SlideShare a Scribd company logo
Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram,
Nellore www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
Secure Auditing and Deduplicating
Data in Cloud
ABSTRACT:
As the cloud computing technology develops during the last decade,
outsourcing data to cloud service for storage becomes an attractive trend, which
benefits in sparing efforts on heavy data maintenance and management.
Nevertheless, since the outsourced cloud storage is not fully trustworthy, it
raises security concerns on how to realize data deduplication in cloud while
achieving integrity auditing. In this work, we study the problem of integrity
auditing and secure deduplication on cloud data. Specifically, aiming at
achieving both data integrity and deduplication in cloud, we propose two secure
systems, namely SecCloud and SecCloud+. SecCloud introduces an auditing
entity with a maintenance of a MapReduce cloud, which helps clients generate
data tags before uploading as well as audit the integrity of data having been
stored in cloud. Compared with previous work, the computation by user in
SecCloud is greatly reduced during the file uploading and auditing phases.
SecCloud+ is designed motivated by the fact that customers always want to
Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram,
Nellore www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
encrypt their data before uploading, and enables integrity auditing and secure
deduplication on encrypted data.
Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram,
Nellore www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
EXISTING SYSTEM:
SecCloud introduces an auditing entity with a maintenance of a Map
Reduce cloud, which helps clients generate data tags before uploading as well
as audit the integrity of data having been stored in cloud. This design fixes the
issue of previous work that the computational load at user or auditor is too huge
for tag generation. For completeness of fine-grained, the functionality of
auditing designed in SecCoud is supported on both block level and sector level.
In addition, SecCoud also enables secure deduplication. Notice that the
“security” considered in SecCoud is the prevention of leakage of side channel
information. In order to prevent the leakage of such side channel information,
we follow the tradition of and design a proof of ownership protocol between
clients and cloud servers, which allows clients to prove to cloud servers that
they exactly own the target data.
Motivated by the fact that customers always want to encrypt their data
before uploading, for reasons ranging from personal privacy to corporate policy,
we introduce a key server into SecCloud as with and propose the SecCloud+
schema. Besides supporting integrity auditing and secure deduplication,
SecCloud+ enables the guarantee of file confidentiality. Specifically, thanks to
the property of deterministic encryption in convergent encryption, we propose a
method of directly auditing integrity on encrypted data. The challenge of
deduplication on encrypted is the prevention of dictionary attack. As with, we
make a modification on convergent encryption such that the convergent key of
file is generated and controlled by a secret “seed”, such that any adversary could
not directly derive the convergent key from the content of file and the dictionary
attack is prevented.
Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram,
Nellore www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
Disadvantages :
 It is very difficult to audit the files huge and large amount of data in cloud
using integrity auditing.
 Data loss and lots of Duplicate files in cloud .
PROPOSED SYSTEM:
We specify that our proposed SecCloud system has achieved both integrity
auditing and file deduplication. However, it cannot prevent the cloud servers
from knowing the content of files having been stored. In other words, the
functionalities of integrity auditing and secure deduplication are only imposed
on plain files. In this section, we propose SecCloud+, which allows for integrity
auditing and deduplication on encrypted files. Cloud Clients have large data
files to be stored and rely on the cloud for data maintenance and computation.
They can be either individual consumers or commercial organizations;
Cloud Servers virtualize the resources according to the requirements of
clients and expose them as storage pools. Typically, the cloud clients may buy
or lease storage capacity from cloud servers, and store their individual data in
these bought or rented spaces for future utilization. Auditor which helps clients
Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram,
Nellore www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
upload and audit their outsourced data maintains a MapReduce cloud and acts
