SlideShare a Scribd company logo
Enviar pesquisa
Carregar
Implementation of De-Duplication Algorithm
Denunciar
IRJET Journal
Fast Track Publications
Seguir
•
0 gostou
•
31 visualizações
Engenharia
https://www.irjet.net/archives/V4/i9/IRJET-V4I917.pdf
Leia mais
Implementation of De-Duplication Algorithm
•
0 gostou
•
31 visualizações
IRJET Journal
Fast Track Publications
Seguir
Denunciar
Engenharia
https://www.irjet.net/archives/V4/i9/IRJET-V4I917.pdf
Leia mais
Implementation of De-Duplication Algorithm
1 de 5
Baixar agora
Recomendados
E031102034039
theijes
304 visualizações
•
6 slides
IRJET- Privacy Preserving Cloud Storage based on a Three Layer Security M...
IRJET Journal
298 visualizações
•
6 slides
A Privacy Preserving Three-Layer Cloud Storage Scheme Based On Computational ...
IJSRED
151 visualizações
•
6 slides
IRJET - Multi Authority based Integrity Auditing and Proof of Storage wit...
IRJET Journal
9 visualizações
•
5 slides
Paper id 27201448
IJRAT
251 visualizações
•
6 slides
262 265
Editor IJARCET
961 visualizações
•
4 slides
Mais conteúdo relacionado
Mais procurados
Secret keys and the packets transportation for privacy data forwarding method...
eSAT Publishing House
326 visualizações
•
5 slides
Secret keys and the packets transportation for privacy data forwarding method...
eSAT Journals
73 visualizações
•
5 slides
Research trends review on RSA scheme of asymmetric cryptography techniques
journalBEEI
78 visualizações
•
6 slides
Revocation based De-duplication Systems for Improving Reliability in Cloud St...
IRJET Journal
26 visualizações
•
6 slides
SECRY - Secure file storage on cloud using hybrid cryptography
ALIN BABU
2.1K visualizações
•
34 slides
IRJET- Secure Sharing of Personal Data on Cloud using Key Aggregation and...
IRJET Journal
21 visualizações
•
3 slides
Mais procurados
(20)
Secret keys and the packets transportation for privacy data forwarding method...
eSAT Publishing House
•
326 visualizações
Secret keys and the packets transportation for privacy data forwarding method...
eSAT Journals
•
73 visualizações
Research trends review on RSA scheme of asymmetric cryptography techniques
journalBEEI
•
78 visualizações
Revocation based De-duplication Systems for Improving Reliability in Cloud St...
IRJET Journal
•
26 visualizações
SECRY - Secure file storage on cloud using hybrid cryptography
ALIN BABU
•
2.1K visualizações
IRJET- Secure Sharing of Personal Data on Cloud using Key Aggregation and...
IRJET Journal
•
21 visualizações
Review on Key Based Encryption Scheme for Secure Data Sharing on Cloud
IRJET Journal
•
64 visualizações
Secure Medical Data Computation using Virtual_ID Authentication and File Swap...
IJASRD Journal
•
41 visualizações
Secure Privacy Preserving Using Multilevel Trust For Cloud Storage
IRJET Journal
•
30 visualizações
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
Editor IJCATR
•
124 visualizações
Searchable Encryption Systems
Christopher Frenz
•
2.5K visualizações
IRJET- Comparative Analysis of Encryption Techniques
IRJET Journal
•
15 visualizações
IRJET- Privacy Preserving Encrypted Keyword Search Schemes
IRJET Journal
•
35 visualizações
Ieeepro techno solutions 2014 ieee java project -key-aggregate cryptosystem...
hemanthbbc
•
509 visualizações
126689454 jv6
homeworkping8
•
58 visualizações
Secure Redundant Data Avoidance over Multi-Cloud Architecture.
