SlideShare a Scribd company logo
1 of 8
#13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, vellore – 6.
Off:0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602,
Project Titles: http://shakastech.weebly.com/2015-2016-titles
Website:www.shakastech.com,Email - id:shakastech@gmail.com,info@shakastech.com
SECURE DISTRIBUTED DE-DUPLICATION SYSTEMS WITH
IMPROVED RELIABILITY
ABSTRACT
Data is a technique for eliminating duplicate copies of data, and has been widely used in
cloud storage to reduce storage space and upload bandwidth. However, there is only one copy for
each file stored in cloud even if such a file is owned by a huge number of users. As a result,
system improves storage utilization while reducing reliability. Furthermore, the challenge of
privacy for sensitive data also arises when they are outsourced by users to cloud. Aiming to
address the above security challenges, this paper makes the first attempt to formalize the notion
of distributed reliable system. We propose new distributed systems with higher reliability in
which the data chunks are distributed across multiple cloud servers. The security requirements of
data confidentiality and tag consistency are also achieved by introducing a deterministic secret
sharing scheme in distributed storage systems, instead of using convergent encryption as in
previous systems. Security analysis demonstrates that our systems are secure in terms of the
definitions specified in the proposed security model. As a proof of concept, we implement the
proposed systems and demonstrate that the incurred overhead is very limited in realistic
environments.
#13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, vellore – 6.
Off:0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602,
Project Titles: http://shakastech.weebly.com/2015-2016-titles
Website:www.shakastech.com,Email - id:shakastech@gmail.com,info@shakastech.com
PROPOSED SYSTEM:
This paper makes the following contributions.
• Four new secure de-duplication systems are proposed to provide efficient de-duplication with
high reliability for file-level and block-level de-duplication, respectively. The secret splitting
technique, instead of traditional encryption methods, is utilized to protect data confidentiality.
Specifically, data are split into fragments by using secure secret sharing schemes and stored at
different servers. Our proposed constructions support both file-level and block-level de-
duplications.
• Security analysis demonstrates that the proposed de-duplication systems are secure in terms of
the definitions specified in the proposed security model. In more details, confidentiality,
reliability and integrity can be achieved in our proposed system. Two kinds of collusion attacks
are considered in our solutions. These are the collusion attack on the data and the collusion
attack against servers. In particular, the data remains secure even if the adversary controls a
limited number of storage servers.
• We implement our de-duplication systems using the Ramp secret sharing scheme that enables
high reliability and confidentiality levels. Our evaluation results demonstrate that the new
proposed constructions are efficient and the redundancies are optimized and comparable with the
other storage system supporting the same level of reliability.
EXISTING SYSTEM:
Reliable De-duplication systems Data de-duplication techniques are very interesting
techniques that are widely employed for data backup in enterprise environments to minimize
network and storage overhead by detecting and eliminating redundancy among data blocks.
There are many de-duplication schemes proposed by the research community. The reliability in
de-duplication has also been addresse.. However, they only focused on traditional files without
encryption, without considering the reliable de-duplication over ciphertext. Li et al. showed how
to achieve reliable key management in de-duplication. However, they did not mention about the
application of reliable de-duplication for encrypted files. Later, , they showed how to extend the
method for the construction of reliable de-duplication for user files. However, all of these works
#13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, vellore – 6.
Off:0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602,
Project Titles: http://shakastech.weebly.com/2015-2016-titles
Website:www.shakastech.com,Email - id:shakastech@gmail.com,info@shakastech.com
have not considered and achieved the tag consistency and integrity in the construction.
Convergent encryption. Convergent encryption ensures data privacy in de-duplication. Bellare et
al. formalized this primitive as message-locked encryption, and explored its application in
spaceefficient secure outsourced storage. There are also several implementations of convergent
implementations of different convergent encryption variants for secure de-duplication. It is
known that some commercial cloud storage providers, such as Bitcasa, also deploy convergent
encryption addressed the key-management issue in block-level de-duplication by distributing
these keys across multiple servers after encrypting the files. Bellare et al. showed how to protect
data confidentiality by transforming the predicatable message into a unpredicatable message. In
their system, another third party called the key server was introduced to generate the file tag for
the duplicate check. Stanek et al. we presented a novel encryption scheme that provided
differential security for popular and unpopular data. For popular data that are not particularly
sensitive, the traditional conventional encryption is performed. Another two-layered encryption
scheme with stronger security while supporting de-duplication was proposed for unpopular data.
In this way, they achieved better tradeoff between the efficiency and security of the outsourced
data.
Module 1
Data de-duplication
Data deduplication involves finding and removing duplication within data without
compromising its fidelity or integrity. The goal is to store more data in less space by segmenting
files into small variable-sized chunks (32–128 KB), identifying duplicate chunks, and
maintaining a single copy of each chunk. Redundant copies of the chunk are replaced by a
reference to the single copy. The chunks are compressed and then organized into special
container files in the System Volume Information folder. After deduplication, files are no longer
stored as independent streams of data, and they are replaced with stubs that point to data blocks
that are stored within a common chunk store. Because these files share blocks, those blocks are
only stored once, which reduces the disk space needed to store all files. During file access, the
correct blocks are transparently assembled to serve the data without calling the application or the
user having any knowledge of the on-disk transformation to the file. This enables administrators
#13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, vellore – 6.
Off:0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602,
Project Titles: http://shakastech.weebly.com/2015-2016-titles
Website:www.shakastech.com,Email - id:shakastech@gmail.com,info@shakastech.com
to apply deduplication to files without having to worry about any change in behavior to the
applications or impact to users who are accessing those files.
After a volume is enabled for deduplication and the data is optimized, the volume contains the
following:
 Unoptimized files. For example, unoptimized files could include files that do not meet
the selected file-age policy setting, system state files, alternate data streams, encrypted
files, files with extended attributes, files smaller than 32 KB, other reparse point files, or
files in use by other applications (the “in use” limit is removed in Windows Server 2012
R2).
 Optimized files. Files that are stored as reparse points that contain pointers to a map of
the respective chunks in the chunk store that are needed to restore the file when it is
requested.
 Chunk store. Location for the optimized file data.
 Additional free space. The optimized files and chunk store occupy much less space than
they did prior to optimization.
Module 2
Distributed de-duplication systems
The distributed systems’ proposed aim is to reliably store data in the cloud while
achieving confidentiality and integrity. Its main goal is to enable and distributed storage of the
data across multiple storage servers. Instead of encrypting the data to keep the confidentiality of
the data, our new constructions utilize the secret splitting technique to split data into shards.
These shards will then be distributed across multiple storage servers. Building Blocks Secret
Sharing Scheme. There are two algorithms in a secret sharing scheme, which are Share and
Recover. The secret is divided and shared by using Share. With enough shares, the secret can be
extracted and recovered with the algorithm of Recover. In our implementation, we will use the
