SlideShare a Scribd company logo
Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore
www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
SECURE DISTRIBUTED DEDUPLICATION SYSTEMS WITH IMPROVED RELIABILITY
ABSTRACT
Data deduplication is a technique for eliminating duplicate copies of data, and has been widely
used in cloud storage to reduce storage space and upload bandwidth. However, there is only
one copy for each file stored in cloud even if such a file is owned by a huge number of users. As
a result, deduplication system improves storage utilization while reducing reliability.
Furthermore, the challenge of privacy for sensitive data also arises when they are outsourced
by users to cloud. Aiming to address the above security challenges, this paper makes the first
attempt to formalize the notion of distributed reliable deduplication system. We propose new
distributed deduplication systems with higher reliability in which the data chunks are
distributed across multiple cloud servers. The security requirements of data confidentiality and
tag consistency are also achieved by introducing a deterministic secret sharing scheme in
distributed storage systems, instead of using convergent encryption as in previous
deduplication systems. Security analysis demonstrates that our deduplication systems are
secure in terms of the definitions specified in the proposed security model. As a proof of
concept, we implement the proposed systems and demonstrate that the incurred overhead is
very limited in realistic environments.
MODULEDESCRIPTION:
NUMBER OF MODULES:
After careful analysis the system has been identified to have the following
modules:
Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore
www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
1. Secure Deduplication
2. User Behavior Profiling:
3.Decoy documents.
1. Secure Deduplication:
Data deduplication is a specialized data compression technique for
eliminating duplicate copies of repeating data. Related and somewhat
synonymous terms are intelligent (data) compression and single-instance
(data) storage. This technique is used to improve storage utilization and
can also be applied to network data transfers to reduce the number of
bytes that must be sent. In the deduplication process, unique chunks of
data, or byte patterns, are identified and stored during a process of
analysis. As the analysis continues, other chunks are compared to the
stored copy and whenever a match occurs, the redundant chunk is
replaced with a small reference that points to the stored chunk. Given
that the same byte pattern may occur dozens, hundreds, or even
thousands of times (the match frequency is dependent on the chunk
Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore
www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
size), the amount of data that must be stored or transferred can be greatly
reduced.
This type of deduplication is different from that performed by standard
file-compression tools, such as LZ77 and LZ78. Whereas these tools
identify short repeated substrings inside individual files, the intent of
storage-based data deduplication is to inspect large volumes of data and
identify large sections – such as entire files or large sections of files –
that are identical, in order to store only one copy of it. This copy may be
additionally compressed by single-file compression techniques. For
example a typical email system might contain 100 instances of the same
1 MB (megabyte) file attachment. Each time the email platform is
backed up, all 100 instances of the attachment are saved, requiring 100
MB storage space.
2. User Behavior Profiling:
Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore
www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
We monitor data access in the cloud and detect abnormal data access patterns User profiling
is a well known Technique that can be applied here to model how, when, and how much a user accesses
their information in the Cloud. Such ‘normal user’ behavior can be continuously checked to determine
whether abnormal access to a user’s information is occurring. This method of behavior-based security is
commonly used in fraud detection applications. Such profiles would naturally include volumetric
information, how many documents are typically read and how often. We monitor for abnormal search
behaviors that exhibit deviations from the user baseline the correlation of search behavior anomaly
detection with trap-based decoy files should provide stronger evidence of malfeasance, and therefore
improve adetector’saccuracy.
3.Decoy documents.
