SlideShare a Scribd company logo
Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore
www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
SECURE DISTRIBUTED DEDUPLICATION SYSTEMS WITH IMPROVED RELIABILITY
ABSTRACT
Data deduplication is a technique for eliminating duplicate copies of data, and has been widely
used in cloud storage to reduce storage space and upload bandwidth. However, there is only
one copy for each file stored in cloud even if such a file is owned by a huge number of users. As
a result, deduplication system improves storage utilization while reducing reliability.
Furthermore, the challenge of privacy for sensitive data also arises when they are outsourced
by users to cloud. Aiming to address the above security challenges, this paper makes the first
attempt to formalize the notion of distributed reliable deduplication system. We propose new
distributed deduplication systems with higher reliability in which the data chunks are
distributed across multiple cloud servers. The security requirements of data confidentiality and
tag consistency are also achieved by introducing a deterministic secret sharing scheme in
distributed storage systems, instead of using convergent encryption as in previous
deduplication systems. Security analysis demonstrates that our deduplication systems are
secure in terms of the definitions specified in the proposed security model. As a proof of
concept, we implement the proposed systems and demonstrate that the incurred overhead is
very limited in realistic environments.
MODULEDESCRIPTION:
NUMBER OF MODULES:
After careful analysis the system has been identified to have the following
modules:
Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore
www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
1. Secure Deduplication
2. User Behavior Profiling:
3.Decoy documents.
1. Secure Deduplication:
Data deduplication is a specialized data compression technique for
eliminating duplicate copies of repeating data. Related and somewhat
synonymous terms are intelligent (data) compression and single-instance
(data) storage. This technique is used to improve storage utilization and
can also be applied to network data transfers to reduce the number of
bytes that must be sent. In the deduplication process, unique chunks of
data, or byte patterns, are identified and stored during a process of
analysis. As the analysis continues, other chunks are compared to the
stored copy and whenever a match occurs, the redundant chunk is
replaced with a small reference that points to the stored chunk. Given
that the same byte pattern may occur dozens, hundreds, or even
thousands of times (the match frequency is dependent on the chunk
Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore
www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
size), the amount of data that must be stored or transferred can be greatly
reduced.
This type of deduplication is different from that performed by standard
file-compression tools, such as LZ77 and LZ78. Whereas these tools
identify short repeated substrings inside individual files, the intent of
storage-based data deduplication is to inspect large volumes of data and
identify large sections – such as entire files or large sections of files –
that are identical, in order to store only one copy of it. This copy may be
additionally compressed by single-file compression techniques. For
example a typical email system might contain 100 instances of the same
1 MB (megabyte) file attachment. Each time the email platform is
backed up, all 100 instances of the attachment are saved, requiring 100
MB storage space.
2. User Behavior Profiling:
We monitor data access in the cloud and detect abnormal data access patterns User profiling
is a well known Technique that can be applied here to model how, when, and how much a user accesses
Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore
www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
their information in the Cloud. Such ‘normal user’ behavior can be continuously checked to determine
whether abnormal access to a user’s information is occurring. This method of behavior-based security is
commonly used in fraud detection applications. Such profiles would naturally include volumetric
information, how many documents are typically read and how often. We monitor for abnormal search
behaviors that exhibit deviations from the user baseline the correlation of search behavior anomaly
detection with trap-based decoy files should provide stronger evidence of malfeasance, and therefore
improve adetector’saccuracy.
3.Decoy documents.
We propose a different approach for securing data in the cloud using offensive decoy
technology. We monitor data access in the cloud and detect abnormal data access patterns. We launch
a disinformation attack by returning large amounts of decoy information to the attacker. This protects
against the misuse of the user’s real data. We use this technology to launch disinformation attacks
against malicious insiders, preventing them from distinguishing the real sensitive customer data from
fake worthlessdata the decoys,then,serve twopurposes:
(1) Validatingwhetherdataaccessis authorizedwhenabnormalinformationaccessisdetected,and
(2) Confusingthe attackerwithbogusinformation.
Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore
www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
EXISTING SYSTEM
The various kinds of data for each user stored in the cloud and the demand of
long term continuous assurance of their data safety, the problem of verifying
correctness of data storage in the cloud becomes even more challenging. Cloud
Computing is not just a third party data warehouse. The data stored in the cloud
may be frequently updated by the users, including insertion, deletion,
modification, appending, reordering, etc. One critical challenge of today’s cloud
storage services is the management of the ever-increasing volume of data.
According to the analysis report of IDC, the volume of data in the wild is expected
to reach 40 trillion gigabytes in 2020. The baseline approach suffers two critical
deployment issues. First, it is inefficient, as it will generate an enormous number
of keys with the increasing number of users. Specifically, each user must associate
an encrypted convergent key with each block of its outsourced encrypted data
copies, so as to later restore the data copies. Although different users may share
the same data copies, they must have their own set of convergent keys so that no
other users can access their files. Second, the baseline approach is unreliable, as it
requires each user to dedicatedly protect his own master key. If the master key is
accidentally lost, then the user data cannot be recovered; if it is compromised by
attackers, then the user data will be leaked.
.
PROPOSED SYSTEM:
Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore
www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
We propose Dekey, a new construction in which users do not need to
manage any keys on their own but instead securely distribute the
convergent key shares across multiple servers. Dekey using the Ramp
secret sharing scheme and demonstrate that Dekey incurs limited
overhead in realistic environments we propose a new construction called
Dekey, which provides efficiency and reliability guarantees for
convergent key management on both user and cloud storage sides. A
new construction Dekey is proposed to provide efficient and reliable
convergent key management through convergent key Deduplication and
secret sharing. Dekey supports both file-level Deduplication. Security
analysis demonstrates that Dekey is secure in terms of the definitions
specified in the proposed security model. In particular, Dekey remains
secure even the adversary controls a limited number of key servers. We
implement Dekey using the secret sharing scheme that enables the key
management to adapt to different reliability and confidentiality levels.
Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore
www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
Our evaluation demonstrates that Dekey incurs limited overhead in
normal upload/download operations in realistic cloud environments.
The advantages of placing decoys in a file system are threefold:
(1) The detection of masquerade activity.
(2) The confusion of the attacker and the additional costs incurred to
distinguish real from bogus information, and
(3) The deterrence effect which, although hard to measure, plays a
significant role in preventing masquerade activity by risk-averse
attackers.
System Configuration:
HARDWARE REQUIREMENTS:
Hardware - Pentium
Speed - 1.1 GHz
Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore
www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
RAM - 1GB
Hard Disk - 20 GB
KeyBoard - Standard WindowsKeyboard
Mouse - Two or Three ButtonMouse
Monitor - SVGA
SOFTWARE REQUIREMENTS:
OperatingSystem : Windows
Technology : Java and J2EE
Web Technologies : Html,JavaScript,CSS
IDE : My Eclipse
Web Server : Tomcat
Tool kit : AndroidPhone
Database : My SQL
Java Version : J2SDK1.5
Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore
www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457