Ramp secret sharing scheme (RSSS) ,[8] to secretly split a secret into shards. Specifically, the (n,
k, r)-RSSS (where n > k > r ≥ 0) generates n shares from a secret so that (i) the secret can be
#13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, vellore – 6.
Off:0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602,
Project Titles: http://shakastech.weebly.com/2015-2016-titles
Website:www.shakastech.com,Email - id:shakastech@gmail.com,info@shakastech.com
recovered from any k or more shares, and (ii) no information about the secret can be deduced
from any r or less shares. Two algorithms, Share and Recover, are defined in the (n, k, r)-RSSS.
• Share divides a secret S into (k −r) pieces of equal size, generates r random pieces of the same
size, and encodes the k pieces using a non-systematic k-of-n erasure code into n shares of the
same size;
• Recover takes any k out of n shares as inputs and then outputs the original secret S. It is known
that when r = 0, the (n, k, 0)-RSSS becomes the (n, k) Rabin’s Information Dispersal Algorithm
(IDA) [9]. When r = k−1, the (n, k, k−1)-RSSS becomes the (n,k) Shamir’s Secret Sharing
Scheme (SSSS).
Module 3
The File-level Distributed De-duplication System
To support efficient duplicate check, tags for each file will be computed and are sent to
S-CSPs. To prevent a collusion attack launched by the S-CSPs, the tags stored at different
storage servers are computationally independent and different. We now elaborate on the details
of the construction as follows.
System setup. In our construction, the number of storage servers S-CSPs is assumed to be n with
identities denoted by id1, id2, · · · , idn, respectively. Define the security parameter as 1_ and
initialize a secret sharing scheme SS = (Share, Recover), and a tag generation algorithm TagGen.
The file storage system for the storage server is set to be. File Upload. To upload a file F, the
user interacts with S-CSPs to perform the de-duplication. More precisely, the user firstly
computes and sends the file tag ϕF = TagGen(F) to S-CSPs for the file duplicate check.
• If a duplicate is found, the user computes and sends ϕF;idj = TagGen′(F, idj) to the j-th server
with identity idj via the secure channel for 1 ≤ j ≤ n (which could be implemented by a
cryptographic hash function Hj(F) related with index j). The reason for introducing an index j is
to prevent the server from getting the shares of other S-CSPs for the same file or block, which
will be explained in detail in the security analysis. If ϕF;idj matches the metadata stored with ϕF
, the user will be provided a pointer for the shard stored at server idj .
• Otherwise, if no duplicate is found, the user will proceed as follows. He runs the secret
sharing algorithm SS over F to get {cj} = Share(F), where cj is the j-th shard of F. He also
#13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, vellore – 6.
Off:0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602,
Project Titles: http://shakastech.weebly.com/2015-2016-titles
Website:www.shakastech.com,Email - id:shakastech@gmail.com,info@shakastech.com
computes ϕF;idj = TagGen′(F, idj), which serves as the tag for the jth S-CSP. Finally, the user
uploads the set of values {ϕF , cj , ϕF;idj } to the S-CSP with identity idj via a secure channel.
The S-CSP stores these values and returns a pointer back to the user for local storage.
File Download. To download a file F, the user first downloads the secret shares {cj} of the file
from k out of n storage servers. Specifically, the user sends the pointer of F to k out of n S-CSPs.
After gathering enough shares, the user reconstructs file F by using the algorithm of
Recover({cj}). This approach provides fault tolerance and allows the user to remain accessible
even if any limited subsets of storage servers fail.
Module 4
The Block-level Distributed System
In this section, we show how to achieve the fine-grained block-level distributed de-
duplication. In a block-level de-duplication system, the user also needs to firstly perform the file-
level de-duplication before uploading his file. If no duplicate is found, the user divides this file
into blocks and performs block-level de-duplication. The system setup is the same as the file-
level de-duplication system, except the block size parameter will be defined additionally. Next,
we give the details of the algorithms of File Upload and File Download. File Upload. To upload
a file F, the user first performs the file-level de-duplication by sending ϕF to the storage servers.
If a duplicate is found, the user will perform the file-level de-duplication. Otherwise, if no
duplicate is found, the user performs the block-level de-duplication as follows. He firstly divides
F into a set of fragments {Bi} (where i = 1, 2, · · · ). For each fragment Bi, the user will perform a
block-level duplicate check by computing ϕBi = TagGen(Bi), where the data processing and
duplicate check of block-level de-duplication is the same as that of file-level de-duplication if the
file F is replaced with block Bi. Upon receiving block tags {ϕBi }, the server with identity idj
computes a block signal vector σBi for each i
.• i) If σBi=1, the user further computes and sends ϕBi;j = TagGen′(Bi, j) to the S-CSP with
identity idj . If it also matches the corresponding tag stored, S-CSP returns a block pointer of Bi
to the user. Then, the user keeps the block pointer of Bi and does not need to upload Bi.
• ii) If σBi=0, the user runs the secret sharing algorithm SS over Bi and gets {cij} =
Share(Bi), where cij is the j-th secret share of Bi. The user also computes ϕBi;j for 1 ≤ j ≤ n and
#13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, vellore – 6.
Off:0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602,
Project Titles: http://shakastech.weebly.com/2015-2016-titles
Website:www.shakastech.com,Email - id:shakastech@gmail.com,info@shakastech.com
uploads the set of values {ϕF , ϕF;idj , cij , ϕBi;j} to the server idj via a secure channel. The S-
CSP returns the corresponding pointers back to the user.
File Download. To download a file F = {Bi}, the user first downloads the secret shares {cij} of all
the blocks Bi in F from k out of n S-CSPs. Specifically, the user sends all the pointers for Bi to k
out of n servers. After gathering all the shares, the user reconstructs all the fragments Bi using
the algorithm of Recover({·}) and gets the file F = {Bi}.
CONCLUSIONS
We proposed the distributed de-duplication systems to improve the reliability of data
while achieving the confidentiality of the users’ outsourced data without an encryption
mechanism. Four constructions were proposed to support file-level and fine-grained block-level
data de-duplication. The security of tag consistency and integrity were achieved.We
implemented our de-duplication systems using the Ramp secret sharing scheme and
demonstrated that it incurs small encoding/decoding overhead compared to the network
transmission overhead in regular upload/download operations.
REFERENCES
[1] Amazon, “Case Studies,” https://aws.amazon.com/solutions/casestudies/# backup.
[2] J. Gantz and D. Reinsel, “The digital universe in 2020: Big data, bigger digi tal shadows, and
biggest growth in the far east,” http://www.emc.com/collateral/analyst-reports/idcthe- digital-
universe-in-2020.pdf, Dec 2012.
[3] M. O. Rabin, “Fingerprinting by random polynomials,” Center for Research in Computing
Technology, Harvard University, Tech. Rep. Tech. Report TR-CSE-03-01, 1981.
[4] J. R. Douceur, A. Adya, W. J. Bolosky, D. Simon, and M. Theimer, “Reclaiming space from
duplicate files in a serverless distributed file system.” in ICDCS, 2002, pp. 617–624.
[5] M. Bellare, S. Keelveedhi, and T. Ristenpart, “Dupless: Serveraided encryption for
deduplicated storage,” in USENIX Security Symposium, 2013.
[6] “Message-locked encryption and secure de-duplication,” in EUROCRYPT, 2013, pp. 296–
312.
#13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, vellore – 6.
Off:0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602,
Project Titles: http://shakastech.weebly.com/2015-2016-titles
Website:www.shakastech.com,Email - id:shakastech@gmail.com,info@shakastech.com
[7] G. R. Blakley and C. Meadows, “Security of ramp schemes,” in Advances in Cryptology:
Proceedings of CRYPTO ’84, ser. Lecture Notes in Computer Science, G. R. Blakley and D.
Chaum, Eds. Springer-Verlag Berlin/Heidelberg, 1985, vol. 196, pp. 242–268.
[8] A. D. Santis and B. Masucci, “Multiple ramp schemes,” IEEE Transactions on Information
Theory, vol. 45, no. 5, pp. 1720–1728, Jul. 1999.
[9] M. O. Rabin, “Efficient dispersal of information for security, load balancing, and fault
tolerance,” Journal of the ACM, vol. 36, no. 2, pp. 335–348, Apr. 1989.
[10] A. Shamir, “How to share a secret,” Commun. ACM, vol. 22, no. 11, pp. 612–613, 1979.
[11] J. Li, X. Chen, M. Li, J. Li, P. Lee, and W. Lou, “Secure de-duplication with efficient and
reliable convergent key management,” in IEEE Transactions on Parallel and Distributed
Systems, 2014, pp. vol. 25(6), pp. 1615–1625.

