SlideShare a Scribd company logo
1 of 3
Download to read offline
International Journal of Advanced Engineering, Management and Science (IJAEMS) [Vol-3, Issue-4, Apr- 2017]
https://dx.doi.org/10.24001/ijaems.3.4.12 ISSN: 2454-1311
www.ijaems.com Page | 355
An Enhanced Multi-Layered Cryptosystem
Based Secure and Authorized auditing
deduplication Model in Cloud Storage System
K. Mamatha1
, D.Nandini2
, K. Raja Manohar Reddy3
Dept. of IT, Lakireddy Balireddy College of Engineering, Andhra Pradesh, India
Abstract— As the cloud computing technology develops
during the recent days, outsourcing data to cloud service
for storage becomes an attractive trend, which benefits in
sparing efforts on heavy data maintenance and
management. Nevertheless, since the outsourced cloud
storage is not fully trustworthy, it raises security concerns
on how to realize data deduplication in cloud while
achieving integrity auditing. In this work, we study the
problem of integrity auditing and secure deduplication on
cloud data. Specifically, willing achieving both data
integrity and deduplication in cloud, we propose two
secure systems, namely SecCloud and SecCloud.
SecCloud introduces an auditing entity with maintenance
of a Map Reduce cloud, which helps clients generate data
tags before uploading still audit the integrity of data
having been stored in cloud. Compared with previous
work, the computation by user in SecCloud is greatly
reduced during the file uploading and auditing phases.
SecCloud is designed motivated individually fact that
customers always must encrypt their data before
uploading, and enables integrity auditing and secure
deduplication on encrypted data.
Keywords—cloud storage, data deduplication, secure
auditing, proof of ownership protocol, Proof of
retrievability, proof of ownership.
I. INTRODUCTION
As the cloud computing technology develops around the
continue decade, outsourcing story to cloud enrollment
for computerized information becomes an bright trend,
which benefits in sparing efforts on chief disclosure
reprieve and management. Nevertheless, as a result of the
outsourced leave in the shade storage is not far
trustworthy, it raises stake concerns on at which point to
notice front page new de-duplication in outweigh interim
achieving moral auditing. In this employment, we design
the stoppage of moral auditing and win de-duplication on
dwarf data. Specifically, determined achieving both data
principle and de-duplication in cloud, we propose two
secure systems, namely Sec-Cloud and Sec-Cloud. Sec-
Cloud introduces an auditing entity by the whole of
maintenance of a Map Reduce cloud, which helps clients
arouse data tags once uploading as abundantly as audit the
integrity of data having been collected in cloud.
Compared mutually previous function, the computation
by addict in Sec-Cloud is profoundly reduced around the
file uploading and auditing phases. Sec-Cloud is designed
motivated by the rundown that customers eternally want
to encrypt their data earlier uploading, and enables
integrity auditing and achieve de-duplication on encrypted
data.
Cloud storage systems are becoming increasingly popular.
A promising technology that keeps their cost down is
deduplication.More specifically, an attacker who knows
the hash signature of a file can convince the storage
service that it owns that file; hence the server lets the
attacker download the entire file. .Data security is also
challenge in the cloud server.
II. RELATED WORK
The definition of demonstrable knowledge possession
(PDP) was introduced by Ateniese et al. [5][6] for
reassuring that the cloud servers possess the target files
while not retrieving or downloading the total knowledge.
Basically, PDP may be a probabilistic proof protocol by
sampling a random set of blocks and asking the servers to
prove that they precisely possess these blocks, and also
the admirer solely maintaining a little quantity of
information is in a position to perform the integrity
checking. when Ateniese et al.’s proposal [5], many
works involved directed understand PDP on dynamic
scenario: Ateniese et al. [7] planned a dynamic PDP
schema however while not insertion operation; Erway et
al. [8] improved Ateniese et al.’s work [7] and supported
insertion by introducing documented flip table; an
identical work has additionally been contributed in [9].
However, these proposals [5][7][8][9] receive the
machine overhead for tag generation at the consumer. To
mend this issue, Wang et al. [10] planned proxy PDP
publicly clouds. Zhu et al. [11] planned the cooperative
PDP in multi-cloud storage. Another line of labor
supporting integrity auditing is proof of retrievability
International Journal of Advanced Engineering, Management and Science (IJAEMS) [Vol-3, Issue-4, Apr- 2017]
https://dx.doi.org/10.24001/ijaems.3.4.12 ISSN: 2454-1311
www.ijaems.com Page | 356
(POR) [12]. Compared with PDP, POR not just assures
the cloud servers possess the target files, however
additionally guarantees their full recovery. In [12],
purchasers apply erasure codes and generate
authenticators for every block for verifiability and
retrievability. So aside realize economical knowledge
dynamics, Wang et al. [13] improved the POR model by
manipulating languages Merkle hash tree construction for
block tag authentication. Xu and Yangtze River [14]
planned to enhance the POR schema in [12] with
polynomial commitment for reducing communication
value. Stefanov et al. [15] proposed a POR protocol over
authenticated file system if frequent changes. Azraoui et
al. [16] combined the privacy-preserving word search
algorithm with the insertion in data segments of randomly
generated short bit sequences, and developed a new POR
protocol. Li et al. [17] considered a new cloud storage
architecture with two independent cloud servers for
integrity auditing to reduce the computation load at client
side. Recently, Li et al. [18] utilized the key-disperse
paradigm to fix the issue of a significant number of
convergent compute convergent encryption. B. Secure
Deduplication Deduplication is a technique where the
server stores only a single copy of each file, nevertheless
how many clients asked to store that file, such that the
disk space of cloud servers likewise network bandwidth
are saved. However, trivial client side deduplication
accelerate the leakage of side channel information. For
example, a server telling a client full need not send the
file reveals that that client has the exact same file, which
perchance sensitive information in some case. In order to
restrict the leakage of side channel information, Halevi et
al. [3] introduced the proof of ownership protocol which
lets a client efficiently prove to a server that that the client
exactly holds this file. Several proof of ownership
protocols based on the Merkle hash tree are proposed [3]
