SlideShare uma empresa Scribd logo
1 de 4
Baixar para ler offline
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 04 Issue: 04 | Apr-2015, Available @ http://www.ijret.org 792
AN EFFICIENT, SECURE DEDUPLICATION DATA STORING IN
CLOUD STORAGE ENVIRONMENT
Amaresh1
, Manjunath G S2
1
Student, Computer science and Engineering, Acharya Institute of Technology, Bengaluru, India
2
Assistant professor, Computer science and Engineering, Acharya Institute of Technology, Bengaluru, India
Abstract
Most of the IT industry heading towards the cloud –based storage services .cloud storage is witnessed to weak in security and
privacy for public cloud environments .To tackle these security challenges ,we propose a new deduplication at client side for
secure data storing and data sharing among the cloud users through public cloud .our proposal is mainly concerned on the
owner of the file is encrypted the data that he intended to upload to the cloud by applying per data key, so data access controlled
by data owner and log file which contains retrieval rights of the cloud users ,an authorised user can decipher an encrypted file
with his private key.
Keywords: convergent encryption, cloud storage, deduplication, privacy, Merkle-tree
--------------------------------------------------------------------***------------------------------------------------------------------
1. INTRODUCTION
Recent days, ever increasing of digital information insist on
having new storage and network capacity demands along
with the cost effectiveness of storage and network traffic
rate.
As such, use of remote storage is got attention, namely cloud
based services because it gives cost effective architecture
and is pay as you go model. Client side deduplication is a
scheme to reduce the consumption of storage space along
with the bandwidth used to transfer duplicate file, this
already applied some service providers namely Memopal,
DropBox ([2][3]).
In spite of some noteworthy advantage’s in saving
resources, client side deduplication pose many security
problems due to multi-owner data possession challenges [1],
most of the attackers attack only for bandwidth consumption
as well as privacy. Lately, weaken these problems, a lot
work has been done under different security models [1] [3]
[4] [8] [6] .these security models focus on POW (power of
ownership) and onto the server to check the test user
ownership, based on content and short Hash value. These all
models build trust most of the requirements, say light weight
verification.
Our paper introduces new cryptographic approach for an
efficient, secure POW (power of ownership), on the basis of
combined effect of convergent encryption [5] and the
Merkle-tree [7], for climbing the level of data storage
security in the cloud environments, giving option to share
cloud users. Our spotlight contains derive the unique
identifier of outsourced data in using markle base tree over
enciphered data. Other side identifier serve to make sure that
only copy of data is stored along with dynamic sharing of
data with controlled access to users.
2. BACKGROUNDS
The proof of ownership (PoW) is found by Halevi [8].It is
request-response protocol make sure that requesting object
is data owner of the file (F) outsourced, on the basis of short
value .whenever the owner wants to outsource a file, he
must calculate the hash value H=Hash (F) and send to the
cloud server to check the duplicate file has been found or
not. The server database checks the short hash value of data
file to ensure the uniqueness of file in the cloud
environment. If the short value matched with current hash
value then by sending the response message as duplicate file
otherwise allowing to cloud to store file by saving hash
value into the database of serve. This client side
deduplication, referred to as hash-as-a-proof [6], poses a
many security problems to cloud users.
2.1 Security Investigation
In spite of noteworthy resources rescuing, Pow schemes
imports many security demands that may lead to sensitive
data
 Uncovering of Confidentiality-Existing Pow
schemes introduces confidentiality burden because of
client uses a static-a hash a proof. For example if
unauthorised user has a small static client side hash
value, so he can easily fool cloud server as data
owner demanding to upload intended file, then ,he
advantage connection to data by giving a hash proof.
 Breaching the privacy-The outsourced data file
must be ensuring that, cloud servers inadequate to
entry outsourced data or user profiles.
 Replace poisoned file-The data file is encrypted on
client side by selecting the random key to encrypt the
file, the cloud server inadequate to check the
consistency between outsourced file with current
hash proof indeed given (Hash(F),Enck(F)),the
storage server unable to verify.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 04 Issue: 04 | Apr-2015, Available @ http://www.ijret.org 793
The adversary user upload hash value, he demands the
original file, then replace his poison file with original.
2.2 Relevant Works
Table 1: A survey on PoW scheme in deduplication.
Author Title Advantage Dis-
advantage
R di
pietro
[1]
Boosting
efficiency
security in
PoW or
deduplicati
on
Problems of
multitenant
environment
s are solved
by
convergent
encryption
But does not
point out the
data leakage
Halevi
et al
[3]
Proof of
ownership
in remotes
storage
systems
It overcomes
the data
leakage by
providing
the siblings
of valid
path.
But, it is
random
function of
hash a proof.
Jia at al
[6]
Weak-
leakage
resistant
client side
deduplicati
on
Address
confidentiali
ty
preservation
concern in
cross-user
client side
deduplicatio
n
Does not
support
malicious
adversary.
Ng et al
[4]
Private
data
deduplicati
on in cloud
storage
PoW scheme
over
encrypted
data file of
fixed block
has unique
commitment
hash a proof.
No need to
reveal any
information.
Computation
al cost
requiring a
generation
of all
commitment
s.
3. SYSTEM ARCHITECTURE
Fig 1.Architecture of data storing in cloud storage
environment
It consists of fallowing entities which describes the how all
entities are communicating each other through network
architecture for cloud storage.
A CSP has virtualised provisioning of resources to control
distributed cloud servers and which consist of cloud
database to maintain user profiles as well as unique
identifier of any file that we outsourced
Clients are the actual data owner he may be single or
multiple .he can upload, download, giving permission to
other cloud users. All permission’s are integrated in the
metafile which is intended to store to cloud.
All the restrictions are done by the client of data, he is
responsible for integrating the access rights to cloud users, if
the cloud user is authorised then he able to retrieval of data.
4. OUR PROOF OF OWNERSHIP IDEA
Idea of secure client side deduplication
 Encryption Key Extracted
 Markel-based tree over Encrypted Data
 Unique Identifier is extracted.
 Encrypt Decipher key with public key of cloud
users.
 Integrate by data owner in user log file.