More Related Content

What's hot

3 ijece 1 ed iqbal qc
3 ijece 1 ed iqbal qc3 ijece 1 ed iqbal qc
3 ijece 1 ed iqbal qcIAESIJEECS
 
IRJET- Secure Data Deduplication and Auditing for Cloud Data Storage
IRJET-  	  Secure Data Deduplication and Auditing for Cloud Data StorageIRJET-  	  Secure Data Deduplication and Auditing for Cloud Data Storage
IRJET- Secure Data Deduplication and Auditing for Cloud Data StorageIRJET Journal
 
Secure Redundant Data Avoidance over Multi-Cloud Architecture.
Secure Redundant Data Avoidance over Multi-Cloud Architecture. Secure Redundant Data Avoidance over Multi-Cloud Architecture.
Secure Redundant Data Avoidance over Multi-Cloud Architecture. IJCERT JOURNAL
 
Towards secure cloud data management
Towards secure cloud data managementTowards secure cloud data management
Towards secure cloud data managementambitlick
 
Secret keys and the packets transportation for privacy data forwarding method...
Secret keys and the packets transportation for privacy data forwarding method...Secret keys and the packets transportation for privacy data forwarding method...
Secret keys and the packets transportation for privacy data forwarding method...eSAT Publishing House
 
Secret keys and the packets transportation for privacy data forwarding method...
Secret keys and the packets transportation for privacy data forwarding method...Secret keys and the packets transportation for privacy data forwarding method...
Secret keys and the packets transportation for privacy data forwarding method...eSAT Journals
 
Data deduplication and chunking
Data deduplication and chunkingData deduplication and chunking
Data deduplication and chunkingSanchita Kadambari
 
iaetsd Preserving private multi keyword searching with ranking by anonymous i...
iaetsd Preserving private multi keyword searching with ranking by anonymous i...iaetsd Preserving private multi keyword searching with ranking by anonymous i...
iaetsd Preserving private multi keyword searching with ranking by anonymous i...Iaetsd Iaetsd
 
28 15141Secure Data Sharing with Data Partitioning in Big Data33289 24 12-2017
28 15141Secure Data Sharing with Data Partitioning in Big Data33289 24 12-201728 15141Secure Data Sharing with Data Partitioning in Big Data33289 24 12-2017
28 15141Secure Data Sharing with Data Partitioning in Big Data33289 24 12-2017rahulmonikasharma
 
Encryption based multi user manner secured data sharing and storing in cloud
Encryption based multi user manner secured data sharing and storing in cloudEncryption based multi user manner secured data sharing and storing in cloud
Encryption based multi user manner secured data sharing and storing in cloudprjpublications
 
Accessing secured data in cloud computing environment
Accessing secured data in cloud computing environmentAccessing secured data in cloud computing environment
Accessing secured data in cloud computing environmentIJNSA Journal
 
Review on Key Based Encryption Scheme for Secure Data Sharing on Cloud
Review on Key Based Encryption Scheme for Secure Data Sharing on CloudReview on Key Based Encryption Scheme for Secure Data Sharing on Cloud
Review on Key Based Encryption Scheme for Secure Data Sharing on CloudIRJET Journal
 
Securely Data Forwarding and Maintaining Reliability of Data in Cloud Computing
Securely Data Forwarding and Maintaining Reliability of Data in Cloud ComputingSecurely Data Forwarding and Maintaining Reliability of Data in Cloud Computing
Securely Data Forwarding and Maintaining Reliability of Data in Cloud ComputingIJERA Editor
 
IRJET - A Secure Access Policies based on Data Deduplication System
IRJET - A Secure Access Policies based on Data Deduplication SystemIRJET - A Secure Access Policies based on Data Deduplication System
IRJET - A Secure Access Policies based on Data Deduplication SystemIRJET Journal
 
Data Partitioning In Cloud Storage Using DESD Crypto Technique
Data Partitioning In Cloud Storage Using DESD Crypto TechniqueData Partitioning In Cloud Storage Using DESD Crypto Technique
Data Partitioning In Cloud Storage Using DESD Crypto TechniqueIJCSIS Research Publications
 
SMONA: Secure Multi Owner Data Sharing for Dynamic Groups in the Cloud
SMONA: Secure Multi Owner Data Sharing for Dynamic Groups in the CloudSMONA: Secure Multi Owner Data Sharing for Dynamic Groups in the Cloud
SMONA: Secure Multi Owner Data Sharing for Dynamic Groups in the Cloudijsrd.com
 
iaetsd Controlling data deuplication in cloud storage
iaetsd Controlling data deuplication in cloud storageiaetsd Controlling data deuplication in cloud storage
iaetsd Controlling data deuplication in cloud storageIaetsd Iaetsd
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 

What's hot (19)

3 ijece 1 ed iqbal qc
3 ijece 1 ed iqbal qc3 ijece 1 ed iqbal qc
3 ijece 1 ed iqbal qc
 
IRJET- Secure Data Deduplication and Auditing for Cloud Data Storage
IRJET-  	  Secure Data Deduplication and Auditing for Cloud Data StorageIRJET-  	  Secure Data Deduplication and Auditing for Cloud Data Storage
IRJET- Secure Data Deduplication and Auditing for Cloud Data Storage
 
Secure Redundant Data Avoidance over Multi-Cloud Architecture.
Secure Redundant Data Avoidance over Multi-Cloud Architecture. Secure Redundant Data Avoidance over Multi-Cloud Architecture.
Secure Redundant Data Avoidance over Multi-Cloud Architecture.
 
Towards secure cloud data management
Towards secure cloud data managementTowards secure cloud data management
Towards secure cloud data management
 
[IJET-V2I1P12] Authors:Nikesh Pansare, Akash Somkuwar , Adil Shaikh and Satya...
[IJET-V2I1P12] Authors:Nikesh Pansare, Akash Somkuwar , Adil Shaikh and Satya...[IJET-V2I1P12] Authors:Nikesh Pansare, Akash Somkuwar , Adil Shaikh and Satya...
[IJET-V2I1P12] Authors:Nikesh Pansare, Akash Somkuwar , Adil Shaikh and Satya...
 
Secret keys and the packets transportation for privacy data forwarding method...
Secret keys and the packets transportation for privacy data forwarding method...Secret keys and the packets transportation for privacy data forwarding method...
Secret keys and the packets transportation for privacy data forwarding method...
 
Secret keys and the packets transportation for privacy data forwarding method...
Secret keys and the packets transportation for privacy data forwarding method...Secret keys and the packets transportation for privacy data forwarding method...
Secret keys and the packets transportation for privacy data forwarding method...
 