to enable secure client-side deduplication. Pietro and
Sorniotti [19] proposed an efficient proof of ownership
scheme by choosing the projection of a file onto some
randomly selected bit-positions as the file proof. Another
career for secure deduplication dig the confidentiality of
DE duplicated data and considers to make deduplication
on encrypted data. Ng et al. [20] firstly introduced the
private data deduplication as a complement of public data
deduplication protocols of Halevi et al. [3]. Convergent
encryption [21] is a promising cryptographic primitive for
ensuring data privacy in deduplication. Bellare et al. [22]
formalized this primitive as message-locked encryption,
and explored its application in space-efficient secure
outsourced storage. Abadi et al. [23] further strengthened
Bellare et AL’s security definitions [22] by considering
plaintext distributions so anticipate the public parameters
of the schemas. Regarding the practical implementation of
convergent encryption for securing deduplication,
Keelveedhi et al. [4] designed the Dupless system
anywhere clients encrypt under file-based keys derived
from a key server via an oblivious pseudorandom function
protocol. As stated before, all the works illustrated above
considers either integrity auditing or deduplication, while
in this paper, we attempt to solve both problems
simultaneously. Additionally, it's worth noting that our
work is additionally distinguished with [2] that audits
cloud knowledge with deduplication, as we have a
tendency to additionally envisage to 1) source the
computation of tag generation, 2) audit and DE duplicate
encrypted knowledge within the planned protocols.
III. SYSTEM MODEL
1. User: It is nothing but cloud clientswhen a client
wants to store a huge data they rely on cloud for
maintenance and computation
2. Cloud server: It virtualizes theresources based on the
client’s requirements and expose them as storage
pools
3. Auditors: Which helps clients to upload and
maintains their data and acts like a certificate
authority. Auditor is associated with pair of public and
private keys and public key is made available.
Fig: System architecture
IV. PROPOSED WORK
In this project, aiming at achieving data integrity and
deduplication in cloud, we propose two secure systems
namely SecCloud and SecCloud+.SecCloud introduces an
auditing entity with maintenance of a MapReduce cloud,
which helps clients generate data tags before uploading as
well as audit integrity of data having been stored in
cloud.Besides supporting integrity auditing and secure
deduplication, SecCloud+ enables the guarantee of file
confidentiality.We propose a method of directly auditing
integrity on encrypted data.
International Journal of Advanced Engineering, Management and Science (IJAEMS) [Vol-3, Issue-4, Apr- 2017]
https://dx.doi.org/10.24001/ijaems.3.4.12 ISSN: 2454-1311
www.ijaems.com Page | 357
V. PERORMANCE EVALUTION
Fig: Performance Analysis
In this performance analysis graph we show the
relationship between the files and their time to upload in
server. In this above graph, we consider the size of the file
on x-axis and time on y-axis from 0 to infinity these
values will change dynamically based on the time. If the
file size is small the uploading time is less. If the file size
is huge then it takes more amount of time to upload file
into server. Based on the size of the files only the
uploading time will be depended.
VI. CONCLUSION
We are focusing to achieve both data integrity and data
de-duplication in cloud, we propose SecCloud and
SecCloud+. SecCloud introduce an auditing entity with
maintenance of a Map Reduce cloud, which helps the
clients to generate data tags before uploading and audit
the integrity of data having been stored in cloud. In
addition, SecCloud enables secure de-duplication by
introducing a Proof of Ownership protocol (POP) and
preventing the leakage of side channel information in de-
duplication. We compared with the existing work; the
computation by user in SecCloud is greatly reduced
during the file uploading and auditing phases. Sec -
Cloud+ is an advanced construction motivated by the fact
that customers always want their data to be encrypted
before uploading, and allows for integrity auditing as well
as secure de-duplication directly on encrypted data.
REFERENCES
[1] Imai, Shigeru, Thomas Chestna, and Carlos A.
Varela. "Elastic scalable cloud computing using
application-level migration." Utility and Cloud
Computing (UCC), 2012 IEEE Fifth International
Conference on. IEEE, 2012.
[2] J. Yuan and S. Yu, “Secure and constant cost public
cloud storage auditing with deduplication,” in IEEE
Conference on Communications and Network
Security (CNS), 2013, pp. 145–153.
[3] S. Halevi, D. Harnik, B. Pinkas, and A. Shulman-
Peleg, “Proofs of ownership in remote storage
systems,” in Proceedings of the 18th ACM
Conference on Computer and Communications
Security. ACM, 2011, pp. 491–500.
[4] S. Keelveedhi, M. Bellare, and T. Ristenpart,
“Dupless: Server aided encryption for DE duplicated
storage,” in Proceedings of the 22Nd USENIX
Conference on Security, ser. SEC’13. Washington,
D.C.:
USENIXAssociation,2013,pp.179194.[Online].Avail
able:https://www.usenix.org/conference/usenixsecur
ity13/technicalsessions/presentation/ bellare.
[5] G. Ateniese, R. Burns, R. Curtmola, J. Herring, L.
Kissner,Z. Peterson, and D. Song, “Provable data
possession at untrusted stores,” in Proceedings of the
14th ACM Conference on Computer and
Communications Security,ser. CCS ’07. New York,
NY, USA: ACM, 2007, pp. 598– 609.
[6] G. Ateniese, R. Burns, R. Curtmola, J. Herring, O.
Khan,L. Kissner, Z. Peterson, and D. Song, “Remote
data checkingusing provable data possession,” ACM
Trans. Inf. Syst.Secur., vol. 14, no. 1, pp. 12:1–
12:34, 2011.
[7] G. Ateniese, R. Di Pietro, L. V. Mancini, and G.
Tsudik, “Scalable and efficient provable data
possession,” in Proceedings of the 4th International
Conference on Security and Privacy in
Communication Networks, ser. SecureComm ’08.
New York, NY, USA: ACM, 2008, pp. 9:1–9:10. 8.
C. Erway, A. K ̈upc ̧ ̈u, C. Papamanthou, and
R.Tamassia, “Dynamic provable data possession,” in
Proceedings of the 16th ACM Conference on
Computer and Communications Security, ser. CCS
’09. New York, NY, USA: ACM, 2009, pp. 213–
222.
[8] F. Seb ́e, J. Domingo-Ferrer, A. Martinez-Balleste,
Y.Deswarte, and J.-J. Quisquater, “Efficient remote
data © 2015, IRJET ISO 9001:2008 Certified
Journal Page 653 International Research Journal of
Engineering and Technology (IRJET) e-ISSN: 2395-
0056 Volume: 02 Issue: 09 | Dec-2015 www.irjet.net
p-ISSN: 2395-0072.
[9] J. Li, X. Chen, M. Li, J. Li, P. Lee, and W. Lou,
“Secure deduplication with efficient and reliable
convergent key management,” IEEE Transactions on
Parallel and Distributed Systems, vol. 25, no. 6, pp.
1615–1625, June2014.

