SlideShare a Scribd company logo
Suche senden
Hochladen
IRJET - A Secure Access Policies based on Data Deduplication System
Melden
Teilen
IRJET Journal
Fast Track Publications
Folgen
•
0 gefällt mir
•
8 views
Ingenieurwesen
https://irjet.net/archives/V7/i2/IRJET-V7I2680.pdf
Mehr lesen
IRJET - A Secure Access Policies based on Data Deduplication System
•
0 gefällt mir
•
8 views
IRJET Journal
Fast Track Publications
Folgen
Melden
Teilen
Ingenieurwesen
https://irjet.net/archives/V7/i2/IRJET-V7I2680.pdf
Mehr lesen
IRJET - A Secure Access Policies based on Data Deduplication System
1 von 3
Jetzt herunterladen
Recomendados
An efficient, secure deduplication data storing in cloud storage environment von
An efficient, secure deduplication data storing in cloud storage environment
eSAT Journals
134 views
•
4 Folien
El35782786 von
El35782786
IJERA Editor
190 views
•
5 Folien
Enabling Integrity for the Compressed Files in Cloud Server von
Enabling Integrity for the Compressed Files in Cloud Server
IOSR Journals
348 views
•
5 Folien
Hybrid Cloud Approach for Secure Authorized Deduplication von
Hybrid Cloud Approach for Secure Authorized Deduplication
Prem Rao
1.9K views
•
52 Folien
International Journal of Computational Engineering Research(IJCER) von
International Journal of Computational Engineering Research(IJCER)
ijceronline
275 views
•
5 Folien
IRJET- Secured Hadoop Environment von
IRJET- Secured Hadoop Environment
IRJET Journal
28 views
•
8 Folien
Más contenido relacionado
Was ist angesagt?
A Hybrid Cloud Approach for Secure Authorized Deduplication von
A Hybrid Cloud Approach for Secure Authorized Deduplication
1crore projects
369 views
•
11 Folien
L018137479 von
L018137479
IOSR Journals
191 views
•
6 Folien
Secure distributed deduplication systems with improved reliability von
Secure distributed deduplication systems with improved reliability
Pvrtechnologies Nellore
638 views
•
9 Folien
IRJET- Secure Data Deduplication for Cloud Server using HMAC Algorithm von
IRJET- Secure Data Deduplication for Cloud Server using HMAC Algorithm
IRJET Journal
32 views
•
4 Folien
IRJET- Cloud based Deduplication using Middleware Approach von
IRJET- Cloud based Deduplication using Middleware Approach
IRJET Journal
20 views
•
7 Folien
Doc A hybrid cloud approach for secure authorized deduplication von
Doc A hybrid cloud approach for secure authorized deduplication
Shakas Technologie
4.2K views
•
12 Folien
Was ist angesagt?
(19)
A Hybrid Cloud Approach for Secure Authorized Deduplication von 1crore projects
A Hybrid Cloud Approach for Secure Authorized Deduplication
1crore projects
•
369 views
L018137479 von IOSR Journals
L018137479
IOSR Journals
•
191 views
Secure distributed deduplication systems with improved reliability von Pvrtechnologies Nellore
Secure distributed deduplication systems with improved reliability
Pvrtechnologies Nellore
•
638 views
IRJET- Secure Data Deduplication for Cloud Server using HMAC Algorithm von IRJET Journal
IRJET- Secure Data Deduplication for Cloud Server using HMAC Algorithm
IRJET Journal
•
32 views
IRJET- Cloud based Deduplication using Middleware Approach von IRJET Journal
IRJET- Cloud based Deduplication using Middleware Approach
IRJET Journal
•
20 views
Doc A hybrid cloud approach for secure authorized deduplication von Shakas Technologie
Doc A hybrid cloud approach for secure authorized deduplication
Shakas Technologie
•
4.2K views
The DDS Security Standard von Angelo Corsaro
The DDS Security Standard
Angelo Corsaro
•
1K views
SECURE AUDITING AND DEDUPLICATING DATA IN CLOUD von Nexgen Technology
SECURE AUDITING AND DEDUPLICATING DATA IN CLOUD
Nexgen Technology
•
3.8K views
A hybrid cloud approach for secure authorized deduplication von Pvrtechnologies Nellore
A hybrid cloud approach for secure authorized deduplication
