IRJET - A Secure Access Policies based on Data Deduplication System

IRJET Journal
IRJET JournalFast Track Publications

https://irjet.net/archives/V7/i2/IRJET-V7I2680.pdf

International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 02 | Feb 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 3155
A SECURE ACCESS POLICIES BASED ON DATA DEDUPLICATION SYSTEM
Gayathri.S1, Ragavi.P2, Srilekha.R3
1Asst Professor, Dept. of Computer Science and Engineering, Jeppiaar SRR Engineering college, Padur.
2,3Final year student, Dept. of Computer Science and Engineering, Jeppiaar SRR Engineering college, Padur.
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - Deduplication techniques are used to a back up
data on disk and minimize the storage overhead by detecting
and eliminating redundancy among data. It is crucial for
eliminating duplicate copies of identical data to save storage
space and network bandwidth. It presents an attribute-based
storage system with secure data deduplication access policies
in a hybrid clouds settings, using public cloud and private
cloud. Private cloud is used to detect duplication and a public
cloud maintains the storage. Instead of keeping data copies in
multiple with the similar content, in this system removes
surplus data by keeping only one physical copy and referring
other redundant data to that copy. User access policies defines
each of such copy, the user will upload the file with access
policies. Then similar file with the separate access policies are
set the particular file to replace the reference. The user’s
private key is associated with attribute set and a message is
encrypted under an access policy over a set of attributes. The
user can decrypt a cipher text with private key if the set of
attributes satisfies the accesspolicyassociatedwiththiscipher
text. Our system has two advantages. Thetwolevelofchecking
file is file level deduplication and signature match checking. It
reduced the time and cost in uploading and downloadingwith
storage space in Hadoop system.
KeyWords: Hadoop Software, Ciphertext, Deduplication,
Tomcat.
1. INTRODUCTION
Hadoop software library that permits for the distributed
processing of huge data setacrossclusterofcomputersusing
simple programming models. It is designed to proportion
from single server to the thousandofmachines, eachoffering
local computation and storage. It makes Use of the
commodity hardware Hadoop is very Scalable and Fault
Tolerant. This provides resource management and
scheduling for user applications; and Hadoop Map Reduce,
which provides the programming model used to tacklelarge
distributed data processing mapping data and reducing it to
a result. Big Data in most companies are processed by
Hadoop by submitting the roles to Master. Thistypeofusage
is best-suited to highly scalable public cloud services; The
Master distributes the job to its cluster and processmapand
reduces tasks sequentially. But nowadays the growing data
and the competition between Service Providers lead to the
increased submission of jobs to the Master. This Concurrent
job submission on Hadoop forces us to do Schedule on
Hadoop Cluster so that the response time will be acceptable
for each job.
2. PROPOSED SYSTEM
In this paper, we present an attribute-based storage system,
which uses the ciphertext-policy attribute-based encryption
(CP-ABE) and to support securededuplication.To enablethe
deduplication and distributed storage of the data across
HDFS. And then using two way cloudinourstoragesystemis
built under a hybrid cloud architecture, where a private
cloud manipulates the computation of the user and a public
cloud manages the storage. The private cloud is given a
trapdoor key related to the corresponding ciphertext, with
which it can transfer the ciphertext over one access policy
into ciphertexts of the same plaintext under the otheraccess
policies without being conscious of the underlyingplaintext.
After receiving a storage request from the user, the private
cloud first checks the validity of the upload item through the
attached proof. If the proof is valid, the private cloud runs a
tag matching algorithm to ascertain whether an equivalent
data underlying the ciphertext has been stored
3. HARDWARE AND SOFTWARE SPECIFICATION
HARDWARE REQUIREMENTS:
Hard disk : 500 GB and above.
Processor : i3 and above.
Ram : 4GB and above.
SOFTWARE REQUIREMENTS:
Operating System : Windows 7 and above (64-bit).
Java Version : JDK 1.7
Web Server :Tomcat 6.20
Web Server :Tomcat 7.0.11
Storage : Hadoop 2.7
4. TECHNOLOGY USED
 JAVA
 Cloud Computing
 JAVA Platform
5. APACHE TOMCAT SERVER
Apache Tomcat (formerly under the ApacheJakarta Project;
Tomcat is now a top level project) could also be an internet
container developed at the Apache Software Foundation.
Tomcat implements the servlet and thusthe JSPspecifyfrom
Sun Microsystems, providing an environment forJava torun
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 02 | Feb 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 3156
in cooperation with an online server. It adds tools for
configuration andmanagement butalsocanbeconfiguredby
editing configuration files that are normally XML-formatted.
Because Tomcat includes its own HTTP serverinternally,it's
also considered a standalone web server.
5.1 Purpose
The main aim of this project is to realize newdistributed de-
duplication systems we present an attribute-based storage
system with secure deduplication during a hybrid cloud
setting with higher reliability.
5.2 Project Scope
In this Deduplication techniques are employed to backup
data and minimize network of the data and storage of an
data overhead by detecting and eliminating redundancy
among data from the storage area.so which is crucial for
eliminating duplicate copies of identical data so as to save
lots of space for storing and network bandwidth.Wepresent
an attribute-based storage system with secure access
policies data deduplication in a hybrid cloud. Where a
personal cloud is liable for duplicate detection and a public
cloud manages the storage. Instead of keeping multiple data
copy with an equivalent content, during the technique
eliminate redundant data by keeping only physical copyand
referring other redundant datas thereto copy.
6. Algorithms used
 MD5 algorithm.
 Base 64.
 RSA algorithm.
7. SYSTEM DESIGN
7.1 Uploading a File
In this module, cloud user first register the user details and
then login the user credential details. Once user name and
password is valid open the user profile screen are going to
be displayed. A user is an entity whowantstooutsourcedata
storage to the HDFS Storage and access the info later. A user
register to the HDFS storage with necessaryinformationand
login the page for uploading the file. User chooses the file of
data and uploads to Storage in the given space where the
HDFS store the file in rapid storage system and file level
deduplication is checked.
7.2 Mastering File to HDFS Storage
Tag the file by using MD5 message-digest algorithm is
cryptographic hash function producing a 128-bit hash value
typically expressed in text format as 32 digit hex value in
order that files of same are deduplicated. Chunking the file
chosen for the fixed size given of data andgeneratingtags for
each blocks chunked. Then generate convergent keys for
every blocks split to verify block level deduplication.Provide
filename and password for file authorization in future. This
Encrypt the blocks by Triple encoding Standard (3DES)
algorithm. Here the plain text is encoded triple times with
convergent key then while decoding the primary content it
also needs an equivalent key to decode again by triple times.
Finally the first content is encrypted as cipher text and
stored in slave system. Blocks arestoredinDistributedHDFS
Storage Providers.
7.3 Enabling Deduplication Method
After encrypting the convergent keys are securely shared
with slave machines provider toKeyManagementmachines.
Key management slave checks duplicate copies of an data to
convergent keysinKMCSP. KeyManagementslavemaintains
Comma Separated Values file to see proof of verification of
data and store keys secure. Various users who share the
common keys are referred by their own ownership. User
request for deletion definitely got to prove to proof of
ownership to delete own contents.
7.4 Hash Value Based Decryption
The final model user request for downloading their
document which they need to upload in HDFS storage. This
download request needs proper ownership of the data
verification of the document here we create the ownership
by unique tag generated by MD5 algorithm and verifies
existing tag of user. After verification the original content of
the data is decrypted by requesting the Distributed HDFS
storage where HDFS storage request key management slave
for keys to decrypt the given data and finally the original
content is received by the user. The delete request will
delete only the reference of the content shared by common
users, and not the whole content.
Fig -1: Block diagram
8. CONCLUSIONS
In this project, the new distributed deduplication systems
with file-level and fine-grained block-level data
deduplication, higher reliability inwhichthedata chunks are
distributed across HDFSstorage,reliablekeymanagementin
secure deduplication and security of tag consistency and
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 02 | Feb 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 3157
integrity were achieved. The purpose of software
requirements specification is to provide a detailedoverview
of the software project and its purpose and its parameters
and goals. This describes the project target audience and its
user interface, hardware and software requirements of the
given data. It is defined how the client, team and audience
see the project and its functionality.
9. REFERENCES
[1] D. Quick, B. Martini, and K. R. Choo, Cloud Storage
Forensics. Syngress Publishing / Elsevier, 2014. [Online].
Available:http://www.elsevier.com/books/cloud-
storageforensics/ quick/978-0-12-419970-5
[2] K. R. Choo, J. Domingo-Ferrer, and L. Zhang, “Cloud
cryptography: Theory, practice and future research
directions,” Future Generation Comp. Syst., vol. 62, pp. 51–
53, 2016.
[3] K. R. Choo, M. Herman, M. Iorga, and B. Martini, “Cloud
forensics: State-of-the-art and future directions,” Digital
Investigation, vol. 18, pp. 77–78, 2016.
[4] Y. Yang, H. Zhu, H. Lu, J.Weng, Y. Zhang, and K. R. Choo,
“Cloud based data sharing with fine-grained proxy re-
encryption,” Pervasive and Mobile Computing, vol. 28, pp.
122–134, 2016.
[5] D. Quick and K. R. Choo, “Google drive: Forensic analysis
of data remnants,” J. Network and Computer Applications,
vol. 40, pp. 179– 193, 2014.
[6] A. Sahai and B. Waters, “Fuzzy identity-based
encryption,” in Advances in Cryptology - EUROCRYPT 2005,
24th Annual International Conference on the Theory and
ApplicationsofCryptographicTechniques,Aarhus,Denmark,
May 22-26, 2005, Proceedings, ser. Lecture Notes in
Computer Science, vol. 3494. Springer, 2005, pp. 457–473.