More Related Content

What's hot

DATA PROVENENCE IN PUBLIC CLOUD
DATA PROVENENCE IN PUBLIC CLOUDDATA PROVENENCE IN PUBLIC CLOUD
DATA PROVENENCE IN PUBLIC CLOUDijsrd.com
 
A Hybrid Cloud Approach for Secure Authorized De-Duplication
A Hybrid Cloud Approach for Secure Authorized De-DuplicationA Hybrid Cloud Approach for Secure Authorized De-Duplication
A Hybrid Cloud Approach for Secure Authorized De-DuplicationEditor IJMTER
 
A Novel Method of Directly Auditing Integrity On Encrypted Data
A Novel Method of Directly Auditing Integrity On Encrypted DataA Novel Method of Directly Auditing Integrity On Encrypted Data
A Novel Method of Directly Auditing Integrity On Encrypted DataIRJET Journal
 
A Hybrid Cloud Approach for Secure Authorized Deduplication
A Hybrid Cloud Approach for Secure Authorized DeduplicationA Hybrid Cloud Approach for Secure Authorized Deduplication
A Hybrid Cloud Approach for Secure Authorized Deduplication1crore projects
 
A hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplicationA hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplicationTmks Infotech
 
Hybrid Cloud Approach for Secure Authorized Deduplication
Hybrid Cloud Approach for Secure Authorized DeduplicationHybrid Cloud Approach for Secure Authorized Deduplication
Hybrid Cloud Approach for Secure Authorized DeduplicationPrem Rao
 
Survey on Data Security with Time Constraint in Clouds
Survey on Data Security with Time Constraint in CloudsSurvey on Data Security with Time Constraint in Clouds
Survey on Data Security with Time Constraint in CloudsIRJET Journal
 
A hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplicationA hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplicationPvrtechnologies Nellore
 
A Hybrid Cloud Approach for Secure Authorized Deduplication
A Hybrid Cloud Approach for Secure Authorized DeduplicationA Hybrid Cloud Approach for Secure Authorized Deduplication
A Hybrid Cloud Approach for Secure Authorized DeduplicationSWAMI06
 