More Related Content

What's hot (18)

PPTX
Secure deduplicaton with efficient and reliable convergent
Jayakrishnan U
 
DOCX
Secure auditing and deduplicating data in cloud
Pvrtechnologies Nellore
 
DOC
A hybrid cloud approach for secure authorized deduplication
Papitha Velumani
 
PDF
A hybrid cloud approach for secure authorized deduplication
LeMeniz Infotech
 
PPTX
Deduplication in Open Spurce Cloud
Mangali Praveen Kumar
 
PPTX
A hybrid cloud approach for secure authorized deduplication
prudhvikumar madithati
 
PDF
A hybrid cloud approach for secure authorized deduplication
Tmks Infotech
 
PDF
A Hybrid Cloud Approach for Secure Authorized Deduplication
1crore projects
 
DOCX
Secure auditing and deduplicating data in cloud
CloudTechnologies
 
DOCX
SECURE AUDITING AND DEDUPLICATING DATA IN CLOUD
Nexgen Technology
 
PDF
Enabling Integrity for the Compressed Files in Cloud Server
IOSR Journals
 
DOCX
a hybrid cloud approach for secure authorized reduplications
swathi78
 
PDF
a hybrid cloud approach for secure authorized
logicsystemsprojects
 
PPTX
Identity based distributed provable data possession in multi-cloud storage
Papitha Velumani
 
PDF
International Journal of Computational Engineering Research(IJCER)
ijceronline
 