Recomendados

An efficient, secure deduplication data storing in cloud storage environment von
An efficient, secure deduplication data storing in cloud storage environmentAn efficient, secure deduplication data storing in cloud storage environment
An efficient, secure deduplication data storing in cloud storage environmenteSAT Journals
134 views4 Folien
El35782786 von
El35782786El35782786
El35782786IJERA Editor
190 views5 Folien
Enabling Integrity for the Compressed Files in Cloud Server von
Enabling Integrity for the Compressed Files in Cloud ServerEnabling Integrity for the Compressed Files in Cloud Server
Enabling Integrity for the Compressed Files in Cloud ServerIOSR Journals
348 views5 Folien
Hybrid Cloud Approach for Secure Authorized Deduplication von
Hybrid Cloud Approach for Secure Authorized DeduplicationHybrid Cloud Approach for Secure Authorized Deduplication
Hybrid Cloud Approach for Secure Authorized DeduplicationPrem Rao
1.9K views52 Folien
International Journal of Computational Engineering Research(IJCER) von
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
275 views5 Folien
IRJET- Secured Hadoop Environment von
IRJET- Secured Hadoop EnvironmentIRJET- Secured Hadoop Environment
IRJET- Secured Hadoop EnvironmentIRJET Journal
28 views8 Folien

Más contenido relacionado

Was ist angesagt?