Secure distributed deduplication systems with improved reliability
Secure distributed deduplication systems with improved reliabilitySecure distributed deduplication systems with improved reliability
Secure distributed deduplication systems with improved reliabilityPvrtechnologies Nellore
 
IRJET - Confidential Image De-Duplication in Cloud Storage
IRJET - Confidential Image De-Duplication in Cloud StorageIRJET - Confidential Image De-Duplication in Cloud Storage
IRJET - Confidential Image De-Duplication in Cloud StorageIRJET Journal
 
An Auditing Protocol for Protected Data Storage in Cloud Computing
An Auditing Protocol for Protected Data Storage in Cloud ComputingAn Auditing Protocol for Protected Data Storage in Cloud Computing
An Auditing Protocol for Protected Data Storage in Cloud Computingijceronline
 
Secure distributed deduplication systems with improved reliability 2
Secure distributed deduplication systems with improved reliability 2Secure distributed deduplication systems with improved reliability 2
Secure distributed deduplication systems with improved reliability 2Rishikesh Pathak
 
A hybrid cloud approach for secure authorized deduplication.
A hybrid cloud approach for secure authorized deduplication.A hybrid cloud approach for secure authorized deduplication.
A hybrid cloud approach for secure authorized deduplication.prudhvikumar madithati
 
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...ijsrd.com
 
DATA SECURITY IN CLOUD USING BLOWFISH ALGORITHM
DATA SECURITY IN CLOUD USING BLOWFISH ALGORITHMDATA SECURITY IN CLOUD USING BLOWFISH ALGORITHM
DATA SECURITY IN CLOUD USING BLOWFISH ALGORITHMijsrd.com
 
IRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
IRJET- Improving Data Spillage in Multi-Cloud Capacity AdministrationIRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
IRJET- Improving Data Spillage in Multi-Cloud Capacity AdministrationIRJET Journal
 

What's hot (19)

DATA PROVENENCE IN PUBLIC CLOUD
DATA PROVENENCE IN PUBLIC CLOUDDATA PROVENENCE IN PUBLIC CLOUD
DATA PROVENENCE IN PUBLIC CLOUD
 
A Hybrid Cloud Approach for Secure Authorized De-Duplication
A Hybrid Cloud Approach for Secure Authorized De-DuplicationA Hybrid Cloud Approach for Secure Authorized De-Duplication
A Hybrid Cloud Approach for Secure Authorized De-Duplication
 
A Novel Method of Directly Auditing Integrity On Encrypted Data
A Novel Method of Directly Auditing Integrity On Encrypted DataA Novel Method of Directly Auditing Integrity On Encrypted Data
A Novel Method of Directly Auditing Integrity On Encrypted Data
 
An4201262267
An4201262267An4201262267
An4201262267
 
A Hybrid Cloud Approach for Secure Authorized Deduplication
A Hybrid Cloud Approach for Secure Authorized DeduplicationA Hybrid Cloud Approach for Secure Authorized Deduplication
A Hybrid Cloud Approach for Secure Authorized Deduplication
 
A hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplicationA hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplication
 
Hybrid Cloud Approach for Secure Authorized Deduplication
Hybrid Cloud Approach for Secure Authorized DeduplicationHybrid Cloud Approach for Secure Authorized Deduplication
Hybrid Cloud Approach for Secure Authorized Deduplication
 
Survey on Data Security with Time Constraint in Clouds
Survey on Data Security with Time Constraint in CloudsSurvey on Data Security with Time Constraint in Clouds
Survey on Data Security with Time Constraint in Clouds
 
Ppt 1
Ppt 1Ppt 1
Ppt 1
 
A hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplicationA hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplication
 
A Hybrid Cloud Approach for Secure Authorized Deduplication
A Hybrid Cloud Approach for Secure Authorized DeduplicationA Hybrid Cloud Approach for Secure Authorized Deduplication
A Hybrid Cloud Approach for Secure Authorized Deduplication
 
Secure distributed deduplication systems with improved reliability
Secure distributed deduplication systems with improved reliabilitySecure distributed deduplication systems with improved reliability
Secure distributed deduplication systems with improved reliability
 
IRJET - Confidential Image De-Duplication in Cloud Storage
IRJET - Confidential Image De-Duplication in Cloud StorageIRJET - Confidential Image De-Duplication in Cloud Storage
IRJET - Confidential Image De-Duplication in Cloud Storage
 
An Auditing Protocol for Protected Data Storage in Cloud Computing
An Auditing Protocol for Protected Data Storage in Cloud ComputingAn Auditing Protocol for Protected Data Storage in Cloud Computing
An Auditing Protocol for Protected Data Storage in Cloud Computing
 
Secure distributed deduplication systems with improved reliability 2
Secure distributed deduplication systems with improved reliability 2Secure distributed deduplication systems with improved reliability 2
Secure distributed deduplication systems with improved reliability 2
 
A hybrid cloud approach for secure authorized deduplication.
A hybrid cloud approach for secure authorized deduplication.A hybrid cloud approach for secure authorized deduplication.
A hybrid cloud approach for secure authorized deduplication.
 
