+ All Categories
Home > Education > A hybrid cloud approach for secure authorized deduplication.

A hybrid cloud approach for secure authorized deduplication.

Date post: 15-Jul-2015
Category:
Upload: prudhvikumar-madithati
View: 229 times
Download: 8 times
Share this document with a friend
Popular Tags:
36
A PROJECT REPORT ON A HYBRID CLOUD APPROACH FOR SECURE AUTHORIZED DEDUPLICATION Submitted by T.CHANDU 114P1A0551 M.PRUDHVI KUMAR 114P1A0530 S.CHAITHANYA NAIK 114P1A0548 Esteemed Guidance by SHAIK ASEEF.(M.Tech) Asst.Professor. CSE Department. YOGANANDA INSTITUTE OF TECHNOLOGY & SCIENCE DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING (Approved by AICTE, New Delhi & Affiliated to JNTUA, Anantapur) Mohan reddynagar,yalamandyam(v),Renigunta(m),Tirupathi. 2014-2015
Transcript
Page 1: A hybrid cloud approach for secure authorized deduplication.

A PROJECT REPORT ON

A HYBRID CLOUD APPROACH FOR SECURE

AUTHORIZED DEDUPLICATION

Submitted by

T.CHANDU 114P1A0551

M.PRUDHVI KUMAR 114P1A0530

S.CHAITHANYA NAIK 114P1A0548

Esteemed Guidance by

SHAIK ASEEF.(M.Tech)

Asst.Professor.

CSE Department.

YOGANANDA INSTITUTE OF TECHNOLOGY & SCIENCEDEPARTMENT OF COMPUTER SCIENCE & ENGINEERING

(Approved by AICTE, New Delhi & Affiliated to JNTUA, Anantapur)

Mohan reddynagar,yalamandyam(v),Renigunta(m),Tirupathi.

2014-2015

Page 2: A hybrid cloud approach for secure authorized deduplication.

A HYBRID CLOUD APPROACH FOR SECURE

AUTHORIZED DEDUPLICATION

Page 3: A hybrid cloud approach for secure authorized deduplication.

YOU COULD ACHIEVE THESE BENEFITS:

REDUCED

COSTSFLEXIBILITY

MORE

MOBILITY

EASY TO

IMPLEMENT

AGILITY

HIGHLY

AUTOMATED

END USER

PRODUCTIVITY

REDUCED

COSTS FLEXIBILITYMORE

MOBILITY

EASY TO

IMPLEMENTAGILITYHIGHLY

AUTOMATED

END USER

PRODUCTIVITY

WITH AN INFRASTRUCTURE THAT IS:

EFFICIENTSELF

SERVICE

USAGE

BASED

SCALABLE

AND ELASTIC

Page 4: A hybrid cloud approach for secure authorized deduplication.

ABSTRACT

• Data deduplication is one of important data compression techniques for eliminating duplicate

copies of repeating data, and has been widely used in cloud storage to reduce the amount of

storage space and save bandwidth.

• The first attempt to formally address the problem of authorized data deduplication. Different

from traditional deduplication systems, the differential privileges of users are further

considered in duplicate check besides the data itself.

• our proposed authorized duplicate check scheme incurs minimal overhead compared to

normal operations.our proposed authorized duplicate check scheme incurs minimal overhead

compared to normal operations.

Page 5: A hybrid cloud approach for secure authorized deduplication.

ARCHITECTURE

Page 6: A hybrid cloud approach for secure authorized deduplication.

• Cloud computing provides seemingly unlimited “virtualized” resources to users as

services across the whole Internet, while hiding platform and implementation details.

• Today’s cloud service providers offer both highly available storage and massively

parallel computing resources at relatively low costs.

• Cloud computing becomes prevalent, an increasing amount of data is being stored in

the cloud and shared by users with specified privileges, which define the access rights

of the stored data.

EXISTING SYSTEM

Page 7: A hybrid cloud approach for secure authorized deduplication.

EXISTING SYSTEM DISADVANTAGES

• One critical challenge of cloud storage services is the management of the ever-

increasing volume of data.

• Increasing of duplicate data in cloud storage and it increases size of occupation and

increases bandwidth.

Page 8: A hybrid cloud approach for secure authorized deduplication.

PROPOSED SYSTEM

• We also present several new deduplication constructions supporting authorized

duplicate check in a hybrid cloud architecture.