We propose a different approach for securing data in the cloud using offensive decoy
technology. We monitor data access in the cloud and detect abnormal data access patterns. We launch
a disinformation attack by returning large amounts of decoy information to the attacker. This protects
against the misuse of the user’s real data. We use this technology to launch disinformation attacks
against malicious insiders, preventing them from distinguishing the real sensitive customer data from
fake worthlessdata the decoys,then,serve twopurposes:
(1) Validatingwhetherdataaccessis authorizedwhenabnormalinformationaccessisdetected,and
(2) Confusingthe attackerwithbogusinformation.
Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore
www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
EXISTING SYSTEM
The various kinds of data for each user stored in the cloud and the demand of
long term continuous assurance of their data safety, the problem of verifying
correctness of data storage in the cloud becomes even more challenging. Cloud
Computing is not just a third party data warehouse. The data stored in the cloud
may be frequently updated by the users, including insertion, deletion,
modification, appending, reordering, etc. One critical challenge of today’s cloud
storage services is the management of the ever-increasing volume of data.
According to the analysis report of IDC, the volume of data in the wild is expected
to reach 40 trillion gigabytes in 2020. The baseline approach suffers two critical
deployment issues. First, it is inefficient, as it will generate an enormous number
of keys with the increasing number of users. Specifically, each user must associate
an encrypted convergent key with each block of its outsourced encrypted data
copies, so as to later restore the data copies. Although different users may share
the same data copies, they must have their own set of convergent keys so that no
other users can access their files. Second, the baseline approach is unreliable, as it
requires each user to dedicatedly protect his own master key. If the master key is
accidentally lost, then the user data cannot be recovered; if it is compromised by
attackers, then the user data will be leaked.
.
PROPOSED SYSTEM:
Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore
www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
We propose Dekey, a new construction in which users do not need to
manage any keys on their own but instead securely distribute the
convergent key shares across multiple servers. Dekey using the Ramp
secret sharing scheme and demonstrate that Dekey incurs limited
overhead in realistic environments we propose a new construction called
Dekey, which provides efficiency and reliability guarantees for
convergent key management on both user and cloud storage sides. A
new construction Dekey is proposed to provide efficient and reliable
convergent key management through convergent key Deduplication and
secret sharing. Dekey supports both file-level Deduplication. Security
analysis demonstrates that Dekey is secure in terms of the definitions
specified in the proposed security model. In particular, Dekey remains
secure even the adversary controls a limited number of key servers. We
implement Dekey using the secret sharing scheme that enables the key
management to adapt to different reliability and confidentiality levels.
Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore
www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
Our evaluation demonstrates that Dekey incurs limited overhead in
normal upload/download operations in realistic cloud environments.
The advantages of placing decoys in a file system are threefold:
(1) The detection of masquerade activity.
(2) The confusion of the attacker and the additional costs incurred to
distinguish real from bogus information, and
(3) The deterrence effect which, although hard to measure, plays a
significant role in preventing masquerade activity by risk-averse
attackers.
System Configuration:
HARDWARE REQUIREMENTS:
Hardware - Pentium
Speed - 1.1 GHz
Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore
www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
RAM - 1GB
Hard Disk - 20 GB
KeyBoard - Standard WindowsKeyboard
Mouse - Two or Three ButtonMouse
Monitor - SVGA
SOFTWARE REQUIREMENTS:
OperatingSystem : Windows
Technology : Java and J2EE
Web Technologies : Html,JavaScript,CSS
IDE : My Eclipse
Web Server : Tomcat
Tool kit : AndroidPhone
Database : My SQL
Java Version : J2SDK1.5
Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore
www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457