Our proof consists of mainly above five steps at client side
to resistant to all weakness posed earlier schemes of PoW.
Encrypted key is extracted on file which intended to
outsource into the cloud by applying one way hash function
that is use of convergent encryption, on the other side key is
acted as enciphering key of file and the file is encrypted.
After the encryption accomplished on data file, the data
owner has to derive a uniqueness identifier of the data file
by applying Merkle tree over enciphered data file.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 04 Issue: 04 | Apr-2015, Available @ http://www.ijret.org 794
On the other side, to care of data from public cloud users of
unauthorised entities access, enciphering the decryption key
by using public key encryption like to say encrypt the
deciphering key using public key of cloud user. the key then
unified by cloud client in cloud user log file(metadata) and it
is outsourced to cloud database ,it makes sure of
confidentiality posed to malicious cloud users, and all access
controlled by data owner.
4.1 Methodology
Client side: select the file (D) which is intended to
outsource, apply one way hash function in order to extract
the enciphering key, after derived the key must apply
symmetric key encryption to original data file (D) and then
run Merkle-tree over encrypted file to extract the unique
identifier of the data file.
The enciphering key is encrypted with asymmetric key
encryption from public key of cloud user. After successfully
done all these must be store in user metadata file into cloud
database, subsequent storage checks the uniqueness in cloud
database if found it stops transferring of encrypted file to
cloud storage server by saving the bandwidth of network
traffic. And it ensures the highest level of privacy to cloud
clients.
Fig 2.Client side deduplication
Cloud Storage: The cloud server checks the requested
client is authorized, if he is the authorised can upload or
download file from cloud server ,if client wants to upload
the file checks the unique id of in the cloud database if it
found then it display text duplicate no need to upload,
otherwise allow to upload into cloud storage server.
And it checks against the unauthorised cloud users sharing
of cloud data file, if the cloud user is not malicious user then
allow to access data file.
If the file is not duplicate one then it intended to store the
encrypted data file to cloud server and unique id, user
permission’s to cloud database.
4.2 Premise
The assumptions are made of our model are
 Establishment of secure channel between the client
and CSP
 And uses of hash functions to enchaining key
extraction
 Merkle tree gives the root value that is unique
identifier extraction. It is file divided into number
of blocks and find a hash for each block ,finally
subsequent file root is created.
4.3 Cloud Storage
 Whenever the data owner need to upload the file to
cloud. Client must derive the enciphering key from
data file keyfile , by applying hash function H() .
 And encrypt the file based on symmetric encryption
algorithm.
 Extract the data identifier from Merkle-Tree over
encrypted file.
 The identifier which must be unique in entire cloud
database associated with that cloud client.
4.4 Cloud Share
The client outsourced data is sharing among the cloud users
who are associated with that cloud owners, only authorised
users can only get data that outsourced by data owner.
 The users should not connected to the cloud during
depositing of the data file to cloud, the data owner
integrate the access rights into the metadata file
which present in cloud database.
 Even data owner can intimate URI to the cloud user
after the deposit data itself, or store the cloud
database with metadata file.
 Cloud User can access the data file whenever he
need but must be authorised to access.
5. CONCLUSION
The demand for secured storage in the cloud and the
fetching properties of convergent encryption makes integrate
them, thus leads to more attractive solution to outsource of
data storage along with more secure, efficient.
Our result combines the feature of cryptographic usage of
both symmetric encryption and asymmetric encryption used
for enciphering the data file and for meta data files,
respectively due to the maximize the security towards
privacy information to tackle several intrusions., and most
appreciation job from the Merkle tree properties, this helps
to data deduplication, as it lead to an pre-verification of data
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 04 Issue: 04 | Apr-2015, Available @ http://www.ijret.org 795
presence in cloud servers, which is saves bandwidth. Also,
the solution is shown to be resistant to unauthorized access
to data and it maintains privacy during sharing process.
At last we know every solution as its own barrier still need
to face some challenges, yet to discover issues to outsource
the data into the cloud.
REFERENCES
[1] R. Di Pietro and A. Sorniotti. Boosting efficiency and
security in proof of ownership for deduplication. In
Proceedings of the 7th ACM Symposium on
Information, Computer and Communications
Security, ASIACCS ’12, pages 81–82, New York,
NY, USA, 2012. ACM.
[2] M. Dutch. Understanding data deduplication ratios.
SNIA White Paper, June 2008.
[3] D. Harnik, B. Pinkas, and A. Shulman-Peleg. Side
channels in cloud services: Deduplicationn cloud
storage. IEEE Security And Privacy, 8(6):40–47,
2010.
[4] W. K. Ng, Y. Wen, and H. Zhu. Private data
deduplication protocols Computing, SAC ’12, pages
441–446, New York, NY, USA, 2012. ACM. in
cloud storage. In Proceedings of the 27th Annual
ACM Symposium on Applied
[5] C. Wang, Z. guang Qin, J. Peng, and J. Wang. novel
encryption scheme for data deduplication. In
Communications, Circuits and Systems (ICCCAS),
2010 International Conference on, pages 265–269,
2010.
[6] J. Xu, E.-C. Chang, and J. Zhou. Weak leakage-
resilient client-side deduplication of encrypted data
in cloud storage. In Proceedings of the 8th ACM
SIGSAC symposium on Information, computer and
communications security, ASIA CCS ’13, pages
195–206, New York, NY, USA, 2013. ACM.
[7] R. C. Merkle. A digital signature based on a
conventional encryption function. In A Conference
on the Theory and Applications of Cryptographic
Techniques on Advances in Cryptology, CRYPTO
’87, pages 369–378, London, UK, UK, 1988.
Springer-Verlag
[8] M. W. Storer, K. Greenan, D. D. Long, and E. L.
Miller. Secure data deduplication. In Proceedings of
the 4th ACM International Workshop on Storage
Security and Survivability, StorageSS ’08, pages 1–
10, New York, NY, USA, 2008. ACM
[9] http://github.com/openstack/swift.
BIOGRAPHIES
Amaresh is a received degree BE degree
in computer science from VTU,
Belagavi. Now perceiving M Tech
(CSE) degree at Acharya institute of
technology, Bengaluru.
Manjunath G S is Assistant professor of
computer science at Acharya Institute of
Technology, Bengaluru and received M
Tech Degree computer science from same
institute.