like a certificate authority. This assumption presumes that the auditor is
associated with a pair of public and private keys. Its public key is made
available to the other entities in the system
Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram,
Nellore www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
The design goal of file confidentiality requires to prevent the cloud
servers from accessing the content of files. Specially, we require that the goal of
file confidentiality needs to be resistant to “dictionary attack”. That is, even the
adversaries have pre-knowledge of the “dictionary” which includes all the
possible files, they still cannot recover the target file.
Advantages:
 It provides the Integrity auditing by Clustering the files with removing
the duplicate files
 The duplicate files are mapped with a single copy of the file by mapping
with the existing file in the cloud
MODULE DESCRIPTION:
File Confidentiality:
The design goal of file confidentiality requires to prevent the cloud
servers from accessing the content of files. Specially, we require that the goal of
file confidentiality needs to be resistant to “dictionary attack”. That is, even the
adversaries have pre-knowledge of the “dictionary” which includes all the
possible files, they still cannot recover the target file
Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram,
Nellore www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram,
Nellore www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
Secure Deduplication:
Deduplication is a technique where the server stores only a single copy of
each file, regardless of how many clients asked to store that file, such that the
disk space of cloud servers as well as network bandwidth are saved. However,
trivial client side deduplication leads to the leakage of side channel information.
For example, a server telling a client that it need not send the file reveals that
some other client has the exact same file, which could be sensitive information
in some case.
Encryption & Decryption:
Encryption and decryption provides data confidentiality in
deduplication. A user (or data owner) derives a convergent key from the data
content and encrypts the data copy with the convergent key. In addition, the
user derives a tag for the data copy, such that the tag will be used to detect
duplicates. Here, we assume that the tag correctness property holds, i.e., if two
data copies are the same, then their tags are the same. Formally, a convergent
encryption scheme can be defined with four primitive functions:
Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram,
Nellore www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
Integrity Auditing:
The first design goal of this work is to provide the capability of verifying
correctness of the remotely stored data. The integrity verification further
requires two features:
1. Public verification, which allows anyone, not just the clients originally
stored the file, to perform verification;
2. Stateless verification, which is able to eliminate the need for state
information maintenance at the verifier side between the actions of auditing and
data storage.
ARCHITECTURE
Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram,
Nellore www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram,
Nellore www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
SOFTWARE REQUIREMENTS:
 Operating System : Windows 7
 Technology : Java and J2EE
 Web Technologies : Html, JavaScript, CSS
 IDE : My Eclipse
 Web Server : Tomcat
 Database : My SQL
 Java Version : J2SDK1.7
HARDWARE REQUIREMENTS:
 Hardware : Pentium Dual Core
 Speed : 2.80 GHz
 RAM : 1GB
 Hard Disk : 20 GB
 Floppy Drive : 1.44 MB
 Key Board : Standard Windows Keyboard
 Mouse : Two or Three Button Mouse
 Monitor : SVGA
Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram,
Nellore www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
CONCLUSION:
Aiming at achieving both data integrity and deduplication in cloud, we
propose SecCloud and SecCloud+. SecCloud introduces an auditing entity with
maintenance of a MapReduce cloud, which helps clients generate data tags
before uploading as well as audit the integrity of data having been stored in
cloud. In addition, SecCoud enables secure deduplication through introducing a
Proof of Ownership protocol and preventing the leakage of side channel
information in data deduplication. Compared with previous work, the
computation by user in SecCloud is greatly reduced during the file uploading
and auditing phases. SecCloud+ is an advanced construction motivated by the
fact that customers always want to encrypt their data before uploading, and
allows for integrity auditing and secure deduplication directly on encrypted
data.

