Protected Deduplication of Data using Hybrid Cloud
|
|
- Marion Bryant
- 8 years ago
- Views:
Transcription
1 Protected Deduplication of Data using Hybrid Cloud 1 B.NAVEEN, 2 V.SRINIVAS 1 M.Tech Student, Department of CSE, Aurora s Scientific Technological and Research Academy, Bandlaguda, Hyderabad. naveenbandari75@gmail.com 2 Associate Professor, Department of CSE, Aurora s Scientific Technological and Research Academy, Bandlaguda, Hyderabad. srinivassai1549@gmail.com ABSTRACT Information deduplication is one of essential information pressure strategies for wiping out copy duplicates of rehashing information, what's more, has been broadly utilized as a part of distributed storage to diminish the measure of storage room and spare data transmission. To secure the privacy of touchy information while supporting deduplication, the united encryption system has been proposed to scramble the information some time recently outsourcing. To better ensure information security, this paper makes the first endeavor to formally address the issue of approved information deduplication. Not the same as conventional deduplication frameworks, the differential benefits of clients are further considered in copy check other than the information itself. We additionally introduce a few new deduplication developments supporting approved copy check in a cross breed cloud construction modeling. Security investigation shows that our plan is secure as far as the definitions determined in the proposed security model. As a proof of idea, we execute a model of our proposed approved copy check plan and lead testbed examinations utilizing our model. We demonstrate that our proposed approved copy check plan brings about insignificant overhead contrasted with ordinary operations. Index Terms Deduplication, approved copy check, classification, mixture cloud 1.INTRODUCTION: Today's cloud administration suppliers offer both very accessible capacity and hugely parallel registering assets at generally low expenses. As distributed computing gets to be common, an expanding measure of information is being put away in the cloud and imparted by clients to indicated benefits, which characterize the entrance privileges of the put away information. One basic test of distributed storage administrations is the administration of the regularly expanding volume of information. To make information administration adaptable in distributed computing, deduplication has been a surely understood procedure what's more, has pulled in more consideration as of late. Information deduplication is a specific information pressure strategy for wiping out copy duplicates of rehashing information away. The strategy is utilized to enhance stockpiling use and can likewise be connected to network information exchanges to diminish the quantity of bytes that must be sent. In spite of the fact that information deduplication brings a great deal of advantages, security and protection concerns emerge as clients' delicate information are helpless to both insider and outcast assaults. Conventional encryption, while giving information privacy, is incongruent with information deduplication. In particular, customary encryption requires distinctive clients to encode their information with their own keys. Therefore, indistinguishable information duplicates of distinctive clients will prompt diverse ciphertexts, making deduplication unthinkable. Focalized encryption has been proposed to uphold information secrecy while making deduplication doable. It encodes/decodes an information duplicate with a joined
2 key, which is gotten by registering the cryptographic hash esteem of the substance of the information duplicate. After key era what's more, information encryption, clients hold the keys and send the ciphertext to the cloud. Since the encryption operation is deterministic and is gotten from the information content, indistinguishable information duplicates will create the same focalized key what's more, subsequently the same ciphertext. To avert unapproved access, a protected confirmation of possession convention is moreover expected to give the verification that the client to be sure claims the same document when a copy is found. After the confirmation, ensuing clients with the same document will be given a pointer from the server without expecting to transfer the same document. A client can download the scrambled document with the pointer from the server, which must be unscrambled by the comparing information proprietors with their concurrent keys. In this way, concurrent encryption permits the cloud to perform deduplication on the ciphertexts and the evidence of proprietorship keeps the unapproved client to get to the document. 2.RELATEDWORK: In past deduplication frameworks can't bolster differential approval duplicatecheck, which is vital in numerous applications. In such an approved deduplication framework, every client is issued an arrangement of benefits amid framework instatement. The review of the cloud deduplication is as take after: A. Post-Process Deduplication With post-process deduplication, new learning is introductory continue the gadget thus a system at a later time can examine the data aching for duplication. The benefit is that there is no got the chance to look for the hash figurings and operation to be finished before putting away the data in this way verifying store execution isn't corrupted. Executions giving policybased operation will give clients the ability to concede change on "dynamic" records, or to technique documents upheld kind and position. One potential drawback is that you just could pointlessly store copy learning for a brief time that is an issue if the capacity framework is near full ability. B.In-Line Deduplication This is the technique wherever the deduplication hash computations zone unit made on the objective gadget in light of the fact that the information enters the