2014 ieee dotnet service computing project a secure client side deduplication scheme in cloud...

10
A Secure Client Side De duplication Scheme in Cloud Storage Environments ABSTRACT recent years have witnessed the trend of leveraging cloud-based services for large scale content storage, processing, and distribution. security and privacy are amongtop concerns for the public cloud environments. towards thesesecurity challenges, we propose and implement, on open stack swift, a new client-side deduplication scheme for securely storing and sharing outsourced data via the public cloud.the originality of our proposal is twofold. first, it ensuresbetter confidentiality towards unauthorized users. that is,every client computes a per data key to encrypt the data that he intends to store in the cloud. as such, the data access ismanaged by the data owner. second, by integrating accessrights in metadata file, an authorized user can decipher an encrypted file only with his private key. GLOBALSOFT TECHNOLOGIES IEEE PROJECTS & SOFTWARE DEVELOPMENTS IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401 Visit: www.finalyearprojects.org Mail to:ieeefinalsem[email protected]

Upload: ieeebebtechstudentsprojects

Post on 21-Jun-2015

187 views

Category:

Engineering


1 download

DESCRIPTION

To Get any Project for CSE, IT ECE, EEE Contact Me @ 09666155510, 09849539085 or mail us - [email protected] Our Website: www.finalyearprojects.org

TRANSCRIPT

Page 1: 2014 IEEE DOTNET SERVICE COMPUTING PROJECT A secure client side deduplication scheme in cloud storage environments

A Secure Client Side De duplication Scheme in Cloud Storage Environments

ABSTRACT

recent years have witnessed the trend of leveraging cloud-based services for large scale content storage, processing, and distribution. security and privacy are amongtop concerns for the public cloud environments. towards thesesecurity challenges, we propose and implement, on open stack swift, a new client-side deduplication scheme for securely storing and sharing outsourced data via the public cloud.the originality of our proposal is twofold. first, it ensuresbetter confidentiality towards unauthorized users. that is,every client computes a per data key to encrypt the data that he intends to store in the cloud. as such, the data access ismanaged by the data owner. second, by integrating accessrights in metadata file, an authorized user can decipher an encrypted file only with his private key.

Existing System

Although the existing schemes aim at providing integrity verification for different data storage systems, data dynamics has not been fully addressed. How to achieve a secure and efficient design to seamlessly integrate these two important components for data storage service remains an open challenging task in Cloud storage.

GLOBALSOFT TECHNOLOGIESIEEE PROJECTS & SOFTWARE DEVELOPMENTS

IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE

BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS

CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401

Visit: www.finalyearprojects.org Mail to:[email protected]

GLOBALSOFT TECHNOLOGIESIEEE PROJECTS & SOFTWARE DEVELOPMENTS

IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE

BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS

CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401

Visit: www.finalyearprojects.org Mail to:[email protected]

Page 2: 2014 IEEE DOTNET SERVICE COMPUTING PROJECT A secure client side deduplication scheme in cloud storage environments

DISADVANTAGES OF EXISTING SYSTEM:

Although the infrastructures under the cloud are much more powerful and reliable than

personal computing devices, they are still facing the broad range of both internal and external

threats for data integrity.

Second, there do exist various motivations for CSP to behave unfaithfully toward the cloud

users regarding their outsourced data status.

In particular, simply downloading all the data for its integrity verification is not a practical

solution due to the expensiveness in I/O and transmission cost across the network. Besides, it is

often insufficient to detect the data corruption only when accessing the data, as it does not give

users correctness assurance for those unaccessed data and might be too late to recover the data

loss or damage.

Encryption does not completely solve the problem of protecting data privacy against clous

service provider but just reduces it to the complex key management domain. Unauthorized data

leakage still remains possible due to the potential exposure of decryption keys.

Proposed System:

proposed the use of the convergent encryption, i.e., deriving keys from the hash of plaintext. Then, Storer et al. pointed out some security problems, and presented a security model for secure data deduplication. However,these two protocols focus on server-side deduplication and do not consider data leakage settings, against malicious users.

Page 3: 2014 IEEE DOTNET SERVICE COMPUTING PROJECT A secure client side deduplication scheme in cloud storage environments

Advantage :

1) As a rising subject, cloud storage is playing an increasingly important role in the decision

support activity of every walk of life.

2) Get Efficient Item set result based on the deduplication.

IMPLEMENTATION

Implementation is the stage of the project when the theoretical design is turned out into a

working system. Thus it can be considered to be the most critical stage in achieving a successful

new system and in giving the user, confidence that the new system will work and be effective.

The implementation stage involves careful planning, investigation of the existing system

and it’s constraints on implementation, designing of methods to achieve changeover and

evaluation of changeover methods.

Modules

1. User Module.

2. client module.

3. csp Module.

4. Deduplication module.

Page 4: 2014 IEEE DOTNET SERVICE COMPUTING PROJECT A secure client side deduplication scheme in cloud storage environments

Modules Description

User Module

In this module, user should register their details and get the secret key for loggin …… and user can download the clients uploaded files the users are able to access the content stored in the cloud, depending on their access rights which are authorizations granted by the client, like the rights re-store the modified data in the cloud. ……..

Client Module

In this module, a client makes use of provider’s resources to store, retrieve and share data with multiple users. A

client can be either an individual or an enterprise.

client can check the uploaded file he can neglate or upload the file ….

Client can view the deduplicate file based on this client can delete the unwanted datas.

csp module:

In this module csp can view all the user details , client uploads details,clients details…

Page 5: 2014 IEEE DOTNET SERVICE COMPUTING PROJECT A secure client side deduplication scheme in cloud storage environments

And clients activties….regarding the A Secure Client Side Deduplication Scheme in Cloud Storage Environments

Deduplication module:

In this module , the clients uploaded files can be stored in cloud database.. it can be very secure

….clients can view the file from the database based on the deduplicate factor it can be very

secure..

System Configuration:-

H/W System Configuration:-

Page 6: 2014 IEEE DOTNET SERVICE COMPUTING PROJECT A secure client side deduplication scheme in cloud storage environments

Processor - Pentium –III

Speed - 1.1 Ghz

RAM - 256 MB(min)

Hard Disk - 20 GB

Floppy Drive - 1.44 MB

Key Board - Standard Windows Keyboard

Mouse - Two or Three Button Mouse

Monitor - SVGA

S/W System Configuration:-

Operating System :Windows 7

Front End : vs2010 Asp.net c#

Page 7: 2014 IEEE DOTNET SERVICE COMPUTING PROJECT A secure client side deduplication scheme in cloud storage environments

Database : sql server 2008

CONCLUSION

The growing need for secure cloud storage services and the attractive properties of the convergent cryptography lead us to combine them, thus, defining an innovative solution to

the data outsourcing security and efficiency issues.Our solution is based on a cryptographic usage of symmetric encryption used for enciphering the data file and asymmetric encryption for meta data files, due to the highest sensibility of these information towards several intrusions. In

addition, thanks to the Merkle tree properties, this proposal is shown to support data deduplication, as it employs anpre-verfication of data existence, in cloud servers, which is

useful for saving bandwidth. Besides, our solution is also shown to be resistant to unauthorized access to data and to any data disclosure during sharing process, providing two

levels of access control verification.Finally, we believe that cloud data storage security is still

full of challenges and of paramount importance, and many research problems remain to be identified.