More Related Content

What's hot (19)

PDF
Secure distributed deduplication systems with improved reliability 2
Rishikesh Pathak
 
PPTX
A hybrid cloud approach for secure authorized deduplication.
prudhvikumar madithati
 
DOC
A hybrid cloud approach for secure authorized deduplication
Papitha Velumani
 
PDF
A hybrid cloud approach for secure authorized deduplication
Pvrtechnologies Nellore
 
PDF
A Hybrid Cloud Approach for Secure Authorized De-Duplication
Editor IJMTER
 
PDF
an enhanced multi layered cryptosystem based secure
IJAEMSJORNAL
 
PPTX
A hybrid cloud approach for secure authorized deduplication
prudhvikumar madithati
 
PDF
A hybrid cloud approach for secure authorized deduplication
LeMeniz Infotech
 
PDF
Secure Authorised De-duplication using Convergent Encryption Technique
Eswar Publications
 
PPTX
Deduplication in Open Spurce Cloud
Mangali Praveen Kumar
 
PPTX
Secure erasure code based cloud storage system with secure data forwarding
Priyank Rupera
 
PPTX
Privacy preserving public auditing
vmshimavm
 
PPTX
Identity based distributed provable data possession in multi-cloud storage
Papitha Velumani
 
PPTX
Privacy preserving public auditing for regenerating-code-based cloud storage
Nagamalleswararao Tadikonda
 
PDF
IRJET - A Secure Access Policies based on Data Deduplication System
IRJET Journal
 
PPTX
PUBLIC AUDITING FOR SECURE CLOUD STORAGE ...
Bharath Nair
 
PPTX
Identity Based Secure Distributed Storage Scheme
Venkatesh Devam ☁
 
PDF
Authenticated key exchange protocols for parallel network file systems
Pvrtechnologies Nellore
 
DOCX
A secure erasure code based cloud storage
IMPULSE_TECHNOLOGY
 
Secure distributed deduplication systems with improved reliability 2
Rishikesh Pathak
 
A hybrid cloud approach for secure authorized deduplication.
prudhvikumar madithati
 
A hybrid cloud approach for secure authorized deduplication
Papitha Velumani
 
A hybrid cloud approach for secure authorized deduplication
Pvrtechnologies Nellore
 
A Hybrid Cloud Approach for Secure Authorized De-Duplication
Editor IJMTER
 
an enhanced multi layered cryptosystem based secure
IJAEMSJORNAL
 
A hybrid cloud approach for secure authorized deduplication
prudhvikumar madithati
 
A hybrid cloud approach for secure authorized deduplication
LeMeniz Infotech
 
Secure Authorised De-duplication using Convergent Encryption Technique
Eswar Publications
 
Deduplication in Open Spurce Cloud
Mangali Praveen Kumar
 
Secure erasure code based cloud storage system with secure data forwarding
Priyank Rupera
 
Privacy preserving public auditing
vmshimavm
 
Identity based distributed provable data possession in multi-cloud storage
Papitha Velumani
 
Privacy preserving public auditing for regenerating-code-based cloud storage
Nagamalleswararao Tadikonda
 
IRJET - A Secure Access Policies based on Data Deduplication System
IRJET Journal
 
PUBLIC AUDITING FOR SECURE CLOUD STORAGE ...
Bharath Nair
 
Identity Based Secure Distributed Storage Scheme
Venkatesh Devam ☁
 
Authenticated key exchange protocols for parallel network file systems
Pvrtechnologies Nellore
 
A secure erasure code based cloud storage
IMPULSE_TECHNOLOGY
 

Viewers also liked (20)

DOCX
Secure auditing and deduplicating data in cloud
nexgentech15
 
DOCX
A Novel privacy preserving public auditing for shared data in cloud
JAVVAJI VENKATA RAO
 
PPTX
Cloud Computing Security From Single To Multicloud
Sandip Karale
 
PDF
Oruta project report
Manasa Chowdary
 
DOCX
CLOUD CPOMPUTING SECURITY
Shivananda Rai
 
PPT
Privacy preserving public auditing for secure cloud storage
Mustaq Syed
 
DOCX
A lightweight secure scheme for detecting
jpstudcorner
 
DOCX
Fahad Project On Spencer
Mohd Fahad
 
PPT
Privacy Preserving Public Auditing for Data Storage Security in Cloud.ppt
Girish Chandra
 
PDF
Mobile cloud computing
Fatih Özlü
 
PDF
Ieee 2015 2016
Focuslogic Walaja
 
PPTX
Visible Light Communication
Meherunnesha (Nishat)
 
PPTX
Palm vein technology
Bhavin Solanki
 
PPT
Mobile cloud computing; Future of Cloud Computing
Vineet Garg
 
PPTX
VISIBLE LIGHT COMMUNICATION
Maheshnagakumar Tokala
 
PPT
palm vein technology and its applications
Akhil Kumar
 
PPTX
Palm vein technology.pptx
schetan202
 
PPTX
Palm Vein Technology
sathyakawthar
 
PPTX
Mobile Cloud Computing
Vikas Kottari
 
PDF
visible light communication
Hossam Zein
 
Secure auditing and deduplicating data in cloud
nexgentech15
 
A Novel privacy preserving public auditing for shared data in cloud
JAVVAJI VENKATA RAO
 