Mais conteúdo relacionado

Mais procurados

Hybrid Cloud Approach for Secure Authorized Deduplication
Hybrid Cloud Approach for Secure Authorized DeduplicationHybrid Cloud Approach for Secure Authorized Deduplication
Hybrid Cloud Approach for Secure Authorized DeduplicationPrem Rao
 
IRJET- Secure Data Deduplication for Cloud Server using HMAC Algorithm
IRJET- Secure Data Deduplication for Cloud Server using HMAC AlgorithmIRJET- Secure Data Deduplication for Cloud Server using HMAC Algorithm
IRJET- Secure Data Deduplication for Cloud Server using HMAC AlgorithmIRJET Journal
 
A Hybrid Cloud Approach for Secure Authorized Deduplication
A Hybrid Cloud Approach for Secure Authorized DeduplicationA Hybrid Cloud Approach for Secure Authorized Deduplication
A Hybrid Cloud Approach for Secure Authorized DeduplicationSWAMI06
 
An Optimal Cooperative Provable Data Possession Scheme for Distributed Cloud ...
An Optimal Cooperative Provable Data Possession Scheme for Distributed Cloud ...An Optimal Cooperative Provable Data Possession Scheme for Distributed Cloud ...
An Optimal Cooperative Provable Data Possession Scheme for Distributed Cloud ...IJMER
 
Ijricit 01-006 a secluded approval on clould storage proceedings
Ijricit 01-006 a secluded approval on clould storage proceedingsIjricit 01-006 a secluded approval on clould storage proceedings
Ijricit 01-006 a secluded approval on clould storage proceedingsIjripublishers Ijri
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
An Improved Integrated Hash and Attributed based Encryption Model on High Dim...
An Improved Integrated Hash and Attributed based Encryption Model on High Dim...An Improved Integrated Hash and Attributed based Encryption Model on High Dim...
An Improved Integrated Hash and Attributed based Encryption Model on High Dim...IJECEIAES
 
Doc A hybrid cloud approach for secure authorized deduplication
 Doc A hybrid cloud approach for secure authorized deduplication Doc A hybrid cloud approach for secure authorized deduplication
Doc A hybrid cloud approach for secure authorized deduplicationShakas Technologie
 
A hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplicationA hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplicationPvrtechnologies Nellore
 
A hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplicationA hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplicationTmks Infotech
 
Secure distributed deduplication systems with improved reliability
Secure distributed deduplication systems with improved reliabilitySecure distributed deduplication systems with improved reliability
Secure distributed deduplication systems with improved reliabilityPvrtechnologies Nellore
 
A Hybrid Cloud Approach for Secure Authorized Deduplication
A Hybrid Cloud Approach for Secure Authorized DeduplicationA Hybrid Cloud Approach for Secure Authorized Deduplication
A Hybrid Cloud Approach for Secure Authorized Deduplication1crore projects
 
Secure cloud storage
Secure cloud storageSecure cloud storage
Secure cloud storageALIN BABU
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)inventionjournals
 
Survey on Data Security with Time Constraint in Clouds
Survey on Data Security with Time Constraint in CloudsSurvey on Data Security with Time Constraint in Clouds
Survey on Data Security with Time Constraint in CloudsIRJET Journal
 
an enhanced multi layered cryptosystem based secure
an enhanced multi layered cryptosystem based securean enhanced multi layered cryptosystem based secure
an enhanced multi layered cryptosystem based secureIJAEMSJORNAL
 
Two Level Auditing Architecture to Maintain Consistent In Cloud
Two Level Auditing Architecture to Maintain Consistent In CloudTwo Level Auditing Architecture to Maintain Consistent In Cloud
Two Level Auditing Architecture to Maintain Consistent In Cloudtheijes
 