IJCERT JOURNAL
•
224 visualizações
A research paper_on_lossless_data_compre
Luisa Francisco
•
82 visualizações
IRJET- Adaptable Wildcard Searchable Encryption System
IRJET Journal
•
11 visualizações
IRJET- Secure File Storage on Cloud using Cryptography
IRJET Journal
•
478 visualizações
IRJET- Message Encryption using Hybrid Cryptography
IRJET Journal
•
14 visualizações
Similar a Implementation of De-Duplication Algorithm
IRJET- Secure Data Deduplication and Auditing for Cloud Data Storage
IRJET Journal
21 visualizações
•
5 slides
Multi-part Dynamic Key Generation For Secure Data Encryption
CSCJournals
430 visualizações
•
10 slides
Methodology for Optimizing Storage on Cloud Using Authorized De-Duplication –...
IRJET Journal
31 visualizações
•
5 slides
An Approach towards Shuffling of Data to Avoid Tampering in Cloud
IRJET Journal
34 visualizações
•
3 slides
Secured Authorized Deduplication Based Hybrid Cloud
theijes
539 visualizações
•
6 slides
The Impact Of Cryptanalysis Using Advanced 3D Playfair...
Robynn Dixon
2 visualizações
•
45 slides
Similar a Implementation of De-Duplication Algorithm
(20)
IRJET- Secure Data Deduplication and Auditing for Cloud Data Storage
IRJET Journal
•
21 visualizações
Multi-part Dynamic Key Generation For Secure Data Encryption
CSCJournals
•
430 visualizações
Methodology for Optimizing Storage on Cloud Using Authorized De-Duplication –...
IRJET Journal
•
31 visualizações
An Approach towards Shuffling of Data to Avoid Tampering in Cloud
IRJET Journal
•
34 visualizações
Secured Authorized Deduplication Based Hybrid Cloud
theijes
•
539 visualizações
The Impact Of Cryptanalysis Using Advanced 3D Playfair...
Robynn Dixon
•
2 visualizações
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET Journal
•
11 visualizações
Implementation and Review Paper of Secure and Dynamic Multi Keyword Search in...
IRJET Journal
•
29 visualizações
Improving Efficiency of Security in Multi-Cloud
IJTET Journal
•
317 visualizações
IRJET - Confidential Image De-Duplication in Cloud Storage
IRJET Journal
•
11 visualizações
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET Journal
•
10 visualizações
IRJET- Storage Security in Cloud Computing
IRJET Journal
•
26 visualizações
IRJET - A Secure Access Policies based on Data Deduplication System
IRJET Journal
•
8 visualizações
Paper2
Vikas Khairnar
•
129 visualizações
Installing Convergent Encryption By Aes Encryption
Cindy Wooten
•
2 visualizações
V5 i7 0169
Siddhartha Bashetty
•
117 visualizações
IRJET- Key Exchange Privacy Preserving Technique in Cloud Computing
IRJET Journal
•
18 visualizações
EXPLORING WOMEN SECURITY BY DEDUPLICATION OF DATA
IRJET Journal
•
4 visualizações
IRJET- Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
IRJET Journal
•
10 visualizações
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
CloudTechnologies
•
2.4K visualizações
Mais de IRJET Journal
SOIL STABILIZATION USING WASTE FIBER MATERIAL
IRJET Journal
19 visualizações
•
7 slides
Sol-gel auto-combustion produced gamma irradiated Ni1-xCdxFe2O4 nanoparticles...
IRJET Journal
7 visualizações
•
7 slides
Identification, Discrimination and Classification of Cotton Crop by Using Mul...
IRJET Journal
7 visualizações
•
5 slides
“Analysis of GDP, Unemployment and Inflation rates using mathematical formula...
IRJET Journal
12 visualizações
•
11 slides
MAXIMUM POWER POINT TRACKING BASED PHOTO VOLTAIC SYSTEM FOR SMART GRID INTEGR...
IRJET Journal
14 visualizações
•
6 slides
Performance Analysis of Aerodynamic Design for Wind Turbine Blade
IRJET Journal
7 visualizações
•
5 slides
Mais de IRJET Journal
(20)
SOIL STABILIZATION USING WASTE FIBER MATERIAL
IRJET Journal
•
19 visualizações
Sol-gel auto-combustion produced gamma irradiated Ni1-xCdxFe2O4 nanoparticles...
IRJET Journal
•
7 visualizações
Identification, Discrimination and Classification of Cotton Crop by Using Mul...
IRJET Journal
•
7 visualizações
“Analysis of GDP, Unemployment and Inflation rates using mathematical formula...
