A hybrid cloud approach for secure authorized deduplication.
1. A PROJECT REPORT ON
A HYBRID CLOUD APPROACH FOR SECURE
AUTHORIZED DEDUPLICATION
Submitted by
T.CHANDU 114P1A0551
M.PRUDHVI KUMAR 114P1A0530
S.CHAITHANYA NAIK 114P1A0548
Esteemed Guidance by
SHAIK ASEEF.(M.Tech)
Asst.Professor.
CSE Department.
YOGANANDA INSTITUTE OF TECHNOLOGY & SCIENCE
DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING
(Approved by AICTE, New Delhi & Affiliated to JNTUA, Anantapur)
Mohan reddynagar,yalamandyam(v),Renigunta(m),Tirupathi.
2014-2015
2. A HYBRID CLOUD APPROACH FOR SECURE
AUTHORIZED DEDUPLICATION
3. YOU COULD ACHIEVE THESE BENEFITS:
REDUCED
COSTS
FLEXIBILITY
MORE
MOBILITY
EASY TO
IMPLEMENT
AGILITY
HIGHLY
AUTOMATED
END USER
PRODUCTIVITY
REDUCED
COSTS FLEXIBILITY
MORE
MOBILITY
EASY TO
IMPLEMENTAGILITY
HIGHLY
AUTOMATED
END USER
PRODUCTIVITY
WITH AN INFRASTRUCTURE THAT IS:
EFFICIENT
SELF
SERVICE
USAGE
BASED
SCALABLE
AND ELASTIC
4. ABSTRACT
• Data deduplication is one of important data compression techniques for eliminating duplicate
copies of repeating data, and has been widely used in cloud storage to reduce the amount of
storage space and save bandwidth.
• The first attempt to formally address the problem of authorized data deduplication. Different
from traditional deduplication systems, the differential privileges of users are further
considered in duplicate check besides the data itself.
• our proposed authorized duplicate check scheme incurs minimal overhead compared to
normal operations.our proposed authorized duplicate check scheme incurs minimal overhead
compared to normal operations.
6. • Cloud computing provides seemingly unlimited “virtualized” resources to users as
services across the whole Internet, while hiding platform and implementation details.
• Today’s cloud service providers offer both highly available storage and massively
parallel computing resources at relatively low costs.
• Cloud computing becomes prevalent, an increasing amount of data is being stored in
the cloud and shared by users with specified privileges, which define the access rights
of the stored data.
EXISTING SYSTEM
7. EXISTING SYSTEM DISADVANTAGES
• One critical challenge of cloud storage services is the management of the ever-
increasing volume of data.
• Increasing of duplicate data in cloud storage and it increases size of occupation and
increases bandwidth.
8. PROPOSED SYSTEM
• We also present several new deduplication constructions supporting authorized
duplicate check in a hybrid cloud architecture.
• Security analysis demonstrates that our scheme is secure in terms of the definitions
specified in the proposed security model.
• Our proposed authorized duplicate check scheme incurs minimal overhead
compared to normal operations.
9. PROPOSED SYSTEM ADVANTAGES
• Decreasing of duplicate data in cloud storage and save the server space.
• It Decreases size of occupation and Decreases bandwidth.
• One critical challenge of cloud storage services is the management of the ever-
increasing volume of data.