gadget continuously. On the off chance that the gadget spots a square that it as of now put away on the framework it does n't store the new piece, essentially references to the overarching piece. The advantage of in-line deduplication over post-process deduplication is that it needs less capacity as information isn't copied. On the negative viewpoint, it's oft contended that as a consequence of hash estimations and lookups takes farewell, it will imply that the data uptake is slower consequently lessening the reinforcement yield of the gadget. Notwithstanding, beyond any doubt sellers with in-line deduplication have incontestible instrumentality with comparative execution to their post-process deduplication partners. Post-process and in-line deduplication ways zone unit for the most part intensely bantered about. C.Source Versus Target Deduplication Another approach to consider information deduplication is by wherever it happens. At the point when the deduplication happens close wherever information is shaped, it's generally said as "source deduplication." once it happens near wherever the data is keep, it's typically known as "target deduplication." supply deduplication guarantees that learning on the information supply is deduplicated. This for the most part happens specifically at interims an arrangement framework. The order framework can sporadically filter new records making hashes and contrast them with hashes of existing documents. At the point when records with same hashes square measure discovered then the document duplicate is uprooted furthermore the new record focuses to the past document. not
3 care for depleting connections but rather, copied records square measure considered to be particular substances and if one amongst the copied documents is later changed, then utilizing a framework alluded to as Copyon-compose an imitation of that document or altered piece is shaped. The deduplication system is straightforward to the clients and reinforcement applications. Going down a deduplicated recording framework can regularly make duplication happen prompting the reinforcements being bigger than the supply data. Target deduplication is that the strategy for evacuating copies of learning inside of the auxiliary store. In a few executions, the conviction is made that if the distinguishing proof is indistinguishable, the data is indistinguishable, despite the fact that this can not be genuine everything considered cases on account of the compartment guideline; elective usage don't expect that two pieces of learning with the same image square measure indistinguishable, however truly check that data with indistinguishable recognizable proof is indistinguishable. On the off chance that the bundle either expect that a given distinguishing proof as of now exists inside of the deduplication namespace or truly confirms the character of the two squares of information, contingent upon the usage, then it'll supplant that copy lump with a connection. Once the data has been deduplicated, upon sweep back of the record, where a connection is found, the framework only replaces that connection with the archived data piece. The deduplication system is intended to be straightforward to complete clients and applications. 3.PROPOSED SOLUTION: The convergent encryption strategy has been proposed to encode the information before outsourcing. To better ensure information security, this paper makes the first endeavor to formally address the issue of approved information deduplication. Not quite the same as conventional deduplication frameworks, the differential benefits of clients are further considered in copy check other than the information itself.we likewise show a few new deduplication developments supporting approved copy check in a half and half cloud structural engineering. Security examination shows that our plan is secure regarding the definitions indicated in the proposed security model. As a proof of idea, we actualize a model of our proposed approved copy check plan and direct testbed analyses utilizing our model. We demonstrate that our proposed approved copy check plan brings about insignificant overhead contrasted with ordinary operations. 4. IMPLEMENTATION ISSUES We actualize a model of the proposed approved deduplication framework, in which we show three substances as discrete C++ programs. A Client project is utilized to model the information clients to do the document transfer process. A Private Server system is utilized to show the private cloud which deals with the private keys and handles the document token calculation. A Storage Server system is utilized to display the S-CSP which stores and deduplicates documents. We execute cryptographic operations of hashing furthermore, encryption with the OpenSSL library. We additionally actualize the correspondence between the substances based on HTTP, utilizing GNU Libmicrohttpd and libcurl. Therefore, clients can issue HTTP Post solicitations to the servers. Our usage of the Client gives the accompanying capacity calls to bolster token era and deduplication along the record transfer process. FileTag(File) - It computes SHA-1 hash of the File as File Tag; TokenReq(Tag, UserID) - It requests the Private Server for File Token generation with the File Tag and User ID; DupCheckReq(Token) - It requests the Storage Server for Duplicate Check of the File by sending the file token received from private server; ShareTokenReq(Tag, {Priv.}) - It requests the Private Server to generate the Share File Token with the File Tag and Target Sharing Privilege Set; FileEncrypt(File) - It encrypts the File with Convergent Encryption using 256-bit AES algorithm in cipher block chaining (CBC) mode, where the convergent key is from SHA-256 Hashing of the file; and FileUploadReq(FileID, File, Token) It uploads the File Data to the Storage Server if the file is Unique and updates the File Token stored.
