Secured Authorized Deduplication Based Hybrid Cloud

T

The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published. The papers for publication in The International Journal of Engineering& Science are selected through rigorous peer reviews to ensure originality, timeliness, relevance, and readability. Theoretical work submitted to the Journal should be original in its motivation or modeling structure. Empirical analysis should be based on a theoretical framework and should be capable of replication. It is expected that all materials required for replication (including computer programs and data sets) should be available upon request to the authors. The International Journal of Engineering & Science would take much care in making your article published without much delay with your kind cooperation

The International Journal Of Engineering And Science (IJES)
|| Volume || 3 || Issue || 11|| Pages || 34-39 || 2014 ||
ISSN (e): 2319 – 1813 ISSN (p): 2319 – 1805
www.theijes.com The IJES Page 34
Secured Authorized Deduplication Based Hybrid Cloud
1,
R.S.Walunj , 2,
D.A.Lande , 3,
N.S.Pansare
1,2,3,
Computer Engg. Jaihind College Of Engg,Kuran
------------------------------------------------ABSTRACT----------------------------------------------------------
Data deduplication is an important technique for eliminating redundant data.Insted of taking no. of same files,
it store only single copy of file.In most organizations,storage system contain many pieces of duplicate data. .
For example, the same file may be saved in several different places by different users. Deduplication eliminates
these extra copies by saving just one copy of the data and replacing the other copies with pointers that lead
back to the original copy. It is data compression technique for improve the bandwidth efficiency and storage
utilization.Data deduplication most widely used in cloud computing.It make data management scalable and
storage problem in cloud computing.Data deduplication protect the confidentiality of sensitive data.data
deduplication work with convergent encryption technique to encrypt the data before uploading. . Companies
frequently use deduplication in backup and disaster recovery applications.In this paper we attempt authorized
deduplication check, combine with convergent encryption for providing security to sensitive data using hybrid
cloud computing.
KEYWORDS : Deduplication, authorized duplicate check, confidentiality, hybrid cloud,covergent encryption.
---------------------------------------------------------------------------------------------------------------------------------------
Date of Submission: 30 October 2014 Date of Accepted: 20 November 2014
---------------------------------------------------------------------------------------------------------------------------------------
I. INTRODUCTION
Cloud computing technique which is most widely used todays.In that, computing is done over the large
communication network like Internet.It is an important solution for business storage in low cost.Cloud
computing provide vast storage in all sector like government, enterprise,also for storing our personal data on
cloud. Without background implementation details,platform user can access and share different resources on
cloud.The most important problem in cloud computing is that large amount of storage space and security issues.
One critical challenge of cloud storage to management of ever-increasing volume of data.To improve
scalability,storage problem data deduplication is most important technique and has attracted more attension
recently.It is an important technique for data compression ,It simply avoid the duplicate copies of data and store
single copy of data.Data deduplication take place in either block level or file level.In file level approach
duplicate files are eliminate,and in block level approach duplicate blocks of data that occur in non-identical
files.Deduplication reduce the storage needs by upto 90-95% for backup application,68% in standard file
system.Important issues in data deduplication that security and privacy to protect the data from insider or
outsider attack.For data confidentiality,encryption is used by different user for encrypt there files or data ,using a
secrete key user perform encryption and decryption operation.For uploading file to cloud user first generate
convergent key,encryption of file then load file to the cloud.To prevent unauthorize access proof of ownership
protocol is used to provide proof that the user indeed owns the same file when deduplication found.After the
proof,server provide a pointer to subsequent user for accessing same file without needing to upload same
file.When user want to download file he simply download encrypted file from cloud and decrypt this file using
convergent key.
PRELIMINARIES : In this section ,we first define notations used in this paper,review secure primitives .The
notation used in this paper are listed in Table 1.
Convergent encryption. Convergent encryption is used to encrypt and decrypt file.User can derives the
convergent key from each original data copy,then using that key encrpty data file.Also user derives tag for data
copy to check duplicate data.If tag are same then both files are same. Both convergent key and tag are
independently derives. Convergent encryption, also known as content hash keying, is used to produces identical
ciphertext from identical plaintext files. The simplest implementation of convergent encryption can be defined
as: Alice derives the encryption key from her file F such that K = H(F), where H is a cryptographic hash
function.Convergent encryption scheme can be defined with four primitive functions:
Secured Authorized Deduplication Based…
www.theijes.com The IJES Page 35
[1] KeyGenCE(M ) -> K is the key generation algorithm that maps a data copy M to a convergent key K;
[2] EncCE(K, M ) ->C is the symmetric encryption algorithm that takes both the convergent key K and the data
copy M as inputs and then outputs a ciphertext C;
[3] DecCE (K, C) ->M is the decryption algorithm that takes both the ciphertext C and the convergent key K as
inputs and then outputs the original data copy M ; and
[4] TagGen(M ) -> T (M ) is the tag generation algorithm that maps the original data copy M and outputs a tag
T (M ).
Proof of ownership. proof of ownership(PoW) is a protocol enables users to prove their ownership of data
copies to the storage server.PoW is implemented as an interactive algorithm run by user and storage server act
as prover and verifier. The verifier derives a short value ϕ(M )from a data copy M . To prove the ownership of
the data copy M , the prover needs to send ϕ to the verifier such that ϕ= ϕ(M ). The formal security definition for
PoW roughly follows the threat model in a content distribution network, where an attacker does not know the
entire file, but has accomplices who have the file. proof of-ownership is specified by a summary function S(.)
(which could be randomized and takes the input file F and a security parameter),and an interactive two-party
protocol ||(P V ). To solve the problem of using a small hash value as a proxy for the entire file, we want to
design a solution where a client proves to the server that it indeed has the file. We call a proof mechanism that
prevents such leakage amplification a proof of ownership (PoW).
Public hash function. To support cross-user deduplication, all users must use the same procedure for
identifying duplicate files. Hence this procedure must be public i.e. each user implement it, which means that a
determined attacker can learn it.
System Model and Adversary Model : In the client deduplication scenario, the S-CSP server keeps a single
copy of the original file, regardless of the number of user that request to store the file. All users that possess the
original file only use link to the single copy of the original file stored on the S-CSP server. Specifically, a client
user first sends the hash value of the original file to the server, and then the server checks whether the hash
value already exists in its database. If the hash value is the same as an existing hash value stored on the server,
the server will challenge the user to ask for the proof of possession of the original file. After a successful
challenge, the client does not have to upload the file again to the server. At the same time, the server marks the
client as an owner of the original file. From then on, there is no difference between the client and the users who
uploaded the original file. Thus, the deduplication process saves the communication bandwidth as well as the
storage space.
.
DESIGN GOALS : In this paper, we address the problem of privacy preserving deduplication in cloud
computing and propose a new deduplication system supporting for:
 Differential Authorization. Each authorized user is able to access its individual token of his file to
perform duplicate check based on authority.Under this assumption, any user cannot generate a token for
duplicate check out of his access or without the aid from the private cloud server.
 Authorized Duplicate Check. Authorized user is able to access his/her own token from private cloud,while
the public cloud performs duplicate check directly and tells the user if there is any duplicate. The security
requirements considered in this paper lie in two folds, including the security of file token and security of
data files. For the security of file token, two aspects are defined as unforgeability and indistinguishability of
file token. The details are given below.
 Unforgeability of file token/duplicate-check token. User make registration in private cloud for generating
file token.Using respective file token he/she upload or download files on public cloud. The users are not
allowed to collude with the public cloud server to break the unforgeability of file tokens. In our system, the
S-CSP is honest but curious and will honestly perform the duplicate check upon receiving the duplicate
request from users. The duplicate check token of users should be issued from the private cloud server in our
scheme.
 Indistinguishability of file token/duplicate-check token. It requires that any user without querying the
private cloud server for some file token, he cannot get any useful information from the token, which
includes the file information and key information.
Secured Authorized Deduplication Based…
www.theijes.com The IJES Page 36
 Data Confidentiality. Unauthorized users without appropriate token , including the S-CSP and the private
cloud server, should be prevented from access to the underlying plaintext stored at S-CSP. In another word,
the goal of the adversary is to retrieve and recover the files that do not belong to them. In our system,