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
 
DATA SECURITY IN CLOUD USING BLOWFISH ALGORITHM
DATA SECURITY IN CLOUD USING BLOWFISH ALGORITHMDATA SECURITY IN CLOUD USING BLOWFISH ALGORITHM
DATA SECURITY IN CLOUD USING BLOWFISH ALGORITHM
 
IRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
IRJET- Improving Data Spillage in Multi-Cloud Capacity AdministrationIRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
IRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
 

Similar to an enhanced multi layered cryptosystem based secure

A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD ...
A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD ...A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD ...
A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD ...nexgentechnology
 
Secure auditing and deduplicating data in cloud
Secure auditing and deduplicating data in cloudSecure auditing and deduplicating data in cloud
Secure auditing and deduplicating data in cloudnexgentech15
 
EXPLORING WOMEN SECURITY BY DEDUPLICATION OF DATA
EXPLORING WOMEN SECURITY BY DEDUPLICATION OF DATAEXPLORING WOMEN SECURITY BY DEDUPLICATION OF DATA
EXPLORING WOMEN SECURITY BY DEDUPLICATION OF DATAIRJET Journal
 
Enabling Public Audit Ability and Data Dynamics for Storage Security in Clou...
Enabling Public Audit Ability and Data Dynamics for Storage  Security in Clou...Enabling Public Audit Ability and Data Dynamics for Storage  Security in Clou...
Enabling Public Audit Ability and Data Dynamics for Storage Security in Clou...IOSR Journals
 
SecCloudPro: A Novel Secure Cloud Storage System for Auditing and Deduplication
SecCloudPro: A Novel Secure Cloud Storage System for Auditing and DeduplicationSecCloudPro: A Novel Secure Cloud Storage System for Auditing and Deduplication
SecCloudPro: A Novel Secure Cloud Storage System for Auditing and DeduplicationIJCERT
 
Providing Secure Cloud for College Campus
Providing Secure Cloud for College CampusProviding Secure Cloud for College Campus
Providing Secure Cloud for College Campusvivatechijri
 
Improving Data Storage Security in Cloud using Hadoop
Improving Data Storage Security in Cloud using HadoopImproving Data Storage Security in Cloud using Hadoop
Improving Data Storage Security in Cloud using HadoopIJERA Editor
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Cooperative Schedule Data Possession for Integrity Verification in Multi-Clou...
Cooperative Schedule Data Possession for Integrity Verification in Multi-Clou...Cooperative Schedule Data Possession for Integrity Verification in Multi-Clou...
Cooperative Schedule Data Possession for Integrity Verification in Multi-Clou...IJMER
 
Privacy and Integrity Preserving in Cloud Storage Devices
Privacy and Integrity Preserving in Cloud Storage DevicesPrivacy and Integrity Preserving in Cloud Storage Devices
Privacy and Integrity Preserving in Cloud Storage DevicesIOSR Journals
 
An Optimal Cooperative Provable Data Possession Scheme for Distributed Cloud ...
An Optimal Cooperative Provable Data Possession Scheme for Distributed Cloud ...An Optimal Cooperative Provable Data Possession Scheme for Distributed Cloud ...
An Optimal Cooperative Provable Data Possession Scheme for Distributed Cloud ...IJMER
 
Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud StoragePrivacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage1crore projects
 
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud ComputingDistributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud ComputingAIRCC Publishing Corporation
 
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGAIRCC Publishing Corporation
 
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGijcsit
 
Bio-Cryptography Based Secured Data Replication Management in Cloud Storage
Bio-Cryptography Based Secured Data Replication Management in Cloud StorageBio-Cryptography Based Secured Data Replication Management in Cloud Storage
Bio-Cryptography Based Secured Data Replication Management in Cloud StorageIJERA Editor
 
Dynamic Resource Allocation and Data Security for Cloud
Dynamic Resource Allocation and Data Security for CloudDynamic Resource Allocation and Data Security for Cloud
Dynamic Resource Allocation and Data Security for CloudAM Publications
 

Similar to an enhanced multi layered cryptosystem based secure (20)

A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD ...
A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD ...A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD ...
A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD ...
 
Secure auditing and deduplicating data in cloud
Secure auditing and deduplicating data in cloudSecure auditing and deduplicating data in cloud
Secure auditing and deduplicating data in cloud
 
EXPLORING WOMEN SECURITY BY DEDUPLICATION OF DATA
EXPLORING WOMEN SECURITY BY DEDUPLICATION OF DATAEXPLORING WOMEN SECURITY BY DEDUPLICATION OF DATA
EXPLORING WOMEN SECURITY BY DEDUPLICATION OF DATA
 
H1803035056
H1803035056H1803035056
H1803035056
 
Enabling Public Audit Ability and Data Dynamics for Storage Security in Clou...
Enabling Public Audit Ability and Data Dynamics for Storage  Security in Clou...Enabling Public Audit Ability and Data Dynamics for Storage  Security in Clou...
Enabling Public Audit Ability and Data Dynamics for Storage Security in Clou...
 