4 We plan and execute another framework which could ensure the security for predicatable message. The fundamental thought of our strategy is that the novel encryption key era calculation. For effortlessness, we will utilize the hash capacities to characterize the label era capacities what's more, merged keys in this area. In conventional united encryption, to bolster copy check, the ey is gotten from the document F by utilizing some cryptographic hash capacity kf = H (F ). To dodge the deterministic key era, the encryption key kf for record F in our framework will be produced with the guide of the private key cloud server with benefit key kp. The encryption key can be seen as the type of k F,p = H0 (H (F ), kp ) H2 (F ), where H0, H and H2 are all cryptographic hash capacities. The record F is scrambled with another key k, while k will be encoded with kf,p. Along these lines, both the private cloud server and S-CSP can't decode the ciphertext. Besides, it is semantically secure to the S-CSP based on the security of symmetric encryption. For S-CSP, if the record is unpredicatable, then it is semantically secure. 5 EXPERIMENTS 5.1 Experimental Results: To evaluate the deduplication's effect extent, we get prepared two intriguing data sets, each of which contains MB records. We first exchange the first set as a beginning exchange. For the second exchange, we pick a fragment of 50 archives, as demonstrated by the given deduplication extent, from the early on set as duplicate records and remaining reports from the second set as exceptional records. The ordinary time of exchanging the second set is shown in Fig. 4. As exchanging and encryption would be skipped if there ought to emerge an event of duplicate records, the time spent on them two decreases with growing deduplication extent. The time spent on duplicate check in like manner reduces as the looking would be done when duplicate is found. Total time spent on exchanging the record with deduplication extent at 100 percent is only 33.5 percent with unprecedented archives. To assess the impact of number of put away records in the framework, we transfer MB special documents to the framework furthermore, record the breakdown for each document transfer. From that each stride stays steady along the time. Token checking is finished with a hash table and a straight hunt would be done in the event of impact. Regardless of of the likelihood of a direct hunt, the time taken in copy check stays stable because of the low impact likelihood. To assess the impact of the deduplication proportion, we plan two remarkable information sets, each of which comprises of MB records. We first transfer the first set as an introductory transfer. For the second transfer, we pick a bit of 50 records, as indicated by the given deduplication proportion, from the introductory set as copy records and remaining documents from the second set as remarkable records. The normal time of transferring the second set is displayed in Figure 4. As transferring and encryption would be skipped if there should arise an occurrence of copy records, the time spent on them two abatements with expanding deduplication proportion. The time spent on copy check likewise diminishes as the looking would be finished when copy is found. Aggregate time spent on transferring the
5 record with deduplication proportion at 100% is just 33.5% with exceptional records. 