compared to the previous definition of data confidentiality based on convergent encryption, a higher level
confidentiality is defined and achieved.
Table 1. Notations Used in This Paper
Acronym Description
S-CSP Storage cloud service provider
POW Proof of Ownership
KF
Convergent encryption key for
file F
H Hash function
II. PROPOSED SYSTEM
In our system we implement a project that includes the public cloud and the private cloud and also the
hybrid cloud which is a combination of the both public cloud and private cloud. In general by if we used the
public cloud we can’t provide the security to our private data and hence our private data will be loss.So that we
have to provide the security to our data for that we make a use of private cloud also. When we use a private
clouds the greater security can be provided.In this system we also provides the data deduplication . which is
used to avoid the duplicate copies of data.User can upload and download the files from public cloud but private
cloudprovides the security for that data.that means only the authorized person can upload and download the files
from the
Fig 1:Architecture of Authorized Deduplication
public cloud.for that user generates the key and storeed that key onto the private cloud. at the time of
downloading user request to the private cloud for key and then access that
Particular file.
System Model :Now we see the architecture of our system. in our architecture there are three modules .
[1] user
[2] public cloud
[3] private cloud.etc
Secured Authorized Deduplication Based…
www.theijes.com The IJES Page 37
First if the user want to upload the files on the public cloud then user first encrypt that file with the convergent
key and then sends it to the public cloud at the same time user also generates the key for that file and sends that
key to the private cloud for the purpose of security.In the public cloud we use one algorithm for deduplication.
Which is used to avoid the duplicate copies of files which is entered in the public cloud. Hence it also minimizes
the bandwidth. that means we requires the less storage space for storing the files on the public cloud.In the
public cloud any person that means the unauthorized person can also access or store the data so we can conclude
that in the public cloud the security is not provided. In general for providing more security user can use the
private cloud instead of using the public cloud.User generates the key at the time of uploading file and store it to
the private cloud.When user wants to downloads the file that he/she upload,.he/she sends the request to the
public cloud. Public cloud provides the list of files that are uploads the many user of the public cloud because
there is no security is provided in the public cloud.When user selects one of the file from the list of files then
private cloud sends a message like enter the key!. User has to enter the key that he generated for that file. When
user enter the key the private cloud checks the key for that file and if the key is correct that means user is valid
then private cloud give access to that user to download that file successufully. then user downloads the file from
the public cloud and decrypt that file by using the same convergent key which is used at the time of encrypt that
file.in this way user can make a use of the architecture.
III. ROLES OF ENTITIES
S-CSP:The purpose of this entity to work as a data storage service in public cloud.On the half of the user S-CSP
store the data.The S-CSP eliminate the duplicate data using deduplication and keep the unique data as it is.S-
SCP entity is used to reduce the storage cost.S-CSP han abundant storage capacity and computational
power.When user send respective token for accessing his file from public cloud S-CSP matches this token with
internally if it matched then an then only he send the file or ciphertext Cf with token, otherwise he send abort
signal to user.After receiving file user use convergent key KF to decrypt the file.
Data User: A user is an entity that want to access the data or files from S-SCP.User generate the key and store
that key in private cloud.In storage system supporting deduplication,The user only upload unique data but do not
upload any duplicate data to save the upload bandwidth,which may be owned by the same user or different
users.Each file is protected by convergent encryption key and can access by only athorized person.In our system
user must need to register in private cloud for storing token with respective file which are store on public
cloud.When he want to access that file he access respective token from private cloud and then access his files
from public cloud.token consist of file content F and convergent key KF.
Private Cloud: In general for providing more security user can use the private cloud instead of public
cloud.User store the generated key in private cloud.At the time of downloading system ask the key to download
the file.User can not store the secrete key internally.for providing proper protection to key we use private
cloud.Private cloud only store the convergent key with respective file.When user want to access the key he first
check authority of user then an then provide key.
Public Cloud:Public cloud entity is used for the storage purpose.User upload the files in public cloud.Public
cloud is similar as S-CSP.When the user want to download the files from public cloud,it will be ask the key
which is generated or stored in private cloud.When the users key is match with files key at that time user can
download the file,without key user can not access the file.Only authorized user can access the file.In public
cloud all files are stored in encrypted format.If any chance unauthorized person hack our file,but without the
secrete or convergent key he doesn’t access original file.On public cloud there are lots of files are store each
user access its respective file if its token matches with S-CSP server token.
Operations performed on Hybrid Cloud
 File Uploading : When user want to upload the file to the public cloud then user first encrypt the file which
is to be upload by make a use of the symmetric key,and send it to the Public cloud. At the same time user
generates the key for that file and sends it to the private cloud. in this way user can upload the file in to the
public cloud.
 File Downloading: When user wants to download the file that he/she has upload on the public
cloud.he/she make a request to the public cloud. then public cloud provide a list of files that many users
are upload on it.Among that user select one of the file form the list of files and enter the download
option.at that time private cloud sends a message that enter the key for the file generasted by the
user.then user enters the key for the file that he/she is generated.then private cloud checks the key for that
Secured Authorized Deduplication Based…
www.theijes.com The IJES Page 38
file and if the key is correct that means the user is valid.only then and then the user can download the file from
the public cloud otherwise user can’t download the file. When user download the file from the public cloud it is
in the encrypted format then user decrypt that file by using the same symmetric key.
IV. IMPLEMENTATION
We implement system with data deduplication,in which we model three entities as separate programs.
A Client program is used to model the data users to carry out the file upload/download process.
A Private Server program is used to model the private cloud which manages the private keys and handles the file
token computation. A Storage Server program is used to model the S-CSP which stores and deduplicates files.
Followings are function calls used in system:
 FileTag(File) - It computes SHA-1 hash of the File as File Tag;
 DupCheckReq(Token) - It requests the Storage Server for Duplicate Check of the file.
 FileEncrypt(File) - It encrypts the File with Convergent Encryption using 256-bit AES algorithm in cipher
block chaining (CBC) mode, where the convergent key is from SHA-256 Hashing of the file;
 FileUploadReq(FileID, File, Token) – It uploads the File Data to the Storage Server if the file is Unique and
updates the File Token stored.
 FileStore(FileID, File, Token) - It stores the File on Disk and updates the Mapping.
V. CONCLUSION
In this paper, the idea of authorized data deduplication was proposed to protect the data security by
including differential authority of users in the duplicate check. In public cloud our data are securely store in
encrypted format,and also in private cloud our key is store with respective file.There is no need to user
remember the key.So without key anyone can not access our file or data from public cloud.
REFERENCES
[1] Open SSL Project. http://www.openssl.org/.
[2] P. Anderson and L.Zhang. Fast and secure laptop backups with encrypted de-duplication.In Proc.of USENIX LISA, 2010.
[3] M. Bellare, S. Keelveedhi, and T. Ristenpart. Dupless: Serveraided encryption for deduplicated storage. In USENIX Security
Symposium, 2013.
[4] M. Bellare, S. Keelveedhi, and T. Ristenpart. Message-locked encryption and secure deduplication. In EUROCRYPT, pages 296–
312, 2013.
[5] M. Bellare, C. Namprempre, and G. Neven. Security proofs for identity-based identification and signature schemes.
Cryptology,22(1):1–61, 2009.
[6] M. Bellare and A. Palacio. Gq and schnorr identification schemes:Proofs of security against impersonation under active and
concurrentattacks. In CRYPTO, pages 162–177, 2002.
[7] S. Bugiel, S. Nurnberger, A. Sadeghi, and T. Schneider. Twinclouds: An architecture for secure cloud computing. In Workshopon
Cryptography and Security in Clouds (WCSC 2011), 2011.
[8] J. R. Douceur, A. Adya, W. J. Bolosky, D. Simon, and M. Theimer.Reclaiming space from duplicate files in a serverless
distributedfile system. In ICDCS, pages 617–624, 2002.
[9] D. Ferraiolo and R. Kuhn. Role-based access controls. In 15thNIST-NCSC National Computer Security Conf., 1992.
[10] GNULibmicrohttpd.http://www.gnu.org/software/libmicrohttpd/.
R.S.Walunj completd diploma in computer engg(2012). Currently she is student of Department of Computer
Engineering at Jaihind college of engg,kuran in last year.She is interested to search latest information related
to security purpose.
Secured Authorized Deduplication Based…
www.theijes.com The IJES Page 39
N.S.Pansare completd diploma in computer engg(2012). Currently she is student of Department of Computer
Engineering at Jaihind college of engg,kuran in last year.She is interested to search latest information related
to cloud computing.
D.A.Lande completed diploma in computer engg(2012). Currently she is student of Department of Computer
Engineering at Jaihind college of engg,kuran in last year.She is interested to search latest information related
to hybrid cloud computing.