SecCloudPro: A Novel Secure Cloud Storage System for Auditing and Deduplication
SecCloudPro: A Novel Secure Cloud Storage System for Auditing and DeduplicationSecCloudPro: A Novel Secure Cloud Storage System for Auditing and Deduplication
SecCloudPro: A Novel Secure Cloud Storage System for Auditing and Deduplication
 
Providing Secure Cloud for College Campus
Providing Secure Cloud for College CampusProviding Secure Cloud for College Campus
Providing Secure Cloud for College Campus
 
Improving Data Storage Security in Cloud using Hadoop
Improving Data Storage Security in Cloud using HadoopImproving Data Storage Security in Cloud using Hadoop
Improving Data Storage Security in Cloud using Hadoop
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Fs2510501055
Fs2510501055Fs2510501055
Fs2510501055
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Cooperative Schedule Data Possession for Integrity Verification in Multi-Clou...
Cooperative Schedule Data Possession for Integrity Verification in Multi-Clou...Cooperative Schedule Data Possession for Integrity Verification in Multi-Clou...
Cooperative Schedule Data Possession for Integrity Verification in Multi-Clou...
 
Privacy and Integrity Preserving in Cloud Storage Devices
Privacy and Integrity Preserving in Cloud Storage DevicesPrivacy and Integrity Preserving in Cloud Storage Devices
Privacy and Integrity Preserving in Cloud Storage Devices
 
An Optimal Cooperative Provable Data Possession Scheme for Distributed Cloud ...
An Optimal Cooperative Provable Data Possession Scheme for Distributed Cloud ...An Optimal Cooperative Provable Data Possession Scheme for Distributed Cloud ...
An Optimal Cooperative Provable Data Possession Scheme for Distributed Cloud ...
 
Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud StoragePrivacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
 
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud ComputingDistributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
 
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
 
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
 
Bio-Cryptography Based Secured Data Replication Management in Cloud Storage
Bio-Cryptography Based Secured Data Replication Management in Cloud StorageBio-Cryptography Based Secured Data Replication Management in Cloud Storage
Bio-Cryptography Based Secured Data Replication Management in Cloud Storage
 
Dynamic Resource Allocation and Data Security for Cloud
Dynamic Resource Allocation and Data Security for CloudDynamic Resource Allocation and Data Security for Cloud
Dynamic Resource Allocation and Data Security for Cloud
 

Recently uploaded

(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...roncy bisnoi
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college projectTonystark477637
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...ranjana rawat
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduitsrknatarajan
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 

Recently uploaded (20)

DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 

an enhanced multi layered cryptosystem based secure

  • 1. International Journal of Advanced Engineering, Management and Science (IJAEMS) [Vol-3, Issue-4, Apr- 2017] https://dx.doi.org/10.24001/ijaems.3.4.12 ISSN: 2454-1311 www.ijaems.com Page | 355 An Enhanced Multi-Layered Cryptosystem Based Secure and Authorized auditing deduplication Model in Cloud Storage System K. Mamatha1 , D.Nandini2 , K. Raja Manohar Reddy3 Dept. of IT, Lakireddy Balireddy College of Engineering, Andhra Pradesh, India Abstract— As the cloud computing technology develops during the recent days, outsourcing data to cloud service for storage becomes an attractive trend, which benefits in sparing efforts on heavy data maintenance and management. Nevertheless, since the outsourced cloud storage is not fully trustworthy, it raises security concerns on how to realize data deduplication in cloud while achieving integrity auditing. In this work, we study the problem of integrity auditing and secure deduplication on cloud data. Specifically, willing achieving both data integrity and deduplication in cloud, we propose two secure systems, namely SecCloud and SecCloud. SecCloud introduces an auditing entity with maintenance of a Map Reduce cloud, which helps clients generate data tags before uploading still audit the integrity of data having been stored in cloud. Compared with previous work, the computation by user in SecCloud is greatly reduced during the file uploading and auditing phases. SecCloud is designed motivated individually fact that customers always must encrypt their data before uploading, and enables integrity auditing and secure deduplication on encrypted data. Keywords—cloud storage, data deduplication, secure auditing, proof of ownership protocol, Proof of retrievability, proof of ownership. I. INTRODUCTION As the cloud computing technology develops around the continue decade, outsourcing story to cloud enrollment for computerized information becomes an bright trend, which benefits in sparing efforts on chief disclosure reprieve and management. Nevertheless, as a result of the outsourced leave in the shade storage is not far trustworthy, it raises stake concerns on at which point to notice front page new de-duplication in outweigh interim achieving moral auditing. In this employment, we design the stoppage of moral auditing and win de-duplication on dwarf data. Specifically, determined achieving both data principle and de-duplication in cloud, we propose two secure systems, namely Sec-Cloud and Sec-Cloud. Sec- Cloud introduces an auditing entity by the whole of maintenance of a Map Reduce cloud, which helps clients arouse data tags once uploading as abundantly as audit the integrity of data having been collected in cloud. Compared mutually previous function, the computation by addict in Sec-Cloud is profoundly reduced around the file uploading and auditing phases. Sec-Cloud is designed motivated by the rundown that customers eternally want to encrypt their data earlier uploading, and enables integrity auditing and achieve de-duplication on encrypted data. Cloud storage systems are becoming increasingly popular. A promising technology that keeps their cost down is deduplication.More specifically, an attacker who knows the hash signature of a file can convince the storage service that it owns that file; hence the server lets the attacker download the entire file. .Data security is also challenge in the cloud server. II. RELATED WORK The definition of demonstrable knowledge possession (PDP) was introduced by Ateniese et al. [5][6] for reassuring that the cloud servers possess the target files while not retrieving or downloading the total knowledge. Basically, PDP may be a probabilistic proof protocol by sampling a random set of blocks and asking the servers to prove that they precisely possess these blocks, and also the admirer solely maintaining a little quantity of information is in a position to perform the integrity checking. when Ateniese et al.’s proposal [5], many works involved directed understand PDP on dynamic scenario: Ateniese et al. [7] planned a dynamic PDP schema however while not insertion operation; Erway et al. [8] improved Ateniese et al.’s work [7] and supported insertion by introducing documented flip table; an identical work has additionally been contributed in [9]. However, these proposals [5][7][8][9] receive the machine overhead for tag generation at the consumer. To mend this issue, Wang et al. [10] planned proxy PDP publicly clouds. Zhu et al. [11] planned the cooperative PDP in multi-cloud storage. Another line of labor supporting integrity auditing is proof of retrievability
  • 2. International Journal of Advanced Engineering, Management and Science (IJAEMS) [Vol-3, Issue-4, Apr- 2017] https://dx.doi.org/10.24001/ijaems.3.4.12 ISSN: 2454-1311 www.ijaems.com Page | 356 (POR) [12]. Compared with PDP, POR not just assures the cloud servers possess the target files, however additionally guarantees their full recovery. In [12], purchasers apply erasure codes and generate authenticators for every block for verifiability and retrievability. So aside realize economical knowledge dynamics, Wang et al. [13] improved the POR model by manipulating languages Merkle hash tree construction for block tag authentication. Xu and Yangtze River [14] planned to enhance the POR schema in [12] with polynomial commitment for reducing communication value. Stefanov et al. [15] proposed a POR protocol over authenticated file system if frequent changes. Azraoui et al. [16] combined the privacy-preserving word search algorithm with the insertion in data segments of randomly generated short bit sequences, and developed a new POR protocol. Li et al. [17] considered a new cloud storage architecture with two independent cloud servers for integrity auditing to reduce the computation load at client side. Recently, Li et al. [18] utilized the key-disperse paradigm to fix the issue of a significant number of convergent compute convergent encryption. B. Secure Deduplication Deduplication is a technique where the server stores only a single copy of each file, nevertheless how many clients asked to store that file, such that the disk space of cloud servers likewise network bandwidth are saved. However, trivial client side deduplication accelerate the leakage of side channel information. For example, a server telling a client full need not send the file reveals that that client has the exact same file, which perchance sensitive information in some case. In order to restrict the leakage of side channel information, Halevi et al. [3] introduced the proof of ownership protocol which lets a client efficiently prove to a server that that the client exactly holds this file. Several proof of ownership protocols based on the Merkle