6.CONCLUSION In this paper, the thought of affirmed data deduplication was proposed to guarantee the data security by including differential advantages of customers the duplicate check. We furthermore presented a couple of new deduplication advancements supporting endorsed duplicate say something cream cloud building configuration, in which the duplicate check tokens of archives are made by the private cloud server with private keys. Security examination demonstrates that our arrangements are secure in regards to insider and outcast attacks decided in the proposed security model. As a proof of thought, we completed a model of our proposed affirmed duplicate check arrangement and conduct testbed trials on our model. We demonstrated that our affirmed duplicate check arrangement realizes unimportant overhead appeared differently in relation to centered encryption and framework trade. REFERENCES [1] S. Halevi, D. Harnik, B. Pinkas, and A. Shulman-Peleg. Proofs of ownership in remote storage systems. In Y. Chen, G. Danezis, and V. Shmatikov, editors, ACM Conference on Computer and Communications Security, pages ACM, [2] P. Anderson and L. Zhang. Fast and secure laptop backups with encrypted de-duplication. In Proc. of USENIX LISA, [3] M. Bellare, S. Keelveedhi, and T. Ristenpart. Dupless: Serveraided encryption for deduplicated storage. In USENIX Security Symposium, [4] M. Bellare, S. Keelveedhi, and T. Ristenpart. Message-lockedencryption and secure deduplication. In EUROCRYPT, pages ,2013. [5] M. Bellare, C. Namprempre, and G. Neven. Security proofsfor identity-based identification and signature schemes. J. Cryptology, 22(1):1 61, [6] M. Bellare and A. Palacio. Gq and schnorr identification schemes: Proofs of security against impersonation under active and concurrent attacks. In CRYPTO, pages , [7] S. Bugiel, S. Nurnberger, A. Sadeghi, and T. Schneider. Twin clouds: An architecture for secure cloud computing. In Workshop on Cryptography and Security in Clouds (WCSC 2011), [8] J. R. Douceur, A. Adya, W. J. Bolosky, D. Simon, and M. Theimer. Reclaiming space from duplicate files in a serverless distributed file system. In ICDCS, pages , [9] D. Ferraiolo and R. Kuhn. Role-based access controls. In 15 th NIST-NCSC National Computer Security Conf., [10] GNU Libmicrohttpd. [10] M. W. Storer, K. Greenan, D. D. E. Long, and E. L. Miller. Secure data deduplication. In Proc. of StorageSS, [11] Z. Wilcox-O Hearn and B. Warner. Tahoe: the least-authority filesystem. In Proc. of ACM StorageSS, 2008.
A SIGNIFICANT REDUCTION OF CLOUD STORAGE BY ELIMINATION OF REPETITIVE DATA
INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND SCIENCE A SIGNIFICANT REDUCTION OF CLOUD STORAGE BY ELIMINATION OF REPETITIVE DATA M.Rajashekar Reddy 1, B.Ramya 2 1 M.Tech Student, Dept of
More informationOptimized And Secure Data Backup Solution For Cloud Using Data Deduplication
RESEARCH ARTICLE OPEN ACCESS Optimized And Secure Data Backup Solution For Cloud Using Data Deduplication Siva Ramakrishnan S( M.Tech ) 1,Vinoth Kumar P (M.E) 2 1 ( Department Of Computer Science Engineering,
More informationA Survey Paper on Secure Auditing and Maintaining Block Level Integrity with Reliability of Data in Cloud
A Survey Paper on Secure Auditing and Maintaining Block Level Integrity with Reliability of Data in Cloud Aishwarya R. Kumthekar 1, Prof. Jyoti Raghatwan 2 1 M.E. II Computer, aish275@gmail.com, 8806967523
More informationAdvanced HMAC Schemes for Hybrid Cloud Deduplication G. Siva Punyavathi 1, P. Neelima 2
Advanced HMAC Schemes for Hybrid Cloud Deduplication G. Siva Punyavathi 1, P. Neelima 2 1 M. Tech Student, Department of Computer Science and Engineering, S.R.K.R Engineering College, Bhimavaram, Andhra
More informationDATA SECURITY IN CLOUD USING ADVANCED SECURE DE-DUPLICATION
DATA SECURITY IN CLOUD USING ADVANCED SECURE DE-DUPLICATION Hasna.R 1, S.Sangeetha 2 1 PG Scholar, Dhanalakshmi Srinivasan College of Engineering, Coimbatore. 2 Assistant Professor, Dhanalakshmi Srinivasan
More informationREDUCED FILE HASH FOOT PRINTS FOR OPTIMIZED DEDUPLICATION IN CLOUD PLATFORMS
REDUCED FILE HASH FOOT PRINTS FOR OPTIMIZED DEDUPLICATION IN CLOUD PLATFORMS 1 M.JYOTHIRMAI, 2 Dr.K.THIRUPATHI RAO 1 Student, Department of Computer Science & Engineering, K L University, Vaddeswaram 2
More informationSURVEY ON DISTRIBUTED DEDUPLICATION SYSTEM WITH AUDITING AND IMPROVED RELIABILITY IN CLOUD Rekha R 1, ChandanRaj BR 2