Mais procurados (20)

Hybrid Cloud Approach for Secure Authorized Deduplication
Hybrid Cloud Approach for Secure Authorized DeduplicationHybrid Cloud Approach for Secure Authorized Deduplication
Hybrid Cloud Approach for Secure Authorized Deduplication
 
IRJET- Secure Data Deduplication for Cloud Server using HMAC Algorithm
IRJET- Secure Data Deduplication for Cloud Server using HMAC AlgorithmIRJET- Secure Data Deduplication for Cloud Server using HMAC Algorithm
IRJET- Secure Data Deduplication for Cloud Server using HMAC Algorithm
 
A Hybrid Cloud Approach for Secure Authorized Deduplication
A Hybrid Cloud Approach for Secure Authorized DeduplicationA Hybrid Cloud Approach for Secure Authorized Deduplication
A Hybrid Cloud Approach for Secure Authorized Deduplication
 
An Optimal Cooperative Provable Data Possession Scheme for Distributed Cloud ...
An Optimal Cooperative Provable Data Possession Scheme for Distributed Cloud ...An Optimal Cooperative Provable Data Possession Scheme for Distributed Cloud ...
An Optimal Cooperative Provable Data Possession Scheme for Distributed Cloud ...
 
IJARCCE 20
IJARCCE 20IJARCCE 20
IJARCCE 20
 
Ijricit 01-006 a secluded approval on clould storage proceedings
Ijricit 01-006 a secluded approval on clould storage proceedingsIjricit 01-006 a secluded approval on clould storage proceedings
Ijricit 01-006 a secluded approval on clould storage proceedings
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
An Improved Integrated Hash and Attributed based Encryption Model on High Dim...
An Improved Integrated Hash and Attributed based Encryption Model on High Dim...An Improved Integrated Hash and Attributed based Encryption Model on High Dim...
An Improved Integrated Hash and Attributed based Encryption Model on High Dim...
 
Doc A hybrid cloud approach for secure authorized deduplication
 Doc A hybrid cloud approach for secure authorized deduplication Doc A hybrid cloud approach for secure authorized deduplication
Doc A hybrid cloud approach for secure authorized deduplication
 
A hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplicationA hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplication
 
A hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplicationA hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplication
 
Secure distributed deduplication systems with improved reliability
Secure distributed deduplication systems with improved reliabilitySecure distributed deduplication systems with improved reliability
Secure distributed deduplication systems with improved reliability
 
A Hybrid Cloud Approach for Secure Authorized Deduplication
A Hybrid Cloud Approach for Secure Authorized DeduplicationA Hybrid Cloud Approach for Secure Authorized Deduplication
A Hybrid Cloud Approach for Secure Authorized Deduplication
 
Secure cloud storage
Secure cloud storageSecure cloud storage
Secure cloud storage
 
El35782786
El35782786El35782786
El35782786
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
 
Survey on Data Security with Time Constraint in Clouds
Survey on Data Security with Time Constraint in CloudsSurvey on Data Security with Time Constraint in Clouds
Survey on Data Security with Time Constraint in Clouds
 
an enhanced multi layered cryptosystem based secure
an enhanced multi layered cryptosystem based securean enhanced multi layered cryptosystem based secure
an enhanced multi layered cryptosystem based secure
 
Two Level Auditing Architecture to Maintain Consistent In Cloud
Two Level Auditing Architecture to Maintain Consistent In CloudTwo Level Auditing Architecture to Maintain Consistent In Cloud
Two Level Auditing Architecture to Maintain Consistent In Cloud
 
An4201262267
An4201262267An4201262267
An4201262267
 

Semelhante a An efficient, secure deduplication data storing in cloud storage environment

Secure Redundant Data Avoidance over Multi-Cloud Architecture.
Secure Redundant Data Avoidance over Multi-Cloud Architecture. Secure Redundant Data Avoidance over Multi-Cloud Architecture.
Secure Redundant Data Avoidance over Multi-Cloud Architecture. IJCERT JOURNAL
 
Secure Data Sharing in Cloud Computing using Revocable Storage Identity- Base...
Secure Data Sharing in Cloud Computing using Revocable Storage Identity- Base...Secure Data Sharing in Cloud Computing using Revocable Storage Identity- Base...
Secure Data Sharing in Cloud Computing using Revocable Storage Identity- Base...rahulmonikasharma
 
Bio-Cryptography Based Secured Data Replication Management in Cloud Storage
Bio-Cryptography Based Secured Data Replication Management in Cloud StorageBio-Cryptography Based Secured Data Replication Management in Cloud Storage
Bio-Cryptography Based Secured Data Replication Management in Cloud StorageIJERA Editor
 
IJSRED-V2I2P10
IJSRED-V2I2P10IJSRED-V2I2P10
IJSRED-V2I2P10IJSRED
 
Dynamic Resource Allocation and Data Security for Cloud
Dynamic Resource Allocation and Data Security for CloudDynamic Resource Allocation and Data Security for Cloud
Dynamic Resource Allocation and Data Security for CloudAM Publications
 
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud. A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud. IJCERT JOURNAL
 
Secured Authorized Deduplication Based Hybrid Cloud
Secured Authorized Deduplication Based Hybrid CloudSecured Authorized Deduplication Based Hybrid Cloud
Secured Authorized Deduplication Based Hybrid Cloudtheijes
 