Data deduplication and chunking
Data deduplication and chunkingData deduplication and chunking
Data deduplication and chunking
 
iaetsd Preserving private multi keyword searching with ranking by anonymous i...
iaetsd Preserving private multi keyword searching with ranking by anonymous i...iaetsd Preserving private multi keyword searching with ranking by anonymous i...
iaetsd Preserving private multi keyword searching with ranking by anonymous i...
 
28 15141Secure Data Sharing with Data Partitioning in Big Data33289 24 12-2017
28 15141Secure Data Sharing with Data Partitioning in Big Data33289 24 12-201728 15141Secure Data Sharing with Data Partitioning in Big Data33289 24 12-2017
28 15141Secure Data Sharing with Data Partitioning in Big Data33289 24 12-2017
 
Encryption based multi user manner secured data sharing and storing in cloud
Encryption based multi user manner secured data sharing and storing in cloudEncryption based multi user manner secured data sharing and storing in cloud
Encryption based multi user manner secured data sharing and storing in cloud
 
Accessing secured data in cloud computing environment
Accessing secured data in cloud computing environmentAccessing secured data in cloud computing environment
Accessing secured data in cloud computing environment
 
Review on Key Based Encryption Scheme for Secure Data Sharing on Cloud
Review on Key Based Encryption Scheme for Secure Data Sharing on CloudReview on Key Based Encryption Scheme for Secure Data Sharing on Cloud
Review on Key Based Encryption Scheme for Secure Data Sharing on Cloud
 
Securely Data Forwarding and Maintaining Reliability of Data in Cloud Computing
Securely Data Forwarding and Maintaining Reliability of Data in Cloud ComputingSecurely Data Forwarding and Maintaining Reliability of Data in Cloud Computing
Securely Data Forwarding and Maintaining Reliability of Data in Cloud Computing
 
IRJET - A Secure Access Policies based on Data Deduplication System
IRJET - A Secure Access Policies based on Data Deduplication SystemIRJET - A Secure Access Policies based on Data Deduplication System
IRJET - A Secure Access Policies based on Data Deduplication System
 
Data Partitioning In Cloud Storage Using DESD Crypto Technique
Data Partitioning In Cloud Storage Using DESD Crypto TechniqueData Partitioning In Cloud Storage Using DESD Crypto Technique
Data Partitioning In Cloud Storage Using DESD Crypto Technique
 
SMONA: Secure Multi Owner Data Sharing for Dynamic Groups in the Cloud
SMONA: Secure Multi Owner Data Sharing for Dynamic Groups in the CloudSMONA: Secure Multi Owner Data Sharing for Dynamic Groups in the Cloud
SMONA: Secure Multi Owner Data Sharing for Dynamic Groups in the Cloud
 
iaetsd Controlling data deuplication in cloud storage
iaetsd Controlling data deuplication in cloud storageiaetsd Controlling data deuplication in cloud storage
iaetsd Controlling data deuplication in cloud storage
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 

Viewers also liked

2015-10-01 Structured Data Archiving InfoGovCon
2015-10-01 Structured Data Archiving InfoGovCon2015-10-01 Structured Data Archiving InfoGovCon
2015-10-01 Structured Data Archiving InfoGovConDonda L. Young, CIP
 
IDCC 1353 Valeur point rmh 2016
IDCC 1353 Valeur point rmh 2016IDCC 1353 Valeur point rmh 2016
IDCC 1353 Valeur point rmh 2016Société Tripalio
 
Blessurepreventie methodisch aangepakt
Blessurepreventie methodisch aangepaktBlessurepreventie methodisch aangepakt
Blessurepreventie methodisch aangepaktFysio Running
 
Project of Banu priya muthu
Project of Banu priya muthuProject of Banu priya muthu
Project of Banu priya muthubanumuthu
 
Executive guide to contact center kpi's
Executive guide to contact center kpi'sExecutive guide to contact center kpi's
Executive guide to contact center kpi'sInova Solutions
 
IDCC 3105 Avenant n°3 annexe 2 clause de sauvegarde - v2
IDCC 3105 Avenant n°3 annexe 2   clause de sauvegarde - v2IDCC 3105 Avenant n°3 annexe 2   clause de sauvegarde - v2
IDCC 3105 Avenant n°3 annexe 2 clause de sauvegarde - v2Société Tripalio
 
Blessurepreventie
BlessurepreventieBlessurepreventie
BlessurepreventieDeKinesist
 
The role of radio broadcasting in public enlightenment (a case study of port...
The role of radio broadcasting in public enlightenment  (a case study of port...The role of radio broadcasting in public enlightenment  (a case study of port...
The role of radio broadcasting in public enlightenment (a case study of port...Newman Enyioko
 
Supply chain management ppt
Supply chain management pptSupply chain management ppt
Supply chain management pptShivani Singh
 
Nivea - world largest skin care brand
Nivea -  world largest skin care brandNivea -  world largest skin care brand
Nivea - world largest skin care brandKatharina_H
 
November hero of the month: Paul
November hero of the month: PaulNovember hero of the month: Paul
November hero of the month: PaulMyWonderStudio
 
Airtightness and insulation with solar study
Airtightness and insulation with solar studyAirtightness and insulation with solar study
Airtightness and insulation with solar studyJonathan Flanagan
 
IBM WebSphere Application Server version to version comparison
IBM WebSphere Application Server version to version comparisonIBM WebSphere Application Server version to version comparison
IBM WebSphere Application Server version to version comparisonejlp12
 

Viewers also liked (17)

2015-10-01 Structured Data Archiving InfoGovCon
2015-10-01 Structured Data Archiving InfoGovCon2015-10-01 Structured Data Archiving InfoGovCon
2015-10-01 Structured Data Archiving InfoGovCon
 
IDCC 1353 Valeur point rmh 2016
IDCC 1353 Valeur point rmh 2016IDCC 1353 Valeur point rmh 2016
IDCC 1353 Valeur point rmh 2016
 
This Is Your Brain on Franchising
This Is Your Brain on FranchisingThis Is Your Brain on Franchising
This Is Your Brain on Franchising
 
Blessurepreventie methodisch aangepakt
Blessurepreventie methodisch aangepaktBlessurepreventie methodisch aangepakt
Blessurepreventie methodisch aangepakt
 
Project of Banu priya muthu
Project of Banu priya muthuProject of Banu priya muthu
Project of Banu priya muthu
 
Executive guide to contact center kpi's
Executive guide to contact center kpi'sExecutive guide to contact center kpi's
Executive guide to contact center kpi's
 
IDCC 3105 Avenant n°3 annexe 2 clause de sauvegarde - v2
IDCC 3105 Avenant n°3 annexe 2   clause de sauvegarde - v2IDCC 3105 Avenant n°3 annexe 2   clause de sauvegarde - v2
IDCC 3105 Avenant n°3 annexe 2 clause de sauvegarde - v2
 
Blessurepreventie
BlessurepreventieBlessurepreventie
Blessurepreventie
 
The role of radio broadcasting in public enlightenment (a case study of port...
The role of radio broadcasting in public enlightenment  (a case study of port...The role of radio broadcasting in public enlightenment  (a case study of port...
The role of radio broadcasting in public enlightenment (a case study of port...
 