Recomendados

Implementation of De-Duplication Algorithm von
Implementation of De-Duplication AlgorithmImplementation of De-Duplication Algorithm
Implementation of De-Duplication AlgorithmIRJET Journal
31 views5 Folien
Ieeepro techno solutions 2014 ieee java project -key-aggregate cryptosystem... von
Ieeepro techno solutions   2014 ieee java project -key-aggregate cryptosystem...Ieeepro techno solutions   2014 ieee java project -key-aggregate cryptosystem...
Ieeepro techno solutions 2014 ieee java project -key-aggregate cryptosystem...hemanthbbc
509 views11 Folien
Secret keys and the packets transportation for privacy data forwarding method... von
Secret keys and the packets transportation for privacy data forwarding method...Secret keys and the packets transportation for privacy data forwarding method...
Secret keys and the packets transportation for privacy data forwarding method...eSAT Publishing House
326 views5 Folien
Secret keys and the packets transportation for privacy data forwarding method... von
Secret keys and the packets transportation for privacy data forwarding method...Secret keys and the packets transportation for privacy data forwarding method...
Secret keys and the packets transportation for privacy data forwarding method...eSAT Journals
73 views5 Folien
A hybrid cloud approach for secure authorized deduplication von
A hybrid cloud approach for secure authorized deduplicationA hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplicationTmks Infotech
356 views11 Folien
A Hybrid Cloud Approach for Secure Authorized Deduplication von
A Hybrid Cloud Approach for Secure Authorized DeduplicationA Hybrid Cloud Approach for Secure Authorized Deduplication
A Hybrid Cloud Approach for Secure Authorized Deduplication1crore projects
369 views11 Folien

Más contenido relacionado

Was ist angesagt?

262 265 von
262 265262 265
262 265Editor IJARCET
961 views4 Folien
Hybrid Cloud Approach for Secure Authorized Deduplication von
Hybrid Cloud Approach for Secure Authorized DeduplicationHybrid Cloud Approach for Secure Authorized Deduplication
Hybrid Cloud Approach for Secure Authorized DeduplicationPrem Rao
1.9K views52 Folien
International Journal of Engineering and Science Invention (IJESI) von
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)inventionjournals
504 views6 Folien
IRJET- Privacy Preserving Encrypted Keyword Search Schemes von
IRJET-  	  Privacy Preserving Encrypted Keyword Search SchemesIRJET-  	  Privacy Preserving Encrypted Keyword Search Schemes
IRJET- Privacy Preserving Encrypted Keyword Search SchemesIRJET Journal
35 views4 Folien
A Hybrid Cloud Approach for Secure Authorized Deduplication von
A Hybrid Cloud Approach for Secure Authorized DeduplicationA Hybrid Cloud Approach for Secure Authorized Deduplication
A Hybrid Cloud Approach for Secure Authorized DeduplicationSWAMI06
1.7K views8 Folien
SECRY - Secure file storage on cloud using hybrid cryptography von
SECRY - Secure file storage on cloud using hybrid cryptographySECRY - Secure file storage on cloud using hybrid cryptography
SECRY - Secure file storage on cloud using hybrid cryptographyALIN BABU
2.1K views34 Folien

Was ist angesagt?(18)

Hybrid Cloud Approach for Secure Authorized Deduplication von Prem Rao
Hybrid Cloud Approach for Secure Authorized DeduplicationHybrid Cloud Approach for Secure Authorized Deduplication
Hybrid Cloud Approach for Secure Authorized Deduplication
Prem Rao1.9K views
International Journal of Engineering and Science Invention (IJESI) von inventionjournals
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
inventionjournals504 views
IRJET- Privacy Preserving Encrypted Keyword Search Schemes von IRJET Journal
IRJET-  	  Privacy Preserving Encrypted Keyword Search SchemesIRJET-  	  Privacy Preserving Encrypted Keyword Search Schemes
IRJET- Privacy Preserving Encrypted Keyword Search Schemes
IRJET Journal35 views
A Hybrid Cloud Approach for Secure Authorized Deduplication von SWAMI06
A Hybrid Cloud Approach for Secure Authorized DeduplicationA Hybrid Cloud Approach for Secure Authorized Deduplication
A Hybrid Cloud Approach for Secure Authorized Deduplication
SWAMI061.7K views
SECRY - Secure file storage on cloud using hybrid cryptography von ALIN BABU
SECRY - Secure file storage on cloud using hybrid cryptographySECRY - Secure file storage on cloud using hybrid cryptography
SECRY - Secure file storage on cloud using hybrid cryptography
ALIN BABU2.1K views
IRJET- Multiple Keyword Search over Encrypted Cloud Data von IRJET Journal
IRJET- Multiple Keyword Search over Encrypted Cloud DataIRJET- Multiple Keyword Search over Encrypted Cloud Data
IRJET- Multiple Keyword Search over Encrypted Cloud Data
IRJET Journal19 views
Ieeepro techno solutions 2014 ieee java project - query services in cost ef... von hemanthbbc
Ieeepro techno solutions   2014 ieee java project - query services in cost ef...Ieeepro techno solutions   2014 ieee java project - query services in cost ef...
Ieeepro techno solutions 2014 ieee java project - query services in cost ef...
hemanthbbc96 views
IJSRED-V2I2P10 von IJSRED
IJSRED-V2I2P10IJSRED-V2I2P10
IJSRED-V2I2P10
IJSRED12 views
Retrieving Secure Data from Cloud Using OTP von AM Publications
Retrieving Secure Data from Cloud Using OTPRetrieving Secure Data from Cloud Using OTP
Retrieving Secure Data from Cloud Using OTP
AM Publications245 views
IRJET - A Secure Access Policies based on Data Deduplication System von IRJET Journal
IRJET - A Secure Access Policies based on Data Deduplication SystemIRJET - A Secure Access Policies based on Data Deduplication System
IRJET - A Secure Access Policies based on Data Deduplication System
IRJET Journal8 views
IRJET- Comparative Analysis of Encryption Techniques von IRJET Journal
IRJET-  	  Comparative Analysis of Encryption TechniquesIRJET-  	  Comparative Analysis of Encryption Techniques
IRJET- Comparative Analysis of Encryption Techniques
IRJET Journal15 views
Secure deduplicaton with efficient and reliable convergent von Jayakrishnan U
Secure deduplicaton with  efficient and reliable   convergentSecure deduplicaton with  efficient and reliable   convergent
Secure deduplicaton with efficient and reliable convergent
Jayakrishnan U882 views
Doc A hybrid cloud approach for secure authorized deduplication von Shakas Technologie
 Doc A hybrid cloud approach for secure authorized deduplication Doc A hybrid cloud approach for secure authorized deduplication
Doc A hybrid cloud approach for secure authorized deduplication
Shakas Technologie4.2K views