A Hybrid Cloud Approach for Secure Authorized Deduplication von
A Hybrid Cloud Approach for Secure Authorized DeduplicationA Hybrid Cloud Approach for Secure Authorized Deduplication
A Hybrid Cloud Approach for Secure Authorized Deduplication1crore projects
369 views11 Folien
L018137479 von
L018137479L018137479
L018137479IOSR Journals
191 views6 Folien
Secure distributed deduplication systems with improved reliability von
Secure distributed deduplication systems with improved reliabilitySecure distributed deduplication systems with improved reliability
Secure distributed deduplication systems with improved reliabilityPvrtechnologies Nellore
638 views9 Folien
IRJET- Secure Data Deduplication for Cloud Server using HMAC Algorithm von
IRJET- Secure Data Deduplication for Cloud Server using HMAC AlgorithmIRJET- Secure Data Deduplication for Cloud Server using HMAC Algorithm
IRJET- Secure Data Deduplication for Cloud Server using HMAC AlgorithmIRJET Journal
32 views4 Folien
IRJET- Cloud based Deduplication using Middleware Approach von
IRJET- Cloud based Deduplication using Middleware ApproachIRJET- Cloud based Deduplication using Middleware Approach
IRJET- Cloud based Deduplication using Middleware ApproachIRJET Journal
20 views7 Folien
Doc A hybrid cloud approach for secure authorized deduplication von
 Doc A hybrid cloud approach for secure authorized deduplication Doc A hybrid cloud approach for secure authorized deduplication
Doc A hybrid cloud approach for secure authorized deduplicationShakas Technologie
4.2K views12 Folien

Was ist angesagt?(19)

A Hybrid Cloud Approach for Secure Authorized Deduplication von 1crore projects
A Hybrid Cloud Approach for Secure Authorized DeduplicationA Hybrid Cloud Approach for Secure Authorized Deduplication
A Hybrid Cloud Approach for Secure Authorized Deduplication
1crore projects369 views
Secure distributed deduplication systems with improved reliability von Pvrtechnologies Nellore
Secure distributed deduplication systems with improved reliabilitySecure distributed deduplication systems with improved reliability
Secure distributed deduplication systems with improved reliability
IRJET- Secure Data Deduplication for Cloud Server using HMAC Algorithm von IRJET Journal
IRJET- Secure Data Deduplication for Cloud Server using HMAC AlgorithmIRJET- Secure Data Deduplication for Cloud Server using HMAC Algorithm
IRJET- Secure Data Deduplication for Cloud Server using HMAC Algorithm
IRJET Journal32 views
IRJET- Cloud based Deduplication using Middleware Approach von IRJET Journal
IRJET- Cloud based Deduplication using Middleware ApproachIRJET- Cloud based Deduplication using Middleware Approach
IRJET- Cloud based Deduplication using Middleware Approach
IRJET Journal20 views
Doc A hybrid cloud approach for secure authorized deduplication von Shakas Technologie
 Doc A hybrid cloud approach for secure authorized deduplication Doc A hybrid cloud approach for secure authorized deduplication
Doc A hybrid cloud approach for secure authorized deduplication
Shakas Technologie4.2K views
SECURE AUDITING AND DEDUPLICATING DATA IN CLOUD von Nexgen Technology
SECURE AUDITING AND DEDUPLICATING DATA IN CLOUDSECURE AUDITING AND DEDUPLICATING DATA IN CLOUD
SECURE AUDITING AND DEDUPLICATING DATA IN CLOUD
Nexgen Technology 3.8K views
A Hybrid Cloud Approach for Secure Authorized De-Duplication von Editor IJMTER
A Hybrid Cloud Approach for Secure Authorized De-DuplicationA Hybrid Cloud Approach for Secure Authorized De-Duplication
A Hybrid Cloud Approach for Secure Authorized De-Duplication
Editor IJMTER490 views
Block-Level Message-Locked Encryption for Secure Large File De-duplication von IRJET Journal
Block-Level Message-Locked Encryption for Secure Large File De-duplicationBlock-Level Message-Locked Encryption for Secure Large File De-duplication
Block-Level Message-Locked Encryption for Secure Large File De-duplication
IRJET Journal40 views
IRJET- Cross User Bigdata Deduplication von IRJET Journal
IRJET-  	  Cross User Bigdata DeduplicationIRJET-  	  Cross User Bigdata Deduplication
IRJET- Cross User Bigdata Deduplication
IRJET Journal15 views
E031102034039 von theijes
E031102034039E031102034039
E031102034039
theijes304 views
Secure distributed deduplication systems with improved reliability 2 von Rishikesh Pathak
Secure distributed deduplication systems with improved reliability 2Secure distributed deduplication systems with improved reliability 2
Secure distributed deduplication systems with improved reliability 2
Rishikesh Pathak583 views
iaetsd Controlling data deuplication in cloud storage von Iaetsd Iaetsd
iaetsd Controlling data deuplication in cloud storageiaetsd Controlling data deuplication in cloud storage
iaetsd Controlling data deuplication in cloud storage
Iaetsd Iaetsd95 views
An Auditing Protocol for Protected Data Storage in Cloud Computing von ijceronline
An Auditing Protocol for Protected Data Storage in Cloud ComputingAn Auditing Protocol for Protected Data Storage in Cloud Computing
An Auditing Protocol for Protected Data Storage in Cloud Computing
ijceronline69 views
An Optimal Cooperative Provable Data Possession Scheme for Distributed Cloud ... von IJMER
An Optimal Cooperative Provable Data Possession Scheme for Distributed Cloud ...An Optimal Cooperative Provable Data Possession Scheme for Distributed Cloud ...
An Optimal Cooperative Provable Data Possession Scheme for Distributed Cloud ...
IJMER411 views
SECRY - Secure file storage on cloud using hybrid cryptography von ALIN BABU
SECRY - Secure file storage on cloud using hybrid cryptographySECRY - Secure file storage on cloud using hybrid cryptography
SECRY - Secure file storage on cloud using hybrid cryptography
ALIN BABU2.1K views