hash tree are proposed [3] to enable secure client-side deduplication. Pietro and Sorniotti [19] proposed an efficient proof of ownership scheme by choosing the projection of a file onto some randomly selected bit-positions as the file proof. Another career for secure deduplication dig the confidentiality of DE duplicated data and considers to make deduplication on encrypted data. Ng et al. [20] firstly introduced the private data deduplication as a complement of public data deduplication protocols of Halevi et al. [3]. Convergent encryption [21] is a promising cryptographic primitive for ensuring data privacy in deduplication. Bellare et al. [22] formalized this primitive as message-locked encryption, and explored its application in space-efficient secure outsourced storage. Abadi et al. [23] further strengthened Bellare et AL’s security definitions [22] by considering plaintext distributions so anticipate the public parameters of the schemas. Regarding the practical implementation of convergent encryption for securing deduplication, Keelveedhi et al. [4] designed the Dupless system anywhere clients encrypt under file-based keys derived from a key server via an oblivious pseudorandom function protocol. As stated before, all the works illustrated above considers either integrity auditing or deduplication, while in this paper, we attempt to solve both problems simultaneously. Additionally, it's worth noting that our work is additionally distinguished with [2] that audits cloud knowledge with deduplication, as we have a tendency to additionally envisage to 1) source the computation of tag generation, 2) audit and DE duplicate encrypted knowledge within the planned protocols. III. SYSTEM MODEL 1. User: It is nothing but cloud clientswhen a client wants to store a huge data they rely on cloud for maintenance and computation 2. Cloud server: It virtualizes theresources based on the client’s requirements and expose them as storage pools 3. Auditors: Which helps clients to upload and maintains their data and acts like a certificate authority. Auditor is associated with pair of public and private keys and public key is made available. Fig: System architecture IV. PROPOSED WORK In this project, aiming at achieving data integrity and deduplication in cloud, we propose two secure systems namely SecCloud and SecCloud+.SecCloud introduces an auditing entity with maintenance of a MapReduce cloud, which helps clients generate data tags before uploading as well as audit integrity of data having been stored in cloud.Besides supporting integrity auditing and secure deduplication, SecCloud+ enables the guarantee of file confidentiality.We propose a method of directly auditing integrity on encrypted data.
  • 3. International Journal of Advanced Engineering, Management and Science (IJAEMS) [Vol-3, Issue-4, Apr- 2017] https://dx.doi.org/10.24001/ijaems.3.4.12 ISSN: 2454-1311 www.ijaems.com Page | 357 V. PERORMANCE EVALUTION Fig: Performance Analysis In this performance analysis graph we show the relationship between the files and their time to upload in server. In this above graph, we consider the size of the file on x-axis and time on y-axis from 0 to infinity these values will change dynamically based on the time. If the file size is small the uploading time is less. If the file size is huge then it takes more amount of time to upload file into server. Based on the size of the files only the uploading time will be depended. VI. CONCLUSION We are focusing to achieve both data integrity and data de-duplication in cloud, we propose SecCloud and SecCloud+. SecCloud introduce an auditing entity with maintenance of a Map Reduce cloud, which helps the clients to generate data tags before uploading and audit the integrity of data having been stored in cloud. In addition, SecCloud enables secure de-duplication by introducing a Proof of Ownership protocol (POP) and preventing the leakage of side channel information in de- duplication. We compared with the existing work; the computation by user in SecCloud is greatly reduced during the file uploading and auditing phases. Sec - Cloud+ is an advanced construction motivated by the fact that customers always want their data to be encrypted before uploading, and allows for integrity auditing as well as secure de-duplication directly on encrypted data. REFERENCES [1] Imai, Shigeru, Thomas Chestna, and Carlos A. Varela. "Elastic scalable cloud computing using application-level migration." Utility and Cloud Computing (UCC), 2012 IEEE Fifth International Conference on. IEEE, 2012. [2] J. Yuan and S. Yu, “Secure and constant cost public cloud storage auditing with deduplication,” in IEEE Conference on Communications and Network Security (CNS), 2013, pp. 145–153. [3] S. Halevi, D. Harnik, B. Pinkas, and A. Shulman- Peleg, “Proofs of ownership in remote storage systems,” in Proceedings of the 18th ACM Conference on Computer and Communications Security. ACM, 2011, pp. 491–500. [4] S. Keelveedhi, M. Bellare, and T. Ristenpart, “Dupless: Server aided encryption for DE duplicated storage,” in Proceedings of the 22Nd USENIX Conference on Security, ser. SEC’13. Washington, D.C.: USENIXAssociation,2013,pp.179194.[Online].Avail able:https://www.usenix.org/conference/usenixsecur ity13/technicalsessions/presentation/ bellare. [5] G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner,Z. Peterson, and D. Song, “Provable data possession at untrusted stores,” in Proceedings of the 14th ACM Conference on Computer and Communications Security,ser. CCS ’07. New York, NY, USA: ACM, 2007, pp. 598– 609. [6] G. Ateniese, R. Burns, R. Curtmola, J. Herring, O. Khan,L. Kissner, Z. Peterson, and D. Song, “Remote data checkingusing provable data possession,” ACM Trans. Inf. Syst.Secur., vol. 14, no. 1, pp. 12:1– 12:34, 2011. [7] G. Ateniese, R. Di Pietro, L. V. Mancini, and G. Tsudik, “Scalable and efficient provable data possession,” in Proceedings of the 4th International Conference on Security and Privacy in Communication Networks, ser. SecureComm ’08. New York, NY, USA: ACM, 2008, pp. 9:1–9:10. 8. C. Erway, A. K ̈upc ̧ ̈u, C. Papamanthou, and R.Tamassia, “Dynamic provable data possession,” in Proceedings of the 16th ACM Conference on Computer and Communications Security, ser. CCS ’09. New York, NY, USA: ACM, 2009, pp. 213– 222. [8] F. Seb ́e, J. Domingo-Ferrer, A. Martinez-Balleste, Y.Deswarte, and J.-J. Quisquater, “Efficient remote data © 2015, IRJET ISO 9001:2008 Certified Journal Page 653 International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395- 0056 Volume: 02 Issue: 09 | Dec-2015 www.irjet.net p-ISSN: 2395-0072. [9] J. Li, X. Chen, M. Li, J. Li, P. Lee, and W. Lou, “Secure deduplication with efficient and reliable convergent key management,” IEEE Transactions on Parallel and Distributed Systems, vol. 25, no. 6, pp. 1615–1625, June2014.