Destacado

Photocatalytic Degradation of Meta-chlorophenol using Solar and Artificial Ra... von
Photocatalytic Degradation of Meta-chlorophenol using Solar and Artificial Ra...Photocatalytic Degradation of Meta-chlorophenol using Solar and Artificial Ra...
Photocatalytic Degradation of Meta-chlorophenol using Solar and Artificial Ra...theijes
327 views6 Folien
Adoption of Ict in the Tourism and Hospitality Sector In Zimbabwe von
Adoption of Ict in the Tourism and Hospitality Sector In ZimbabweAdoption of Ict in the Tourism and Hospitality Sector In Zimbabwe
Adoption of Ict in the Tourism and Hospitality Sector In Zimbabwetheijes
658 views7 Folien
when a coil is rotated or turned under a magnetic field, there occurs a force... von
when a coil is rotated or turned under a magnetic field, there occurs a force...when a coil is rotated or turned under a magnetic field, there occurs a force...
when a coil is rotated or turned under a magnetic field, there occurs a force...theijes
343 views5 Folien
The Subansiri River Basin Of Eastern Himalaya And The Alaknanda River Basin O... von
The Subansiri River Basin Of Eastern Himalaya And The Alaknanda River Basin O...The Subansiri River Basin Of Eastern Himalaya And The Alaknanda River Basin O...
The Subansiri River Basin Of Eastern Himalaya And The Alaknanda River Basin O...theijes
449 views7 Folien
Duality Theory in Multi Objective Linear Programming Problems von
Duality Theory in Multi Objective Linear Programming ProblemsDuality Theory in Multi Objective Linear Programming Problems
Duality Theory in Multi Objective Linear Programming Problemstheijes
430 views6 Folien
Adaptive Grouping Quantum Inspired Shuffled Frog Leaping Algorithm von
Adaptive Grouping Quantum Inspired Shuffled Frog Leaping AlgorithmAdaptive Grouping Quantum Inspired Shuffled Frog Leaping Algorithm
Adaptive Grouping Quantum Inspired Shuffled Frog Leaping Algorithmtheijes
395 views12 Folien

Destacado(19)

Photocatalytic Degradation of Meta-chlorophenol using Solar and Artificial Ra... von theijes
Photocatalytic Degradation of Meta-chlorophenol using Solar and Artificial Ra...Photocatalytic Degradation of Meta-chlorophenol using Solar and Artificial Ra...
Photocatalytic Degradation of Meta-chlorophenol using Solar and Artificial Ra...
theijes327 views
Adoption of Ict in the Tourism and Hospitality Sector In Zimbabwe von theijes
Adoption of Ict in the Tourism and Hospitality Sector In ZimbabweAdoption of Ict in the Tourism and Hospitality Sector In Zimbabwe
Adoption of Ict in the Tourism and Hospitality Sector In Zimbabwe
theijes658 views
when a coil is rotated or turned under a magnetic field, there occurs a force... von theijes
when a coil is rotated or turned under a magnetic field, there occurs a force...when a coil is rotated or turned under a magnetic field, there occurs a force...
when a coil is rotated or turned under a magnetic field, there occurs a force...
theijes343 views
The Subansiri River Basin Of Eastern Himalaya And The Alaknanda River Basin O... von theijes
The Subansiri River Basin Of Eastern Himalaya And The Alaknanda River Basin O...The Subansiri River Basin Of Eastern Himalaya And The Alaknanda River Basin O...
The Subansiri River Basin Of Eastern Himalaya And The Alaknanda River Basin O...
theijes449 views
Duality Theory in Multi Objective Linear Programming Problems von theijes
Duality Theory in Multi Objective Linear Programming ProblemsDuality Theory in Multi Objective Linear Programming Problems
Duality Theory in Multi Objective Linear Programming Problems
theijes430 views
Adaptive Grouping Quantum Inspired Shuffled Frog Leaping Algorithm von theijes
Adaptive Grouping Quantum Inspired Shuffled Frog Leaping AlgorithmAdaptive Grouping Quantum Inspired Shuffled Frog Leaping Algorithm
Adaptive Grouping Quantum Inspired Shuffled Frog Leaping Algorithm
theijes395 views
The Implementation of Social Media for Educational Objectives von theijes
The Implementation of Social Media for Educational ObjectivesThe Implementation of Social Media for Educational Objectives
The Implementation of Social Media for Educational Objectives
theijes292 views
Personality Identification using Facial Features von theijes
Personality Identification using Facial FeaturesPersonality Identification using Facial Features
Personality Identification using Facial Features
theijes310 views
Survey of Some New Road Extraction Methods von theijes
Survey of Some New Road Extraction MethodsSurvey of Some New Road Extraction Methods
Survey of Some New Road Extraction Methods
theijes322 views
Prevalence Of B.Cereus In Uncontrolled Fermented Cow-Milk And The Influence ... von theijes
	Prevalence Of B.Cereus In Uncontrolled Fermented Cow-Milk And The Influence ...	Prevalence Of B.Cereus In Uncontrolled Fermented Cow-Milk And The Influence ...
Prevalence Of B.Cereus In Uncontrolled Fermented Cow-Milk And The Influence ...
theijes363 views
An Analysis of the Information Security Governance in the State Owned Enterpr... von theijes
An Analysis of the Information Security Governance in the State Owned Enterpr...An Analysis of the Information Security Governance in the State Owned Enterpr...
An Analysis of the Information Security Governance in the State Owned Enterpr...
theijes384 views
The Parameters and Equipments Used in TIG Welding: A Review von theijes
The Parameters and Equipments Used in TIG Welding: A ReviewThe Parameters and Equipments Used in TIG Welding: A Review
The Parameters and Equipments Used in TIG Welding: A Review
theijes808 views
Analysis Of Groundwater Quality By WQI von theijes
Analysis Of Groundwater Quality By WQIAnalysis Of Groundwater Quality By WQI
Analysis Of Groundwater Quality By WQI
theijes340 views
Design, Construction and Performance Evaluation of Two Types of Improved Woo... von theijes
	Design, Construction and Performance Evaluation of Two Types of Improved Woo...	Design, Construction and Performance Evaluation of Two Types of Improved Woo...
Design, Construction and Performance Evaluation of Two Types of Improved Woo...
theijes426 views
Re-Visiting Environmental and Health Effects of Nichemtex Textile Industry on... von theijes
Re-Visiting Environmental and Health Effects of Nichemtex Textile Industry on...Re-Visiting Environmental and Health Effects of Nichemtex Textile Industry on...
Re-Visiting Environmental and Health Effects of Nichemtex Textile Industry on...
theijes339 views
THD Minimisation for Phase Voltage of Multilevel Inverters Using Genetic Algo... von theijes
THD Minimisation for Phase Voltage of Multilevel Inverters Using Genetic Algo...THD Minimisation for Phase Voltage of Multilevel Inverters Using Genetic Algo...
THD Minimisation for Phase Voltage of Multilevel Inverters Using Genetic Algo...
theijes513 views
Cost Segregation Analysis - The Emerging Practice Of Quantity Surveyors And ... von theijes
	Cost Segregation Analysis - The Emerging Practice Of Quantity Surveyors And ...	Cost Segregation Analysis - The Emerging Practice Of Quantity Surveyors And ...
Cost Segregation Analysis - The Emerging Practice Of Quantity Surveyors And ...
theijes623 views
Principles and Practice of the Maintenance of Physical Education Curriculum F... von theijes
Principles and Practice of the Maintenance of Physical Education Curriculum F...Principles and Practice of the Maintenance of Physical Education Curriculum F...
Principles and Practice of the Maintenance of Physical Education Curriculum F...
theijes377 views
Effects of Various Material Infiltrants in Sls Process von theijes
Effects of Various Material Infiltrants in Sls ProcessEffects of Various Material Infiltrants in Sls Process
Effects of Various Material Infiltrants in Sls Process
theijes276 views