Similar a IRJET - A Secure Access Policies based on Data Deduplication System

Implementation of De-Duplication Algorithm von
Implementation of De-Duplication AlgorithmImplementation of De-Duplication Algorithm
Implementation of De-Duplication AlgorithmIRJET Journal
31 views5 Folien
Hasbe a hierarchical attribute based solution for flexible and scalable acces... von
Hasbe a hierarchical attribute based solution for flexible and scalable acces...Hasbe a hierarchical attribute based solution for flexible and scalable acces...
Hasbe a hierarchical attribute based solution for flexible and scalable acces...JPINFOTECH JAYAPRAKASH
1.1K views14 Folien
H017144148 von
H017144148H017144148
H017144148IOSR Journals
118 views8 Folien
Comparative Analysis, Security Aspects & Optimization of Workload in Gfs Base... von
Comparative Analysis, Security Aspects & Optimization of Workload in Gfs Base...Comparative Analysis, Security Aspects & Optimization of Workload in Gfs Base...
Comparative Analysis, Security Aspects & Optimization of Workload in Gfs Base...IOSR Journals
158 views8 Folien
IJSRED-V2I2P10 von
IJSRED-V2I2P10IJSRED-V2I2P10
IJSRED-V2I2P10IJSRED
12 views2 Folien
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC von
IRJET-  	  Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASCIRJET-  	  Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASCIRJET Journal
36 views3 Folien

Similar a IRJET - A Secure Access Policies based on Data Deduplication System(20)

Implementation of De-Duplication Algorithm von IRJET Journal
Implementation of De-Duplication AlgorithmImplementation of De-Duplication Algorithm
Implementation of De-Duplication Algorithm
IRJET Journal31 views
Hasbe a hierarchical attribute based solution for flexible and scalable acces... von JPINFOTECH JAYAPRAKASH
Hasbe a hierarchical attribute based solution for flexible and scalable acces...Hasbe a hierarchical attribute based solution for flexible and scalable acces...
Hasbe a hierarchical attribute based solution for flexible and scalable acces...
Comparative Analysis, Security Aspects & Optimization of Workload in Gfs Base... von IOSR Journals
Comparative Analysis, Security Aspects & Optimization of Workload in Gfs Base...Comparative Analysis, Security Aspects & Optimization of Workload in Gfs Base...
Comparative Analysis, Security Aspects & Optimization of Workload in Gfs Base...
IOSR Journals158 views
IJSRED-V2I2P10 von IJSRED
IJSRED-V2I2P10IJSRED-V2I2P10
IJSRED-V2I2P10
IJSRED12 views
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC von IRJET Journal
IRJET-  	  Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASCIRJET-  	  Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET Journal36 views
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC von IRJET Journal
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASCIRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET Journal25 views
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)... von dbpublications
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
dbpublications57 views
IRJET- An Integrity Auditing &Data Dedupe withEffective Bandwidth in Cloud St... von IRJET Journal
IRJET- An Integrity Auditing &Data Dedupe withEffective Bandwidth in Cloud St...IRJET- An Integrity Auditing &Data Dedupe withEffective Bandwidth in Cloud St...
IRJET- An Integrity Auditing &Data Dedupe withEffective Bandwidth in Cloud St...
IRJET Journal20 views
Presentation on cloud computing security issues using HADOOP and HDFS ARCHITE... von Pushpa
Presentation on cloud computing security issues using HADOOP and HDFS ARCHITE...Presentation on cloud computing security issues using HADOOP and HDFS ARCHITE...
Presentation on cloud computing security issues using HADOOP and HDFS ARCHITE...
Pushpa 2.5K views
IRJET- A Survey on File Storage and Retrieval using Blockchain Technology von IRJET Journal
IRJET- A Survey on File Storage and Retrieval using Blockchain TechnologyIRJET- A Survey on File Storage and Retrieval using Blockchain Technology
IRJET- A Survey on File Storage and Retrieval using Blockchain Technology
IRJET Journal52 views
IRJET- Adaptable Wildcard Searchable Encryption System von IRJET Journal
IRJET- Adaptable Wildcard Searchable Encryption SystemIRJET- Adaptable Wildcard Searchable Encryption System
IRJET- Adaptable Wildcard Searchable Encryption System
IRJET Journal11 views
Data Sharing: Ensure Accountability Distribution in the Cloud von Suraj Mehta
Data Sharing: Ensure Accountability Distribution in the CloudData Sharing: Ensure Accountability Distribution in the Cloud
Data Sharing: Ensure Accountability Distribution in the Cloud
Suraj Mehta803 views
IRJET- A Study of Comparatively Analysis for HDFS and Google File System ... von IRJET Journal
IRJET-  	  A Study of Comparatively Analysis for HDFS and Google File System ...IRJET-  	  A Study of Comparatively Analysis for HDFS and Google File System ...
IRJET- A Study of Comparatively Analysis for HDFS and Google File System ...
IRJET Journal10 views
Distributed Framework for Data Mining As a Service on Private Cloud von IJERA Editor
Distributed Framework for Data Mining As a Service on Private CloudDistributed Framework for Data Mining As a Service on Private Cloud
Distributed Framework for Data Mining As a Service on Private Cloud
IJERA Editor241 views
A robust and verifiable threshold multi authority access control system in pu... von IJARIIT
A robust and verifiable threshold multi authority access control system in pu...A robust and verifiable threshold multi authority access control system in pu...
A robust and verifiable threshold multi authority access control system in pu...
IJARIIT33 views
IRJET - Confidential Image De-Duplication in Cloud Storage von IRJET Journal
IRJET - Confidential Image De-Duplication in Cloud StorageIRJET - Confidential Image De-Duplication in Cloud Storage
IRJET - Confidential Image De-Duplication in Cloud Storage
IRJET Journal11 views
Methodology for Optimizing Storage on Cloud Using Authorized De-Duplication –... von IRJET Journal
Methodology for Optimizing Storage on Cloud Using Authorized De-Duplication –...Methodology for Optimizing Storage on Cloud Using Authorized De-Duplication –...
Methodology for Optimizing Storage on Cloud Using Authorized De-Duplication –...
IRJET Journal31 views