• Security analysis demonstrates that our scheme is secure in terms of the definitions

specified in the proposed security model.

• Our proposed authorized duplicate check scheme incurs minimal overhead

compared to normal operations.

Page 9: A hybrid cloud approach for secure authorized deduplication.

PROPOSED SYSTEM ADVANTAGES

• Decreasing of duplicate data in cloud storage and save the server space.

• It Decreases size of occupation and Decreases bandwidth.

• One critical challenge of cloud storage services is the management of the ever-

increasing volume of data.

Page 10: A hybrid cloud approach for secure authorized deduplication.

ALGORITHMS

• Key Gen Algorithm.

• AES Algorithm.

• Tag Gen Algorithm.

Page 11: A hybrid cloud approach for secure authorized deduplication.

User

+user name+password

+registration()+login()+send request()+upload files()+view files()+download files()+logout()

Admin

+admin+password

+login()+accept request()+send key()+logout()

CLASS DIAGRAM:

Page 12: A hybrid cloud approach for secure authorized deduplication.

registration

user admin

login

send request

upload files

view files

download files

accept request

logout

send key

USECASE DIAGRAM :

Page 13: A hybrid cloud approach for secure authorized deduplication.

user system admin

registration

login

send request

login

accept request

send key to mail

logout

upload files

view files

download files

logout

SEQUENCE DIAGRAM :

Page 14: A hybrid cloud approach for secure authorized deduplication.

ACCEPT REQUESTLOGIN

LOGINREGISTRATION

USER ADMIN

HOME

START

SEND REQUEST

UPLOAD FILES

VIEW FILES

DOWNLOAD FILES

SEND KEY TO MAIL

LOGOUT

STOP

VIEW FILES

STATE CHART DIAGRAM

Page 15: A hybrid cloud approach for secure authorized deduplication.

SCREENSHOTSHome page

Page 16: A hybrid cloud approach for secure authorized deduplication.

SCREENSHOTSRegistration page

Page 17: A hybrid cloud approach for secure authorized deduplication.

SCREENSHOTSUser Login page

Page 18: A hybrid cloud approach for secure authorized deduplication.

SCREENSHOTSUser page

Page 19: A hybrid cloud approach for secure authorized deduplication.

SCREENSHOTSToken Request page

Page 20: A hybrid cloud approach for secure authorized deduplication.

SCREENSHOTSAdmin Login page

Page 21: A hybrid cloud approach for secure authorized deduplication.

SCREENSHOTSAdmin page

Page 22: A hybrid cloud approach for secure authorized deduplication.

SCREENSHOTSMail page

Page 23: A hybrid cloud approach for secure authorized deduplication.

SCREENSHOTSMail: Secret Key

Page 24: A hybrid cloud approach for secure authorized deduplication.

SCREENSHOTSEnter Key

Page 25: A hybrid cloud approach for secure authorized deduplication.

SCREENSHOTSEnter File Name

Page 26: A hybrid cloud approach for secure authorized deduplication.

SCREENSHOTSUpload File

Page 27: A hybrid cloud approach for secure authorized deduplication.

SCREENSHOTSFile uploading

Page 28: A hybrid cloud approach for secure authorized deduplication.

SCREENSHOTSFile uploaded Sucessfully

Page 29: A hybrid cloud approach for secure authorized deduplication.

SCREENSHOTSFile Download

Page 30: A hybrid cloud approach for secure authorized deduplication.

SCREENSHOTSEnter Key

Page 31: A hybrid cloud approach for secure authorized deduplication.

SCREENSHOTSSelected File

Page 32: A hybrid cloud approach for secure authorized deduplication.

HARDWARE REQUIREMENTS

Processor - Pentium –III

Speed - 1.Ghz

RAM - 256 MB(min)

Hard Disk - 20 GB

Page 33: A hybrid cloud approach for secure authorized deduplication.

SOFTWARE REQUIREMENTS

Operating System : Windows95/98/2000/XP

Front End : HTML, Java, Jsp

Scripts : JavaScript.

Database : MySql

IDE : Netbeans

Page 34: A hybrid cloud approach for secure authorized deduplication.

Requirements

AnalysisDesign

Coding

TestingDeployment

CONCLUSION

Page 35: A hybrid cloud approach for secure authorized deduplication.

QUERIES….?

Page 36: A hybrid cloud approach for secure authorized deduplication.

THANK YOU


Recommended