Similar a Secured Authorized Deduplication Based Hybrid Cloud

IEEE 2014 JAVA CLOUD COMPUTING PROJECTS A hybrid cloud approach for secure au... von
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS A hybrid cloud approach for secure au...IEEE 2014 JAVA CLOUD COMPUTING PROJECTS A hybrid cloud approach for secure au...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS A hybrid cloud approach for secure au...IEEEGLOBALSOFTSTUDENTPROJECTS
326 views6 Folien
2014 IEEE JAVA CLOUD COMPUTING PROJECT A hybrid cloud approach for secure aut... von
2014 IEEE JAVA CLOUD COMPUTING PROJECT A hybrid cloud approach for secure aut...2014 IEEE JAVA CLOUD COMPUTING PROJECT A hybrid cloud approach for secure aut...
2014 IEEE JAVA CLOUD COMPUTING PROJECT A hybrid cloud approach for secure aut...IEEEFINALSEMSTUDENTPROJECTS
197 views6 Folien
2014 IEEE JAVA CLOUD COMPUTING PROJECT A hybrid cloud approach for secure aut... von
2014 IEEE JAVA CLOUD COMPUTING PROJECT A hybrid cloud approach for secure aut...2014 IEEE JAVA CLOUD COMPUTING PROJECT A hybrid cloud approach for secure aut...
2014 IEEE JAVA CLOUD COMPUTING PROJECT A hybrid cloud approach for secure aut...IEEEFINALYEARSTUDENTPROJECT
434 views6 Folien
Improving Efficiency of Security in Multi-Cloud von
Improving Efficiency of Security in Multi-CloudImproving Efficiency of Security in Multi-Cloud
Improving Efficiency of Security in Multi-CloudIJTET Journal
317 views4 Folien
JAVA projects 2014 von
JAVA projects 2014JAVA projects 2014
JAVA projects 2014Senthilvel S
240 views6 Folien
Ieeepro techno solutions 2014 ieee dotnet project - a hybrid cloud approach... von
Ieeepro techno solutions   2014 ieee dotnet project - a hybrid cloud approach...Ieeepro techno solutions   2014 ieee dotnet project - a hybrid cloud approach...
Ieeepro techno solutions 2014 ieee dotnet project - a hybrid cloud approach...ASAITHAMBIRAJAA
146 views12 Folien

Similar a Secured Authorized Deduplication Based Hybrid Cloud(20)

Improving Efficiency of Security in Multi-Cloud von IJTET Journal
Improving Efficiency of Security in Multi-CloudImproving Efficiency of Security in Multi-Cloud
Improving Efficiency of Security in Multi-Cloud
IJTET Journal317 views
Ieeepro techno solutions 2014 ieee dotnet project - a hybrid cloud approach... von ASAITHAMBIRAJAA
Ieeepro techno solutions   2014 ieee dotnet project - a hybrid cloud approach...Ieeepro techno solutions   2014 ieee dotnet project - a hybrid cloud approach...
Ieeepro techno solutions 2014 ieee dotnet project - a hybrid cloud approach...
ASAITHAMBIRAJAA146 views
Ieeepro techno solutions 2014 ieee java project - a hybrid cloud approach f... von hemanthbbc
Ieeepro techno solutions   2014 ieee java project - a hybrid cloud approach f...Ieeepro techno solutions   2014 ieee java project - a hybrid cloud approach f...
Ieeepro techno solutions 2014 ieee java project - a hybrid cloud approach f...
hemanthbbc128 views
IRJET - Virtual Data Auditing at Overcast Environment von IRJET Journal
IRJET - Virtual Data Auditing at Overcast EnvironmentIRJET - Virtual Data Auditing at Overcast Environment
IRJET - Virtual Data Auditing at Overcast Environment
IRJET Journal13 views
Providing Secure Cloud for College Campus von vivatechijri
Providing Secure Cloud for College CampusProviding Secure Cloud for College Campus
Providing Secure Cloud for College Campus
vivatechijri16 views
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo... von Editor IJCATR
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
Editor IJCATR124 views
Paper id 712019116 von IJRAT
Paper id 712019116Paper id 712019116
Paper id 712019116
IJRAT26 views
Two Level Auditing Architecture to Maintain Consistent In Cloud von theijes
Two Level Auditing Architecture to Maintain Consistent In CloudTwo Level Auditing Architecture to Maintain Consistent In Cloud
Two Level Auditing Architecture to Maintain Consistent In Cloud
theijes377 views
IRJET - Confidential Image De-Duplication in Cloud Storage von IRJET Journal
IRJET - Confidential Image De-Duplication in Cloud StorageIRJET - Confidential Image De-Duplication in Cloud Storage
IRJET - Confidential Image De-Duplication in Cloud Storage
IRJET Journal11 views
IRJET- Improving Data Spillage in Multi-Cloud Capacity Administration von IRJET Journal
IRJET-  	  Improving Data Spillage in Multi-Cloud Capacity AdministrationIRJET-  	  Improving Data Spillage in Multi-Cloud Capacity Administration
IRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
IRJET Journal29 views
IRJET- Improving Data Spillage in Multi-Cloud Capacity Administration von IRJET Journal
IRJET- Improving Data Spillage in Multi-Cloud Capacity AdministrationIRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
IRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
IRJET Journal13 views
Authorized Duplicate Check Scheme von IRJET Journal
Authorized Duplicate Check SchemeAuthorized Duplicate Check Scheme
Authorized Duplicate Check Scheme
IRJET Journal30 views
Secure sensitive data sharing on a big data platform von Nexgen Technology
Secure sensitive data sharing on a big data platformSecure sensitive data sharing on a big data platform
Secure sensitive data sharing on a big data platform
Nexgen Technology 1.7K views
Secure sensitive data sharing on a big data platform von Nexgen Technology
Secure sensitive data sharing on a big data platformSecure sensitive data sharing on a big data platform
Secure sensitive data sharing on a big data platform
Nexgen Technology 404 views
Secure Auditing and Deduplicating Data on Cloud von IJMTST Journal
Secure Auditing and Deduplicating Data on CloudSecure Auditing and Deduplicating Data on Cloud
Secure Auditing and Deduplicating Data on Cloud
IJMTST Journal82 views