IRJET Journal
•
12 visualizações
MAXIMUM POWER POINT TRACKING BASED PHOTO VOLTAIC SYSTEM FOR SMART GRID INTEGR...
IRJET Journal
•
14 visualizações
Performance Analysis of Aerodynamic Design for Wind Turbine Blade
IRJET Journal
•
7 visualizações
Heart Failure Prediction using Different Machine Learning Techniques
IRJET Journal
•
7 visualizações
Experimental Investigation of Solar Hot Case Based on Photovoltaic Panel
IRJET Journal
•
3 visualizações
Metro Development and Pedestrian Concerns
IRJET Journal
•
2 visualizações
Mapping the Crashworthiness Domains: Investigations Based on Scientometric An...
IRJET Journal
•
3 visualizações
Data Analytics and Artificial Intelligence in Healthcare Industry
IRJET Journal
•
3 visualizações
DESIGN AND SIMULATION OF SOLAR BASED FAST CHARGING STATION FOR ELECTRIC VEHIC...
IRJET Journal
•
36 visualizações
Efficient Design for Multi-story Building Using Pre-Fabricated Steel Structur...
IRJET Journal
•
10 visualizações
Development of Effective Tomato Package for Post-Harvest Preservation
IRJET Journal
•
4 visualizações
“DYNAMIC ANALYSIS OF GRAVITY RETAINING WALL WITH SOIL STRUCTURE INTERACTION”
IRJET Journal
•
4 visualizações
Understanding the Nature of Consciousness with AI
IRJET Journal
•
11 visualizações
Augmented Reality App for Location based Exploration at JNTUK Kakinada
IRJET Journal
•
6 visualizações
Smart Traffic Congestion Control System: Leveraging Machine Learning for Urba...
IRJET Journal
•
18 visualizações
Enhancing Real Time Communication and Efficiency With Websocket
IRJET Journal
•
4 visualizações
Textile Industrial Wastewater Treatability Studies by Soil Aquifer Treatment ...
IRJET Journal
•
4 visualizações
Último
9_DVD_Dynamic_logic_circuits.pdf
Usha Mehta
5 visualizações
•
32 slides
Performance of Back-to-Back Mechanically Stabilized Earth Walls Supporting th...
ahmedmesaiaoun
9 visualizações
•
84 slides
Dynamics of Hard-Magnetic Soft Materials
Shivendra Nandan
11 visualizações
•
32 slides
Investor Presentation
eser sevinç
10 visualizações
•
26 slides
SWM L1-L14_drhasan (Part 1).pdf
MahmudHasan747870
38 visualizações
•
150 slides
How I learned to stop worrying and love the dark silicon apocalypse.pdf
Tomasz Kowalczewski
22 visualizações
•
66 slides
Último
(20)
9_DVD_Dynamic_logic_circuits.pdf
Usha Mehta
•
5 visualizações
Performance of Back-to-Back Mechanically Stabilized Earth Walls Supporting th...
ahmedmesaiaoun
•
9 visualizações
Dynamics of Hard-Magnetic Soft Materials
Shivendra Nandan
•
11 visualizações
Investor Presentation
eser sevinç
•
10 visualizações
SWM L1-L14_drhasan (Part 1).pdf
MahmudHasan747870
•
38 visualizações
How I learned to stop worrying and love the dark silicon apocalypse.pdf
Tomasz Kowalczewski
•
22 visualizações
Literature review and Case study on Commercial Complex in Nepal, Durbar mall,...
AakashShakya12
•
16 visualizações
IEC 61850 Technical Overview.pdf
ssusereeea97
•
5 visualizações
SDN-based Signal Performance Optimization in Campus Area Network
abir641
•
7 visualizações
Wire Cutting & Stripping
Iwiss Tools Co.,Ltd
•
6 visualizações
IWISS Catalog 2022
Iwiss Tools Co.,Ltd
•
22 visualizações
MSA Website Slideshow (16).pdf
msaucla
•
21 visualizações
DevOps to DevSecOps: Enhancing Software Security Throughout The Development L...