PDF
IRJET - A Secure Access Policies based on Data Deduplication System
IRJET Journal
 
PPTX
Provable multi copy dynamic data possession in cloud computing systems
Nagamalleswararao Tadikonda
 
PDF
An efficient, secure deduplication data storing in cloud storage environment
eSAT Journals
 
Secure deduplicaton with efficient and reliable convergent
Jayakrishnan U
 
Secure auditing and deduplicating data in cloud
Pvrtechnologies Nellore
 
A hybrid cloud approach for secure authorized deduplication
Papitha Velumani
 
A hybrid cloud approach for secure authorized deduplication
LeMeniz Infotech
 
Deduplication in Open Spurce Cloud
Mangali Praveen Kumar
 
A hybrid cloud approach for secure authorized deduplication
prudhvikumar madithati
 
A hybrid cloud approach for secure authorized deduplication
Tmks Infotech
 
A Hybrid Cloud Approach for Secure Authorized Deduplication
1crore projects
 
Secure auditing and deduplicating data in cloud
CloudTechnologies
 
SECURE AUDITING AND DEDUPLICATING DATA IN CLOUD
Nexgen Technology
 
Enabling Integrity for the Compressed Files in Cloud Server
IOSR Journals
 
a hybrid cloud approach for secure authorized reduplications
swathi78
 
a hybrid cloud approach for secure authorized
logicsystemsprojects
 
Identity based distributed provable data possession in multi-cloud storage
Papitha Velumani
 
International Journal of Computational Engineering Research(IJCER)
ijceronline
 
IRJET - A Secure Access Policies based on Data Deduplication System
IRJET Journal
 
Provable multi copy dynamic data possession in cloud computing systems
Nagamalleswararao Tadikonda
 
An efficient, secure deduplication data storing in cloud storage environment
eSAT Journals
 

Similar to Secure distributed deduplication systems with improved reliability (20)

PDF
Secure Deduplication with Efficient and Reliable Dekey Management with the Pr...
paperpublications3
 
DOCX
2015 16 java titles
Pvrtechnologies Nellore
 
PDF
Ijaiem 2014-11-30-122
Sathya Madhesh
 
PDF
Methodology for Optimizing Storage on Cloud Using Authorized De-Duplication –...
IRJET Journal
 
PPTX
Secure_Data_Deduplication_Presentation.pptx
syedmujeeburrahman07
 
PDF
Secure Data Sharing in Cloud Computing using Revocable Storage Identity- Base...
rahulmonikasharma
 
PDF
IRJET- Security Enhance using Hash and Chaostic Algorithm in Cloud
IRJET Journal
 
PDF
IRJET- Security Enhance using Hash and Chaostic Algorithm in Cloud
IRJET Journal
 
PDF
Improving Data Storage Security in Cloud using Hadoop
IJERA Editor
 
PPTX
Presentation (6).pptx
MSMuthu5
 
PDF
A hybrid cloud approach for secure authorized
Ninad Samel
 
PDF
THE SURVEY ON REFERENCE MODEL FOR OPEN STORAGE SYSTEMS INTERCONNECTION MASS S...
IRJET Journal
 
PDF
Deduplication on Encrypted Big Data in HDFS
IRJET Journal
 
PDF
IRJET- Secure Data Deduplication and Auditing for Cloud Data Storage
IRJET Journal
 
PDF
Improved deduplication with keys and chunks in HDFS storage providers
IRJET Journal
 
PDF
iaetsd Controlling data deuplication in cloud storage
Iaetsd Iaetsd
 
PDF
An Approach towards Shuffling of Data to Avoid Tampering in Cloud
IRJET Journal
 
PDF
IRJET- Data Deduplication Security with Dynamic Ownership Management
IRJET Journal
 
DOCX
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Pvrtechnologies Nellore
 
PDF
IRJET- Cloud based Deduplication using Middleware Approach
IRJET Journal
 
Secure Deduplication with Efficient and Reliable Dekey Management with the Pr...
paperpublications3
 
2015 16 java titles
Pvrtechnologies Nellore
 
Ijaiem 2014-11-30-122
Sathya Madhesh
 
Methodology for Optimizing Storage on Cloud Using Authorized De-Duplication –...
IRJET Journal
 