Último

【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院 von
【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院
【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院IttrainingIttraining
41 views8 Folien
6g - REPORT.pdf von
6g - REPORT.pdf6g - REPORT.pdf
6g - REPORT.pdfLiveplex
10 views23 Folien
Data-centric AI and the convergence of data and model engineering: opportunit... von
Data-centric AI and the convergence of data and model engineering:opportunit...Data-centric AI and the convergence of data and model engineering:opportunit...
Data-centric AI and the convergence of data and model engineering: opportunit...Paolo Missier
39 views40 Folien
Piloting & Scaling Successfully With Microsoft Viva von
Piloting & Scaling Successfully With Microsoft VivaPiloting & Scaling Successfully With Microsoft Viva
Piloting & Scaling Successfully With Microsoft VivaRichard Harbridge
12 views160 Folien
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N... von
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...James Anderson
66 views32 Folien
Web Dev - 1 PPT.pdf von
Web Dev - 1 PPT.pdfWeb Dev - 1 PPT.pdf
Web Dev - 1 PPT.pdfgdsczhcet
60 views45 Folien

Último(20)

【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院 von IttrainingIttraining
【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院
【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院
6g - REPORT.pdf von Liveplex
6g - REPORT.pdf6g - REPORT.pdf
6g - REPORT.pdf
Liveplex10 views
Data-centric AI and the convergence of data and model engineering: opportunit... von Paolo Missier
Data-centric AI and the convergence of data and model engineering:opportunit...Data-centric AI and the convergence of data and model engineering:opportunit...
Data-centric AI and the convergence of data and model engineering: opportunit...
Paolo Missier39 views
Piloting & Scaling Successfully With Microsoft Viva von Richard Harbridge
Piloting & Scaling Successfully With Microsoft VivaPiloting & Scaling Successfully With Microsoft Viva
Piloting & Scaling Successfully With Microsoft Viva
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N... von James Anderson
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...
James Anderson66 views
Web Dev - 1 PPT.pdf von gdsczhcet
Web Dev - 1 PPT.pdfWeb Dev - 1 PPT.pdf
Web Dev - 1 PPT.pdf
gdsczhcet60 views
PharoJS - Zürich Smalltalk Group Meetup November 2023 von Noury Bouraqadi
PharoJS - Zürich Smalltalk Group Meetup November 2023PharoJS - Zürich Smalltalk Group Meetup November 2023
PharoJS - Zürich Smalltalk Group Meetup November 2023
Noury Bouraqadi126 views
Unit 1_Lecture 2_Physical Design of IoT.pdf von StephenTec
Unit 1_Lecture 2_Physical Design of IoT.pdfUnit 1_Lecture 2_Physical Design of IoT.pdf
Unit 1_Lecture 2_Physical Design of IoT.pdf
StephenTec12 views
Attacking IoT Devices from a Web Perspective - Linux Day von Simone Onofri
Attacking IoT Devices from a Web Perspective - Linux Day Attacking IoT Devices from a Web Perspective - Linux Day
Attacking IoT Devices from a Web Perspective - Linux Day
Simone Onofri15 views
Empathic Computing: Delivering the Potential of the Metaverse von Mark Billinghurst
Empathic Computing: Delivering  the Potential of the MetaverseEmpathic Computing: Delivering  the Potential of the Metaverse
Empathic Computing: Delivering the Potential of the Metaverse
Mark Billinghurst476 views
From chaos to control: Managing migrations and Microsoft 365 with ShareGate! von sammart93
From chaos to control: Managing migrations and Microsoft 365 with ShareGate!From chaos to control: Managing migrations and Microsoft 365 with ShareGate!
From chaos to control: Managing migrations and Microsoft 365 with ShareGate!
sammart939 views
STPI OctaNE CoE Brochure.pdf von madhurjyapb
STPI OctaNE CoE Brochure.pdfSTPI OctaNE CoE Brochure.pdf
STPI OctaNE CoE Brochure.pdf
madhurjyapb13 views
Lilypad @ Labweek, Istanbul, 2023.pdf von Ally339821
Lilypad @ Labweek, Istanbul, 2023.pdfLilypad @ Labweek, Istanbul, 2023.pdf
Lilypad @ Labweek, Istanbul, 2023.pdf
Ally3398219 views
DALI Basics Course 2023 von Ivory Egg
DALI Basics Course  2023DALI Basics Course  2023
DALI Basics Course 2023
Ivory Egg16 views
Voice Logger - Telephony Integration Solution at Aegis von Nirmal Sharma
Voice Logger - Telephony Integration Solution at AegisVoice Logger - Telephony Integration Solution at Aegis
Voice Logger - Telephony Integration Solution at Aegis
Nirmal Sharma31 views
handbook for web 3 adoption.pdf von Liveplex
handbook for web 3 adoption.pdfhandbook for web 3 adoption.pdf
handbook for web 3 adoption.pdf
Liveplex22 views
TouchLog: Finger Micro Gesture Recognition Using Photo-Reflective Sensors von sugiuralab
TouchLog: Finger Micro Gesture Recognition  Using Photo-Reflective SensorsTouchLog: Finger Micro Gesture Recognition  Using Photo-Reflective Sensors
TouchLog: Finger Micro Gesture Recognition Using Photo-Reflective Sensors
sugiuralab19 views