Anowar Hossain
•
9 visualizações
Art of Writing Research article slide share.pptx
sureshc91
•
13 visualizações
Electrical Crimping
Iwiss Tools Co.,Ltd
•
18 visualizações
At Indus Tower We Connecting The Communities. The Importance of Professional...
IndustowerFanclub
•
5 visualizações
Saikat Chakraborty Java Oracle Certificate.pdf
SaikatChakraborty787148
•
9 visualizações
Design and analysis of a new undergraduate Computer Engineering degree – a me...
WaelBadawy6
•
48 visualizações
cloud computing-virtualization.pptx
RajaulKarim20
•
72 visualizações
Pointers.pptx
Ananthi Palanisamy
•
58 visualizações
Implementation of De-Duplication Algorithm
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 09 | Sep -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 84 IMPLEMENTATION OF DE-DUPLICATION ALGORITHM Nirmala Bhadrappa1, Dr. G S Mamatha2 1Department of ISE, R.V College of Engineering, Bengaluru, India 2Associate Professor, Dept. of ISE, R.V College of Engineering, Bengaluru, India ---------------------------------------------------------------------***--------------------------------------------------------------------- ABSTRACT: Data which are duplicatedcan beavoidedusing data de-duplication technique, and these techniques are used to reduce storage space. This also helpsinreducingbandwidth and can be stored on cloud storage. These de-duplications are used to secure the data and have been a challenge for keeping the data securely. To avoid miss handling of data cloud convergent encryption technique is used. The duplication of data can be treated in two different methods. Firstly we will have to address the problem proficiently and should handle a huge count of convergent keys. Secondly data resource raises i.e. security and privacy. A third-party cloud service is proposed for confidentiality of data; reliability checking by access control mechanisms can be done both internal and external. As the duplication techniqueimprovesstoragespace, bandwidth and efficiency will be aconflictwiththeconvergent encryption technique. So the convergent encryptiontechnique requires key for their respective data to encrypt. The copies of same data and will be checked for data feasibility. Convergent encryption helps in encryptingand decryptingthedatausinga key guaranteeing same data to be duplicated on to itself. The key generation and data encryption technique helps to hold the key and send the cipher text to cloud serviceprovider. Thus encrypting technique is used to determine identicalcopiesand also to create similar key and the identical cipher text hence data is stored secured and only authorized user can accessthe information from the cloud service provider. KEYWORDS: data de-duplication, convergent encryption, de-duplication efficiency, SHA algorithm 1. INTRODUCTION As we move forward with the development of enterprise data accelerates, the task of protecting and de-duplication becomes more challenging. The individualized computing frameworks like desktops, portable PCs, tablets, advanced mobile phones have turned out to be significant stages for various users, increasing the significance of data on these gadgets. We may lose data because of system failure or at times the data might be erased consequently or we may lose the data by losing the gadget or be lost by looting of gadget, yet people have enhanced the utilization of data protection and recovery tool in their individualized computinggadgets. Storage resources like Amazon S3 and Google storage take economic advantages to store the data on the cloud storage for users. Figure1. Replicates the data reinforcement for individual stockpiling, these have beenoutsourcedsoclients can oversee information much effectively withoutbothering about keeping up about the reinforcement. The clouds are always centralized so that they can be easily managed efficiently and disaster free. The clouds offer offsite storage for data backup. The data reinforcement for individual stockpiling in the cloud demonstrates a geographic division between customer and the service provider. In de- duplication the data redundancy is removed by generating hash key to the respective file and later these file is divided into smaller parts based on the number of lines in the file. This smaller parts can also be called has blocks. Hash key is also created to these blocks for de-duplication check. Fig-1: Shows cloud backup platform The cloud concepts can be understood in more detail from the below: 1.1 DE-DUPLICATION Data de-duplication is a technique of finding duplication of data in storage space. This technique used to improve bandwidth and utilization of storagethatcanalsobeused for data transfers over network and to decrease the number of bytes and file size. Data de-duplication technique identifies and removes the data which are not unique. Whenever any similar data match occurs, they are copied with a small reference. Based on file content or file name data de- duplication is performed. Data de-duplication consists of following steps: Step 1: Divide the input file into blocks based on number of lines in the file. Step 2: Hash key value is generated for each block of file.