Efficient and Empiric Keyword Search Using Cloud
Efficient and Empiric Keyword Search Using CloudEfficient and Empiric Keyword Search Using Cloud
Efficient and Empiric Keyword Search Using CloudIRJET Journal
 
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET-  	  Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASCIRJET-  	  Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASCIRJET Journal
 
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASCIRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASCIRJET Journal
 
Improved deduplication with keys and chunks in HDFS storage providers
Improved deduplication with keys and chunks in HDFS storage providersImproved deduplication with keys and chunks in HDFS storage providers
Improved deduplication with keys and chunks in HDFS storage providersIRJET Journal
 
Secure retrieval of files using homomorphic encryption for cloud computing
Secure retrieval of files using homomorphic encryption for cloud computingSecure retrieval of files using homomorphic encryption for cloud computing
Secure retrieval of files using homomorphic encryption for cloud computingeSAT Publishing House
 
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...IRJET Journal
 
Block-Level Message-Locked Encryption for Secure Large File De-duplication
Block-Level Message-Locked Encryption for Secure Large File De-duplicationBlock-Level Message-Locked Encryption for Secure Large File De-duplication
Block-Level Message-Locked Encryption for Secure Large File De-duplicationIRJET Journal
 
IRJET- Protection of Personal Data on Distributed Cloud using Biometrics
IRJET- Protection of Personal Data on Distributed Cloud using BiometricsIRJET- Protection of Personal Data on Distributed Cloud using Biometrics
IRJET- Protection of Personal Data on Distributed Cloud using BiometricsIRJET Journal
 
Enabling Integrity for the Compressed Files in Cloud Server
Enabling Integrity for the Compressed Files in Cloud ServerEnabling Integrity for the Compressed Files in Cloud Server
Enabling Integrity for the Compressed Files in Cloud ServerIOSR Journals
 
Secured architecture for multi cloud using key aggregation technique
Secured architecture for multi cloud using key aggregation techniqueSecured architecture for multi cloud using key aggregation technique
Secured architecture for multi cloud using key aggregation techniqueeSAT Journals
 
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...Editor IJMTER
 

Semelhante a An efficient, secure deduplication data storing in cloud storage environment (20)

Secure Redundant Data Avoidance over Multi-Cloud Architecture.
Secure Redundant Data Avoidance over Multi-Cloud Architecture. Secure Redundant Data Avoidance over Multi-Cloud Architecture.
Secure Redundant Data Avoidance over Multi-Cloud Architecture.
 
Secure Data Sharing in Cloud Computing using Revocable Storage Identity- Base...
Secure Data Sharing in Cloud Computing using Revocable Storage Identity- Base...Secure Data Sharing in Cloud Computing using Revocable Storage Identity- Base...
Secure Data Sharing in Cloud Computing using Revocable Storage Identity- Base...
 
Bio-Cryptography Based Secured Data Replication Management in Cloud Storage
Bio-Cryptography Based Secured Data Replication Management in Cloud StorageBio-Cryptography Based Secured Data Replication Management in Cloud Storage
Bio-Cryptography Based Secured Data Replication Management in Cloud Storage
 
IJSRED-V2I2P10
IJSRED-V2I2P10IJSRED-V2I2P10
IJSRED-V2I2P10
 
L018137479
L018137479L018137479
L018137479
 
Dynamic Resource Allocation and Data Security for Cloud
Dynamic Resource Allocation and Data Security for CloudDynamic Resource Allocation and Data Security for Cloud
Dynamic Resource Allocation and Data Security for Cloud
 
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud. A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
 
H1803035056
H1803035056H1803035056
H1803035056
 
Secured Authorized Deduplication Based Hybrid Cloud
Secured Authorized Deduplication Based Hybrid CloudSecured Authorized Deduplication Based Hybrid Cloud
Secured Authorized Deduplication Based Hybrid Cloud
 
Efficient and Empiric Keyword Search Using Cloud
Efficient and Empiric Keyword Search Using CloudEfficient and Empiric Keyword Search Using Cloud
Efficient and Empiric Keyword Search Using Cloud
 
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET-  	  Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASCIRJET-  	  Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
 
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASCIRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
 
Improved deduplication with keys and chunks in HDFS storage providers
Improved deduplication with keys and chunks in HDFS storage providersImproved deduplication with keys and chunks in HDFS storage providers
Improved deduplication with keys and chunks in HDFS storage providers
 
Secure retrieval of files using homomorphic encryption for cloud computing
Secure retrieval of files using homomorphic encryption for cloud computingSecure retrieval of files using homomorphic encryption for cloud computing
Secure retrieval of files using homomorphic encryption for cloud computing
 
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
 
Block-Level Message-Locked Encryption for Secure Large File De-duplication
Block-Level Message-Locked Encryption for Secure Large File De-duplicationBlock-Level Message-Locked Encryption for Secure Large File De-duplication
Block-Level Message-Locked Encryption for Secure Large File De-duplication
 
IRJET- Protection of Personal Data on Distributed Cloud using Biometrics
IRJET- Protection of Personal Data on Distributed Cloud using BiometricsIRJET- Protection of Personal Data on Distributed Cloud using Biometrics
IRJET- Protection of Personal Data on Distributed Cloud using Biometrics
 