More Related Content

What's hot (19)

PDF
Review on Key Based Encryption Scheme for Secure Data Sharing on Cloud
IRJET Journal
 
PDF
C017421624
IOSR Journals
 
PDF
IRJET- Privacy Preserving Cloud Storage based on a Three Layer Security M...
IRJET Journal
 
PDF
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET Journal
 
PDF
Ijariie1196
IJARIIE JOURNAL
 
PDF
A Privacy Preserving Three-Layer Cloud Storage Scheme Based On Computational ...
IJSRED
 
PDF
Security Check in Cloud Computing through Third Party Auditor
ijsrd.com
 
PDF
Privacy Preserving in Cloud Using Distinctive Elliptic Curve Cryptosystem (DECC)
ElavarasaN GanesaN
 
PDF
5.[40 44]enhancing security in cloud computing
Alexander Decker
 
PDF
Ieeepro techno solutions 2014 ieee java project -key-aggregate cryptosystem...
hemanthbbc
 
PDF
J018145862
IOSR Journals
 
PDF
Ijarcet vol-2-issue-3-951-956
Editor IJARCET
 
PDF
Attribute-Based Data Sharing
IJERA Editor
 
PDF
Data Leakage Detection and Security Using Cloud Computing
IJERA Editor
 
PDF
Improved Data Integrity Protection Regenerating-Coding Based Cloud Storage
IJSRD
 
PDF
Secret keys and the packets transportation for privacy data forwarding method...
eSAT Journals
 
PDF
Secret keys and the packets transportation for privacy data forwarding method...
eSAT Publishing House
 
PDF
Hindering data theft attack through fog computing
eSAT Publishing House
 
PDF
Control Cloud Data Access Using Attribute-Based Encryption
paperpublications3
 
Review on Key Based Encryption Scheme for Secure Data Sharing on Cloud
IRJET Journal
 
C017421624
IOSR Journals
 
IRJET- Privacy Preserving Cloud Storage based on a Three Layer Security M...
IRJET Journal
 
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET Journal
 
Ijariie1196
IJARIIE JOURNAL
 
A Privacy Preserving Three-Layer Cloud Storage Scheme Based On Computational ...
IJSRED
 
Security Check in Cloud Computing through Third Party Auditor
ijsrd.com
 
Privacy Preserving in Cloud Using Distinctive Elliptic Curve Cryptosystem (DECC)
ElavarasaN GanesaN
 
5.[40 44]enhancing security in cloud computing
Alexander Decker
 
Ieeepro techno solutions 2014 ieee java project -key-aggregate cryptosystem...
hemanthbbc
 
J018145862
IOSR Journals
 
Ijarcet vol-2-issue-3-951-956
Editor IJARCET
 
Attribute-Based Data Sharing
IJERA Editor
 
Data Leakage Detection and Security Using Cloud Computing
IJERA Editor
 
Improved Data Integrity Protection Regenerating-Coding Based Cloud Storage
IJSRD
 
Secret keys and the packets transportation for privacy data forwarding method...
eSAT Journals
 
Secret keys and the packets transportation for privacy data forwarding method...
eSAT Publishing House
 
Hindering data theft attack through fog computing
eSAT Publishing House
 
Control Cloud Data Access Using Attribute-Based Encryption
paperpublications3
 

Viewers also liked (16)

PDF
HSHP Research GRID co-linking
Gordon M. Groat
 
PPTX
Fotografia Ambiental - Araucária
Mariana Nunes
 
PDF
Bien doi khi hau48
Phi Phi
 
PPTX
Práctica 1. portafolio diagnóstico
Montserrat Alvarez Berrocal
 
DOCX
Scripteam - Medical transcription company
Sciprteam
 
PDF
Altech NuPay Authenticated Product brochure
Kyle Botha
 
PDF
Mma For Turkey V1
didemtopuz
 
PDF
Bien doi khi hau24
Phi Phi
 
PDF
Dell jort kollerie
BigDataExpo
 
DOCX
Plan de-negocio
kafequ
 
PPTX
La actividad-financiera
Gabriel Vilchez
 
PDF
Modelagens malharia - 2ª entrada verão 2017
Marles Indústria Têxtil e Comércio Ltda.
 
PPT
Charla fertilizacion en mashua
Inveracero Sac
 
PDF
Como Montar seu Negócio Próprio - Flávio de Almeida
Filiphe Amorim
 
PPT
01 2012 Nancy Bush
M Gallery of Fine Art
 
DOC
Roteiro de aula prática de Biologia Celular
Nathália Vasconcelos
 
HSHP Research GRID co-linking
Gordon M. Groat
 
Fotografia Ambiental - Araucária
Mariana Nunes
 
Bien doi khi hau48
Phi Phi
 
Práctica 1. portafolio diagnóstico
Montserrat Alvarez Berrocal
 
Scripteam - Medical transcription company
Sciprteam
 
Altech NuPay Authenticated Product brochure
Kyle Botha
 
Mma For Turkey V1
didemtopuz
 
Bien doi khi hau24
Phi Phi
 
Dell jort kollerie
BigDataExpo
 
Plan de-negocio
kafequ
 
La actividad-financiera
Gabriel Vilchez
 
Modelagens malharia - 2ª entrada verão 2017
Marles Indústria Têxtil e Comércio Ltda.
 