Supply chain management ppt
Supply chain management pptSupply chain management ppt
Supply chain management ppt
 
Jefff mpob
Jefff mpobJefff mpob
Jefff mpob
 
Nivea - world largest skin care brand
Nivea -  world largest skin care brandNivea -  world largest skin care brand
Nivea - world largest skin care brand
 
November hero of the month: Paul
November hero of the month: PaulNovember hero of the month: Paul
November hero of the month: Paul
 
Airtightness and insulation with solar study
Airtightness and insulation with solar studyAirtightness and insulation with solar study
Airtightness and insulation with solar study
 
IBM WebSphere Application Server version to version comparison
IBM WebSphere Application Server version to version comparisonIBM WebSphere Application Server version to version comparison
IBM WebSphere Application Server version to version comparison
 
Internal Branding
Internal BrandingInternal Branding
Internal Branding
 
とある色の決め方
とある色の決め方とある色の決め方
とある色の決め方
 

Similar to Secure distributed de duplication systems with

Cloud based multimedia content protection system
Cloud based multimedia content protection systemCloud based multimedia content protection system
Cloud based multimedia content protection systemShakas Technologies
 
Secure distributed deduplication systems with improved reliability 2
Secure distributed deduplication systems with improved reliability 2Secure distributed deduplication systems with improved reliability 2
Secure distributed deduplication systems with improved reliability 2Rishikesh Pathak
 
Enabling fine grained multi-keyword search supporting classified sub-dictiona...
Enabling fine grained multi-keyword search supporting classified sub-dictiona...Enabling fine grained multi-keyword search supporting classified sub-dictiona...
Enabling fine grained multi-keyword search supporting classified sub-dictiona...Shakas Technologies
 
Enabling fine grained multi-keyword search supporting classified sub-dictiona...
Enabling fine grained multi-keyword search supporting classified sub-dictiona...Enabling fine grained multi-keyword search supporting classified sub-dictiona...
Enabling fine grained multi-keyword search supporting classified sub-dictiona...Shakas Technologies
 
K nearest neighbor classification over semantically secure encrypted
K nearest neighbor classification over semantically secure encryptedK nearest neighbor classification over semantically secure encrypted
K nearest neighbor classification over semantically secure encryptedShakas Technologies
 
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud. A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud. IJCERT JOURNAL
 
Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud S...
Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud S...Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud S...
Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud S...1crore projects
 
A hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplicationA hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplicationShakas Technologies
 
Methodology for Optimizing Storage on Cloud Using Authorized De-Duplication –...
Methodology for Optimizing Storage on Cloud Using Authorized De-Duplication –...Methodology for Optimizing Storage on Cloud Using Authorized De-Duplication –...
Methodology for Optimizing Storage on Cloud Using Authorized De-Duplication –...IRJET Journal
 
Mona secure multi owner data sharing for dynamic groups in the cloud
Mona secure multi owner data sharing for dynamic groups in the cloudMona secure multi owner data sharing for dynamic groups in the cloud
Mona secure multi owner data sharing for dynamic groups in the cloudAvinash K S
 
Public integrity auditing for shared dynamic cloud data with group user revoc...
Public integrity auditing for shared dynamic cloud data with group user revoc...Public integrity auditing for shared dynamic cloud data with group user revoc...
Public integrity auditing for shared dynamic cloud data with group user revoc...Shakas Technologies
 
Public integrity auditing for shared dynamic cloud data with group user revoc...
Public integrity auditing for shared dynamic cloud data with group user revoc...Public integrity auditing for shared dynamic cloud data with group user revoc...
Public integrity auditing for shared dynamic cloud data with group user revoc...Shakas Technologies
 
Shared authority based privacy preserving authentication protocol in cloud co...
Shared authority based privacy preserving authentication protocol in cloud co...Shared authority based privacy preserving authentication protocol in cloud co...
Shared authority based privacy preserving authentication protocol in cloud co...Shakas Technologies
 
Shared authority based privacy preserving authentication protocol in cloud co...
Shared authority based privacy preserving authentication protocol in cloud co...Shared authority based privacy preserving authentication protocol in cloud co...
Shared authority based privacy preserving authentication protocol in cloud co...Shakas Technologies
 
Optimized search and-compute circuits and their application to query evaluati...
Optimized search and-compute circuits and their application to query evaluati...Optimized search and-compute circuits and their application to query evaluati...
Optimized search and-compute circuits and their application to query evaluati...Shakas Technologies
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
Presentation (6).pptx
Presentation (6).pptxPresentation (6).pptx
Presentation (6).pptxMSMuthu5
 
CLOUD STORAGE AND RETRIEVAL USING BLOCKCHAIN
CLOUD STORAGE AND RETRIEVAL USING BLOCKCHAINCLOUD STORAGE AND RETRIEVAL USING BLOCKCHAIN
CLOUD STORAGE AND RETRIEVAL USING BLOCKCHAINIRJET Journal
 
BIG DATA SHARING PPT LAST EDITED [Autosaved].pptx
BIG DATA SHARING PPT LAST EDITED [Autosaved].pptxBIG DATA SHARING PPT LAST EDITED [Autosaved].pptx
BIG DATA SHARING PPT LAST EDITED [Autosaved].pptxSiddharth Sankar
 
Audit free cloud storage via deniable attribute-based encryption
Audit free cloud storage via deniable attribute-based encryptionAudit free cloud storage via deniable attribute-based encryption
Audit free cloud storage via deniable attribute-based encryptionShakas Technologies
 

Similar to Secure distributed de duplication systems with (20)

Cloud based multimedia content protection system
Cloud based multimedia content protection systemCloud based multimedia content protection system
Cloud based multimedia content protection system
 
Secure distributed deduplication systems with improved reliability 2
Secure distributed deduplication systems with improved reliability 2Secure distributed deduplication systems with improved reliability 2
Secure distributed deduplication systems with improved reliability 2
 
Enabling fine grained multi-keyword search supporting classified sub-dictiona...
Enabling fine grained multi-keyword search supporting classified sub-dictiona...Enabling fine grained multi-keyword search supporting classified sub-dictiona...
Enabling fine grained multi-keyword search supporting classified sub-dictiona...
 
Enabling fine grained multi-keyword search supporting classified sub-dictiona...
Enabling fine grained multi-keyword search supporting classified sub-dictiona...Enabling fine grained multi-keyword search supporting classified sub-dictiona...
Enabling fine grained multi-keyword search supporting classified sub-dictiona...
 
K nearest neighbor classification over semantically secure encrypted
K nearest neighbor classification over semantically secure encryptedK nearest neighbor classification over semantically secure encrypted
K nearest neighbor classification over semantically secure encrypted
 
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud. A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
 
Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud S...
Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud S...Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud S...
Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud S...
 
A hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplicationA hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplication
 
Methodology for Optimizing Storage on Cloud Using Authorized De-Duplication –...
Methodology for Optimizing Storage on Cloud Using Authorized De-Duplication –...Methodology for Optimizing Storage on Cloud Using Authorized De-Duplication –...
Methodology for Optimizing Storage on Cloud Using Authorized De-Duplication –...
 
Mona secure multi owner data sharing for dynamic groups in the cloud
Mona secure multi owner data sharing for dynamic groups in the cloudMona secure multi owner data sharing for dynamic groups in the cloud
Mona secure multi owner data sharing for dynamic groups in the cloud
 
Public integrity auditing for shared dynamic cloud data with group user revoc...
Public integrity auditing for shared dynamic cloud data with group user revoc...Public integrity auditing for shared dynamic cloud data with group user revoc...
Public integrity auditing for shared dynamic cloud data with group user revoc...
 