Secure_Data_Deduplication_Presentation.pptx
syedmujeeburrahman07
 
Secure Data Sharing in Cloud Computing using Revocable Storage Identity- Base...
rahulmonikasharma
 
IRJET- Security Enhance using Hash and Chaostic Algorithm in Cloud
IRJET Journal
 
IRJET- Security Enhance using Hash and Chaostic Algorithm in Cloud
IRJET Journal
 
Improving Data Storage Security in Cloud using Hadoop
IJERA Editor
 
Presentation (6).pptx
MSMuthu5
 
A hybrid cloud approach for secure authorized
Ninad Samel
 
THE SURVEY ON REFERENCE MODEL FOR OPEN STORAGE SYSTEMS INTERCONNECTION MASS S...
IRJET Journal
 
Deduplication on Encrypted Big Data in HDFS
IRJET Journal
 
IRJET- Secure Data Deduplication and Auditing for Cloud Data Storage
IRJET Journal
 
Improved deduplication with keys and chunks in HDFS storage providers
IRJET Journal
 
iaetsd Controlling data deuplication in cloud storage
Iaetsd Iaetsd
 
An Approach towards Shuffling of Data to Avoid Tampering in Cloud
IRJET Journal
 
IRJET- Data Deduplication Security with Dynamic Ownership Management
IRJET Journal
 
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Pvrtechnologies Nellore
 
IRJET- Cloud based Deduplication using Middleware Approach
IRJET Journal
 
Ad

More from Pvrtechnologies Nellore (20)

DOCX
A High Throughput List Decoder Architecture for Polar Codes
Pvrtechnologies Nellore
 
DOCX
Performance/Power Space Exploration for Binary64 Division Units
Pvrtechnologies Nellore
 
DOCX
Hybrid LUT/Multiplexer FPGA Logic Architectures
Pvrtechnologies Nellore
 
DOCX
Input-Based Dynamic Reconfiguration of Approximate Arithmetic Units for Video...
Pvrtechnologies Nellore
 
DOCX
2016 2017 ieee matlab project titles
Pvrtechnologies Nellore
 
DOCX
2016 2017 ieee vlsi project titles
Pvrtechnologies Nellore
 
DOCX
2016 2017 ieee ece embedded- project titles
Pvrtechnologies Nellore
 
DOCX
A High-Speed FPGA Implementation of an RSD-Based ECC Processor
Pvrtechnologies Nellore
 
DOCX
6On Efficient Retiming of Fixed-Point Circuits
Pvrtechnologies Nellore
 
DOCX
Pre encoded multipliers based on non-redundant radix-4 signed-digit encoding
Pvrtechnologies Nellore
 
DOCX
Quality of-protection-driven data forwarding for intermittently connected wir...
Pvrtechnologies Nellore
 
DOC
11.online library management system
Pvrtechnologies Nellore
 
DOC
06.e voting system
Pvrtechnologies Nellore
 
DOCX
New web based projects list
Pvrtechnologies Nellore
 
DOCX
Power controlled medium access control
Pvrtechnologies Nellore
 
DOCX
IEEE PROJECTS LIST
Pvrtechnologies Nellore
 
DOCX
Control cloud-data-access-privilege-and-anonymity-with-fully-anonymous-attrib...
Pvrtechnologies Nellore
 
DOCX
Control cloud data access privilege and anonymity with fully anonymous attrib...
Pvrtechnologies Nellore
 
DOCX
Cloud keybank privacy and owner authorization
Pvrtechnologies Nellore
 
DOCX
Circuit ciphertext policy attribute-based hybrid encryption with verifiable
Pvrtechnologies Nellore
 
A High Throughput List Decoder Architecture for Polar Codes
Pvrtechnologies Nellore
 
Performance/Power Space Exploration for Binary64 Division Units
Pvrtechnologies Nellore
 
Hybrid LUT/Multiplexer FPGA Logic Architectures
Pvrtechnologies Nellore
 
Input-Based Dynamic Reconfiguration of Approximate Arithmetic Units for Video...
Pvrtechnologies Nellore
 
2016 2017 ieee matlab project titles
Pvrtechnologies Nellore
 
2016 2017 ieee vlsi project titles
Pvrtechnologies Nellore
 
2016 2017 ieee ece embedded- project titles
Pvrtechnologies Nellore
 
A High-Speed FPGA Implementation of an RSD-Based ECC Processor
Pvrtechnologies Nellore
 