Charla fertilizacion en mashua
Inveracero Sac
 
Como Montar seu Negócio Próprio - Flávio de Almeida
Filiphe Amorim
 
01 2012 Nancy Bush
M Gallery of Fine Art
 
Roteiro de aula prática de Biologia Celular
Nathália Vasconcelos
 
Ad

Similar to Secure distributed deduplication systems with improved reliability (20)

DOCX
Secure auditing and deduplicating data in cloud
Pvrtechnologies Nellore
 
PDF
Secure Deduplication with Efficient and Reliable Dekey Management with the Pr...
paperpublications3
 
DOCX
2015 16 java titles
Pvrtechnologies Nellore
 
PDF
Methodology for Optimizing Storage on Cloud Using Authorized De-Duplication –...
IRJET Journal
 
PDF
Ijaiem 2014-11-30-122
Sathya Madhesh
 
PPTX
Secure_Data_Deduplication_Presentation.pptx
syedmujeeburrahman07
 
PDF
Secure Data Sharing in Cloud Computing using Revocable Storage Identity- Base...
rahulmonikasharma
 
PDF
IRJET- Security Enhance using Hash and Chaostic Algorithm in Cloud
IRJET Journal
 
PDF
IRJET- Security Enhance using Hash and Chaostic Algorithm in Cloud
IRJET Journal
 
PDF
Improving Data Storage Security in Cloud using Hadoop
IJERA Editor
 
PPTX
Presentation (6).pptx
MSMuthu5
 
PDF
A hybrid cloud approach for secure authorized
Ninad Samel
 
PDF
THE SURVEY ON REFERENCE MODEL FOR OPEN STORAGE SYSTEMS INTERCONNECTION MASS S...
IRJET Journal
 
PDF
Deduplication on Encrypted Big Data in HDFS
IRJET Journal
 
PDF
IRJET- Secure Data Deduplication and Auditing for Cloud Data Storage
IRJET Journal
 
PDF
IRJET- Data Deduplication Security with Dynamic Ownership Management
IRJET Journal
 
PDF
iaetsd Controlling data deuplication in cloud storage
Iaetsd Iaetsd
 
PDF
Improved deduplication with keys and chunks in HDFS storage providers
IRJET Journal
 
PDF
IRJET- Cloud based Deduplication using Middleware Approach
IRJET Journal
 
PPTX
Secure deduplicaton with efficient and reliable convergent
Jayakrishnan U
 
Secure auditing and deduplicating data in cloud
Pvrtechnologies Nellore
 
Secure Deduplication with Efficient and Reliable Dekey Management with the Pr...
paperpublications3
 
2015 16 java titles
Pvrtechnologies Nellore
 
Methodology for Optimizing Storage on Cloud Using Authorized De-Duplication –...
IRJET Journal
 
Ijaiem 2014-11-30-122
Sathya Madhesh
 
Secure_Data_Deduplication_Presentation.pptx
syedmujeeburrahman07
 
Secure Data Sharing in Cloud Computing using Revocable Storage Identity- Base...
rahulmonikasharma
 
IRJET- Security Enhance using Hash and Chaostic Algorithm in Cloud
IRJET Journal
 
IRJET- Security Enhance using Hash and Chaostic Algorithm in Cloud
IRJET Journal
 
Improving Data Storage Security in Cloud using Hadoop
IJERA Editor
 
Presentation (6).pptx
MSMuthu5
 
A hybrid cloud approach for secure authorized
Ninad Samel
 
THE SURVEY ON REFERENCE MODEL FOR OPEN STORAGE SYSTEMS INTERCONNECTION MASS S...
IRJET Journal
 
Deduplication on Encrypted Big Data in HDFS
IRJET Journal
 
IRJET- Secure Data Deduplication and Auditing for Cloud Data Storage
IRJET Journal
 