Public integrity auditing for shared dynamic cloud data with group user revoc...
Public integrity auditing for shared dynamic cloud data with group user revoc...Public integrity auditing for shared dynamic cloud data with group user revoc...
Public integrity auditing for shared dynamic cloud data with group user revoc...
 
Shared authority based privacy preserving authentication protocol in cloud co...
Shared authority based privacy preserving authentication protocol in cloud co...Shared authority based privacy preserving authentication protocol in cloud co...
Shared authority based privacy preserving authentication protocol in cloud co...
 
Shared authority based privacy preserving authentication protocol in cloud co...
Shared authority based privacy preserving authentication protocol in cloud co...Shared authority based privacy preserving authentication protocol in cloud co...
Shared authority based privacy preserving authentication protocol in cloud co...
 
Optimized search and-compute circuits and their application to query evaluati...
Optimized search and-compute circuits and their application to query evaluati...Optimized search and-compute circuits and their application to query evaluati...
Optimized search and-compute circuits and their application to query evaluati...
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Presentation (6).pptx
Presentation (6).pptxPresentation (6).pptx
Presentation (6).pptx
 
CLOUD STORAGE AND RETRIEVAL USING BLOCKCHAIN
CLOUD STORAGE AND RETRIEVAL USING BLOCKCHAINCLOUD STORAGE AND RETRIEVAL USING BLOCKCHAIN
CLOUD STORAGE AND RETRIEVAL USING BLOCKCHAIN
 
BIG DATA SHARING PPT LAST EDITED [Autosaved].pptx
BIG DATA SHARING PPT LAST EDITED [Autosaved].pptxBIG DATA SHARING PPT LAST EDITED [Autosaved].pptx
BIG DATA SHARING PPT LAST EDITED [Autosaved].pptx
 
Audit free cloud storage via deniable attribute-based encryption
Audit free cloud storage via deniable attribute-based encryptionAudit free cloud storage via deniable attribute-based encryption
Audit free cloud storage via deniable attribute-based encryption
 

More from Shakas Technologies

A Review on Deep-Learning-Based Cyberbullying Detection
A Review on Deep-Learning-Based Cyberbullying DetectionA Review on Deep-Learning-Based Cyberbullying Detection
A Review on Deep-Learning-Based Cyberbullying DetectionShakas Technologies
 
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...Shakas Technologies
 
A Novel Framework for Credit Card.
A Novel Framework for Credit Card.A Novel Framework for Credit Card.
A Novel Framework for Credit Card.Shakas Technologies
 
A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...
A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...
A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...Shakas Technologies
 
NS2 Final Year Project Titles 2023- 2024
NS2 Final Year Project Titles 2023- 2024NS2 Final Year Project Titles 2023- 2024
NS2 Final Year Project Titles 2023- 2024Shakas Technologies
 
MATLAB Final Year IEEE Project Titles 2023-2024
MATLAB Final Year IEEE Project Titles 2023-2024MATLAB Final Year IEEE Project Titles 2023-2024
MATLAB Final Year IEEE Project Titles 2023-2024Shakas Technologies
 
Latest Python IEEE Project Titles 2023-2024
Latest Python IEEE Project Titles 2023-2024Latest Python IEEE Project Titles 2023-2024
Latest Python IEEE Project Titles 2023-2024Shakas Technologies
 
EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...
EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...
EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...Shakas Technologies
 
CYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSE
CYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSECYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSE
CYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSEShakas Technologies
 
Detecting Mental Disorders in social Media through Emotional patterns-The cas...
Detecting Mental Disorders in social Media through Emotional patterns-The cas...Detecting Mental Disorders in social Media through Emotional patterns-The cas...
Detecting Mental Disorders in social Media through Emotional patterns-The cas...Shakas Technologies
 
COMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTION
COMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTIONCOMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTION
COMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTIONShakas Technologies
 
CO2 EMISSION RATING BY VEHICLES USING DATA SCIENCE
CO2 EMISSION RATING BY VEHICLES USING DATA SCIENCECO2 EMISSION RATING BY VEHICLES USING DATA SCIENCE
CO2 EMISSION RATING BY VEHICLES USING DATA SCIENCEShakas Technologies
 
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...Shakas Technologies
 
Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...
Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...
Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...Shakas Technologies
 
Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...
Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...
Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...Shakas Technologies
 
Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...
Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...
Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...Shakas Technologies
 
Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...
Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...
Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...Shakas Technologies
 
Fighting Money Laundering With Statistics and Machine Learning.docx
Fighting Money Laundering With Statistics and Machine Learning.docxFighting Money Laundering With Statistics and Machine Learning.docx
Fighting Money Laundering With Statistics and Machine Learning.docxShakas Technologies
 
Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...
Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...
Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...Shakas Technologies
 
Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...
Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...
Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...Shakas Technologies
 

More from Shakas Technologies (20)

A Review on Deep-Learning-Based Cyberbullying Detection
A Review on Deep-Learning-Based Cyberbullying DetectionA Review on Deep-Learning-Based Cyberbullying Detection
A Review on Deep-Learning-Based Cyberbullying Detection
 
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
 
A Novel Framework for Credit Card.
A Novel Framework for Credit Card.A Novel Framework for Credit Card.
A Novel Framework for Credit Card.
 
A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...
A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...
A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...
 
NS2 Final Year Project Titles 2023- 2024
NS2 Final Year Project Titles 2023- 2024NS2 Final Year Project Titles 2023- 2024
NS2 Final Year Project Titles 2023- 2024
 
MATLAB Final Year IEEE Project Titles 2023-2024
MATLAB Final Year IEEE Project Titles 2023-2024MATLAB Final Year IEEE Project Titles 2023-2024
MATLAB Final Year IEEE Project Titles 2023-2024
 
Latest Python IEEE Project Titles 2023-2024
Latest Python IEEE Project Titles 2023-2024Latest Python IEEE Project Titles 2023-2024
Latest Python IEEE Project Titles 2023-2024
 
EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...
EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...
EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...
 
CYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSE
CYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSECYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSE
CYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSE
 
Detecting Mental Disorders in social Media through Emotional patterns-The cas...
Detecting Mental Disorders in social Media through Emotional patterns-The cas...Detecting Mental Disorders in social Media through Emotional patterns-The cas...
Detecting Mental Disorders in social Media through Emotional patterns-The cas...
 
COMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTION
COMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTIONCOMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTION
COMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTION
 
CO2 EMISSION RATING BY VEHICLES USING DATA SCIENCE
CO2 EMISSION RATING BY VEHICLES USING DATA SCIENCECO2 EMISSION RATING BY VEHICLES USING DATA SCIENCE
CO2 EMISSION RATING BY VEHICLES USING DATA SCIENCE
 
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
 
Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...
Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...
Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...
 
Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...
Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...
Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...
 
Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...
Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...
Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...
 
Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...
Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...
Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...
 
Fighting Money Laundering With Statistics and Machine Learning.docx
Fighting Money Laundering With Statistics and Machine Learning.docxFighting Money Laundering With Statistics and Machine Learning.docx
Fighting Money Laundering With Statistics and Machine Learning.docx
 
Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...
Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...
Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...
 
Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...
Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...
Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...
 

