36
A PROJECT REPORT ON A HYBRID CLOUD APPROACH FOR SECURE AUTHORIZED DEDUPLICATION Submitted by T.CHANDU 114P1A0551 M.PRUDHVI KUMAR 114P1A0530 S.CHAITHANYA NAIK 114P1A0548 Esteemed Guidance by SHAIK ASEEF.(M.Tech) Asst.Professor. CSE Department. YOGANANDA INSTITUTE OF TECHNOLOGY & SCIENCE DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING (Approved by AICTE, New Delhi & Affiliated to JNTUA, Anantapur) Mohan reddynagar,yalamandyam(v),Renigunta(m),Tirupathi. 2014-2015

A hybrid cloud approach for secure authorized deduplication

Embed Size (px)

Citation preview

Page 1: A hybrid cloud approach for secure authorized deduplication

A PROJECT REPORT ON

A HYBRID CLOUD APPROACH FOR SECURE

AUTHORIZED DEDUPLICATION

Submitted by

T.CHANDU 114P1A0551

M.PRUDHVI KUMAR 114P1A0530

S.CHAITHANYA NAIK 114P1A0548

Esteemed Guidance by

SHAIK ASEEF.(M.Tech)

Asst.Professor.

CSE Department.

YOGANANDA INSTITUTE OF TECHNOLOGY & SCIENCEDEPARTMENT OF COMPUTER SCIENCE & ENGINEERING

(Approved by AICTE, New Delhi & Affiliated to JNTUA, Anantapur)

Mohan reddynagar,yalamandyam(v),Renigunta(m),Tirupathi.

2014-2015

Page 2: A hybrid cloud approach for secure authorized deduplication

A HYBRID CLOUD APPROACH FOR SECURE

AUTHORIZED DEDUPLICATION

Page 3: A hybrid cloud approach for secure authorized deduplication

YOU COULD ACHIEVE THESE BENEFITS:

REDUCED

COSTSFLEXIBILITY

MORE

MOBILITY

EASY TO

IMPLEMENT

AGILITY

HIGHLY

AUTOMATED

END USER

PRODUCTIVITY

REDUCED

COSTS FLEXIBILITYMORE

MOBILITY

EASY TO

IMPLEMENTAGILITYHIGHLY

AUTOMATED

END USER

PRODUCTIVITY

WITH AN INFRASTRUCTURE THAT IS:

EFFICIENTSELF

SERVICE

USAGE

BASED

SCALABLE

AND ELASTIC

Page 4: A hybrid cloud approach for secure authorized deduplication

ABSTRACT

• Data deduplication is one of important data compression techniques for eliminating duplicate

copies of repeating data, and has been widely used in cloud storage to reduce the amount of

storage space and save bandwidth.

• The first attempt to formally address the problem of authorized data deduplication. Different

from traditional deduplication systems, the differential privileges of users are further

considered in duplicate check besides the data itself.

• our proposed authorized duplicate check scheme incurs minimal overhead compared to

normal operations.our proposed authorized duplicate check scheme incurs minimal overhead

compared to normal operations.

Page 5: A hybrid cloud approach for secure authorized deduplication

ARCHITECTURE

Page 6: A hybrid cloud approach for secure authorized deduplication

• Cloud computing provides seemingly unlimited “virtualized” resources to users as

services across the whole Internet, while hiding platform and implementation details.

• Today’s cloud service providers offer both highly available storage and massively

parallel computing resources at relatively low costs.

• Cloud computing becomes prevalent, an increasing amount of data is being stored in

the cloud and shared by users with specified privileges, which define the access rights

of the stored data.

EXISTING SYSTEM

Page 7: A hybrid cloud approach for secure authorized deduplication

EXISTING SYSTEM DISADVANTAGES

• One critical challenge of cloud storage services is the management of the ever-

increasing volume of data.

• Increasing of duplicate data in cloud storage and it increases size of occupation and

increases bandwidth.

Page 8: A hybrid cloud approach for secure authorized deduplication

PROPOSED SYSTEM

• We also present several new deduplication constructions supporting authorized

duplicate check in a hybrid cloud architecture.

• Security analysis demonstrates that our scheme is secure in terms of the definitions

specified in the proposed security model.