Secured Authorized Deduplication Based Hybrid Cloud

  • 1. The International Journal Of Engineering And Science (IJES) || Volume || 3 || Issue || 11|| Pages || 34-39 || 2014 || ISSN (e): 2319 – 1813 ISSN (p): 2319 – 1805 www.theijes.com The IJES Page 34 Secured Authorized Deduplication Based Hybrid Cloud 1, R.S.Walunj , 2, D.A.Lande , 3, N.S.Pansare 1,2,3, Computer Engg. Jaihind College Of Engg,Kuran ------------------------------------------------ABSTRACT---------------------------------------------------------- Data deduplication is an important technique for eliminating redundant data.Insted of taking no. of same files, it store only single copy of file.In most organizations,storage system contain many pieces of duplicate data. . For example, the same file may be saved in several different places by different users. Deduplication eliminates these extra copies by saving just one copy of the data and replacing the other copies with pointers that lead back to the original copy. It is data compression technique for improve the bandwidth efficiency and storage utilization.Data deduplication most widely used in cloud computing.It make data management scalable and storage problem in cloud computing.Data deduplication protect the confidentiality of sensitive data.data deduplication work with convergent encryption technique to encrypt the data before uploading. . Companies frequently use deduplication in backup and disaster recovery applications.In this paper we attempt authorized deduplication check, combine with convergent encryption for providing security to sensitive data using hybrid cloud computing. KEYWORDS : Deduplication, authorized duplicate check, confidentiality, hybrid cloud,covergent encryption. --------------------------------------------------------------------------------------------------------------------------------------- Date of Submission: 30 October 2014 Date of Accepted: 20 November 2014 --------------------------------------------------------------------------------------------------------------------------------------- I. INTRODUCTION Cloud computing technique which is most widely used todays.In that, computing is done over the large communication network like Internet.It is an important solution for business storage in low cost.Cloud computing provide vast storage in all sector like government, enterprise,also for storing our personal data on cloud. Without background implementation details,platform user can access and share different resources on cloud.The most important problem in cloud computing is that large amount of storage space and security issues. One critical challenge of cloud storage to management of ever-increasing volume of data.To improve scalability,storage problem data deduplication is most important technique and has attracted more attension recently.It is an important technique for data compression ,It simply avoid the duplicate copies of data and store single copy of data.Data deduplication take place in either block level or file level.In file level approach duplicate files are eliminate,and in block level approach duplicate blocks of data that occur in non-identical files.Deduplication reduce the storage needs by upto 90-95% for backup application,68% in standard file system.Important issues in data deduplication that security and privacy to protect the data from insider or outsider attack.For data confidentiality,encryption is used by different user for encrypt there files or data ,using a secrete key user perform encryption and decryption operation.For uploading file to cloud user first generate convergent key,encryption of file then load file to the cloud.To prevent unauthorize access proof of ownership protocol is used to provide proof that the user indeed owns the same file when deduplication found.After the proof,server provide a pointer to subsequent user for accessing same file without needing to upload same file.When user want to download file he simply download encrypted file from cloud and decrypt this file using convergent key. PRELIMINARIES : In this section ,we first define notations used in this paper,review secure primitives .The notation used in this paper are listed in Table 1. Convergent encryption. Convergent encryption is used to encrypt and decrypt file.User can derives the convergent key from each original data copy,then using that key encrpty data file.Also user derives tag for data copy to check duplicate data.If tag are same then both files are same. Both convergent key and tag are independently derives. Convergent encryption, also known as content hash keying, is used to produces identical ciphertext from identical plaintext files. The simplest implementation of convergent encryption can be defined as: Alice derives the encryption key from her file F such that K = H(F), where H is a cryptographic hash function.Convergent encryption scheme can be defined with four primitive functions:
  • 2. Secured Authorized Deduplication Based… www.theijes.com The IJES Page 35 [1] KeyGenCE(M ) -> K is the key generation algorithm that maps a data copy M to a convergent key K; [2] EncCE(K, M ) ->C is the symmetric encryption algorithm that takes both the convergent key K and the data copy M as inputs and then outputs a ciphertext C; [3] DecCE (K, C) ->M is the decryption algorithm that takes both the ciphertext C and the convergent key K as inputs and then outputs the original data copy M ; and [4] TagGen(M ) -> T (M ) is the tag generation algorithm that maps the original data copy M and outputs a tag T (M ). Proof of ownership. proof of ownership(PoW) is a protocol enables users to prove their ownership of data copies to the storage server.PoW is implemented as an interactive algorithm run by user and storage server act as prover and verifier. The verifier derives a short value ϕ(M )from a data copy M . To prove the ownership of the data copy M , the prover needs to send ϕ to the verifier such that ϕ= ϕ(M ). The formal security definition for PoW roughly follows the threat model in a content distribution network, where an attacker does not know the entire file, but has accomplices who have the file. proof of-ownership is specified by a summary function S(.) (which could be randomized and takes the input file F and a security parameter),and an interactive two-party protocol ||(P V ). To solve the problem of using a small hash value as a proxy for the entire file, we want to design a solution where a client proves to the server that it indeed has the file. We call a proof mechanism that prevents such leakage amplification a proof of ownership (PoW). Public hash function. To support cross-user deduplication, all users must use the same procedure for identifying duplicate files. Hence this procedure must be public i.e. each user implement it, which means that a determined attacker can learn it. System Model and Adversary Model : In the client deduplication scenario, the S-CSP server keeps a single copy of the original file, regardless of the number of user that request to store the file. All users that possess the original file only use link to the single copy of the original file stored on the S-CSP server. Specifically, a client user first sends the hash value of the original file to the server, and then the server checks whether the hash value already exists in its database. If the hash value is the same as an existing hash value stored on the server, the server will challenge the user to ask for the proof of possession of the original file. After a successful challenge, the client does not have to upload the file again to the server. At the same time, the server marks the client as an owner of the original file. From then on, there is no difference between the client and the users who uploaded the original file. Thus, the deduplication process saves the communication bandwidth as well as the storage space. . DESIGN GOALS : In this paper, we address the problem of privacy preserving deduplication in cloud computing and propose a new deduplication system supporting for:  Differential Authorization. Each authorized user is able to access its individual token of his file to perform duplicate check based on authority.Under this assumption, any user cannot generate a token for duplicate check out of his access or without the aid from the private cloud server.  Authorized Duplicate Check. Authorized user is able to access his/her own token from private cloud,while the public cloud performs duplicate check directly and tells the user if there is any duplicate. The security requirements considered in this paper lie in two folds, including the security of file token and security of data files. For the security of file token, two aspects are defined as unforgeability and indistinguishability of file token. The details are given below.  Unforgeability of file token/duplicate-check token. User make registration in private cloud for generating file token.Using respective file token he/she upload or download files on public cloud. The users are not allowed to collude with the public cloud server to break the unforgeability of file tokens. In our system, the S-CSP is honest but curious and will honestly perform the duplicate check upon receiving the duplicate request from users. The duplicate check token of users should be issued from the private cloud server in our scheme.  Indistinguishability of file token/duplicate-check token. It requires that any user without querying the private cloud server for some file token, he cannot get any useful information from the token, which includes the file information and key information.