Pvrtechnologies Nellore
•
292 views
A Hybrid Cloud Approach for Secure Authorized De-Duplication von Editor IJMTER
A Hybrid Cloud Approach for Secure Authorized De-Duplication
Editor IJMTER
•
490 views
Block-Level Message-Locked Encryption for Secure Large File De-duplication von IRJET Journal
Block-Level Message-Locked Encryption for Secure Large File De-duplication
IRJET Journal
•
40 views
IRJET- Cross User Bigdata Deduplication von IRJET Journal
IRJET- Cross User Bigdata Deduplication
IRJET Journal
•
15 views
E031102034039 von theijes
E031102034039
theijes
•
304 views
Secure distributed deduplication systems with improved reliability 2 von Rishikesh Pathak
Secure distributed deduplication systems with improved reliability 2
Rishikesh Pathak
•
583 views
iaetsd Controlling data deuplication in cloud storage von Iaetsd Iaetsd
iaetsd Controlling data deuplication in cloud storage
Iaetsd Iaetsd
•
95 views
An4201262267 von IJERA Editor
An4201262267
IJERA Editor
•
386 views
An Auditing Protocol for Protected Data Storage in Cloud Computing von ijceronline
An Auditing Protocol for Protected Data Storage in Cloud Computing
ijceronline
•
69 views
An Optimal Cooperative Provable Data Possession Scheme for Distributed Cloud ... von IJMER
An Optimal Cooperative Provable Data Possession Scheme for Distributed Cloud ...
IJMER
•
411 views
SECRY - Secure file storage on cloud using hybrid cryptography von ALIN BABU
SECRY - Secure file storage on cloud using hybrid cryptography
ALIN BABU
•
2.1K views
Similar a IRJET - A Secure Access Policies based on Data Deduplication System
Implementation of De-Duplication Algorithm von
Implementation of De-Duplication Algorithm
IRJET Journal
31 views
•
5 Folien
Hasbe a hierarchical attribute based solution for flexible and scalable acces... von
Hasbe a hierarchical attribute based solution for flexible and scalable acces...
JPINFOTECH JAYAPRAKASH
1.1K views
•
14 Folien
H017144148 von
H017144148
IOSR Journals
118 views
•
8 Folien
Comparative Analysis, Security Aspects & Optimization of Workload in Gfs Base... von
Comparative Analysis, Security Aspects & Optimization of Workload in Gfs Base...
IOSR Journals
158 views
•
8 Folien
IJSRED-V2I2P10 von
IJSRED-V2I2P10
IJSRED
12 views
•
2 Folien
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC von
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET Journal
36 views
•
3 Folien
Similar a IRJET - A Secure Access Policies based on Data Deduplication System
(20)
Implementation of De-Duplication Algorithm von IRJET Journal
Implementation of De-Duplication Algorithm
IRJET Journal
•
31 views
Hasbe a hierarchical attribute based solution for flexible and scalable acces... von JPINFOTECH JAYAPRAKASH
Hasbe a hierarchical attribute based solution for flexible and scalable acces...
JPINFOTECH JAYAPRAKASH
•
1.1K views
H017144148 von IOSR Journals
H017144148
IOSR Journals
•
118 views
Comparative Analysis, Security Aspects & Optimization of Workload in Gfs Base... von IOSR Journals
Comparative Analysis, Security Aspects & Optimization of Workload in Gfs Base...
IOSR Journals
•
158 views
IJSRED-V2I2P10 von IJSRED
IJSRED-V2I2P10
IJSRED
•
12 views
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC von IRJET Journal
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET Journal
•
36 views
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC von IRJET Journal
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET Journal
•
25 views
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)... von dbpublications
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
dbpublications
•
57 views
IRJET- An Integrity Auditing &Data Dedupe withEffective Bandwidth in Cloud St... von IRJET Journal
IRJET- An Integrity Auditing &Data Dedupe withEffective Bandwidth in Cloud St...