SURVEY ON DISTRIBUTED DEDUPLICATION SYSTEM WITH AUDITING AND IMPROVED RELIABILITY IN CLOUD Rekha R 1, ChandanRaj BR 2 1 MTech, 4th Sem, Dept. Of Computer Science and Engineering EWIT, Bengaluru-91 2 Assistant
More informationSoftware as a Service, a Detailed Study on Challenges and Security Threats
Software as a Service, a Detailed Study on Challenges and Security Threats S.Kokila 1, T. Princess Raichel 2 1. Assistant Professor, Department of Computer Science and Engineering, Sreenivasa Institute
More informationAuthorized data deduplication check in hybrid cloud With Cluster as a Service
Authorized data deduplication check in hybrid cloud With Cluster as a Service X.ALPHONSEINBARAJ PG Scholar, Department of Computer Science and Engineering, Anna University, Coimbatore. Abstract Data deduplication
More informationSecure Hybrid Cloud Architecture for cloud computing
Secure Hybrid Cloud Architecture for cloud computing Amaresh K Sagar Student, Dept of Computer science and Eng LAEC Bidar Email Id: mr.amarsagar@gmail.com Sumangala Patil Associate prof and HOD Dept of
More informationData Deduplication Scheme for Cloud Storage
26 Data Deduplication Scheme for Cloud Storage 1 Iuon-Chang Lin and 2 Po-Ching Chien Abstract Nowadays, the utilization of storage capacity becomes an important issue in cloud storage. In this paper, we
More informationAn Authorized Duplicate Check Scheme for Removing Duplicate Copies of Repeating Data in The Cloud Environment to Reduce Amount of Storage Space
An Authorized Duplicate Check Scheme for Removing Duplicate Copies of Repeating Data in The Cloud Environment to Reduce Amount of Storage Space Jannu.Prasanna Krishna M.Tech Student, Department of CSE,
More informationImplementation of Data Sharing in Cloud Storage Using Data Deduplication
Implementation of Data Sharing in Cloud Storage Using Data Deduplication 1. M.JITHENDRA, 2. Dr. G.V.S.N.R.V. PRASAD M.S, Ph.D. 1. M.Tech, Department of CSE, Gudlavalleru Engineering College. 2. Professor
More informationPUBLIC ANALYZING FOR SHARED AND SECURE INFORMATION STORAGE IN CLOUD USING STEGANOGRAPHY
PUBLIC ANALYZING FOR SHARED AND SECURE INFORMATION STORAGE IN CLOUD USING STEGANOGRAPHY G.SHAIK ABDULLAH 1, B.MUTHULAKSHMI 2 1 2 Post Graduate Student, Assistant Professor 1&2 Department of Computer Science
More informationTITLE: Secure Auditing and Deduplicating Data in Cloud(Survey Paper)
TITLE: Secure Auditing and Deduplicating Data in Cloud(Survey Paper) Pratik Raut 1, Pratik Kamble 2, Prafull Pansare 3, Dipti Salunkhe 4 1 UG Student, Dept. of Computer Engineering, JSCOE, Hadapsar, Pune,
More informationA Survey on Secure Auditing and Deduplicating Data in Cloud
A Survey on Secure Auditing and Deduplicating Data in Cloud Tejaswini Jaybhaye 1 ; D. H. Kulkarni 2 PG Student, Dept. of Computer Engineering, SKNCOE, Pune, India 1 Assistant Professor, Dept. of Computer
More informationSecure Information Recovery for Decentralized Interruption Tolerant Defense Data Network
Secure Information Recovery for Decentralized Interruption Tolerant Defense Data Network Korra Bichya Abstract-Portable nodes in military environments, for example, a front line or an antagonistic area
More informationA Secure Decentralized Access Control Scheme for Data stored in Clouds
A Secure Decentralized Access Control Scheme for Data stored in Clouds Priyanka Palekar 1, Abhijeet Bharate 2, Nisar Anjum 3 1 SKNSITS, University of Pune 2 SKNSITS, University of Pune 3 SKNSITS, University
More informationRole Based Encryption with Efficient Access Control in Cloud Storage
Role Based Encryption with Efficient Access Control in Cloud Storage G. V. Bandewar 1, R. H. Borhade 2 1 Department of Information Technology, Sinhgad Technical Education Society s SKNCOE, Pune, India
More informationA secure two-phase data deduplication scheme
A secure two-phase data deduplication scheme Pierre Meye, Philippe Raipin, Frédéric Tronel, Emmanuelle Anceaume To cite this version: Pierre Meye, Philippe Raipin, Frédéric Tronel, Emmanuelle Anceaume.