Más de IRJET Journal

SOIL STABILIZATION USING WASTE FIBER MATERIAL von
SOIL STABILIZATION USING WASTE FIBER MATERIALSOIL STABILIZATION USING WASTE FIBER MATERIAL
SOIL STABILIZATION USING WASTE FIBER MATERIALIRJET Journal
20 views7 Folien
Sol-gel auto-combustion produced gamma irradiated Ni1-xCdxFe2O4 nanoparticles... von
Sol-gel auto-combustion produced gamma irradiated Ni1-xCdxFe2O4 nanoparticles...Sol-gel auto-combustion produced gamma irradiated Ni1-xCdxFe2O4 nanoparticles...
Sol-gel auto-combustion produced gamma irradiated Ni1-xCdxFe2O4 nanoparticles...IRJET Journal
8 views7 Folien
Identification, Discrimination and Classification of Cotton Crop by Using Mul... von
Identification, Discrimination and Classification of Cotton Crop by Using Mul...Identification, Discrimination and Classification of Cotton Crop by Using Mul...
Identification, Discrimination and Classification of Cotton Crop by Using Mul...IRJET Journal
8 views5 Folien
“Analysis of GDP, Unemployment and Inflation rates using mathematical formula... von
“Analysis of GDP, Unemployment and Inflation rates using mathematical formula...“Analysis of GDP, Unemployment and Inflation rates using mathematical formula...
“Analysis of GDP, Unemployment and Inflation rates using mathematical formula...IRJET Journal
13 views11 Folien
MAXIMUM POWER POINT TRACKING BASED PHOTO VOLTAIC SYSTEM FOR SMART GRID INTEGR... von
MAXIMUM POWER POINT TRACKING BASED PHOTO VOLTAIC SYSTEM FOR SMART GRID INTEGR...MAXIMUM POWER POINT TRACKING BASED PHOTO VOLTAIC SYSTEM FOR SMART GRID INTEGR...
MAXIMUM POWER POINT TRACKING BASED PHOTO VOLTAIC SYSTEM FOR SMART GRID INTEGR...IRJET Journal
14 views6 Folien
Performance Analysis of Aerodynamic Design for Wind Turbine Blade von
Performance Analysis of Aerodynamic Design for Wind Turbine BladePerformance Analysis of Aerodynamic Design for Wind Turbine Blade
Performance Analysis of Aerodynamic Design for Wind Turbine BladeIRJET Journal
7 views5 Folien

Más de IRJET Journal(20)