IRJET Journal
•
20 views
Presentation on cloud computing security issues using HADOOP and HDFS ARCHITE... von Pushpa
Presentation on cloud computing security issues using HADOOP and HDFS ARCHITE...
Pushpa
•
2.5K views
IRJET- A Survey on File Storage and Retrieval using Blockchain Technology von IRJET Journal
IRJET- A Survey on File Storage and Retrieval using Blockchain Technology
IRJET Journal
•
52 views
IRJET- Adaptable Wildcard Searchable Encryption System von IRJET Journal
IRJET- Adaptable Wildcard Searchable Encryption System
IRJET Journal
•
11 views
A cloud enviroment for backup and data storage von IGEEKS TECHNOLOGIES
A cloud enviroment for backup and data storage
IGEEKS TECHNOLOGIES
•
837 views
Data Sharing: Ensure Accountability Distribution in the Cloud von Suraj Mehta
Data Sharing: Ensure Accountability Distribution in the Cloud
Suraj Mehta
•
803 views
IRJET- A Study of Comparatively Analysis for HDFS and Google File System ... von IRJET Journal
IRJET- A Study of Comparatively Analysis for HDFS and Google File System ...
IRJET Journal
•
10 views
A cloud environment for backup and data storage von IGEEKS TECHNOLOGIES
A cloud environment for backup and data storage
IGEEKS TECHNOLOGIES
•
2K views
Distributed Framework for Data Mining As a Service on Private Cloud von IJERA Editor
Distributed Framework for Data Mining As a Service on Private Cloud
IJERA Editor
•
241 views
A robust and verifiable threshold multi authority access control system in pu... von IJARIIT
A robust and verifiable threshold multi authority access control system in pu...
IJARIIT
•
33 views
IRJET - Confidential Image De-Duplication in Cloud Storage von IRJET Journal
IRJET - Confidential Image De-Duplication in Cloud Storage
IRJET Journal
•
11 views
Methodology for Optimizing Storage on Cloud Using Authorized De-Duplication –... von IRJET Journal
Methodology for Optimizing Storage on Cloud Using Authorized De-Duplication –...
IRJET Journal
•
31 views
Más de IRJET Journal
SOIL STABILIZATION USING WASTE FIBER MATERIAL von
SOIL STABILIZATION USING WASTE FIBER MATERIAL
IRJET Journal
20 views
•
7 Folien
Sol-gel auto-combustion produced gamma irradiated Ni1-xCdxFe2O4 nanoparticles... von
Sol-gel auto-combustion produced gamma irradiated Ni1-xCdxFe2O4 nanoparticles...
IRJET Journal
8 views
•
7 Folien
Identification, Discrimination and Classification of Cotton Crop by Using Mul... von
Identification, Discrimination and Classification of Cotton Crop by Using Mul...
IRJET Journal
8 views
•
5 Folien
“Analysis of GDP, Unemployment and Inflation rates using mathematical formula... von
“Analysis of GDP, Unemployment and Inflation rates using mathematical formula...
IRJET Journal
13 views
•
11 Folien
MAXIMUM POWER POINT TRACKING BASED PHOTO VOLTAIC SYSTEM FOR SMART GRID INTEGR... von
MAXIMUM POWER POINT TRACKING BASED PHOTO VOLTAIC SYSTEM FOR SMART GRID INTEGR...
IRJET Journal
14 views
•
6 Folien
Performance Analysis of Aerodynamic Design for Wind Turbine Blade von
Performance Analysis of Aerodynamic Design for Wind Turbine Blade
IRJET Journal
7 views
•
5 Folien
Más de IRJET Journal
(20)
SOIL STABILIZATION USING WASTE FIBER MATERIAL von IRJET Journal
SOIL STABILIZATION USING WASTE FIBER MATERIAL
IRJET Journal
•
20 views
Sol-gel auto-combustion produced gamma irradiated Ni1-xCdxFe2O4 nanoparticles... von IRJET Journal
Sol-gel auto-combustion produced gamma irradiated Ni1-xCdxFe2O4 nanoparticles...
IRJET Journal
•
8 views
Identification, Discrimination and Classification of Cotton Crop by Using Mul... von IRJET Journal
Identification, Discrimination and Classification of Cotton Crop by Using Mul...