Enabling Integrity for the Compressed Files in Cloud Server
Enabling Integrity for the Compressed Files in Cloud ServerEnabling Integrity for the Compressed Files in Cloud Server
Enabling Integrity for the Compressed Files in Cloud Server
 
Secured architecture for multi cloud using key aggregation technique
Secured architecture for multi cloud using key aggregation techniqueSecured architecture for multi cloud using key aggregation technique
Secured architecture for multi cloud using key aggregation technique
 
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
 

Mais de eSAT Journals

Mechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavementsMechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavementseSAT Journals
 
Material management in construction – a case study
Material management in construction – a case studyMaterial management in construction – a case study
Material management in construction – a case studyeSAT Journals
 
Managing drought short term strategies in semi arid regions a case study
Managing drought    short term strategies in semi arid regions  a case studyManaging drought    short term strategies in semi arid regions  a case study
Managing drought short term strategies in semi arid regions a case studyeSAT Journals
 
Life cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangaloreLife cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangaloreeSAT Journals
 
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialsLaboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialseSAT Journals
 
Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...eSAT Journals
 
Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...eSAT Journals
 
Influence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizerInfluence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizereSAT Journals
 
Geographical information system (gis) for water resources management
Geographical information system (gis) for water resources managementGeographical information system (gis) for water resources management
Geographical information system (gis) for water resources managementeSAT Journals
 
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...eSAT Journals
 
Factors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concreteFactors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concreteeSAT Journals
 
Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...eSAT Journals
 
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...eSAT Journals
 
Evaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabsEvaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabseSAT Journals
 
Evaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in indiaEvaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in indiaeSAT Journals
 
Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...eSAT Journals
 
Estimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn methodEstimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn methodeSAT Journals
 
Estimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniquesEstimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniqueseSAT Journals
 
Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...eSAT Journals
 
Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...eSAT Journals
 

Mais de eSAT Journals (20)

Mechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavementsMechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavements
 
Material management in construction – a case study
Material management in construction – a case studyMaterial management in construction – a case study
Material management in construction – a case study
 
Managing drought short term strategies in semi arid regions a case study
Managing drought    short term strategies in semi arid regions  a case studyManaging drought    short term strategies in semi arid regions  a case study
Managing drought short term strategies in semi arid regions a case study
 
Life cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangaloreLife cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangalore
 
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialsLaboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
 
Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...
 
Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...
 
Influence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizerInfluence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizer
 
Geographical information system (gis) for water resources management
Geographical information system (gis) for water resources managementGeographical information system (gis) for water resources management
Geographical information system (gis) for water resources management
 
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
 
Factors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concreteFactors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concrete
 
Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...
 
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
 
Evaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabsEvaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabs
 
Evaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in indiaEvaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in india
 
Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...
 
Estimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn methodEstimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn method
 
Estimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniquesEstimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniques
 
Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...
 
Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...
 

Último

XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXssuser89054b
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfJiananWang21
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptDineshKumar4165
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTbhaskargani46
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsvanyagupta248
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxJuliansyahHarahap1
 
2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projects2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projectssmsksolar
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"mphochane1998
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdfKamal Acharya
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptxJIT KUMAR GUPTA
 
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...HenryBriggs2
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VDineshKumar4165
 
Learn the concepts of Thermodynamics on Magic Marks
Learn the concepts of Thermodynamics on Magic MarksLearn the concepts of Thermodynamics on Magic Marks
Learn the concepts of Thermodynamics on Magic MarksMagic Marks
 
Rums floating Omkareshwar FSPV IM_16112021.pdf
Rums floating Omkareshwar FSPV IM_16112021.pdfRums floating Omkareshwar FSPV IM_16112021.pdf
Rums floating Omkareshwar FSPV IM_16112021.pdfsmsksolar
 
Engineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planesEngineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planesRAJNEESHKUMAR341697
 
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...Health
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesMayuraD1
 
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxA CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxmaisarahman1
 

Último (20)

XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech students
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptx
 
2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projects2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projects
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdf
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
Learn the concepts of Thermodynamics on Magic Marks
Learn the concepts of Thermodynamics on Magic MarksLearn the concepts of Thermodynamics on Magic Marks
Learn the concepts of Thermodynamics on Magic Marks
 
Rums floating Omkareshwar FSPV IM_16112021.pdf
Rums floating Omkareshwar FSPV IM_16112021.pdfRums floating Omkareshwar FSPV IM_16112021.pdf
Rums floating Omkareshwar FSPV IM_16112021.pdf
 
Engineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planesEngineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planes
 
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
 
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxA CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
 