6On Efficient Retiming of Fixed-Point Circuits
Pvrtechnologies Nellore
 
Pre encoded multipliers based on non-redundant radix-4 signed-digit encoding
Pvrtechnologies Nellore
 
Quality of-protection-driven data forwarding for intermittently connected wir...
Pvrtechnologies Nellore
 
11.online library management system
Pvrtechnologies Nellore
 
06.e voting system
Pvrtechnologies Nellore
 
New web based projects list
Pvrtechnologies Nellore
 
Power controlled medium access control
Pvrtechnologies Nellore
 
IEEE PROJECTS LIST
Pvrtechnologies Nellore
 
Control cloud-data-access-privilege-and-anonymity-with-fully-anonymous-attrib...
Pvrtechnologies Nellore
 
Control cloud data access privilege and anonymity with fully anonymous attrib...
Pvrtechnologies Nellore
 
Cloud keybank privacy and owner authorization
Pvrtechnologies Nellore
 
Circuit ciphertext policy attribute-based hybrid encryption with verifiable
Pvrtechnologies Nellore
 
Ad

Recently uploaded (20)

PPTX
Building and Operating a Private Cloud with CloudStack and LINBIT CloudStack ...
ShapeBlue
 
PPTX
WooCommerce Workshop: Bring Your Laptop
Laura Hartwig
 
PDF
Human-centred design in online workplace learning and relationship to engagem...
Tracy Tang
 
PDF
TrustArc Webinar - Data Privacy Trends 2025: Mid-Year Insights & Program Stra...
TrustArc
 
PDF
Blockchain Transactions Explained For Everyone
CIFDAQ
 
PPTX
UiPath Academic Alliance Educator Panels: Session 2 - Business Analyst Content
DianaGray10
 
PDF
SWEBOK Guide and Software Services Engineering Education
Hironori Washizaki
 
PDF
Empowering Cloud Providers with Apache CloudStack and Stackbill
ShapeBlue
 
PDF
DevBcn - Building 10x Organizations Using Modern Productivity Metrics
Justin Reock
 
PDF
CIFDAQ Weekly Market Wrap for 11th July 2025
CIFDAQ
 
PPTX
Darren Mills The Migration Modernization Balancing Act: Navigating Risks and...
AWS Chicago
 
PPTX
Building a Production-Ready Barts Health Secure Data Environment Tooling, Acc...
Barts Health
 
PDF
NewMind AI - Journal 100 Insights After The 100th Issue
NewMind AI
 
PDF
CloudStack GPU Integration - Rohit Yadav
ShapeBlue
 
PDF
How Startups Are Growing Faster with App Developers in Australia.pdf
India App Developer
 
PDF
LLMs.txt: Easily Control How AI Crawls Your Site
Keploy
 
PDF
Rethinking Security Operations - SOC Evolution Journey.pdf
Haris Chughtai
 
PDF
Persuasive AI: risks and opportunities in the age of digital debate
Speck&Tech
 
PDF
HCIP-Data Center Facility Deployment V2.0 Training Material (Without Remarks ...
mcastillo49
 
PDF
Impact of IEEE Computer Society in Advancing Emerging Technologies including ...
Hironori Washizaki
 
Building and Operating a Private Cloud with CloudStack and LINBIT CloudStack ...
ShapeBlue
 
WooCommerce Workshop: Bring Your Laptop
Laura Hartwig
 
Human-centred design in online workplace learning and relationship to engagem...
Tracy Tang
 
TrustArc Webinar - Data Privacy Trends 2025: Mid-Year Insights & Program Stra...
TrustArc
 
Blockchain Transactions Explained For Everyone
CIFDAQ
 
UiPath Academic Alliance Educator Panels: Session 2 - Business Analyst Content
DianaGray10
 
SWEBOK Guide and Software Services Engineering Education
Hironori Washizaki
 
Empowering Cloud Providers with Apache CloudStack and Stackbill
ShapeBlue
 
DevBcn - Building 10x Organizations Using Modern Productivity Metrics
Justin Reock
 