IRJET Journal
•
8 views
“Analysis of GDP, Unemployment and Inflation rates using mathematical formula... von IRJET Journal
“Analysis of GDP, Unemployment and Inflation rates using mathematical formula...
IRJET Journal
•
13 views
MAXIMUM POWER POINT TRACKING BASED PHOTO VOLTAIC SYSTEM FOR SMART GRID INTEGR... von IRJET Journal
MAXIMUM POWER POINT TRACKING BASED PHOTO VOLTAIC SYSTEM FOR SMART GRID INTEGR...
IRJET Journal
•
14 views
Performance Analysis of Aerodynamic Design for Wind Turbine Blade von IRJET Journal
Performance Analysis of Aerodynamic Design for Wind Turbine Blade
IRJET Journal
•
7 views
Heart Failure Prediction using Different Machine Learning Techniques von IRJET Journal
Heart Failure Prediction using Different Machine Learning Techniques
IRJET Journal
•
7 views
Experimental Investigation of Solar Hot Case Based on Photovoltaic Panel von IRJET Journal
Experimental Investigation of Solar Hot Case Based on Photovoltaic Panel
IRJET Journal
•
3 views
Metro Development and Pedestrian Concerns von IRJET Journal
Metro Development and Pedestrian Concerns
IRJET Journal
•
2 views
Mapping the Crashworthiness Domains: Investigations Based on Scientometric An... von IRJET Journal
Mapping the Crashworthiness Domains: Investigations Based on Scientometric An...
IRJET Journal
•
3 views
Data Analytics and Artificial Intelligence in Healthcare Industry von IRJET Journal
Data Analytics and Artificial Intelligence in Healthcare Industry
IRJET Journal
•
3 views
DESIGN AND SIMULATION OF SOLAR BASED FAST CHARGING STATION FOR ELECTRIC VEHIC... von IRJET Journal
DESIGN AND SIMULATION OF SOLAR BASED FAST CHARGING STATION FOR ELECTRIC VEHIC...
IRJET Journal
•
52 views
Efficient Design for Multi-story Building Using Pre-Fabricated Steel Structur... von IRJET Journal
Efficient Design for Multi-story Building Using Pre-Fabricated Steel Structur...
IRJET Journal
•
10 views
Development of Effective Tomato Package for Post-Harvest Preservation von IRJET Journal
Development of Effective Tomato Package for Post-Harvest Preservation
IRJET Journal
•
4 views
“DYNAMIC ANALYSIS OF GRAVITY RETAINING WALL WITH SOIL STRUCTURE INTERACTION” von IRJET Journal
“DYNAMIC ANALYSIS OF GRAVITY RETAINING WALL WITH SOIL STRUCTURE INTERACTION”
IRJET Journal
•
5 views
Understanding the Nature of Consciousness with AI von IRJET Journal
Understanding the Nature of Consciousness with AI
IRJET Journal
•
12 views
Augmented Reality App for Location based Exploration at JNTUK Kakinada von IRJET Journal
Augmented Reality App for Location based Exploration at JNTUK Kakinada
IRJET Journal
•
6 views
Smart Traffic Congestion Control System: Leveraging Machine Learning for Urba... von IRJET Journal
Smart Traffic Congestion Control System: Leveraging Machine Learning for Urba...
IRJET Journal
•
18 views
Enhancing Real Time Communication and Efficiency With Websocket von IRJET Journal
Enhancing Real Time Communication and Efficiency With Websocket
IRJET Journal
•
5 views
Textile Industrial Wastewater Treatability Studies by Soil Aquifer Treatment ... von IRJET Journal
Textile Industrial Wastewater Treatability Studies by Soil Aquifer Treatment ...