Cloud Computing Security From Single To Multicloud
Sandip Karale
 
Oruta project report
Manasa Chowdary
 
CLOUD CPOMPUTING SECURITY
Shivananda Rai
 
Privacy preserving public auditing for secure cloud storage
Mustaq Syed
 
A lightweight secure scheme for detecting
jpstudcorner
 
Fahad Project On Spencer
Mohd Fahad
 
Privacy Preserving Public Auditing for Data Storage Security in Cloud.ppt
Girish Chandra
 
Mobile cloud computing
Fatih Özlü
 
Ieee 2015 2016
Focuslogic Walaja
 
Visible Light Communication
Meherunnesha (Nishat)
 
Palm vein technology
Bhavin Solanki
 
Mobile cloud computing; Future of Cloud Computing
Vineet Garg
 
VISIBLE LIGHT COMMUNICATION
Maheshnagakumar Tokala
 
palm vein technology and its applications
Akhil Kumar
 
Palm vein technology.pptx
schetan202
 
Palm Vein Technology
sathyakawthar
 
Mobile Cloud Computing
Vikas Kottari
 
visible light communication
Hossam Zein
 
Ad

Similar to Secure auditing and deduplicating data in cloud (20)

PDF
Secure Auditing and Deduplicating Data in Cloud
1crore projects
 
PDF
SecCloudPro: A Novel Secure Cloud Storage System for Auditing and Deduplication
IJCERT
 
PDF
Secure Auditing and Deduplicating Data on Cloud
IJMTST Journal
 
DOCX
Public integrity auditing for shared dynamic cloud data with group user revoc...
Pvrtechnologies Nellore
 
PDF
IRJET- Secure Data Deduplication for Cloud Server using HMAC Algorithm
IRJET Journal
 
PDF
A Novel Method of Directly Auditing Integrity On Encrypted Data
IRJET Journal
 
DOCX
A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD ...
nexgentechnology
 
DOCX
Secure distributed deduplication systems with improved reliability
Pvrtechnologies Nellore
 
PPTX
Presentation (6).pptx
MSMuthu5
 
PDF
Secured Authorized Deduplication Based Hybrid Cloud
theijes
 
PDF
E031102034039
theijes
 
PDF
Secure Redundant Data Avoidance over Multi-Cloud Architecture.
IJCERT JOURNAL
 
PDF
public truthfulness assessment for shared active cloud data storage with grou...
Ijripublishers Ijri
 
PDF
A hybrid cloud approach for secure authorized
Ninad Samel
 
PDF
IRJET- Security Enhance using Hash and Chaostic Algorithm in Cloud
IRJET Journal
 
PDF
IRJET- Security Enhance using Hash and Chaostic Algorithm in Cloud
IRJET Journal
 
PDF
IRJET- Secure Data Deduplication and Auditing for Cloud Data Storage
IRJET Journal
 
PDF
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
IRJET Journal
 
PDF
Insuring Security for Outsourced Data Stored in Cloud Environment
Editor IJCATR
 
DOCX
Public integrity auditing for shared dynamic cloud data with group user revoc...
Shakas Technologies
 
Secure Auditing and Deduplicating Data in Cloud
1crore projects
 
SecCloudPro: A Novel Secure Cloud Storage System for Auditing and Deduplication
IJCERT
 
Secure Auditing and Deduplicating Data on Cloud
IJMTST Journal
 
Public integrity auditing for shared dynamic cloud data with group user revoc...
Pvrtechnologies Nellore
 
IRJET- Secure Data Deduplication for Cloud Server using HMAC Algorithm
IRJET Journal
 
A Novel Method of Directly Auditing Integrity On Encrypted Data
IRJET Journal
 
A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD ...
nexgentechnology
 
Secure distributed deduplication systems with improved reliability
Pvrtechnologies Nellore
 
Presentation (6).pptx
MSMuthu5
 
Secured Authorized Deduplication Based Hybrid Cloud
theijes
 
E031102034039
theijes
 
Secure Redundant Data Avoidance over Multi-Cloud Architecture.
IJCERT JOURNAL
 
public truthfulness assessment for shared active cloud data storage with grou...
Ijripublishers Ijri
 