More informationSecurity Saving Open Examining for Secure Cloud storage
ISSN (Online): 2349-7084 GLOBAL IMPACT FACTOR 0.238 INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING IN RESEARCH TRENDS VOLUME 1, ISSUE 3, SEPTEMBER 2014, PP 131-136 Security Saving Open Examining for Secure
More informationPERFORMANCE OF BALANCED STORAGE SERVICES IN CLOUD SYSTEM
INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND SCIENCE PERFORMANCE OF BALANCED STORAGE SERVICES IN CLOUD SYSTEM Byagari Kumar 1, K.Pradeep Kumar 2 1 M.Tech Student, Dept of CSE, RRS College
More informationStrengthen RFID Tags Security Using New Data Structure
International Journal of Control and Automation 51 Strengthen RFID Tags Security Using New Data Structure Yan Liang and Chunming Rong Department of Electrical Engineering and Computer Science, University
More informationReview On Deduplicating Data and Secure Auditing in Cloud
Review On Deduplicating Data and Secure Auditing in Cloud Mr.Satish Shelar 1, Prof.S.Y.Raut 2 1 Student ME CSE,PREC,Loni,Maharashtra,India 2 Asst.Professor,PREC,Loni, Maharashtra,India ---------------------------------------------------------------------***---------------------------------------------------------------------
More informationA FRAMEWORK FOR SECURE ACCESS OF HEALTH DATA WITH AUDIT ABILITY IN CLOUD
A FRAMEWORK FOR SECURE ACCESS OF HEALTH DATA WITH AUDIT ABILITY IN CLOUD Ch. Kousalya Devi 1, B Dada Khalande 2, G.Rama Subba Reddy 3 1 M.tech Scholar (CSE), 2 Asst.Professor, Dept. of CSE, Vignana Bharathi
More informationSecure cloud access system using JAR ABSTRACT:
Secure cloud access system using JAR ABSTRACT: Cloud computing enables highly scalable services to be easily consumed over the Internet on an as-needed basis. A major feature of the cloud services is that
More informationORUTA: SECRECY PRESERVING POPULACE INSPECTING FOR OUTSOURCED DATA IN CLOUD
ORUTA: SECRECY PRESERVING POPULACE INSPECTING FOR OUTSOURCED DATA IN CLOUD M.Babu 1, B V Suresh Reddy 2 1 Pursuing M.Tech (CSE), 2 Working as Assistant Professor (CSE), Nalanda Institute of Technology
More informationSecure Group Oriented Data Access Model with Keyword Search Property in Cloud Computing Environment
Secure Group Oriented Data Access Model with Keyword Search Property in Cloud Computing Environment Chih Hung Wang Computer Science and Information Engineering National Chiayi University Chiayi City 60004,
More informationMANAGING OF AUTHENTICATING PASSWORD BY MEANS OF NUMEROUS SERVERS
INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND SCIENCE MANAGING OF AUTHENTICATING PASSWORD BY MEANS OF NUMEROUS SERVERS Kanchupati Kondaiah 1, B.Sudhakar 2 1 M.Tech Student, Dept of CSE,
More informationIMPLEMENTATION OF RESPONSIBLE DATA STORAGE IN CONSISTENT CLOUD ENVIRONMENT