• Our proposed authorized duplicate check scheme incurs minimal overhead

compared to normal operations.

Page 9: A hybrid cloud approach for secure authorized deduplication

PROPOSED SYSTEM ADVANTAGES

• Decreasing of duplicate data in cloud storage and save the server space.

• It Decreases size of occupation and Decreases bandwidth.

• One critical challenge of cloud storage services is the management of the ever-

increasing volume of data.

Page 10: A hybrid cloud approach for secure authorized deduplication

ALGORITHMS

• Key Gen Algorithm.

• AES Algorithm.

• Tag Gen Algorithm.

Page 11: A hybrid cloud approach for secure authorized deduplication

User

+user name+password

+registration()+login()+send request()+upload files()+view files()+download files()+logout()

Admin

+admin+password

+login()+accept request()+send key()+logout()

CLASS DIAGRAM:

Page 12: A hybrid cloud approach for secure authorized deduplication

registration

user admin

login

send request

upload files

view files

download files

accept request

logout

send key

USECASE DIAGRAM :

Page 13: A hybrid cloud approach for secure authorized deduplication

user system admin

registration

login

send request

login

accept request

send key to mail

logout

upload files

view files

download files

logout

SEQUENCE DIAGRAM :

Page 14: A hybrid cloud approach for secure authorized deduplication

ACCEPT REQUESTLOGIN

LOGINREGISTRATION

USER ADMIN

HOME

START

SEND REQUEST

UPLOAD FILES

VIEW FILES

DOWNLOAD FILES

SEND KEY TO MAIL

LOGOUT

STOP

VIEW FILES

STATE CHART DIAGRAM

Page 15: A hybrid cloud approach for secure authorized deduplication

SCREENSHOTSHome page

Page 16: A hybrid cloud approach for secure authorized deduplication

SCREENSHOTSRegistration page

Page 17: A hybrid cloud approach for secure authorized deduplication

SCREENSHOTSUser Login page

Page 18: A hybrid cloud approach for secure authorized deduplication

SCREENSHOTSUser page

Page 19: A hybrid cloud approach for secure authorized deduplication

SCREENSHOTSToken Request page

Page 20: A hybrid cloud approach for secure authorized deduplication

SCREENSHOTSAdmin Login page

Page 21: A hybrid cloud approach for secure authorized deduplication

SCREENSHOTSAdmin page

Page 22: A hybrid cloud approach for secure authorized deduplication

SCREENSHOTSMail page

Page 23: A hybrid cloud approach for secure authorized deduplication

SCREENSHOTSMail: Secret Key

Page 24: A hybrid cloud approach for secure authorized deduplication

SCREENSHOTSEnter Key

Page 25: A hybrid cloud approach for secure authorized deduplication

SCREENSHOTSEnter File Name

Page 26: A hybrid cloud approach for secure authorized deduplication

SCREENSHOTSUpload File

Page 27: A hybrid cloud approach for secure authorized deduplication

SCREENSHOTSFile uploading

Page 28: A hybrid cloud approach for secure authorized deduplication

SCREENSHOTSFile uploaded Sucessfully

Page 29: A hybrid cloud approach for secure authorized deduplication

SCREENSHOTSFile Download

Page 30: A hybrid cloud approach for secure authorized deduplication

SCREENSHOTSEnter Key

Page 31: A hybrid cloud approach for secure authorized deduplication

SCREENSHOTSSelected File

Page 32: A hybrid cloud approach for secure authorized deduplication

HARDWARE REQUIREMENTS

Processor - Pentium –III

Speed - 1.Ghz

RAM - 256 MB(min)

Hard Disk - 20 GB

Page 33: A hybrid cloud approach for secure authorized deduplication

SOFTWARE REQUIREMENTS

Operating System : Windows95/98/2000/XP

Front End : HTML, Java, Jsp

Scripts : JavaScript.

Database : MySql

IDE : Netbeans

Page 34: A hybrid cloud approach for secure authorized deduplication

Requirements

AnalysisDesign

Coding

TestingDeployment

CONCLUSION

Page 35: A hybrid cloud approach for secure authorized deduplication

QUERIES….?

Page 36: A hybrid cloud approach for secure authorized deduplication

THANK YOU