A hybrid cloud approach for secure authorized
Ninad Samel
 
IRJET- Security Enhance using Hash and Chaostic Algorithm in Cloud
IRJET Journal
 
IRJET- Security Enhance using Hash and Chaostic Algorithm in Cloud
IRJET Journal
 
IRJET- Secure Data Deduplication and Auditing for Cloud Data Storage
IRJET Journal
 
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
IRJET Journal
 
Insuring Security for Outsourced Data Stored in Cloud Environment
Editor IJCATR
 
Public integrity auditing for shared dynamic cloud data with group user revoc...
Shakas Technologies
 
Ad

More from Pvrtechnologies Nellore (20)

DOCX
A High Throughput List Decoder Architecture for Polar Codes
Pvrtechnologies Nellore
 
DOCX
Performance/Power Space Exploration for Binary64 Division Units
Pvrtechnologies Nellore
 
DOCX
Hybrid LUT/Multiplexer FPGA Logic Architectures
Pvrtechnologies Nellore
 
DOCX
Input-Based Dynamic Reconfiguration of Approximate Arithmetic Units for Video...
Pvrtechnologies Nellore
 
DOCX
2016 2017 ieee matlab project titles
Pvrtechnologies Nellore
 
DOCX
2016 2017 ieee vlsi project titles
Pvrtechnologies Nellore
 
DOCX
2016 2017 ieee ece embedded- project titles
Pvrtechnologies Nellore
 
DOCX
A High-Speed FPGA Implementation of an RSD-Based ECC Processor
Pvrtechnologies Nellore
 
DOCX
6On Efficient Retiming of Fixed-Point Circuits
Pvrtechnologies Nellore
 
DOCX
Pre encoded multipliers based on non-redundant radix-4 signed-digit encoding
Pvrtechnologies Nellore
 
DOCX
Quality of-protection-driven data forwarding for intermittently connected wir...
Pvrtechnologies Nellore
 
DOC
11.online library management system
Pvrtechnologies Nellore
 
DOC
06.e voting system
Pvrtechnologies Nellore
 
DOCX
New web based projects list
Pvrtechnologies Nellore
 
DOCX
Power controlled medium access control
Pvrtechnologies Nellore
 
DOCX
IEEE PROJECTS LIST
Pvrtechnologies Nellore
 
DOCX
Control cloud-data-access-privilege-and-anonymity-with-fully-anonymous-attrib...
Pvrtechnologies Nellore
 
DOCX
Control cloud data access privilege and anonymity with fully anonymous attrib...
Pvrtechnologies Nellore
 
DOCX
Cloud keybank privacy and owner authorization
Pvrtechnologies Nellore
 
DOCX
Circuit ciphertext policy attribute-based hybrid encryption with verifiable
Pvrtechnologies Nellore
 
A High Throughput List Decoder Architecture for Polar Codes
Pvrtechnologies Nellore
 
Performance/Power Space Exploration for Binary64 Division Units
Pvrtechnologies Nellore
 
Hybrid LUT/Multiplexer FPGA Logic Architectures
Pvrtechnologies Nellore
 
Input-Based Dynamic Reconfiguration of Approximate Arithmetic Units for Video...
Pvrtechnologies Nellore
 
2016 2017 ieee matlab project titles
Pvrtechnologies Nellore
 
2016 2017 ieee vlsi project titles
Pvrtechnologies Nellore
 
2016 2017 ieee ece embedded- project titles
Pvrtechnologies Nellore
 
A High-Speed FPGA Implementation of an RSD-Based ECC Processor
Pvrtechnologies Nellore
 
6On Efficient Retiming of Fixed-Point Circuits
Pvrtechnologies Nellore
 
Pre encoded multipliers based on non-redundant radix-4 signed-digit encoding
Pvrtechnologies Nellore
 
Quality of-protection-driven data forwarding for intermittently connected wir...
Pvrtechnologies Nellore
 