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 09 | Sep -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 85 Step 3: The generated hash value is matched with stored hash value if it is matched then duplication removed. Step 4: Duplicate data is replaced with reference object which is stored in database earlier 1.2 CONVERGENT ENCRYPTION It is also known as content hashing. It is a cryptographic algorithm which generates alike cipher text from the plain text. Cloud computing has unique applications to remove duplication of files from storage, where the user is unaware or having rights to use to the keys. Convergent encryption is provided with authorization of a fileinwhichanattackercan confirm whether the target possesses a specific file. The attack possesses a problem for users to store information which is publicly available/already held by the attacker. For an example consider the books which are banned orthefiles that cause copyright violation is a best sample for the same. If an argument could be made that a validationofa fileattack is easily rendered unsuccessful then by simply adding a unique portion of data or a few arbitrary characters to the plain text before encryption; would cause the uploaded file to be unique and therefore results in a unique encryptedfile. There are several samples to show convergent encryption scheme in a plain-text, which are broken down into small blocks, based on content of the text in the files, after that each block performs convergent encryption which may by mistake overcome any attempts at making the file unique by adding bytes at any place. 1.3 KEY MANAGEMENT Key management is method for cryptographic keys in a cryptosystem to manage the files. The cryptosystem uses different types of key, so as to differentiate and compare. These keys may be asymmetric or symmetric. For both encryption and decryption of message alike keys are used in symmetric key algorithm. The selected keys must be distributed and securely stored for finding out duplication. In asymmetric key twodifferentkeysareusedforencryption and decryption algorithm and they communicated with files once keys is found, it would be easytomanagethem.Thekey management involves exchange of data, storage of data and use of them with required key. 2. FEATURES OF CRYPTOGRAPHIC Confidentiality Only authorized party should be able to access the information which is transmitted over network and not by the third party. Authentication The receiver should check the identityofthesender before accessing the information whether the information is sent from the authorized person or by an attacker Integrity The permission should not be given to everyone for modifying the transmitted data only an authorized party should be allowed to do so. Third party is not allowed to modify the data. Non Repudiation It ensures that neither the sender, nor the receiver of the information should be able to deny the transmission. Access Control Only approved persons will be able to access the data. 2.1 CRYPTOGRAPHIC ALGORITHM Following are well known cryptographic algorithm DES: It stands for “Data Encryption Standard”. It operates on 64 bit block of data using 56-bit key .It is symmetric key block cipher. In DES the algorithm and cryptographic key is applied simultaneouslyon a block of data rather than one bit at a time to encrypt a plaintext. RSA: RSA is designed by Rivest, Shamir and Adleman. It is a public-key system and it is an asymmetric cryptographic algorithm. It is used for encryption and decryption of message. HASH: A “hash algorithm” is also calledas“message digest”, or “fingerprint” and it is used for mapping the data size. Hash function returns the hash value. Hash value is stored in hash table AES: NIST as approved Advanced Encryption Standard and uses Rijndael block cipher. SHA-1: SHA-1 is a hashing algorithm, produces a digest of 160 bits (20 bytes) Same SHA-1 message digest is given for two different messages hence SHA-1 is recommended than MD5. HMAC: HMAC uses a key with an algorithm, algorithms such as MD5 or SHA-1 anditisoneofthe hashing algorithms hence in can also be referred as HMAC-MD5 and HMAC-SHA1. 3. LITERATURE SURVEY Data de-duplication can be divided into two parts: de- duplication on unencrypted data and de-duplication on encrypted data. In the previous way, performs proof of ownership procedure in an effective and vigorous way. Though, in the last way, privacy of data is the essential security prerequisite make secure againstthirdpartyaswell as inside the cloud server. In this manner, the majorityofthe plans have been proposed to give information encryption, while as yet profiting by a de-duplication system, by empowering data proprietors to share the keys within the sight.