IJRRECS/November 2014/Volume-2/Issue-11/3699-3703 ISSN 2321-5461 INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE IMPLEMENTATION OF RESPONSIBLE DATA STORAGE IN CONSISTENT CLOUD
More informationPublic Auditing for Shared Data in the Cloud by Using AES
Public Auditing for Shared Data in the Cloud by Using AES 1 Syagamreddy Subbareddy, 2 P.Tejaswi, 3 D.Krishna 1 M.Tech(CSE) Pursuing, 2 Associate Professor, 3 Associate Professor,HOD, 1,2,3 Dept. of Computer
More informationEnsuring Data Storage Security in Cloud Computing By IP Address Restriction & Key Authentication
Ensuring Data Storage Security in Cloud Computing By IP Address Restriction & Key Authentication Sanjay Kumar Baghel Mtech Scholar, CSE, CSIT DURG Sanju5878@gmail.com Bhupesh Kumar Dewangan Assistant Professor,CSE,
More informationA Novel Way of Deduplication Approach for Cloud Backup Services Using Block Index Caching Technique
A Novel Way of Deduplication Approach for Cloud Backup Services Using Block Index Caching Technique Jyoti Malhotra 1,Priya Ghyare 2 Associate Professor, Dept. of Information Technology, MIT College of
More informationData Integrity by Aes Algorithm ISSN 2319-9725
Data Integrity by Aes Algorithm ISSN 2319-9725 Alpha Vijayan Nidhiya Krishna Sreelakshmi T N Jyotsna Shukla Abstract: In the cloud computing, data is moved to a remotely located cloud server. Cloud will
More informationSecuring Personal Health Records in Cloud Utilizing Multi Authority Attribute Based Encryption
ISSN (Online): 2349-7084 Securing Personal Health Records in Cloud Utilizing Multi Authority Attribute Based Encryption Meghana A 1, Gaddam Gowthami 2, Mahendrakar Kavitha Bai 3, M.Srilakshmi 4 Department
More informationA NOVEL APPROACH FOR MULTI-KEYWORD SEARCH WITH ANONYMOUS ID ASSIGNMENT OVER ENCRYPTED CLOUD DATA
A NOVEL APPROACH FOR MULTI-KEYWORD SEARCH WITH ANONYMOUS ID ASSIGNMENT OVER ENCRYPTED CLOUD DATA U.Pandi Priya 1, R.Padma Priya 2 1 Research Scholar, Department of Computer Science and Information Technology,
More informationLDA, the new family of Lortu Data Appliances
LDA, the new family of Lortu Data Appliances Based on Lortu Byte-Level Deduplication Technology February, 2011 Copyright Lortu Software, S.L. 2011 1 Index Executive Summary 3 Lortu deduplication technology
More informationSignature Amortization Technique for Authenticating Delay Sensitive Stream
Signature Amortization Technique for Authenticating Delay Sensitive Stream M Bruntha 1, Dr J. Premalatha Ph.D. 2 1 M.E., 2 Professor, Department of Information Technology, Kongu Engineering College, Perundurai,
More informationSECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD
Volume 1, Issue 7, PP:, JAN JUL 2015. SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD B ANNAPURNA 1*, G RAVI 2*, 1. II-M.Tech Student, MRCET 2. Assoc. Prof, Dept.