IRJET- Data Deduplication Security with Dynamic Ownership Management
IRJET Journal
 
iaetsd Controlling data deuplication in cloud storage
Iaetsd Iaetsd
 
Improved deduplication with keys and chunks in HDFS storage providers
IRJET Journal
 
IRJET- Cloud based Deduplication using Middleware Approach
IRJET Journal
 
Secure deduplicaton with efficient and reliable convergent
Jayakrishnan U
 
Ad

More from Pvrtechnologies Nellore (20)

DOCX
A High Throughput List Decoder Architecture for Polar Codes
Pvrtechnologies Nellore
 
DOCX
Performance/Power Space Exploration for Binary64 Division Units
Pvrtechnologies Nellore
 
DOCX
Hybrid LUT/Multiplexer FPGA Logic Architectures
Pvrtechnologies Nellore
 
DOCX
Input-Based Dynamic Reconfiguration of Approximate Arithmetic Units for Video...
Pvrtechnologies Nellore
 
DOCX
2016 2017 ieee matlab project titles
Pvrtechnologies Nellore
 
DOCX
2016 2017 ieee vlsi project titles
Pvrtechnologies Nellore
 
DOCX
2016 2017 ieee ece embedded- project titles
Pvrtechnologies Nellore
 
DOCX
A High-Speed FPGA Implementation of an RSD-Based ECC Processor
Pvrtechnologies Nellore
 
DOCX
6On Efficient Retiming of Fixed-Point Circuits
Pvrtechnologies Nellore
 
DOCX
Pre encoded multipliers based on non-redundant radix-4 signed-digit encoding
Pvrtechnologies Nellore
 
DOCX
Quality of-protection-driven data forwarding for intermittently connected wir...
Pvrtechnologies Nellore
 
DOC
11.online library management system
Pvrtechnologies Nellore
 
DOC
06.e voting system
Pvrtechnologies Nellore
 
DOCX
New web based projects list
Pvrtechnologies Nellore
 
DOCX
Power controlled medium access control
Pvrtechnologies Nellore
 
DOCX
IEEE PROJECTS LIST
Pvrtechnologies Nellore
 
DOCX
Control cloud-data-access-privilege-and-anonymity-with-fully-anonymous-attrib...
Pvrtechnologies Nellore
 
DOCX
Control cloud data access privilege and anonymity with fully anonymous attrib...
Pvrtechnologies Nellore
 
DOCX
Cloud keybank privacy and owner authorization
Pvrtechnologies Nellore
 
DOCX
Circuit ciphertext policy attribute-based hybrid encryption with verifiable
Pvrtechnologies Nellore
 
A High Throughput List Decoder Architecture for Polar Codes
Pvrtechnologies Nellore
 
Performance/Power Space Exploration for Binary64 Division Units
Pvrtechnologies Nellore
 
Hybrid LUT/Multiplexer FPGA Logic Architectures
Pvrtechnologies Nellore
 
Input-Based Dynamic Reconfiguration of Approximate Arithmetic Units for Video...
Pvrtechnologies Nellore
 
2016 2017 ieee matlab project titles
Pvrtechnologies Nellore
 
2016 2017 ieee vlsi project titles
Pvrtechnologies Nellore
 
2016 2017 ieee ece embedded- project titles
Pvrtechnologies Nellore
 
A High-Speed FPGA Implementation of an RSD-Based ECC Processor
Pvrtechnologies Nellore
 
6On Efficient Retiming of Fixed-Point Circuits
Pvrtechnologies Nellore
 
Pre encoded multipliers based on non-redundant radix-4 signed-digit encoding
Pvrtechnologies Nellore
 
Quality of-protection-driven data forwarding for intermittently connected wir...
Pvrtechnologies Nellore
 