CIFDAQ Weekly Market Wrap for 11th July 2025
CIFDAQ
 
Darren Mills The Migration Modernization Balancing Act: Navigating Risks and...
AWS Chicago
 
Building a Production-Ready Barts Health Secure Data Environment Tooling, Acc...
Barts Health
 
NewMind AI - Journal 100 Insights After The 100th Issue
NewMind AI
 
CloudStack GPU Integration - Rohit Yadav
ShapeBlue
 
How Startups Are Growing Faster with App Developers in Australia.pdf
India App Developer
 
LLMs.txt: Easily Control How AI Crawls Your Site
Keploy
 
Rethinking Security Operations - SOC Evolution Journey.pdf
Haris Chughtai
 
Persuasive AI: risks and opportunities in the age of digital debate
Speck&Tech
 
HCIP-Data Center Facility Deployment V2.0 Training Material (Without Remarks ...
mcastillo49
 
Impact of IEEE Computer Society in Advancing Emerging Technologies including ...
Hironori Washizaki
 

Secure distributed deduplication systems with improved reliability

  • 1. Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore www.pvrtechnology.com, E-Mail: [email protected], Ph: 81432 71457 SECURE DISTRIBUTED DEDUPLICATION SYSTEMS WITH IMPROVED RELIABILITY ABSTRACT Data deduplication is a technique for eliminating duplicate copies of data, and has been widely used in cloud storage to reduce storage space and upload bandwidth. However, there is only one copy for each file stored in cloud even if such a file is owned by a huge number of users. As a result, deduplication system improves storage utilization while reducing reliability. Furthermore, the challenge of privacy for sensitive data also arises when they are outsourced by users to cloud. Aiming to address the above security challenges, this paper makes the first attempt to formalize the notion of distributed reliable deduplication system. We propose new distributed deduplication systems with higher reliability in which the data chunks are distributed across multiple cloud servers. The security requirements of data confidentiality and tag consistency are also achieved by introducing a deterministic secret sharing scheme in distributed storage systems, instead of using convergent encryption as in previous deduplication systems. Security analysis demonstrates that our deduplication systems are secure in terms of the definitions specified in the proposed security model. As a proof of concept, we implement the proposed systems and demonstrate that the incurred overhead is very limited in realistic environments. MODULEDESCRIPTION: NUMBER OF MODULES: After careful analysis the system has been identified to have the following modules:
  • 2. Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore www.pvrtechnology.com, E-Mail: [email protected], Ph: 81432 71457 1. Secure Deduplication 2. User Behavior Profiling: 3.Decoy documents. 1. Secure Deduplication: Data deduplication is a specialized data compression technique for eliminating duplicate copies of repeating data. Related and somewhat synonymous terms are intelligent (data) compression and single-instance (data) storage. This technique is used to improve storage utilization and can also be applied to network data transfers to reduce the number of bytes that must be sent. In the deduplication process, unique chunks of data, or byte patterns, are identified and stored during a process of analysis. As the analysis continues, other chunks are compared to the stored copy and whenever a match occurs, the redundant chunk is replaced with a small reference that points to the stored chunk. Given that the same byte pattern may occur dozens, hundreds, or even thousands of times (the match frequency is dependent on the chunk
  • 3. Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore www.pvrtechnology.com, E-Mail: [email protected], Ph: 81432 71457 size), the amount of data that must be stored or transferred can be greatly reduced. This type of deduplication is different from that performed by standard file-compression tools, such as LZ77 and LZ78. Whereas these tools identify short repeated substrings inside individual files, the intent of storage-based data deduplication is to inspect large volumes of data and identify large sections – such as entire files or large sections of files – that are identical, in order to store only one copy of it. This copy may be additionally compressed by single-file compression techniques. For example a typical email system might contain 100 instances of the same 1 MB (megabyte) file attachment. Each time the email platform is backed up, all 100 instances of the attachment are saved, requiring 100 MB storage space. 2. User Behavior Profiling: We monitor data access in the cloud and detect abnormal data access patterns User profiling is a well known Technique that can be applied here to model how, when, and how much a user accesses