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 09 | Sep -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 86 Data de-duplication over unencrypted data Harnick et al. [1] exhibited how information de-duplication method can be utilized as a side channel that uncovers data to pernicious clients about the contents of documents of different clients. Halevi et al. [2] likewise presented a comparative assault situation on distributed storage that utilizations de-duplication over various clients. This is on account of just a little snippet of data about the information, in particular, its hash esteem, fills in as not just a record of the information to find data of the information among countless, yet in addition a proof that any individual whose the hash key is known esteem claims the comparing information. In this manner, any clients who can get the short hash an incentive for particular information can get to every one of the information put away in the distributed storage. Harnik et al. [3] projected randomized limits to maintain a strategic distance from an assault on distributed storage benefits that utilization server-side information de- duplication by ceasing informationde-duplication.Bethatas it may, their technique did not utilize customer side information ownership verifications to counteract hash control assaults. To conquer these assaults, Halevi et al. [4] presented and define the idea of proof of ownership; here the client demonstrates to a server that the document utilizing At that point, a test reaction convention between the server and the customer checks the possession. PoW is firmly identified with verification of retrievability [5] and evidence of information ownership [6]. In any case, confirmation of retrievability and information ownership regularly utilizes a pre-handling step that can'tbeutilized as a part of the information de-duplication strategy. DATA DE-DUPLICATION OVER ENCRYPTED DATA Keeping in mind the end goal to protect informationsecurity against inside cloud server and outside enemies,clients may need their information encoded. In any case, conventional encryption under various clients'keysmakescrossclient de- duplication inconceivable, since the cloud server would dependably observe distinctivefigurewritings,regardlessof the possibility that the information are the same. United encryption, presented by Douceur et al. [7], is a hopeful answer for issue. Focalized encryption, an information proprietor infers an encryption key R <-F (N), where N is information or a document to be scrambled and F is a cryptographic hash function. Then, he figures theciphertext T <-P (R, N) through a piece figure P, erases N, andkeepsjust R in the wake of transferring C to the cloud storage. In the event that another client encodes a similar text, the alike cipher text T is created since it is deterministic. Therefore, on release of T from different clients later the underlying transfer, the server does not holds the record but rather refreshes data of data to demonstrate it has an extra proprietor. In the event that any genuine owner ask for and download T afterwards, they can encode with R. Be that as it may, united encryption experiences the following security flaws. Xu et al. [8] likewise projected a spillage strong de- duplication plan to determine the information uprightness issue. This plan likewise empowers the information proprietor to scramble informationwithanarbitrarilychose key. At that point, the information encoded key is scrambled under a KEK derived from the information and conveyed to the next information proprietors after the proof of ownership procedure. On the off chance that a honest to goodness proprietor gets a cipher text, the honesty of the information can be reviewed by unscrambling the information encryption key with the same KEK. 4. WORKING The Original Data block is chosen to out sourcedintothe CSP (cloud service provider). The file or block of file can be already present in cloud storage. The file that has to be uploaded to cloud service provider first checks whether the file or the block of file exists in the CSP HASH KEY GENERATION Based on file content hash key is generated. The tag, hash key generated is unique for each file. Key generation algorithm maps a data duplicate N to a convergentkeyRand it is based on the security parameter. The purpose of generating hash key is to encrypt the block of data with unique hash key. ENCRYPTION OF FILE Convergent encryption gives data confidentiality in de- duplication. The encrypt data, uses their own encryption keys for accessing i.e. The keys are derived from itself and hence, produce identical cipher text from identical files. Convergent encryption allows each person cloud storage in large amounts for a very low cost, It also offers privacy at its core. This privacy has concern with cloud storage services where de-duplicating data is done via convergent encryption, as de-duplication can be used to find users who are storing a file. Another reason is that it also finds if any other attacker also has a copy of the same file. For example, an oppressive government could find out users who are storing copies of banned books. The same isusedtodiscover users who are storing copyrighted material, thus assuming direct access to the servers which is provided to the outside party. Private Key encryption is used to bypass de- duplication and hence forcing the cloud storage service to store a unique copy of the files. Here no “password reset” option is provided with convergent encryption, so if one forgets it the data will be lost for ever. The client decides a tag for the copy of data which can be utilized to recognize duplicates. The tags are same if two data copiesareidentical. To check whether there is any duplication, the clientinitially