11.online library management system
Pvrtechnologies Nellore
 
06.e voting system
Pvrtechnologies Nellore
 
New web based projects list
Pvrtechnologies Nellore
 
Power controlled medium access control
Pvrtechnologies Nellore
 
IEEE PROJECTS LIST
Pvrtechnologies Nellore
 
Control cloud-data-access-privilege-and-anonymity-with-fully-anonymous-attrib...
Pvrtechnologies Nellore
 
Control cloud data access privilege and anonymity with fully anonymous attrib...
Pvrtechnologies Nellore
 
Cloud keybank privacy and owner authorization
Pvrtechnologies Nellore
 
Circuit ciphertext policy attribute-based hybrid encryption with verifiable
Pvrtechnologies Nellore
 

Recently uploaded (20)

DOCX
Python coding for beginners !! Start now!#
Rajni Bhardwaj Grover
 
PDF
POV_ Why Enterprises Need to Find Value in ZERO.pdf
darshakparmar
 
PDF
IoT-Powered Industrial Transformation – Smart Manufacturing to Connected Heal...
Rejig Digital
 
PDF
Reverse Engineering of Security Products: Developing an Advanced Microsoft De...
nwbxhhcyjv
 
PDF
Biography of Daniel Podor.pdf
Daniel Podor
 
PPTX
WooCommerce Workshop: Bring Your Laptop
Laura Hartwig
 
PDF
July Patch Tuesday
Ivanti
 
PDF
Exolore The Essential AI Tools in 2025.pdf
Srinivasan M
 
PDF
CIFDAQ Market Insights for July 7th 2025
CIFDAQ
 
PPTX
COMPARISON OF RASTER ANALYSIS TOOLS OF QGIS AND ARCGIS
Sharanya Sarkar
 
PDF
"Beyond English: Navigating the Challenges of Building a Ukrainian-language R...
Fwdays
 
PDF
Transcript: New from BookNet Canada for 2025: BNC BiblioShare - Tech Forum 2025
BookNet Canada
 
DOCX
Cryptography Quiz: test your knowledge of this important security concept.
Rajni Bhardwaj Grover
 
PDF
Transforming Utility Networks: Large-scale Data Migrations with FME
Safe Software
 
PDF
Empower Inclusion Through Accessible Java Applications
Ana-Maria Mihalceanu
 
PDF
New from BookNet Canada for 2025: BNC BiblioShare - Tech Forum 2025
BookNet Canada
 
PPTX
AI Penetration Testing Essentials: A Cybersecurity Guide for 2025
defencerabbit Team
 
PDF
"AI Transformation: Directions and Challenges", Pavlo Shaternik
Fwdays
 
PPTX
The Project Compass - GDG on Campus MSIT
dscmsitkol
 
PPTX
OpenID AuthZEN - Analyst Briefing July 2025
David Brossard
 
Python coding for beginners !! Start now!#
Rajni Bhardwaj Grover
 
POV_ Why Enterprises Need to Find Value in ZERO.pdf
darshakparmar
 
IoT-Powered Industrial Transformation – Smart Manufacturing to Connected Heal...
Rejig Digital
 
Reverse Engineering of Security Products: Developing an Advanced Microsoft De...
nwbxhhcyjv
 
Biography of Daniel Podor.pdf
Daniel Podor
 
WooCommerce Workshop: Bring Your Laptop
Laura Hartwig
 
July Patch Tuesday
Ivanti
 
Exolore The Essential AI Tools in 2025.pdf
Srinivasan M
 
CIFDAQ Market Insights for July 7th 2025
CIFDAQ
 
COMPARISON OF RASTER ANALYSIS TOOLS OF QGIS AND ARCGIS
Sharanya Sarkar
 
"Beyond English: Navigating the Challenges of Building a Ukrainian-language R...
Fwdays
 
Transcript: New from BookNet Canada for 2025: BNC BiblioShare - Tech Forum 2025
BookNet Canada
 
Cryptography Quiz: test your knowledge of this important security concept.
Rajni Bhardwaj Grover
 
Transforming Utility Networks: Large-scale Data Migrations with FME
Safe Software
 