11.online library management system
Pvrtechnologies Nellore
 
06.e voting system
Pvrtechnologies Nellore
 
New web based projects list
Pvrtechnologies Nellore
 
Power controlled medium access control
Pvrtechnologies Nellore
 
IEEE PROJECTS LIST
Pvrtechnologies Nellore
 
Control cloud-data-access-privilege-and-anonymity-with-fully-anonymous-attrib...
Pvrtechnologies Nellore
 
Control cloud data access privilege and anonymity with fully anonymous attrib...
Pvrtechnologies Nellore
 
Cloud keybank privacy and owner authorization
Pvrtechnologies Nellore
 
Circuit ciphertext policy attribute-based hybrid encryption with verifiable
Pvrtechnologies Nellore
 

Recently uploaded (20)

PDF
The Builder’s Playbook - 2025 State of AI Report.pdf
jeroen339954
 
PPTX
AUTOMATION AND ROBOTICS IN PHARMA INDUSTRY.pptx
sameeraaabegumm
 
PDF
SFWelly Summer 25 Release Highlights July 2025
Anna Loughnan Colquhoun
 
PDF
How Startups Are Growing Faster with App Developers in Australia.pdf
India App Developer
 
PPTX
✨Unleashing Collaboration: Salesforce Channels & Community Power in Patna!✨
SanjeetMishra29
 
PDF
Why Orbit Edge Tech is a Top Next JS Development Company in 2025
mahendraalaska08
 
PDF
Jak MŚP w Europie Środkowo-Wschodniej odnajdują się w świecie AI
dominikamizerska1
 
PPTX
Webinar: Introduction to LF Energy EVerest
DanBrown980551
 
PDF
HubSpot Main Hub: A Unified Growth Platform
Jaswinder Singh
 
PDF
Predicting the unpredictable: re-engineering recommendation algorithms for fr...
Speck&Tech
 
PPTX
MSP360 Backup Scheduling and Retention Best Practices.pptx
MSP360
 
PDF
Achieving Consistent and Reliable AI Code Generation - Medusa AI
medusaaico
 
PPTX
OpenID AuthZEN - Analyst Briefing July 2025
David Brossard
 
PDF
LLMs.txt: Easily Control How AI Crawls Your Site
Keploy
 
PDF
Complete JavaScript Notes: From Basics to Advanced Concepts.pdf
haydendavispro
 
PDF
DevBcn - Building 10x Organizations Using Modern Productivity Metrics
Justin Reock
 
PDF
Smart Air Quality Monitoring with Serrax AQM190 LITE
SERRAX TECHNOLOGIES LLP
 
PDF
Impact of IEEE Computer Society in Advancing Emerging Technologies including ...
Hironori Washizaki
 
PDF
SWEBOK Guide and Software Services Engineering Education
Hironori Washizaki
 
PDF
HCIP-Data Center Facility Deployment V2.0 Training Material (Without Remarks ...
mcastillo49
 
The Builder’s Playbook - 2025 State of AI Report.pdf
jeroen339954
 
AUTOMATION AND ROBOTICS IN PHARMA INDUSTRY.pptx
sameeraaabegumm
 
SFWelly Summer 25 Release Highlights July 2025
Anna Loughnan Colquhoun
 
How Startups Are Growing Faster with App Developers in Australia.pdf
India App Developer
 
✨Unleashing Collaboration: Salesforce Channels & Community Power in Patna!✨
SanjeetMishra29
 
Why Orbit Edge Tech is a Top Next JS Development Company in 2025
mahendraalaska08
 
Jak MŚP w Europie Środkowo-Wschodniej odnajdują się w świecie AI
dominikamizerska1
 
Webinar: Introduction to LF Energy EVerest
DanBrown980551
 
HubSpot Main Hub: A Unified Growth Platform
Jaswinder Singh
 
Predicting the unpredictable: re-engineering recommendation algorithms for fr...
Speck&Tech
 
MSP360 Backup Scheduling and Retention Best Practices.pptx
MSP360
 
Achieving Consistent and Reliable AI Code Generation - Medusa AI
medusaaico
 
OpenID AuthZEN - Analyst Briefing July 2025
David Brossard
 
LLMs.txt: Easily Control How AI Crawls Your Site
Keploy
 
Complete JavaScript Notes: From Basics to Advanced Concepts.pdf
haydendavispro
 
DevBcn - Building 10x Organizations Using Modern Productivity Metrics
Justin Reock
 