SOIL STABILIZATION USING WASTE FIBER MATERIAL von IRJET Journal
SOIL STABILIZATION USING WASTE FIBER MATERIALSOIL STABILIZATION USING WASTE FIBER MATERIAL
SOIL STABILIZATION USING WASTE FIBER MATERIAL
IRJET Journal20 views
Sol-gel auto-combustion produced gamma irradiated Ni1-xCdxFe2O4 nanoparticles... von IRJET Journal
Sol-gel auto-combustion produced gamma irradiated Ni1-xCdxFe2O4 nanoparticles...Sol-gel auto-combustion produced gamma irradiated Ni1-xCdxFe2O4 nanoparticles...
Sol-gel auto-combustion produced gamma irradiated Ni1-xCdxFe2O4 nanoparticles...
IRJET Journal8 views
Identification, Discrimination and Classification of Cotton Crop by Using Mul... von IRJET Journal
Identification, Discrimination and Classification of Cotton Crop by Using Mul...Identification, Discrimination and Classification of Cotton Crop by Using Mul...
Identification, Discrimination and Classification of Cotton Crop by Using Mul...
IRJET Journal8 views
“Analysis of GDP, Unemployment and Inflation rates using mathematical formula... von IRJET Journal
“Analysis of GDP, Unemployment and Inflation rates using mathematical formula...“Analysis of GDP, Unemployment and Inflation rates using mathematical formula...
“Analysis of GDP, Unemployment and Inflation rates using mathematical formula...
IRJET Journal13 views
MAXIMUM POWER POINT TRACKING BASED PHOTO VOLTAIC SYSTEM FOR SMART GRID INTEGR... von IRJET Journal
MAXIMUM POWER POINT TRACKING BASED PHOTO VOLTAIC SYSTEM FOR SMART GRID INTEGR...MAXIMUM POWER POINT TRACKING BASED PHOTO VOLTAIC SYSTEM FOR SMART GRID INTEGR...
MAXIMUM POWER POINT TRACKING BASED PHOTO VOLTAIC SYSTEM FOR SMART GRID INTEGR...
IRJET Journal14 views
Performance Analysis of Aerodynamic Design for Wind Turbine Blade von IRJET Journal
Performance Analysis of Aerodynamic Design for Wind Turbine BladePerformance Analysis of Aerodynamic Design for Wind Turbine Blade
Performance Analysis of Aerodynamic Design for Wind Turbine Blade
IRJET Journal7 views
Heart Failure Prediction using Different Machine Learning Techniques von IRJET Journal
Heart Failure Prediction using Different Machine Learning TechniquesHeart Failure Prediction using Different Machine Learning Techniques
Heart Failure Prediction using Different Machine Learning Techniques
IRJET Journal7 views
Experimental Investigation of Solar Hot Case Based on Photovoltaic Panel von IRJET Journal
Experimental Investigation of Solar Hot Case Based on Photovoltaic PanelExperimental Investigation of Solar Hot Case Based on Photovoltaic Panel
Experimental Investigation of Solar Hot Case Based on Photovoltaic Panel
IRJET Journal3 views
Metro Development and Pedestrian Concerns von IRJET Journal
Metro Development and Pedestrian ConcernsMetro Development and Pedestrian Concerns
Metro Development and Pedestrian Concerns
IRJET Journal2 views
Mapping the Crashworthiness Domains: Investigations Based on Scientometric An... von IRJET Journal
Mapping the Crashworthiness Domains: Investigations Based on Scientometric An...Mapping the Crashworthiness Domains: Investigations Based on Scientometric An...
Mapping the Crashworthiness Domains: Investigations Based on Scientometric An...
IRJET Journal3 views
Data Analytics and Artificial Intelligence in Healthcare Industry von IRJET Journal
Data Analytics and Artificial Intelligence in Healthcare IndustryData Analytics and Artificial Intelligence in Healthcare Industry
Data Analytics and Artificial Intelligence in Healthcare Industry
IRJET Journal3 views
DESIGN AND SIMULATION OF SOLAR BASED FAST CHARGING STATION FOR ELECTRIC VEHIC... von IRJET Journal
DESIGN AND SIMULATION OF SOLAR BASED FAST CHARGING STATION FOR ELECTRIC VEHIC...DESIGN AND SIMULATION OF SOLAR BASED FAST CHARGING STATION FOR ELECTRIC VEHIC...
DESIGN AND SIMULATION OF SOLAR BASED FAST CHARGING STATION FOR ELECTRIC VEHIC...
IRJET Journal52 views
Efficient Design for Multi-story Building Using Pre-Fabricated Steel Structur... von IRJET Journal
Efficient Design for Multi-story Building Using Pre-Fabricated Steel Structur...Efficient Design for Multi-story Building Using Pre-Fabricated Steel Structur...
Efficient Design for Multi-story Building Using Pre-Fabricated Steel Structur...
IRJET Journal10 views
Development of Effective Tomato Package for Post-Harvest Preservation von IRJET Journal
Development of Effective Tomato Package for Post-Harvest PreservationDevelopment of Effective Tomato Package for Post-Harvest Preservation
Development of Effective Tomato Package for Post-Harvest Preservation
IRJET Journal4 views
“DYNAMIC ANALYSIS OF GRAVITY RETAINING WALL WITH SOIL STRUCTURE INTERACTION” von IRJET Journal
“DYNAMIC ANALYSIS OF GRAVITY RETAINING WALL WITH SOIL STRUCTURE INTERACTION”“DYNAMIC ANALYSIS OF GRAVITY RETAINING WALL WITH SOIL STRUCTURE INTERACTION”
“DYNAMIC ANALYSIS OF GRAVITY RETAINING WALL WITH SOIL STRUCTURE INTERACTION”
IRJET Journal5 views
Understanding the Nature of Consciousness with AI von IRJET Journal
Understanding the Nature of Consciousness with AIUnderstanding the Nature of Consciousness with AI
Understanding the Nature of Consciousness with AI
IRJET Journal12 views
Augmented Reality App for Location based Exploration at JNTUK Kakinada von IRJET Journal
Augmented Reality App for Location based Exploration at JNTUK KakinadaAugmented Reality App for Location based Exploration at JNTUK Kakinada
Augmented Reality App for Location based Exploration at JNTUK Kakinada
IRJET Journal6 views
Smart Traffic Congestion Control System: Leveraging Machine Learning for Urba... von IRJET Journal
Smart Traffic Congestion Control System: Leveraging Machine Learning for Urba...Smart Traffic Congestion Control System: Leveraging Machine Learning for Urba...
Smart Traffic Congestion Control System: Leveraging Machine Learning for Urba...
IRJET Journal18 views
Enhancing Real Time Communication and Efficiency With Websocket von IRJET Journal
Enhancing Real Time Communication and Efficiency With WebsocketEnhancing Real Time Communication and Efficiency With Websocket
Enhancing Real Time Communication and Efficiency With Websocket
IRJET Journal5 views
Textile Industrial Wastewater Treatability Studies by Soil Aquifer Treatment ... von IRJET Journal
Textile Industrial Wastewater Treatability Studies by Soil Aquifer Treatment ...Textile Industrial Wastewater Treatability Studies by Soil Aquifer Treatment ...
Textile Industrial Wastewater Treatability Studies by Soil Aquifer Treatment ...
IRJET Journal4 views

Último

zincalume water storage tank design.pdf von
zincalume water storage tank design.pdfzincalume water storage tank design.pdf
zincalume water storage tank design.pdf3D LABS
5 views1 Folie
Codes and Conventions.pptx von
Codes and Conventions.pptxCodes and Conventions.pptx
Codes and Conventions.pptxIsabellaGraceAnkers
8 views5 Folien
Investor Presentation von
Investor PresentationInvestor Presentation
Investor Presentationeser sevinç
25 views26 Folien
MK__Cert.pdf von
MK__Cert.pdfMK__Cert.pdf
MK__Cert.pdfHassan Khan
10 views1 Folie
Introduction to CAD-CAM.pptx von
Introduction to CAD-CAM.pptxIntroduction to CAD-CAM.pptx
Introduction to CAD-CAM.pptxsuyogpatil49
5 views15 Folien
802.11 Computer Networks von
802.11 Computer Networks802.11 Computer Networks
802.11 Computer NetworksTusharChoudhary72015
10 views33 Folien