Empower Inclusion Through Accessible Java Applications
Ana-Maria Mihalceanu
 
New from BookNet Canada for 2025: BNC BiblioShare - Tech Forum 2025
BookNet Canada
 
AI Penetration Testing Essentials: A Cybersecurity Guide for 2025
defencerabbit Team
 
"AI Transformation: Directions and Challenges", Pavlo Shaternik
Fwdays
 
The Project Compass - GDG on Campus MSIT
dscmsitkol
 
OpenID AuthZEN - Analyst Briefing July 2025
David Brossard
 

Secure distributed deduplication systems with improved reliability

  • 1. Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore www.pvrtechnology.com, E-Mail: [email protected], Ph: 81432 71457 SECURE DISTRIBUTED DEDUPLICATION SYSTEMS WITH IMPROVED RELIABILITY ABSTRACT Data deduplication is a technique for eliminating duplicate copies of data, and has been widely used in cloud storage to reduce storage space and upload bandwidth. However, there is only one copy for each file stored in cloud even if such a file is owned by a huge number of users. As a result, deduplication system improves storage utilization while reducing reliability. Furthermore, the challenge of privacy for sensitive data also arises when they are outsourced by users to cloud. Aiming to address the above security challenges, this paper makes the first attempt to formalize the notion of distributed reliable deduplication system. We propose new distributed deduplication systems with higher reliability in which the data chunks are distributed across multiple cloud servers. The security requirements of data confidentiality and tag consistency are also achieved by introducing a deterministic secret sharing scheme in distributed storage systems, instead of using convergent encryption as in previous deduplication systems. Security analysis demonstrates that our deduplication systems are secure in terms of the definitions specified in the proposed security model. As a proof of concept, we implement the proposed systems and demonstrate that the incurred overhead is very limited in realistic environments. MODULEDESCRIPTION: NUMBER OF MODULES: After careful analysis the system has been identified to have the following modules:
  • 2. Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore www.pvrtechnology.com, E-Mail: [email protected], Ph: 81432 71457 1. Secure Deduplication 2. User Behavior Profiling: 3.Decoy documents. 1. Secure Deduplication: Data deduplication is a specialized data compression technique for eliminating duplicate copies of repeating data. Related and somewhat synonymous terms are intelligent (data) compression and single-instance (data) storage. This technique is used to improve storage utilization and can also be applied to network data transfers to reduce the number of bytes that must be sent. In the deduplication process, unique chunks of data, or byte patterns, are identified and stored during a process of analysis. As the analysis continues, other chunks are compared to the stored copy and whenever a match occurs, the redundant chunk is replaced with a small reference that points to the stored chunk. Given that the same byte pattern may occur dozens, hundreds, or even thousands of times (the match frequency is dependent on the chunk
  • 3. Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore www.pvrtechnology.com, E-Mail: [email protected], Ph: 81432 71457 size), the amount of data that must be stored or transferred can be greatly reduced. This type of deduplication is different from that performed by standard file-compression tools, such as LZ77 and LZ78. Whereas these tools identify short repeated substrings inside individual files, the intent of storage-based data deduplication is to inspect large volumes of data and identify large sections – such as entire files or large sections of files – that are identical, in order to store only one copy of it. This copy may be additionally compressed by single-file compression techniques. For example a typical email system might contain 100 instances of the same 1 MB (megabyte) file attachment. Each time the email platform is backed up, all 100 instances of the attachment are saved, requiring 100 MB storage space. 2. User Behavior Profiling:
  • 4. Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore www.pvrtechnology.com, E-Mail: [email protected], Ph: 81432 71457 We monitor data access in the cloud and detect abnormal data access patterns User profiling is a well known Technique that can be applied here to model how, when, and how much a user accesses their information in the Cloud. Such ‘normal user’ behavior can be continuously checked to determine whether abnormal access to a user’s information is occurring. This method of behavior-based security is commonly used in fraud detection applications. Such profiles would naturally include volumetric information, how many documents are typically read and how often. We monitor for abnormal search behaviors that exhibit deviations from the user baseline the correlation of search behavior anomaly detection with trap-based decoy files should provide stronger evidence of malfeasance, and therefore improve adetector’saccuracy. 