Smart Air Quality Monitoring with Serrax AQM190 LITE
SERRAX TECHNOLOGIES LLP
 
Impact of IEEE Computer Society in Advancing Emerging Technologies including ...
Hironori Washizaki
 
SWEBOK Guide and Software Services Engineering Education
Hironori Washizaki
 
HCIP-Data Center Facility Deployment V2.0 Training Material (Without Remarks ...
mcastillo49
 

Secure auditing and deduplicating data in cloud

  • 1. Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore www.pvrtechnology.com, E-Mail: [email protected], Ph: 81432 71457 Secure Auditing and Deduplicating Data in Cloud ABSTRACT: As the cloud computing technology develops during the last decade, outsourcing data to cloud service for storage becomes an attractive trend, which benefits in sparing efforts on heavy data maintenance and management. Nevertheless, since the outsourced cloud storage is not fully trustworthy, it raises security concerns on how to realize data deduplication in cloud while achieving integrity auditing. In this work, we study the problem of integrity auditing and secure deduplication on cloud data. Specifically, aiming at achieving both data integrity and deduplication in cloud, we propose two secure systems, namely SecCloud and SecCloud+. SecCloud introduces an auditing entity with a maintenance of a MapReduce cloud, which helps clients generate data tags before uploading as well as audit the integrity of data having been stored in cloud. Compared with previous work, the computation by user in SecCloud is greatly reduced during the file uploading and auditing phases. SecCloud+ is designed motivated by the fact that customers always want to
  • 2. Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore www.pvrtechnology.com, E-Mail: [email protected], Ph: 81432 71457 encrypt their data before uploading, and enables integrity auditing and secure deduplication on encrypted data.
  • 3. Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore www.pvrtechnology.com, E-Mail: [email protected], Ph: 81432 71457 EXISTING SYSTEM: SecCloud introduces an auditing entity with a maintenance of a Map Reduce cloud, which helps clients generate data tags before uploading as well as audit the integrity of data having been stored in cloud. This design fixes the issue of previous work that the computational load at user or auditor is too huge for tag generation. For completeness of fine-grained, the functionality of auditing designed in SecCoud is supported on both block level and sector level. In addition, SecCoud also enables secure deduplication. Notice that the “security” considered in SecCoud is the prevention of leakage of side channel information. In order to prevent the leakage of such side channel information, we follow the tradition of and design a proof of ownership protocol between clients and cloud servers, which allows clients to prove to cloud servers that they exactly own the target data. Motivated by the fact that customers always want to encrypt their data before uploading, for reasons ranging from personal privacy to corporate policy, we introduce a key server into SecCloud as with and propose the SecCloud+ schema. Besides supporting integrity auditing and secure deduplication, SecCloud+ enables the guarantee of file confidentiality. Specifically, thanks to the property of deterministic encryption in convergent encryption, we propose a method of directly auditing integrity on encrypted data. The challenge of deduplication on encrypted is the prevention of dictionary attack. As with, we make a modification on convergent encryption such that the convergent key of file is generated and controlled by a secret “seed”, such that any adversary could not directly derive the convergent key from the content of file and the dictionary attack is prevented.
  • 4. Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore www.pvrtechnology.com, E-Mail: [email protected], Ph: 81432 71457 Disadvantages :  It is very difficult to audit the files huge and large amount of data in cloud using integrity auditing.  Data loss and lots of Duplicate files in cloud . PROPOSED SYSTEM: We specify that our proposed SecCloud system has achieved both integrity auditing and file deduplication. However, it cannot prevent the cloud servers from knowing the content of files having been stored. In other words, the functionalities of integrity auditing and secure deduplication are only imposed on plain files. In this section, we propose SecCloud+, which allows for integrity auditing and deduplication on encrypted files. Cloud Clients have large data files to be stored and rely on the cloud for data maintenance and computation. They can be either individual consumers or commercial organizations; Cloud Servers virtualize the resources according to the requirements of clients and expose them as storage pools. Typically, the cloud clients may buy or lease storage capacity from cloud servers, and store their individual data in these bought or rented spaces for future utilization. Auditor which helps clients