4.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 09 | Sep -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 87 sends the tag to server to check whether the copy exists or not. Encryption is done using advanced encryptionstandard algorithm. The encrypted file is stored in cloud service provider with hash key and tag. PROCESS OF FILE UPLOADING When user wants to upload a file “A” file level De duplication is performed first. The user computes file tag on the input file “A” Upon receiving, the auditor checks if there exists the same file with same tag on the cloud service provider. If auditor replies that there is file duplication,orthereisnofile duplication, if the user gets the reply that there is no file duplication, then duplication check is done with block-level. If there is file duplication then user checks for proof of ownership whether the same file “A” that is stored in the cloud service provider. Fig 2: Architecture Diagram of de-duplication PROCESS OF DE-DUPLICATION Once the file is uploaded, upon receiving the auditor checks whether there exist the similar tag and the hash key for the corresponding file on the cloud service provider. If so, auditor replies to the user whether there is file duplication or there no file duplication. If the user receives the response “no file duplication” then it moves to the next level that is block level file duplication. If the auditor gets a reply as “file duplication” then the user runs proof of ownership i.e. it checks for the actual owner of the file on cloud service provider. If proof of ownership file is passed, the cloud service provider simply precedes a file pointer points to the file to the user, and no more information will be uploaded. If proof of ownership fails the upload operation on cloud service provider get terminated. PROCESS OF FILE DOWNLOADING If in case user needs to download a file first along with a filename request is sent to a cloud service provider. Upon receiving, the request cloud service provider checks for the authentication of the user using secret key. If user is authenticated then the file to be downloaded will be in encrypted form using convergent keyandcorrespondingtag and hash key of respective file can be decrypted. DECRYPTION The user downloads the file from the cloud serviceprovider using hash key and tag , the user decrypt the file using decryption encryption standard. EXPERIMENTAL ANALYSIS When a user uploads the datawithencryptionalgorithm,itis compared with two encryption algorithms such as DES and AES. All this depends on the basis of block size. DES has 64 bits block size and AES has 128 bits block size. So the number of blocks required to send over the network in DES is greater than that of AES. The AES analysis is moreefficient than that of DES. CONCLUSION Maintaining encoded data with secure de-duplication is an important and significant aspect in practice on CSP. The proposed work maintains the encoded data in cloud with data de-duplication with on proof of ownership. Our proposed work can support updating of data flexibly and sharing of data with data de-duplication even though users are not online. Only authorized user can access the encoded data and get symmetric keys that is used for decryption hence it is much secured. The analysis of the performance and test conducted reviled that technique issecure, efficient,
5.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 09 | Sep -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 88 suitable for data de-duplication. The resultsofourcomputer simulations showed the practicability ofourproposed work. REFERENCES [1] M. Bellare, S. Keelveedhi, and T. Ristenpart, “DupLESS: Server Aided Encryption for Deduplicated Storage,” Proceedings of the 22nd USENIX Conference on Security, 2013, pp. 179-194. [2] Dropbox, “A File-Storage and Sharing Service,” http://www.dropbox.com/. [3] Google Drive, http://drive.google.com. [4] Mozy, “Mozy: A File-storage and Sharing Service,” http://mozy.com/. [5] J.R. Douceur, A. Adya, W.J. Bolosky, D. Simon, and M.Theimer, “Reclaiming Space from Duplicate Files in a Serverless Distributed File System,” Proceedings of IEEE International Conferenceon DistributedComputingSystems, 2002, pp. 617 -624 [6] G. Wallace, F. Douglis, H. Qian, P. Shilane , S. Smaldone, M. Chamness, and W. Hsu, “Characteristics of Backup Workloads in Production Systems,” Proceedings of USENIX Conference on File and StorageTechnologies,2012,pp.1-16. [7]Z.O. Wilcox,“Convergent Encryption Reconsidered,”2011,http://www.mailarchive.com/cryptogr aphy@metzdowd.com/msg08949.html. [8] G. Ateniese, K. Fu, M. Green, and S. Hohenberger, “Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage,” ACM Transactions on Information and System Security, 9(1), 2006, pp. 1-30. [9] Open de dup. http://opendedup.org/. [10] D.T. Meyer and W.J Bolosky., “A Study of Practical De- duplication,”ACM Transactions on Storage, 2012, pp.1-20.
Baixar agora