Último(20)

zincalume water storage tank design.pdf von 3D LABS
zincalume water storage tank design.pdfzincalume water storage tank design.pdf
zincalume water storage tank design.pdf
3D LABS5 views
Introduction to CAD-CAM.pptx von suyogpatil49
Introduction to CAD-CAM.pptxIntroduction to CAD-CAM.pptx
Introduction to CAD-CAM.pptx
suyogpatil495 views
MSA Website Slideshow (16).pdf von msaucla
MSA Website Slideshow (16).pdfMSA Website Slideshow (16).pdf
MSA Website Slideshow (16).pdf
msaucla68 views
Advances in micro milling: From tool fabrication to process outcomes von Shivendra Nandan
Advances in micro milling: From tool fabrication to process outcomesAdvances in micro milling: From tool fabrication to process outcomes
Advances in micro milling: From tool fabrication to process outcomes
Literature review and Case study on Commercial Complex in Nepal, Durbar mall,... von AakashShakya12
Literature review and Case study on Commercial Complex in Nepal, Durbar mall,...Literature review and Case study on Commercial Complex in Nepal, Durbar mall,...
Literature review and Case study on Commercial Complex in Nepal, Durbar mall,...
AakashShakya1272 views
Design of machine elements-UNIT 3.pptx von gopinathcreddy
Design of machine elements-UNIT 3.pptxDesign of machine elements-UNIT 3.pptx
Design of machine elements-UNIT 3.pptx
gopinathcreddy32 views
2023Dec ASU Wang NETR Group Research Focus and Facility Overview.pptx von lwang78
2023Dec ASU Wang NETR Group Research Focus and Facility Overview.pptx2023Dec ASU Wang NETR Group Research Focus and Facility Overview.pptx
2023Dec ASU Wang NETR Group Research Focus and Facility Overview.pptx
lwang7853 views