Recently uploaded

"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 

Recently uploaded (20)

"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 

Secure distributed de duplication systems with

  • 1. #13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, vellore – 6. Off:0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602, Project Titles: http://shakastech.weebly.com/2015-2016-titles Website:www.shakastech.com,Email - id:shakastech@gmail.com,info@shakastech.com SECURE DISTRIBUTED DE-DUPLICATION SYSTEMS WITH IMPROVED RELIABILITY ABSTRACT Data is a technique for eliminating duplicate copies of data, and has been widely used in cloud storage to reduce storage space and upload bandwidth. However, there is only one copy for each file stored in cloud even if such a file is owned by a huge number of users. As a result, system improves storage utilization while reducing reliability. Furthermore, the challenge of privacy for sensitive data also arises when they are outsourced by users to cloud. Aiming to address the above security challenges, this paper makes the first attempt to formalize the notion of distributed reliable system. We propose new distributed systems with higher reliability in which the data chunks are distributed across multiple cloud servers. The security requirements of data confidentiality and tag consistency are also achieved by introducing a deterministic secret sharing scheme in distributed storage systems, instead of using convergent encryption as in previous systems. Security analysis demonstrates that our systems are secure in terms of the definitions specified in the proposed security model. As a proof of concept, we implement the proposed systems and demonstrate that the incurred overhead is very limited in realistic environments.
  • 2. #13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, vellore – 6. Off:0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602, Project Titles: http://shakastech.weebly.com/2015-2016-titles Website:www.shakastech.com,Email - id:shakastech@gmail.com,info@shakastech.com PROPOSED SYSTEM: This paper makes the following contributions. • Four new secure de-duplication systems are proposed to provide efficient de-duplication with high reliability for file-level and block-level de-duplication, respectively. The secret splitting technique, instead of traditional encryption methods, is utilized to protect data confidentiality. Specifically, data are split into fragments by using secure secret sharing schemes and stored at different servers. Our proposed constructions support both file-level and block-level de- duplications. • Security analysis demonstrates that the proposed de-duplication systems are secure in terms of the definitions specified in the proposed security model. In more details, confidentiality, reliability and integrity can be achieved in our proposed system. Two kinds of collusion attacks are considered in our solutions. These are the collusion attack on the data and the collusion attack against servers. In particular, the data remains secure even if the adversary controls a limited number of storage servers. • We implement our de-duplication systems using the Ramp secret sharing scheme that enables high reliability and confidentiality levels. Our evaluation results demonstrate that the new proposed constructions are efficient and the redundancies are optimized and comparable with the other storage system supporting the same level of reliability. EXISTING SYSTEM: Reliable De-duplication systems Data de-duplication techniques are very interesting techniques that are widely employed for data backup in enterprise environments to minimize network and storage overhead by detecting and eliminating redundancy among data blocks. There are many de-duplication schemes proposed by the research community. The reliability in de-duplication has also been addresse.. However, they only focused on traditional files without encryption, without considering the reliable de-duplication over ciphertext. Li et al. showed how to achieve reliable key management in de-duplication. However, they did not mention about the application of reliable de-duplication for encrypted files. Later, , they showed how to extend the method for the construction of reliable de-duplication for user files. However, all of these works
  • 3. #13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, vellore – 6. Off:0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602, Project Titles: http://shakastech.weebly.com/2015-2016-titles Website:www.shakastech.com,Email - id:shakastech@gmail.com,info@shakastech.com have not considered and achieved the tag consistency and integrity in the construction. Convergent encryption. Convergent encryption ensures data privacy in de-duplication. Bellare et al. formalized this primitive as message-locked encryption, and explored its application in spaceefficient secure outsourced storage. There are also several implementations of convergent implementations of different convergent encryption variants for secure de-duplication. It is known that some commercial cloud storage providers, such as Bitcasa, also deploy convergent encryption addressed the key-management issue in block-level de-duplication by distributing these keys across multiple servers after encrypting the files. Bellare et al. showed how to protect data confidentiality by transforming the predicatable message into a unpredicatable message. In their system, another third party called the key server was introduced to generate the file tag for the duplicate check. Stanek et al. we presented a novel encryption scheme that provided differential security for popular and unpopular data. For popular data that are not particularly sensitive, the traditional conventional encryption is performed. Another two-layered encryption scheme with stronger security while supporting de-duplication was proposed for unpopular data. In this way, they achieved better tradeoff between the efficiency and security of the outsourced data. Module 1 Data de-duplication Data deduplication involves finding and removing duplication within data without compromising its fidelity or integrity. The goal is to store more data in less space by segmenting files into small variable-sized chunks (32–128 KB), identifying duplicate chunks, and maintaining a single copy of each chunk. Redundant copies of the chunk are replaced by a reference to the single copy. The chunks are compressed and then organized into special container files in the System Volume Information folder. After deduplication, files are no longer stored as independent streams of data, and they are replaced with stubs that point to data blocks that are stored within a common chunk store. Because these files share blocks, those blocks are only stored once, which reduces the disk space needed to store all files. During file access, the correct blocks are transparently assembled to serve the data without calling the application or the user having any knowledge of the on-disk transformation to the file. This enables administrators
  • 4. #13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, vellore – 6. Off:0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602, Project Titles: http://shakastech.weebly.com/2015-2016-titles Website:www.shakastech.com,Email - id:shakastech@gmail.com,info@shakastech.com to apply deduplication to files without having to worry about any change in behavior to the applications or impact to users who are accessing those files. After a volume is enabled for deduplication and the data is optimized, the volume contains the following:  Unoptimized files. For example, unoptimized files could include files that do not meet the selected file-age policy setting, system state files, alternate data streams, encrypted files, files with extended attributes, files smaller than 32 KB, other reparse point files, or files in use by other applications (the “in use” limit is removed in Windows Server 2012 R2).  Optimized files. Files that are stored as reparse points that contain pointers to a map of the respective chunks in the chunk store that are needed to restore the file when it is requested.  Chunk store. Location for the optimized file data.  Additional free space. The optimized files and chunk store occupy much less space than they did prior to optimization. Module 2 Distributed de-duplication systems The distributed systems’ proposed aim is to reliably store data in the cloud while achieving confidentiality and integrity. Its main goal is to enable and distributed storage of the data across multiple storage servers. Instead of encrypting the data to keep the confidentiality of the data, our new constructions utilize the secret splitting technique to split data into shards. These shards will then be distributed across multiple storage servers. Building Blocks Secret Sharing Scheme. There are two algorithms in a secret sharing scheme, which are Share and Recover. The secret is divided and shared by using Share. With enough shares, the secret can be extracted and recovered with the algorithm of Recover. In our implementation, we will use the Ramp secret sharing scheme (RSSS) ,[8] to secretly split a secret into shards. Specifically, the (n, k, r)-RSSS (where n > k > r ≥ 0) generates n shares from a secret so that (i) the secret can be