3.Decoy documents. We propose a different approach for securing data in the cloud using offensive decoy technology. We monitor data access in the cloud and detect abnormal data access patterns. We launch a disinformation attack by returning large amounts of decoy information to the attacker. This protects against the misuse of the user’s real data. We use this technology to launch disinformation attacks against malicious insiders, preventing them from distinguishing the real sensitive customer data from fake worthlessdata the decoys,then,serve twopurposes: (1) Validatingwhetherdataaccessis authorizedwhenabnormalinformationaccessisdetected,and (2) Confusingthe attackerwithbogusinformation.
  • 5. Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore www.pvrtechnology.com, E-Mail: [email protected], Ph: 81432 71457 EXISTING SYSTEM The various kinds of data for each user stored in the cloud and the demand of long term continuous assurance of their data safety, the problem of verifying correctness of data storage in the cloud becomes even more challenging. Cloud Computing is not just a third party data warehouse. The data stored in the cloud may be frequently updated by the users, including insertion, deletion, modification, appending, reordering, etc. One critical challenge of today’s cloud storage services is the management of the ever-increasing volume of data. According to the analysis report of IDC, the volume of data in the wild is expected to reach 40 trillion gigabytes in 2020. The baseline approach suffers two critical deployment issues. First, it is inefficient, as it will generate an enormous number of keys with the increasing number of users. Specifically, each user must associate an encrypted convergent key with each block of its outsourced encrypted data copies, so as to later restore the data copies. Although different users may share the same data copies, they must have their own set of convergent keys so that no other users can access their files. Second, the baseline approach is unreliable, as it requires each user to dedicatedly protect his own master key. If the master key is accidentally lost, then the user data cannot be recovered; if it is compromised by attackers, then the user data will be leaked. . PROPOSED SYSTEM:
  • 6. Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore www.pvrtechnology.com, E-Mail: [email protected], Ph: 81432 71457 We propose Dekey, a new construction in which users do not need to manage any keys on their own but instead securely distribute the convergent key shares across multiple servers. Dekey using the Ramp secret sharing scheme and demonstrate that Dekey incurs limited overhead in realistic environments we propose a new construction called Dekey, which provides efficiency and reliability guarantees for convergent key management on both user and cloud storage sides. A new construction Dekey is proposed to provide efficient and reliable convergent key management through convergent key Deduplication and secret sharing. Dekey supports both file-level Deduplication. Security analysis demonstrates that Dekey is secure in terms of the definitions specified in the proposed security model. In particular, Dekey remains secure even the adversary controls a limited number of key servers. We implement Dekey using the secret sharing scheme that enables the key management to adapt to different reliability and confidentiality levels.
  • 7. Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore www.pvrtechnology.com, E-Mail: [email protected], Ph: 81432 71457 Our evaluation demonstrates that Dekey incurs limited overhead in normal upload/download operations in realistic cloud environments. The advantages of placing decoys in a file system are threefold: (1) The detection of masquerade activity. (2) The confusion of the attacker and the additional costs incurred to distinguish real from bogus information, and (3) The deterrence effect which, although hard to measure, plays a significant role in preventing masquerade activity by risk-averse attackers. System Configuration: HARDWARE REQUIREMENTS: Hardware - Pentium Speed - 1.1 GHz
  • 8. Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore www.pvrtechnology.com, E-Mail: [email protected], Ph: 81432 71457 RAM - 1GB Hard Disk - 20 GB KeyBoard - Standard WindowsKeyboard Mouse - Two or Three ButtonMouse Monitor - SVGA SOFTWARE REQUIREMENTS: OperatingSystem : Windows Technology : Java and J2EE Web Technologies : Html,JavaScript,CSS IDE : My Eclipse Web Server : Tomcat Tool kit : AndroidPhone Database : My SQL Java Version : J2SDK1.5
  • 9. Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore www.pvrtechnology.com, E-Mail: [email protected], Ph: 81432 71457