IRJET Journal
•
4 views
Último
zincalume water storage tank design.pdf von
zincalume water storage tank design.pdf
3D LABS
5 views
•
1 Folie
Codes and Conventions.pptx von
Codes and Conventions.pptx
IsabellaGraceAnkers
8 views
•
5 Folien
Investor Presentation von
Investor Presentation
eser sevinç
25 views
•
26 Folien
MK__Cert.pdf von
MK__Cert.pdf
Hassan Khan
10 views
•
1 Folie
Introduction to CAD-CAM.pptx von
Introduction to CAD-CAM.pptx
suyogpatil49
5 views
•
15 Folien
802.11 Computer Networks von
802.11 Computer Networks
TusharChoudhary72015
10 views
•
33 Folien
Último
(20)
zincalume water storage tank design.pdf von 3D LABS
zincalume water storage tank design.pdf
3D LABS
•
5 views
Codes and Conventions.pptx von IsabellaGraceAnkers
Codes and Conventions.pptx
IsabellaGraceAnkers
•
8 views
Investor Presentation von eser sevinç
Investor Presentation
eser sevinç
•
25 views
MK__Cert.pdf von Hassan Khan
MK__Cert.pdf
Hassan Khan
•
10 views
Introduction to CAD-CAM.pptx von suyogpatil49
Introduction to CAD-CAM.pptx
suyogpatil49
•
5 views
802.11 Computer Networks von TusharChoudhary72015
802.11 Computer Networks
TusharChoudhary72015
•
10 views
Saikat Chakraborty Java Oracle Certificate.pdf von SaikatChakraborty787148
Saikat Chakraborty Java Oracle Certificate.pdf
SaikatChakraborty787148
•
15 views
MSA Website Slideshow (16).pdf von msaucla
MSA Website Slideshow (16).pdf
msaucla
•
68 views
DESIGN OF SPRINGS-UNIT4.pptx von gopinathcreddy
DESIGN OF SPRINGS-UNIT4.pptx
gopinathcreddy
•
19 views
Advances in micro milling: From tool fabrication to process outcomes von Shivendra Nandan
Advances in micro milling: From tool fabrication to process outcomes
Shivendra Nandan
•
7 views
SNMPx von Amatullahbutt
SNMPx
Amatullahbutt
•
17 views
Literature review and Case study on Commercial Complex in Nepal, Durbar mall,... von AakashShakya12
Literature review and Case study on Commercial Complex in Nepal, Durbar mall,...
AakashShakya12
•
72 views
START Newsletter 3 von Start Project
START Newsletter 3
Start Project
•
5 views
Design of machine elements-UNIT 3.pptx von gopinathcreddy
Design of machine elements-UNIT 3.pptx
gopinathcreddy
•
32 views
DevOps-ITverse-2023-IIT-DU.pptx von Anowar Hossain
DevOps-ITverse-2023-IIT-DU.pptx
Anowar Hossain
•
9 views
Proposal Presentation.pptx von keytonallamon
Proposal Presentation.pptx
keytonallamon
•
29 views
2023Dec ASU Wang NETR Group Research Focus and Facility Overview.pptx von lwang78
2023Dec ASU Wang NETR Group Research Focus and Facility Overview.pptx
lwang78
•
53 views
What is Whirling Hygrometer.pdf von IIT KHARAGPUR
What is Whirling Hygrometer.pdf
IIT KHARAGPUR
•
12 views
Final Year Presentation von Comsat Universal Islamabad Wah Campus
Final Year Presentation
Comsat Universal Islamabad Wah Campus
•
7 views
K8S Roadmap.pdf von MaryamTavakkoli2
K8S Roadmap.pdf
MaryamTavakkoli2
•
6 views
IRJET - A Secure Access Policies based on Data Deduplication System
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 02 | Feb 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 3155 A SECURE ACCESS POLICIES BASED ON DATA DEDUPLICATION SYSTEM Gayathri.S1, Ragavi.P2, Srilekha.R3 1Asst Professor, Dept. of Computer Science and Engineering, Jeppiaar SRR Engineering college, Padur. 2,3Final year student, Dept. of Computer Science and Engineering, Jeppiaar SRR Engineering college, Padur. ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Deduplication techniques are used to a back up data on disk and minimize the storage overhead by detecting and eliminating redundancy among data. It is crucial for eliminating duplicate copies of identical data to save storage space and network bandwidth. It presents an attribute-based storage system with secure data deduplication access policies in a hybrid clouds settings, using public cloud and private cloud. Private cloud is used to detect duplication and a public cloud maintains the storage. Instead of keeping data copies in multiple with the similar content, in this system removes surplus data by keeping only one physical copy and referring other redundant data to that copy. User access policies defines each of such copy, the user will upload the file with access policies. Then similar file with the separate access policies are set the particular file to replace the reference. The user’s private key is associated with attribute set and a message is encrypted under an access policy over a set of attributes. The user can decrypt a cipher text with private key if the set of attributes satisfies the accesspolicyassociatedwiththiscipher text. Our system has two advantages. Thetwolevelofchecking file is file level deduplication and signature match checking. It reduced the time and cost in uploading and downloadingwith storage space in Hadoop system. KeyWords: Hadoop Software, Ciphertext, Deduplication, Tomcat. 