  • 4. Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore www.pvrtechnology.com, E-Mail: [email protected], Ph: 81432 71457 their information in the Cloud. Such ‘normal user’ behavior can be continuously checked to determine whether abnormal access to a user’s information is occurring. This method of behavior-based security is commonly used in fraud detection applications. Such profiles would naturally include volumetric information, how many documents are typically read and how often. We monitor for abnormal search behaviors that exhibit deviations from the user baseline the correlation of search behavior anomaly detection with trap-based decoy files should provide stronger evidence of malfeasance, and therefore improve adetector’saccuracy. 3.Decoy documents. We propose a different approach for securing data in the cloud using offensive decoy technology. We monitor data access in the cloud and detect abnormal data access patterns. We launch a disinformation attack by returning large amounts of decoy information to the attacker. This protects against the misuse of the user’s real data. We use this technology to launch disinformation attacks against malicious insiders, preventing them from distinguishing the real sensitive customer data from fake worthlessdata the decoys,then,serve twopurposes: (1) Validatingwhetherdataaccessis authorizedwhenabnormalinformationaccessisdetected,and (2) Confusingthe attackerwithbogusinformation.
  • 5. Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore www.pvrtechnology.com, E-Mail: [email protected], Ph: 81432 71457 EXISTING SYSTEM The various kinds of data for each user stored in the cloud and the demand of long term continuous assurance of their data safety, the problem of verifying correctness of data storage in the cloud becomes even more challenging. Cloud Computing is not just a third party data warehouse. The data stored in the cloud may be frequently updated by the users, including insertion, deletion, modification, appending, reordering, etc. One critical challenge of today’s cloud storage services is the management of the ever-increasing volume of data. According to the analysis report of IDC, the volume of data in the wild is expected to reach 40 trillion gigabytes in 2020. The baseline approach suffers two critical deployment issues. First, it is inefficient, as it will generate an enormous number of keys with the increasing number of users. Specifically, each user must associate an encrypted convergent key with each block of its outsourced encrypted data copies, so as to later restore the data copies. Although different users may share the same data copies, they must have their own set of convergent keys so that no other users can access their files. Second, the baseline approach is unreliable, as it requires each user to dedicatedly protect his own master key. If the master key is accidentally lost, then the user data cannot be recovered; if it is compromised by attackers, then the user data will be leaked. . PROPOSED SYSTEM:
  • 6. Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore www.pvrtechnology.com, E-Mail: [email protected], Ph: 81432 71457 We propose Dekey, a new construction in which users do not need to manage any keys on their own but instead securely distribute the convergent key shares across multiple servers. Dekey using the Ramp secret sharing scheme and demonstrate that Dekey incurs limited overhead in realistic environments we propose a new construction called Dekey, which provides efficiency and reliability guarantees for convergent key management on both user and cloud storage sides. A new construction Dekey is proposed to provide efficient and reliable convergent key management through convergent key Deduplication and secret sharing. Dekey supports both file-level Deduplication. Security analysis demonstrates that Dekey is secure in terms of the definitions specified in the proposed security model. In particular, Dekey remains secure even the adversary controls a limited number of key servers. We implement Dekey using the secret sharing scheme that enables the key management to adapt to different reliability and confidentiality levels.
  • 7. Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore www.pvrtechnology.com, E-Mail: [email protected], Ph: 81432 71457 Our evaluation demonstrates that Dekey incurs limited overhead in normal upload/download operations in realistic cloud environments. The advantages of placing decoys in a file system are threefold: (1) The detection of masquerade activity. (2) The confusion of the attacker and the additional costs incurred to distinguish real from bogus information, and (3) The deterrence effect which, although hard to measure, plays a significant role in preventing masquerade activity by risk-averse attackers. System Configuration: HARDWARE REQUIREMENTS: Hardware - Pentium Speed - 1.1 GHz
  • 8. Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore www.pvrtechnology.com, E-Mail: [email protected], Ph: 81432 71457 RAM - 1GB Hard Disk - 20 GB KeyBoard - Standard WindowsKeyboard Mouse - Two or Three ButtonMouse Monitor - SVGA SOFTWARE REQUIREMENTS: OperatingSystem : Windows Technology : Java and J2EE Web Technologies : Html,JavaScript,CSS IDE : My Eclipse Web Server : Tomcat Tool kit : AndroidPhone Database : My SQL Java Version : J2SDK1.5
  • 9. Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore www.pvrtechnology.com, E-Mail: [email protected], Ph: 81432 71457