makes the first attempt to formally address the problem of authorized
data deduplication. Different from traditional deduplication systems, the
differential privileges of users are further considered in duplicate check
besides the data itself.We also present several new deduplication constructions
supporting authorized duplicate check in a hybrid cloud architecture. Security
analysis demonstrates that our scheme is secure in terms of the definitions
specified in the proposed security model. As a proof of concept, we implement a
prototype of our proposed authorized duplicate check scheme and conduct testbed
experiments using our prototype. We show that our proposed authorized duplicate
check scheme incurs minimal overhead compared to normal operations.
Existing System
Data deduplication is one of important data
compression techniques for eliminating duplicate copies of repeating data, and
has been widely used in cloud storage to reduce the amount of storage space and
save bandwidth. To protect the confidentiality of sensitive data while
supporting deduplication, Cloud computing provides seemingly unlimited
“virtualized” resources to users as services across the whole Internet, while
hiding platform and implementation details. Today’s cloud service providers
offer both highly available storage and massively parallel computing resources at
relatively low costs. As cloud computing
becomes
prevalent, an increasing amount of data is being stored in the cloud and shared
by users with specified privileges, which define the access rights of
the stored data.
Problems on existing system:
1.One critical challenge of cloud storage services
is the management of the ever-increasing volume
of data.
Proposed System
The convergent encryption technique has been proposed to
encrypt the data before outsourcing. To better protect data security, this
paper makes the first attempt to formally address the problem of authorized
data deduplication. Different from traditional deduplication systems, the
differential privileges of users are further considered in duplicate check
besides the data itself.We also present several new deduplication constructions
supporting authorized duplicate check in a hybrid
cloud
architecture. Security analysis demonstrates that our scheme is secure in terms
of the definitions specified in the proposed security model. As a proof of
concept, we implement a prototype of our proposed authorized duplicate check
scheme and conduct testbed experiments using our prototype. We show that our
proposed authorized duplicate check scheme incurs minimal overhead compared to
normal operations.
Advantages:
1.One critical challenge of cloud storage services is
the management of the ever-increasing volume of data.
Implementation
Implementation
is the stage of the project when the theoretical design is turned out into a
working system. Thus it can be considered to be the most critical stage in
achieving a successful new system and in giving the user, confidence that the
new system will work and be effective.
The implementation stage involves
careful planning, investigation of the existing system and it’s constraints on
implementation, designing of methods to achieve changeover and evaluation of
changeover methods.
Main Modules:-
1.
User
Module:
In this module, Users are having authentication and security to access
the detail which is presented in the ontology system. Before accessing or
searching the details user should have the account in that otherwise they
should register first.
2. Secure DeDuplication System:
To support authorized deduplication, the tag of a
file F will be determined by
the file F and
the privilege. To show the difference with traditional notation of
tag,
we call it file token instead. To support authorized access, a secret key kp will
be bounded with a privilege p to
generate a file token. Let ϕ′ F;p =
TagGen(F, kp)
denote the token of F that
is only allowed to access by user with privilege p. In another word, the
token ϕ′ F;p could
only be computed by the users with privilege p. As a result, if a file has been uploaded by a user
with a duplicate token ϕ′
F;p,
then a duplicate check sent from another user will be successful if and only if
he also has the file F and
privilege p.
Such a token generation function could be
easily
implemented as H(F, kp),
where H(_)
denotes a cryptographic hash function.
3.
Security
Of Duplicate Check Token :
We
consider several types of privacy we need protect, that is, i) unforgeability
of duplicate-check token: There are two types of adversaries, that is, external
adversary and internal adversary. As shown below, the external adversary
can
be viewed as an internal adversary without any privilege. If a user has
privilege p,
it requires that the adversary cannot forge and output a valid duplicate token
with any other privilege p′ on any file F, where p does not match p′. Furthermore, it also requires that if the
adversary does not make a request of token with its own privilege from private
cloud server, it cannot forge and output a valid duplicate token with p on any F that has been queried.
4.
Send
Key:
Once the key
request was received, the sender can send the key or he can decline it. With
this key and request id which was generated at the time of sending key request
the receiver can decrypt the message.
Configuration:-
H/W System
Configuration:-
Processor - Pentium –III
Speed - 1.1 Ghz
RAM - 256
MB(min)
Hard
Disk -
20 GB
Floppy
Drive - 1.44 MB
Key
Board - Standard Windows Keyboard
Mouse - Two or Three Button Mouse
Monitor - SVGA
S/W
System Configuration:-
v Operating System :Windows95/98/2000/XP
v Application
Server : Tomcat5.0/6.X
v Front End : HTML, Java, Jsp
v Scripts : JavaScript.
v Server side Script :
Java Server Pages.
v Database : Mysql 5.0
v Database Connectivity :
JDBC.