  • 3. Secured Authorized Deduplication Based… www.theijes.com The IJES Page 36  Data Confidentiality. Unauthorized users without appropriate token , including the S-CSP and the private cloud server, should be prevented from access to the underlying plaintext stored at S-CSP. In another word, the goal of the adversary is to retrieve and recover the files that do not belong to them. In our system, compared to the previous definition of data confidentiality based on convergent encryption, a higher level confidentiality is defined and achieved. Table 1. Notations Used in This Paper Acronym Description S-CSP Storage cloud service provider POW Proof of Ownership KF Convergent encryption key for file F H Hash function II. PROPOSED SYSTEM In our system we implement a project that includes the public cloud and the private cloud and also the hybrid cloud which is a combination of the both public cloud and private cloud. In general by if we used the public cloud we can’t provide the security to our private data and hence our private data will be loss.So that we have to provide the security to our data for that we make a use of private cloud also. When we use a private clouds the greater security can be provided.In this system we also provides the data deduplication . which is used to avoid the duplicate copies of data.User can upload and download the files from public cloud but private cloudprovides the security for that data.that means only the authorized person can upload and download the files from the Fig 1:Architecture of Authorized Deduplication public cloud.for that user generates the key and storeed that key onto the private cloud. at the time of downloading user request to the private cloud for key and then access that Particular file. System Model :Now we see the architecture of our system. in our architecture there are three modules . [1] user [2] public cloud [3] private cloud.etc
  • 4. Secured Authorized Deduplication Based… www.theijes.com The IJES Page 37 First if the user want to upload the files on the public cloud then user first encrypt that file with the convergent key and then sends it to the public cloud at the same time user also generates the key for that file and sends that key to the private cloud for the purpose of security.In the public cloud we use one algorithm for deduplication. Which is used to avoid the duplicate copies of files which is entered in the public cloud. Hence it also minimizes the bandwidth. that means we requires the less storage space for storing the files on the public cloud.In the public cloud any person that means the unauthorized person can also access or store the data so we can conclude that in the public cloud the security is not provided. In general for providing more security user can use the private cloud instead of using the public cloud.User generates the key at the time of uploading file and store it to the private cloud.When user wants to downloads the file that he/she upload,.he/she sends the request to the public cloud. Public cloud provides the list of files that are uploads the many user of the public cloud because there is no security is provided in the public cloud.When user selects one of the file from the list of files then private cloud sends a message like enter the key!. User has to enter the key that he generated for that file. When user enter the key the private cloud checks the key for that file and if the key is correct that means user is valid then private cloud give access to that user to download that file successufully. then user downloads the file from the public cloud and decrypt that file by using the same convergent key which is used at the time of encrypt that file.in this way user can make a use of the architecture. III. ROLES OF ENTITIES S-CSP:The purpose of this entity to work as a data storage service in public cloud.On the half of the user S-CSP store the data.The S-CSP eliminate the duplicate data using deduplication and keep the unique data as it is.S- SCP entity is used to reduce the storage cost.S-CSP han abundant storage capacity and computational power.When user send respective token for accessing his file from public cloud S-CSP matches this token with internally if it matched then an then only he send the file or ciphertext Cf with token, otherwise he send abort signal to user.After receiving file user use convergent key KF to decrypt the file. Data User: A user is an entity that want to access the data or files from S-SCP.User generate the key and store that key in private cloud.In storage system supporting deduplication,The user only upload unique data but do not upload any duplicate data to save the upload bandwidth,which may be owned by the same user or different users.Each file is protected by convergent encryption key and can access by only athorized person.In our system user must need to register in private cloud for storing token with respective file which are store on public cloud.When he want to access that file he access respective token from private cloud and then access his files from public cloud.token consist of file content F and convergent key KF. Private Cloud: In general for providing more security user can use the private cloud instead of public cloud.User store the generated key in private cloud.At the time of downloading system ask the key to download the file.User can not store the secrete key internally.for providing proper protection to key we use private cloud.Private cloud only store the convergent key with respective file.When user want to access the key he first check authority of user then an then provide key. Public Cloud:Public cloud entity is used for the storage purpose.User upload the files in public cloud.Public cloud is similar as S-CSP.When the user want to download the files from public cloud,it will be ask the key which is generated or stored in private cloud.When the users key is match with files key at that time user can download the file,without key user can not access the file.Only authorized user can access the file.In public cloud all files are stored in encrypted format.If any chance unauthorized person hack our file,but without the secrete or convergent key he doesn’t access original file.On public cloud there are lots of files are store each user access its respective file if its token matches with S-CSP server token. Operations performed on Hybrid Cloud  File Uploading : When user want to upload the file to the public cloud then user first encrypt the file which is to be upload by make a use of the symmetric key,and send it to the Public cloud. At the same time user generates the key for that file and sends it to the private cloud. in this way user can upload the file in to the public cloud.  File Downloading: When user wants to download the file that he/she has upload on the public cloud.he/she make a request to the public cloud. then public cloud provide a list of files that many users are upload on it.Among that user select one of the file form the list of files and enter the download option.at that time private cloud sends a message that enter the key for the file generasted by the user.then user enters the key for the file that he/she is generated.then private cloud checks the key for that
  • 5. Secured Authorized Deduplication Based… www.theijes.com The IJES Page 38 file and if the key is correct that means the user is valid.only then and then the user can download the file from the public cloud otherwise user can’t download the file. When user download the file from the public cloud it is in the encrypted format then user decrypt that file by using the same symmetric key. IV. IMPLEMENTATION We implement system with data deduplication,in which we model three entities as separate programs. A Client program is used to model the data users to carry out the file upload/download process. A Private Server program is used to model the private cloud which manages the private keys and handles the file token computation. A Storage Server program is used to model the S-CSP which stores and deduplicates files. Followings are function calls used in system:  FileTag(File) - It computes SHA-1 hash of the File as File Tag;  DupCheckReq(Token) - It requests the Storage Server for Duplicate Check of the file.  FileEncrypt(File) - It encrypts the File with Convergent Encryption using 256-bit AES algorithm in cipher block chaining (CBC) mode, where the convergent key is from SHA-256 Hashing of the file;  FileUploadReq(FileID, File, Token) – It uploads the File Data to the Storage Server if the file is Unique and updates the File Token stored.  FileStore(FileID, File, Token) - It stores the File on Disk and updates the Mapping. V. CONCLUSION In this paper, the idea of authorized data deduplication was proposed to protect the data security by including differential authority of users in the duplicate check. In public cloud our data are securely store in encrypted format,and also in private cloud our key is store with respective file.There is no need to user remember the key.So without key anyone can not access our file or data from public cloud. REFERENCES [1] Open SSL Project. http://www.openssl.org/. [2] P. Anderson and L.Zhang. Fast and secure laptop backups with encrypted de-duplication.In Proc.of USENIX LISA, 2010. [3] M. Bellare, S. Keelveedhi, and T. Ristenpart. Dupless: Serveraided encryption for deduplicated storage. In USENIX Security Symposium, 2013. [4] M. Bellare, S. Keelveedhi, and T. Ristenpart. Message-locked encryption and secure deduplication. In EUROCRYPT, pages 296– 312, 2013. [5] M. Bellare, C. Namprempre, and G. Neven. Security proofs for identity-based identification and signature schemes. Cryptology,22(1):1–61, 2009. [6] M. Bellare and A. Palacio. Gq and schnorr identification schemes:Proofs of security against impersonation under active and concurrentattacks. In CRYPTO, pages 162–177, 2002. [7] S. Bugiel, S. Nurnberger, A. Sadeghi, and T. Schneider. Twinclouds: An architecture for secure cloud computing. In Workshopon Cryptography and Security in Clouds (WCSC 2011), 2011. [8] J. R. Douceur, A. Adya, W. J. Bolosky, D. Simon, and M. Theimer.Reclaiming space from duplicate files in a serverless distributedfile system. In ICDCS, pages 617–624, 2002. [9] D. Ferraiolo and R. Kuhn. Role-based access controls. In 15thNIST-NCSC National Computer Security Conf., 1992. [10] GNULibmicrohttpd.http://www.gnu.org/software/libmicrohttpd/. R.S.Walunj completd diploma in computer engg(2012). Currently she is student of Department of Computer Engineering at Jaihind college of engg,kuran in last year.She is interested to search latest information related to security purpose.
  • 6. Secured Authorized Deduplication Based… www.theijes.com The IJES Page 39 N.S.Pansare completd diploma in computer engg(2012). Currently she is student of Department of Computer Engineering at Jaihind college of engg,kuran in last year.She is interested to search latest information related to cloud computing. D.A.Lande completed diploma in computer engg(2012). Currently she is student of Department of Computer Engineering at Jaihind college of engg,kuran in last year.She is interested to search latest information related to hybrid cloud computing.