  • 5. #13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, vellore – 6. Off:0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602, Project Titles: http://shakastech.weebly.com/2015-2016-titles Website:www.shakastech.com,Email - id:shakastech@gmail.com,info@shakastech.com recovered from any k or more shares, and (ii) no information about the secret can be deduced from any r or less shares. Two algorithms, Share and Recover, are defined in the (n, k, r)-RSSS. • Share divides a secret S into (k −r) pieces of equal size, generates r random pieces of the same size, and encodes the k pieces using a non-systematic k-of-n erasure code into n shares of the same size; • Recover takes any k out of n shares as inputs and then outputs the original secret S. It is known that when r = 0, the (n, k, 0)-RSSS becomes the (n, k) Rabin’s Information Dispersal Algorithm (IDA) [9]. When r = k−1, the (n, k, k−1)-RSSS becomes the (n,k) Shamir’s Secret Sharing Scheme (SSSS). Module 3 The File-level Distributed De-duplication System To support efficient duplicate check, tags for each file will be computed and are sent to S-CSPs. To prevent a collusion attack launched by the S-CSPs, the tags stored at different storage servers are computationally independent and different. We now elaborate on the details of the construction as follows. System setup. In our construction, the number of storage servers S-CSPs is assumed to be n with identities denoted by id1, id2, · · · , idn, respectively. Define the security parameter as 1_ and initialize a secret sharing scheme SS = (Share, Recover), and a tag generation algorithm TagGen. The file storage system for the storage server is set to be. File Upload. To upload a file F, the user interacts with S-CSPs to perform the de-duplication. More precisely, the user firstly computes and sends the file tag ϕF = TagGen(F) to S-CSPs for the file duplicate check. • If a duplicate is found, the user computes and sends ϕF;idj = TagGen′(F, idj) to the j-th server with identity idj via the secure channel for 1 ≤ j ≤ n (which could be implemented by a cryptographic hash function Hj(F) related with index j). The reason for introducing an index j is to prevent the server from getting the shares of other S-CSPs for the same file or block, which will be explained in detail in the security analysis. If ϕF;idj matches the metadata stored with ϕF , the user will be provided a pointer for the shard stored at server idj . • Otherwise, if no duplicate is found, the user will proceed as follows. He runs the secret sharing algorithm SS over F to get {cj} = Share(F), where cj is the j-th shard of F. He also
  • 6. #13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, vellore – 6. Off:0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602, Project Titles: http://shakastech.weebly.com/2015-2016-titles Website:www.shakastech.com,Email - id:shakastech@gmail.com,info@shakastech.com computes ϕF;idj = TagGen′(F, idj), which serves as the tag for the jth S-CSP. Finally, the user uploads the set of values {ϕF , cj , ϕF;idj } to the S-CSP with identity idj via a secure channel. The S-CSP stores these values and returns a pointer back to the user for local storage. File Download. To download a file F, the user first downloads the secret shares {cj} of the file from k out of n storage servers. Specifically, the user sends the pointer of F to k out of n S-CSPs. After gathering enough shares, the user reconstructs file F by using the algorithm of Recover({cj}). This approach provides fault tolerance and allows the user to remain accessible even if any limited subsets of storage servers fail. Module 4 The Block-level Distributed System In this section, we show how to achieve the fine-grained block-level distributed de- duplication. In a block-level de-duplication system, the user also needs to firstly perform the file- level de-duplication before uploading his file. If no duplicate is found, the user divides this file into blocks and performs block-level de-duplication. The system setup is the same as the file- level de-duplication system, except the block size parameter will be defined additionally. Next, we give the details of the algorithms of File Upload and File Download. File Upload. To upload a file F, the user first performs the file-level de-duplication by sending ϕF to the storage servers. If a duplicate is found, the user will perform the file-level de-duplication. Otherwise, if no duplicate is found, the user performs the block-level de-duplication as follows. He firstly divides F into a set of fragments {Bi} (where i = 1, 2, · · · ). For each fragment Bi, the user will perform a block-level duplicate check by computing ϕBi = TagGen(Bi), where the data processing and duplicate check of block-level de-duplication is the same as that of file-level de-duplication if the file F is replaced with block Bi. Upon receiving block tags {ϕBi }, the server with identity idj computes a block signal vector σBi for each i .• i) If σBi=1, the user further computes and sends ϕBi;j = TagGen′(Bi, j) to the S-CSP with identity idj . If it also matches the corresponding tag stored, S-CSP returns a block pointer of Bi to the user. Then, the user keeps the block pointer of Bi and does not need to upload Bi. • ii) If σBi=0, the user runs the secret sharing algorithm SS over Bi and gets {cij} = Share(Bi), where cij is the j-th secret share of Bi. The user also computes ϕBi;j for 1 ≤ j ≤ n and
  • 7. #13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, vellore – 6. Off:0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602, Project Titles: http://shakastech.weebly.com/2015-2016-titles Website:www.shakastech.com,Email - id:shakastech@gmail.com,info@shakastech.com uploads the set of values {ϕF , ϕF;idj , cij , ϕBi;j} to the server idj via a secure channel. The S- CSP returns the corresponding pointers back to the user. File Download. To download a file F = {Bi}, the user first downloads the secret shares {cij} of all the blocks Bi in F from k out of n S-CSPs. Specifically, the user sends all the pointers for Bi to k out of n servers. After gathering all the shares, the user reconstructs all the fragments Bi using the algorithm of Recover({·}) and gets the file F = {Bi}. CONCLUSIONS We proposed the distributed de-duplication systems to improve the reliability of data while achieving the confidentiality of the users’ outsourced data without an encryption mechanism. Four constructions were proposed to support file-level and fine-grained block-level data de-duplication. The security of tag consistency and integrity were achieved.We implemented our de-duplication systems using the Ramp secret sharing scheme and demonstrated that it incurs small encoding/decoding overhead compared to the network transmission overhead in regular upload/download operations. REFERENCES [1] Amazon, “Case Studies,” https://aws.amazon.com/solutions/casestudies/# backup. [2] J. Gantz and D. Reinsel, “The digital universe in 2020: Big data, bigger digi tal shadows, and biggest growth in the far east,” http://www.emc.com/collateral/analyst-reports/idcthe- digital- universe-in-2020.pdf, Dec 2012. [3] M. O. Rabin, “Fingerprinting by random polynomials,” Center for Research in Computing Technology, Harvard University, Tech. Rep. Tech. Report TR-CSE-03-01, 1981. [4] J. R. Douceur, A. Adya, W. J. Bolosky, D. Simon, and M. Theimer, “Reclaiming space from duplicate files in a serverless distributed file system.” in ICDCS, 2002, pp. 617–624. [5] M. Bellare, S. Keelveedhi, and T. Ristenpart, “Dupless: Serveraided encryption for deduplicated storage,” in USENIX Security Symposium, 2013. [6] “Message-locked encryption and secure de-duplication,” in EUROCRYPT, 2013, pp. 296– 312.
  • 8. #13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, vellore – 6. Off:0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602, Project Titles: http://shakastech.weebly.com/2015-2016-titles Website:www.shakastech.com,Email - id:shakastech@gmail.com,info@shakastech.com [7] G. R. Blakley and C. Meadows, “Security of ramp schemes,” in Advances in Cryptology: Proceedings of CRYPTO ’84, ser. Lecture Notes in Computer Science, G. R. Blakley and D. Chaum, Eds. Springer-Verlag Berlin/Heidelberg, 1985, vol. 196, pp. 242–268. [8] A. D. Santis and B. Masucci, “Multiple ramp schemes,” IEEE Transactions on Information Theory, vol. 45, no. 5, pp. 1720–1728, Jul. 1999. [9] M. O. Rabin, “Efficient dispersal of information for security, load balancing, and fault tolerance,” Journal of the ACM, vol. 36, no. 2, pp. 335–348, Apr. 1989. [10] A. Shamir, “How to share a secret,” Commun. ACM, vol. 22, no. 11, pp. 612–613, 1979. [11] J. Li, X. Chen, M. Li, J. Li, P. Lee, and W. Lou, “Secure de-duplication with efficient and reliable convergent key management,” in IEEE Transactions on Parallel and Distributed Systems, 2014, pp. vol. 25(6), pp. 1615–1625.