IRJET - A Secure Access Policies based on Data Deduplication System

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 02 | Feb 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 3155 A SECURE ACCESS POLICIES BASED ON DATA DEDUPLICATION SYSTEM Gayathri.S1, Ragavi.P2, Srilekha.R3 1Asst Professor, Dept. of Computer Science and Engineering, Jeppiaar SRR Engineering college, Padur. 2,3Final year student, Dept. of Computer Science and Engineering, Jeppiaar SRR Engineering college, Padur. ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Deduplication techniques are used to a back up data on disk and minimize the storage overhead by detecting and eliminating redundancy among data. It is crucial for eliminating duplicate copies of identical data to save storage space and network bandwidth. It presents an attribute-based storage system with secure data deduplication access policies in a hybrid clouds settings, using public cloud and private cloud. Private cloud is used to detect duplication and a public cloud maintains the storage. Instead of keeping data copies in multiple with the similar content, in this system removes surplus data by keeping only one physical copy and referring other redundant data to that copy. User access policies defines each of such copy, the user will upload the file with access policies. Then similar file with the separate access policies are set the particular file to replace the reference. The user’s private key is associated with attribute set and a message is encrypted under an access policy over a set of attributes. The user can decrypt a cipher text with private key if the set of attributes satisfies the accesspolicyassociatedwiththiscipher text. Our system has two advantages. Thetwolevelofchecking file is file level deduplication and signature match checking. It reduced the time and cost in uploading and downloadingwith storage space in Hadoop system. KeyWords: Hadoop Software, Ciphertext, Deduplication, Tomcat. 1. INTRODUCTION Hadoop software library that permits for the distributed processing of huge data setacrossclusterofcomputersusing simple programming models. It is designed to proportion from single server to the thousandofmachines, eachoffering local computation and storage. It makes Use of the commodity hardware Hadoop is very Scalable and Fault Tolerant. This provides resource management and scheduling for user applications; and Hadoop Map Reduce, which provides the programming model used to tacklelarge distributed data processing mapping data and reducing it to a result. Big Data in most companies are processed by Hadoop by submitting the roles to Master. Thistypeofusage is best-suited to highly scalable public cloud services; The Master distributes the job to its cluster and processmapand reduces tasks sequentially. But nowadays the growing data and the competition between Service Providers lead to the increased submission of jobs to the Master. This Concurrent job submission on Hadoop forces us to do Schedule on Hadoop Cluster so that the response time will be acceptable for each job. 2. PROPOSED SYSTEM In this paper, we present an attribute-based storage system, which uses the ciphertext-policy attribute-based encryption (CP-ABE) and to support securededuplication.To enablethe deduplication and distributed storage of the data across HDFS. And then using two way cloudinourstoragesystemis built under a hybrid cloud architecture, where a private cloud manipulates the computation of the user and a public cloud manages the storage. The private cloud is given a trapdoor key related to the corresponding ciphertext, with which it can transfer the ciphertext over one access policy into ciphertexts of the same plaintext under the otheraccess policies without being conscious of the underlyingplaintext. After receiving a storage request from the user, the private cloud first checks the validity of the upload item through the attached proof. If the proof is valid, the private cloud runs a tag matching algorithm to ascertain whether an equivalent data underlying the ciphertext has been stored 3. HARDWARE AND SOFTWARE SPECIFICATION HARDWARE REQUIREMENTS: Hard disk : 500 GB and above. Processor : i3 and above. Ram : 4GB and above. SOFTWARE REQUIREMENTS: Operating System : Windows 7 and above (64-bit). Java Version : JDK 1.7 Web Server :Tomcat 6.20 Web Server :Tomcat 7.0.11 Storage : Hadoop 2.7 4. TECHNOLOGY USED  JAVA  Cloud Computing  JAVA Platform 5. APACHE TOMCAT SERVER Apache Tomcat (formerly under the ApacheJakarta Project; Tomcat is now a top level project) could also be an internet container developed at the Apache Software Foundation. Tomcat implements the servlet and thusthe JSPspecifyfrom Sun Microsystems, providing an environment forJava torun
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 02 | Feb 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 3156 in cooperation with an online server. It adds tools for configuration andmanagement butalsocanbeconfiguredby editing configuration files that are normally XML-formatted. Because Tomcat includes its own HTTP serverinternally,it's also considered a standalone web server. 5.1 Purpose The main aim of this project is to realize newdistributed de- duplication systems we present an attribute-based storage system with secure deduplication during a hybrid cloud setting with higher reliability. 5.2 Project Scope In this Deduplication techniques are employed to backup data and minimize network of the data and storage of an data overhead by detecting and eliminating redundancy among data from the storage area.so which is crucial for eliminating duplicate copies of identical data so as to save lots of space for storing and network bandwidth.Wepresent an attribute-based storage system with secure access policies data deduplication in a hybrid cloud. Where a personal cloud is liable for duplicate detection and a public cloud manages the storage. Instead of keeping multiple data copy with an equivalent content, during the technique eliminate redundant data by keeping only physical copyand referring other redundant datas thereto copy. 6. Algorithms used  MD5 algorithm.  Base 64.  RSA algorithm. 7. SYSTEM DESIGN 7.1 Uploading a File In this module, cloud user first register the user details and then login the user credential details. Once user name and password is valid open the user profile screen are going to be displayed. A user is an entity whowantstooutsourcedata storage to the HDFS Storage and access the info later. A user register to the HDFS storage with necessaryinformationand login the page for uploading the file. User chooses the file of data and uploads to Storage in the given space where the HDFS store the file in rapid storage system and file level deduplication is checked. 7.2 Mastering File to HDFS Storage Tag the file by using MD5 message-digest algorithm is cryptographic hash function producing a 128-bit hash value typically expressed in text format as 32 digit hex value in order that files of same are deduplicated. Chunking the file chosen for the fixed size given of data andgeneratingtags for each blocks chunked. Then generate convergent keys for every blocks split to verify block level deduplication.Provide filename and password for file authorization in future. This Encrypt the blocks by Triple encoding Standard (3DES) algorithm. Here the plain text is encoded triple times with convergent key then while decoding the primary content it also needs an equivalent key to decode again by triple times. Finally the first content is encrypted as cipher text and stored in slave system. Blocks arestoredinDistributedHDFS Storage Providers. 7.3 Enabling Deduplication Method After encrypting the convergent keys are securely shared with slave machines provider toKeyManagementmachines. Key management slave checks duplicate copies of an data to convergent keysinKMCSP. KeyManagementslavemaintains Comma Separated Values file to see proof of verification of data and store keys secure. Various users who share the common keys are referred by their own ownership. User request for deletion definitely got to prove to proof of ownership to delete own contents. 7.4 Hash Value Based Decryption The final model user request for downloading their document which they need to upload in HDFS storage. This download request needs proper ownership of the data verification of the document here we create the ownership by unique tag generated by MD5 algorithm and verifies existing tag of user. After verification the original content of the data is decrypted by requesting the Distributed HDFS storage where HDFS storage request key management slave for keys to decrypt the given data and finally the original content is received by the user. The delete request will delete only the reference of the content shared by common users, and not the whole content. Fig -1: Block diagram 8. CONCLUSIONS In this project, the new distributed deduplication systems with file-level and fine-grained block-level data deduplication, higher reliability inwhichthedata chunks are distributed across HDFSstorage,reliablekeymanagementin secure deduplication and security of tag consistency and
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 02 | Feb 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 3157 integrity were achieved. The purpose of software requirements specification is to provide a detailedoverview of the software project and its purpose and its parameters and goals. This describes the project target audience and its user interface, hardware and software requirements of the given data. It is defined how the client, team and audience see the project and its functionality. 9. REFERENCES [1] D. Quick, B. Martini, and K. R. Choo, Cloud Storage Forensics. Syngress Publishing / Elsevier, 2014. [Online]. Available:http://www.elsevier.com/books/cloud- storageforensics/ quick/978-0-12-419970-5 [2] K. R. Choo, J. Domingo-Ferrer, and L. Zhang, “Cloud cryptography: Theory, practice and future research directions,” Future Generation Comp. Syst., vol. 62, pp. 51– 53, 2016. [3] K. R. Choo, M. Herman, M. Iorga, and B. Martini, “Cloud forensics: State-of-the-art and future directions,” Digital Investigation, vol. 18, pp. 77–78, 2016. [4] Y. Yang, H. Zhu, H. Lu, J.Weng, Y. Zhang, and K. R. Choo, “Cloud based data sharing with fine-grained proxy re- encryption,” Pervasive and Mobile Computing, vol. 28, pp. 122–134, 2016. [5] D. Quick and K. R. Choo, “Google drive: Forensic analysis of data remnants,” J. Network and Computer Applications, vol. 40, pp. 179– 193, 2014. [6] A. Sahai and B. Waters, “Fuzzy identity-based encryption,” in Advances in Cryptology - EUROCRYPT 2005, 24th Annual International Conference on the Theory and ApplicationsofCryptographicTechniques,Aarhus,Denmark, May 22-26, 2005, Proceedings, ser. Lecture Notes in Computer Science, vol. 3494. Springer, 2005, pp. 457–473.