  • 5. Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore www.pvrtechnology.com, E-Mail: [email protected], Ph: 81432 71457 upload and audit their outsourced data maintains a MapReduce cloud and acts like a certificate authority. This assumption presumes that the auditor is associated with a pair of public and private keys. Its public key is made available to the other entities in the system
  • 6. Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore www.pvrtechnology.com, E-Mail: [email protected], Ph: 81432 71457 The design goal of file confidentiality requires to prevent the cloud servers from accessing the content of files. Specially, we require that the goal of file confidentiality needs to be resistant to “dictionary attack”. That is, even the adversaries have pre-knowledge of the “dictionary” which includes all the possible files, they still cannot recover the target file. Advantages:  It provides the Integrity auditing by Clustering the files with removing the duplicate files  The duplicate files are mapped with a single copy of the file by mapping with the existing file in the cloud MODULE DESCRIPTION: File Confidentiality: The design goal of file confidentiality requires to prevent the cloud servers from accessing the content of files. Specially, we require that the goal of file confidentiality needs to be resistant to “dictionary attack”. That is, even the adversaries have pre-knowledge of the “dictionary” which includes all the possible files, they still cannot recover the target file
  • 7. Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore www.pvrtechnology.com, E-Mail: [email protected], Ph: 81432 71457
  • 8. Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore www.pvrtechnology.com, E-Mail: [email protected], Ph: 81432 71457 Secure Deduplication: Deduplication is a technique where the server stores only a single copy of each file, regardless of how many clients asked to store that file, such that the disk space of cloud servers as well as network bandwidth are saved. However, trivial client side deduplication leads to the leakage of side channel information. For example, a server telling a client that it need not send the file reveals that some other client has the exact same file, which could be sensitive information in some case. Encryption & Decryption: Encryption and decryption provides data confidentiality in deduplication. A user (or data owner) derives a convergent key from the data content and encrypts the data copy with the convergent key. In addition, the user derives a tag for the data copy, such that the tag will be used to detect duplicates. Here, we assume that the tag correctness property holds, i.e., if two data copies are the same, then their tags are the same. Formally, a convergent encryption scheme can be defined with four primitive functions:
  • 9. Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore www.pvrtechnology.com, E-Mail: [email protected], Ph: 81432 71457 Integrity Auditing: The first design goal of this work is to provide the capability of verifying correctness of the remotely stored data. The integrity verification further requires two features: 1. Public verification, which allows anyone, not just the clients originally stored the file, to perform verification; 2. Stateless verification, which is able to eliminate the need for state information maintenance at the verifier side between the actions of auditing and data storage. ARCHITECTURE
  • 10. Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore www.pvrtechnology.com, E-Mail: [email protected], Ph: 81432 71457
  • 11. Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore www.pvrtechnology.com, E-Mail: [email protected], Ph: 81432 71457 SOFTWARE REQUIREMENTS:  Operating System : Windows 7  Technology : Java and J2EE  Web Technologies : Html, JavaScript, CSS  IDE : My Eclipse  Web Server : Tomcat  Database : My SQL  Java Version : J2SDK1.7 HARDWARE REQUIREMENTS:  Hardware : Pentium Dual Core  Speed : 2.80 GHz  RAM : 1GB  Hard Disk : 20 GB  Floppy Drive : 1.44 MB  Key Board : Standard Windows Keyboard  Mouse : Two or Three Button Mouse  Monitor : SVGA
  • 12. Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore www.pvrtechnology.com, E-Mail: [email protected], Ph: 81432 71457 CONCLUSION: Aiming at achieving both data integrity and deduplication in cloud, we propose SecCloud and SecCloud+. SecCloud introduces an auditing entity with maintenance of a MapReduce cloud, which helps clients generate data tags before uploading as well as audit the integrity of data having been stored in cloud. In addition, SecCoud enables secure deduplication through introducing a Proof of Ownership protocol and preventing the leakage of side channel information in data deduplication. Compared with previous work, the computation by user in SecCloud is greatly reduced during the file uploading and auditing phases. SecCloud+ is an advanced construction motivated by the fact that customers always want to encrypt their data before uploading, and allows for integrity auditing and secure deduplication directly on encrypted data.