1. INTRODUCTION Hadoop software library that permits for the distributed processing of huge data setacrossclusterofcomputersusing simple programming models. It is designed to proportion from single server to the thousandofmachines, eachoffering local computation and storage. It makes Use of the commodity hardware Hadoop is very Scalable and Fault Tolerant. This provides resource management and scheduling for user applications; and Hadoop Map Reduce, which provides the programming model used to tacklelarge distributed data processing mapping data and reducing it to a result. Big Data in most companies are processed by Hadoop by submitting the roles to Master. Thistypeofusage is best-suited to highly scalable public cloud services; The Master distributes the job to its cluster and processmapand reduces tasks sequentially. But nowadays the growing data and the competition between Service Providers lead to the increased submission of jobs to the Master. This Concurrent job submission on Hadoop forces us to do Schedule on Hadoop Cluster so that the response time will be acceptable for each job. 2. PROPOSED SYSTEM In this paper, we present an attribute-based storage system, which uses the ciphertext-policy attribute-based encryption (CP-ABE) and to support securededuplication.To enablethe deduplication and distributed storage of the data across HDFS. And then using two way cloudinourstoragesystemis built under a hybrid cloud architecture, where a private cloud manipulates the computation of the user and a public cloud manages the storage. The private cloud is given a trapdoor key related to the corresponding ciphertext, with which it can transfer the ciphertext over one access policy into ciphertexts of the same plaintext under the otheraccess policies without being conscious of the underlyingplaintext. After receiving a storage request from the user, the private cloud first checks the validity of the upload item through the attached proof. If the proof is valid, the private cloud runs a tag matching algorithm to ascertain whether an equivalent data underlying the ciphertext has been stored 3. HARDWARE AND SOFTWARE SPECIFICATION HARDWARE REQUIREMENTS: Hard disk : 500 GB and above. Processor : i3 and above. Ram : 4GB and above. SOFTWARE REQUIREMENTS: Operating System : Windows 7 and above (64-bit). Java Version : JDK 1.7 Web Server :Tomcat 6.20 Web Server :Tomcat 7.0.11 Storage : Hadoop 2.7 4. TECHNOLOGY USED JAVA Cloud Computing JAVA Platform 5. APACHE TOMCAT SERVER Apache Tomcat (formerly under the ApacheJakarta Project; Tomcat is now a top level project) could also be an internet container developed at the Apache Software Foundation. Tomcat implements the servlet and thusthe JSPspecifyfrom Sun Microsystems, providing an environment forJava torun
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 02 | Feb 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 3156 in cooperation with an online server. It adds tools for configuration andmanagement butalsocanbeconfiguredby editing configuration files that are normally XML-formatted. Because Tomcat includes its own HTTP serverinternally,it's also considered a standalone web server. 5.1 Purpose The main aim of this project is to realize newdistributed de- duplication systems we present an attribute-based storage system with secure deduplication during a hybrid cloud setting with higher reliability. 5.2 Project Scope In this Deduplication techniques are employed to backup data and minimize network of the data and storage of an data overhead by detecting and eliminating redundancy among data from the storage area.so which is crucial for eliminating duplicate copies of identical data so as to save lots of space for storing and network bandwidth.Wepresent an attribute-based storage system with secure access policies data deduplication in a hybrid cloud. Where a personal cloud is liable for duplicate detection and a public cloud manages the storage. Instead of keeping multiple data copy with an equivalent content, during the technique eliminate redundant data by keeping only physical copyand referring other redundant datas thereto copy. 6. Algorithms used MD5 algorithm. Base 64. RSA algorithm. 