An efficient, secure deduplication data storing in cloud storage environment

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 04 Issue: 04 | Apr-2015, Available @ http://www.ijret.org 792 AN EFFICIENT, SECURE DEDUPLICATION DATA STORING IN CLOUD STORAGE ENVIRONMENT Amaresh1 , Manjunath G S2 1 Student, Computer science and Engineering, Acharya Institute of Technology, Bengaluru, India 2 Assistant professor, Computer science and Engineering, Acharya Institute of Technology, Bengaluru, India Abstract Most of the IT industry heading towards the cloud –based storage services .cloud storage is witnessed to weak in security and privacy for public cloud environments .To tackle these security challenges ,we propose a new deduplication at client side for secure data storing and data sharing among the cloud users through public cloud .our proposal is mainly concerned on the owner of the file is encrypted the data that he intended to upload to the cloud by applying per data key, so data access controlled by data owner and log file which contains retrieval rights of the cloud users ,an authorised user can decipher an encrypted file with his private key. Keywords: convergent encryption, cloud storage, deduplication, privacy, Merkle-tree --------------------------------------------------------------------***------------------------------------------------------------------ 1. INTRODUCTION Recent days, ever increasing of digital information insist on having new storage and network capacity demands along with the cost effectiveness of storage and network traffic rate. As such, use of remote storage is got attention, namely cloud based services because it gives cost effective architecture and is pay as you go model. Client side deduplication is a scheme to reduce the consumption of storage space along with the bandwidth used to transfer duplicate file, this already applied some service providers namely Memopal, DropBox ([2][3]). In spite of some noteworthy advantage’s in saving resources, client side deduplication pose many security problems due to multi-owner data possession challenges [1], most of the attackers attack only for bandwidth consumption as well as privacy. Lately, weaken these problems, a lot work has been done under different security models [1] [3] [4] [8] [6] .these security models focus on POW (power of ownership) and onto the server to check the test user ownership, based on content and short Hash value. These all models build trust most of the requirements, say light weight verification. Our paper introduces new cryptographic approach for an efficient, secure POW (power of ownership), on the basis of combined effect of convergent encryption [5] and the Merkle-tree [7], for climbing the level of data storage security in the cloud environments, giving option to share cloud users. Our spotlight contains derive the unique identifier of outsourced data in using markle base tree over enciphered data. Other side identifier serve to make sure that only copy of data is stored along with dynamic sharing of data with controlled access to users. 2. BACKGROUNDS The proof of ownership (PoW) is found by Halevi [8].It is request-response protocol make sure that requesting object is data owner of the file (F) outsourced, on the basis of short value .whenever the owner wants to outsource a file, he must calculate the hash value H=Hash (F) and send to the cloud server to check the duplicate file has been found or not. The server database checks the short hash value of data file to ensure the uniqueness of file in the cloud environment. If the short value matched with current hash value then by sending the response message as duplicate file otherwise allowing to cloud to store file by saving hash value into the database of serve. This client side deduplication, referred to as hash-as-a-proof [6], poses a many security problems to cloud users. 2.1 Security Investigation In spite of noteworthy resources rescuing, Pow schemes imports many security demands that may lead to sensitive data  Uncovering of Confidentiality-Existing Pow schemes introduces confidentiality burden because of client uses a static-a hash a proof. For example if unauthorised user has a small static client side hash value, so he can easily fool cloud server as data owner demanding to upload intended file, then ,he advantage connection to data by giving a hash proof.  Breaching the privacy-The outsourced data file must be ensuring that, cloud servers inadequate to entry outsourced data or user profiles.  Replace poisoned file-The data file is encrypted on client side by selecting the random key to encrypt the file, the cloud server inadequate to check the consistency between outsourced file with current hash proof indeed given (Hash(F),Enck(F)),the storage server unable to verify.
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 04 Issue: 04 | Apr-2015, Available @ http://www.ijret.org 793 The adversary user upload hash value, he demands the original file, then replace his poison file with original. 2.2 Relevant Works Table 1: A survey on PoW scheme in deduplication. Author Title Advantage Dis- advantage R di pietro [1] Boosting efficiency security in PoW or deduplicati on Problems of multitenant environment s are solved by convergent encryption But does not point out the data leakage Halevi et al [3] Proof of ownership in remotes storage systems It overcomes the data leakage by providing the siblings of valid path. But, it is random function of hash a proof. Jia at al [6] Weak- leakage resistant client side deduplicati on Address confidentiali ty preservation concern in cross-user client side deduplicatio n Does not support malicious adversary. Ng et al [4] Private data deduplicati on in cloud storage PoW scheme over encrypted data file of fixed block has unique commitment hash a proof. No need to reveal any information. Computation al cost requiring a generation of all commitment s. 3. SYSTEM ARCHITECTURE Fig 1.Architecture of data storing in cloud storage environment It consists of fallowing entities which describes the how all entities are communicating each other through network architecture for cloud storage. A CSP has virtualised provisioning of resources to control distributed cloud servers and which consist of cloud database to maintain user profiles as well as unique identifier of any file that we outsourced Clients are the actual data owner he may be single or multiple .he can upload, download, giving permission to other cloud users. All permission’s are integrated in the metafile which is intended to store to cloud. All the restrictions are done by the client of data, he is responsible for integrating the access rights to cloud users, if the cloud user is authorised then he able to retrieval of data. 4. OUR PROOF OF OWNERSHIP IDEA Idea of secure client side deduplication  Encryption Key Extracted  Markel-based tree over Encrypted Data  Unique Identifier is extracted.  Encrypt Decipher key with public key of cloud users.  Integrate by data owner in user log file. Our proof consists of mainly above five steps at client side to resistant to all weakness posed earlier schemes of PoW. Encrypted key is extracted on file which intended to outsource into the cloud by applying one way hash function that is use of convergent encryption, on the other side key is acted as enciphering key of file and the file is encrypted. After the encryption accomplished on data file, the data owner has to derive a uniqueness identifier of the data file by applying Merkle tree over enciphered data file.