7. SYSTEM DESIGN 7.1 Uploading a File In this module, cloud user first register the user details and then login the user credential details. Once user name and password is valid open the user profile screen are going to be displayed. A user is an entity whowantstooutsourcedata storage to the HDFS Storage and access the info later. A user register to the HDFS storage with necessaryinformationand login the page for uploading the file. User chooses the file of data and uploads to Storage in the given space where the HDFS store the file in rapid storage system and file level deduplication is checked. 7.2 Mastering File to HDFS Storage Tag the file by using MD5 message-digest algorithm is cryptographic hash function producing a 128-bit hash value typically expressed in text format as 32 digit hex value in order that files of same are deduplicated. Chunking the file chosen for the fixed size given of data andgeneratingtags for each blocks chunked. Then generate convergent keys for every blocks split to verify block level deduplication.Provide filename and password for file authorization in future. This Encrypt the blocks by Triple encoding Standard (3DES) algorithm. Here the plain text is encoded triple times with convergent key then while decoding the primary content it also needs an equivalent key to decode again by triple times. Finally the first content is encrypted as cipher text and stored in slave system. Blocks arestoredinDistributedHDFS Storage Providers. 7.3 Enabling Deduplication Method After encrypting the convergent keys are securely shared with slave machines provider toKeyManagementmachines. Key management slave checks duplicate copies of an data to convergent keysinKMCSP. KeyManagementslavemaintains Comma Separated Values file to see proof of verification of data and store keys secure. Various users who share the common keys are referred by their own ownership. User request for deletion definitely got to prove to proof of ownership to delete own contents. 7.4 Hash Value Based Decryption The final model user request for downloading their document which they need to upload in HDFS storage. This download request needs proper ownership of the data verification of the document here we create the ownership by unique tag generated by MD5 algorithm and verifies existing tag of user. After verification the original content of the data is decrypted by requesting the Distributed HDFS storage where HDFS storage request key management slave for keys to decrypt the given data and finally the original content is received by the user. The delete request will delete only the reference of the content shared by common users, and not the whole content. Fig -1: Block diagram 8. CONCLUSIONS In this project, the new distributed deduplication systems with file-level and fine-grained block-level data deduplication, higher reliability inwhichthedata chunks are distributed across HDFSstorage,reliablekeymanagementin secure deduplication and security of tag consistency and
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 02 | Feb 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 3157 integrity were achieved. The purpose of software requirements specification is to provide a detailedoverview of the software project and its purpose and its parameters and goals. This describes the project target audience and its user interface, hardware and software requirements of the given data. It is defined how the client, team and audience see the project and its functionality. 9. REFERENCES [1] D. Quick, B. Martini, and K. R. Choo, Cloud Storage Forensics. Syngress Publishing / Elsevier, 2014. [Online]. Available:http://www.elsevier.com/books/cloud- storageforensics/ quick/978-0-12-419970-5 [2] K. R. Choo, J. Domingo-Ferrer, and L. Zhang, “Cloud cryptography: Theory, practice and future research directions,” Future Generation Comp. Syst., vol. 62, pp. 51– 53, 2016. [3] K. R. Choo, M. Herman, M. Iorga, and B. Martini, “Cloud forensics: State-of-the-art and future directions,” Digital Investigation, vol. 18, pp. 77–78, 2016. [4] Y. Yang, H. Zhu, H. Lu, J.Weng, Y. Zhang, and K. R. Choo, “Cloud based data sharing with fine-grained proxy re- encryption,” Pervasive and Mobile Computing, vol. 28, pp. 122–134, 2016. [5] D. Quick and K. R. Choo, “Google drive: Forensic analysis of data remnants,” J. Network and Computer Applications, vol. 40, pp. 179– 193, 2014. [6] A. Sahai and B. Waters, “Fuzzy identity-based encryption,” in Advances in Cryptology - EUROCRYPT 2005, 24th Annual International Conference on the Theory and ApplicationsofCryptographicTechniques,Aarhus,Denmark, May 22-26, 2005, Proceedings, ser. Lecture Notes in Computer Science, vol. 3494. Springer, 2005, pp. 457–473.
Jetzt herunterladen