  • 3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 04 Issue: 04 | Apr-2015, Available @ http://www.ijret.org 794 On the other side, to care of data from public cloud users of unauthorised entities access, enciphering the decryption key by using public key encryption like to say encrypt the deciphering key using public key of cloud user. the key then unified by cloud client in cloud user log file(metadata) and it is outsourced to cloud database ,it makes sure of confidentiality posed to malicious cloud users, and all access controlled by data owner. 4.1 Methodology Client side: select the file (D) which is intended to outsource, apply one way hash function in order to extract the enciphering key, after derived the key must apply symmetric key encryption to original data file (D) and then run Merkle-tree over encrypted file to extract the unique identifier of the data file. The enciphering key is encrypted with asymmetric key encryption from public key of cloud user. After successfully done all these must be store in user metadata file into cloud database, subsequent storage checks the uniqueness in cloud database if found it stops transferring of encrypted file to cloud storage server by saving the bandwidth of network traffic. And it ensures the highest level of privacy to cloud clients. Fig 2.Client side deduplication Cloud Storage: The cloud server checks the requested client is authorized, if he is the authorised can upload or download file from cloud server ,if client wants to upload the file checks the unique id of in the cloud database if it found then it display text duplicate no need to upload, otherwise allow to upload into cloud storage server. And it checks against the unauthorised cloud users sharing of cloud data file, if the cloud user is not malicious user then allow to access data file. If the file is not duplicate one then it intended to store the encrypted data file to cloud server and unique id, user permission’s to cloud database. 4.2 Premise The assumptions are made of our model are  Establishment of secure channel between the client and CSP  And uses of hash functions to enchaining key extraction  Merkle tree gives the root value that is unique identifier extraction. It is file divided into number of blocks and find a hash for each block ,finally subsequent file root is created. 4.3 Cloud Storage  Whenever the data owner need to upload the file to cloud. Client must derive the enciphering key from data file keyfile , by applying hash function H() .  And encrypt the file based on symmetric encryption algorithm.  Extract the data identifier from Merkle-Tree over encrypted file.  The identifier which must be unique in entire cloud database associated with that cloud client. 4.4 Cloud Share The client outsourced data is sharing among the cloud users who are associated with that cloud owners, only authorised users can only get data that outsourced by data owner.  The users should not connected to the cloud during depositing of the data file to cloud, the data owner integrate the access rights into the metadata file which present in cloud database.  Even data owner can intimate URI to the cloud user after the deposit data itself, or store the cloud database with metadata file.  Cloud User can access the data file whenever he need but must be authorised to access. 5. CONCLUSION The demand for secured storage in the cloud and the fetching properties of convergent encryption makes integrate them, thus leads to more attractive solution to outsource of data storage along with more secure, efficient. Our result combines the feature of cryptographic usage of both symmetric encryption and asymmetric encryption used for enciphering the data file and for meta data files, respectively due to the maximize the security towards privacy information to tackle several intrusions., and most appreciation job from the Merkle tree properties, this helps to data deduplication, as it lead to an pre-verification of data
  • 4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 04 Issue: 04 | Apr-2015, Available @ http://www.ijret.org 795 presence in cloud servers, which is saves bandwidth. Also, the solution is shown to be resistant to unauthorized access to data and it maintains privacy during sharing process. At last we know every solution as its own barrier still need to face some challenges, yet to discover issues to outsource the data into the cloud. REFERENCES [1] R. Di Pietro and A. Sorniotti. Boosting efficiency and security in proof of ownership for deduplication. In Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security, ASIACCS ’12, pages 81–82, New York, NY, USA, 2012. ACM. [2] M. Dutch. Understanding data deduplication ratios. SNIA White Paper, June 2008. [3] D. Harnik, B. Pinkas, and A. Shulman-Peleg. Side channels in cloud services: Deduplicationn cloud storage. IEEE Security And Privacy, 8(6):40–47, 2010. [4] W. K. Ng, Y. Wen, and H. Zhu. Private data deduplication protocols Computing, SAC ’12, pages 441–446, New York, NY, USA, 2012. ACM. in cloud storage. In Proceedings of the 27th Annual ACM Symposium on Applied [5] C. Wang, Z. guang Qin, J. Peng, and J. Wang. novel encryption scheme for data deduplication. In Communications, Circuits and Systems (ICCCAS), 2010 International Conference on, pages 265–269, 2010. [6] J. Xu, E.-C. Chang, and J. Zhou. Weak leakage- resilient client-side deduplication of encrypted data in cloud storage. In Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security, ASIA CCS ’13, pages 195–206, New York, NY, USA, 2013. ACM. [7] R. C. Merkle. A digital signature based on a conventional encryption function. In A Conference on the Theory and Applications of Cryptographic Techniques on Advances in Cryptology, CRYPTO ’87, pages 369–378, London, UK, UK, 1988. Springer-Verlag [8] M. W. Storer, K. Greenan, D. D. Long, and E. L. Miller. Secure data deduplication. In Proceedings of the 4th ACM International Workshop on Storage Security and Survivability, StorageSS ’08, pages 1– 10, New York, NY, USA, 2008. ACM [9] http://github.com/openstack/swift. BIOGRAPHIES Amaresh is a received degree BE degree in computer science from VTU, Belagavi. Now perceiving M Tech (CSE) degree at Acharya institute of technology, Bengaluru. Manjunath G S is Assistant professor of computer science at Acharya Institute of Technology, Bengaluru and received M Tech Degree computer science from same institute.