More informationHow To Secure Cloud Computing, Public Auditing, Security, And Access Control In A Cloud Storage System
REVIEW ARTICAL A Novel Privacy-Preserving Public Auditing and Secure Searchable Data Cloud Storage Dumala Harisha 1, V.Gouthami 2 1 Student, Computer Science & Engineering-Department, JNTU Hyderabad India
More informationAN EFFECTIVE STUDY ON IMPROVED DATA AUTHENTICATION IN CLOUD SYSTEM
INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND SCIENCE AN EFFECTIVE STUDY ON IMPROVED DATA AUTHENTICATION IN CLOUD SYSTEM Bairu Ravi 1, B.Ramya 2 1 M.Tech Student, Dept of CSE, Arjun College
More information(More) Side Channels in Cloud Storage
(More) Side Channels in Cloud Storage Linking Data to Users Tobias Pulls Department of Computer Science Karlstad University Karlstad, Sweden tobias.pulls@kau.se Abstract. Public cloud storage services
More informationISSN 2278-3091. Index Terms Cloud computing, outsourcing data, cloud storage security, public auditability
Outsourcing and Discovering Storage Inconsistencies in Cloud Through TPA Sumathi Karanam 1, GL Varaprasad 2 Student, Department of CSE, QIS College of Engineering and Technology, Ongole, AndhraPradesh,India
More informationAttribute Based Encryption with Privacy Preserving In Clouds
Attribute Based Encryption with Privacy Preserving In Clouds M. Suriyapriya 1, A. Joicy 2 PG Scholar 1 Assistant Professor CSE Department 2 St.Joseph College of Engineering Sriperumbudur, Chennai-602105
More informationSide channels in cloud services, the case of deduplication in cloud storage
Side channels in cloud services, the case of deduplication in cloud storage Danny Harnik IBM Haifa Research Lab dannyh@il.ibm.com Benny Pinkas Bar Ilan University benny@pinkas.net Alexandra Shulman-Peleg
More informationInternational Journal of Advance Research in Computer Science and Management Studies
Volume 2, Issue 11, November 2014 ISSN: 2321 7782 (Online) International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online
More informationSelective dependable storage services for providing security in cloud computing
Selective dependable storage services for providing security in cloud computing Gade Lakshmi Thirupatamma*1, M.Jayaram*2, R.Pitchaiah*3 M.Tech Scholar, Dept of CSE, UCET, Medikondur, Dist: Guntur, AP,
More informationSecurity of Cloud Storage: - Deduplication vs. Privacy
Security of Cloud Storage: - Deduplication vs. Privacy Benny Pinkas - Bar Ilan University Shai Halevi, Danny Harnik, Alexandra Shulman-Peleg - IBM Research Haifa 1 Remote storage and security Easy to encrypt
More informationEfficient Integrity Checking Technique for Securing Client Data in Cloud Computing
International Journal of Electrical & Computer Sciences IJECS-IJENS Vol: 11 No: 05 41 Efficient Integrity Checking Technique for Securing Client Data in Cloud Computing Abstract-- It has been widely observed
More informationDashlane Security Whitepaper
Dashlane Security Whitepaper November 2014 Protection of User Data in Dashlane Protection of User Data in Dashlane relies on 3 separate secrets: The User Master Password Never stored locally nor remotely.
More informationDistributed auditing mechanism in order to strengthen user s control over data in Cloud computing Environment
Distributed auditing mechanism in order to strengthen user s control over data in Cloud computing Environment Chandra Sekhar Murakonda M.Tech Student, Department of Computer Science Engineering, NRI Institute
More informationEFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY
EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY Siliveru Ashok kumar* S.G. Nawaz ## and M.Harathi # * Student of M.Tech, Sri Krishna Devaraya Engineering College, Gooty # Department
More informationCHAPTER 1 INTRODUCTION
1 CHAPTER 1 INTRODUCTION 1.1 Introduction Cloud computing as a new paradigm of information technology that offers tremendous advantages in economic aspects such as reduced time to market, flexible computing
More informationADVANCE SECURITY TO CLOUD DATA STORAGE
Journal homepage: www.mjret.in ADVANCE SECURITY TO CLOUD DATA STORAGE ISSN:2348-6953 Yogesh Bhapkar, Mitali Patil, Kishor Kale,Rakesh Gaikwad ISB&M, SOT, Pune, India Abstract: Cloud Computing is the next
More informationPerformance and Cost Evaluation of Adaptive Architecture with dual Layer Encryption
ISSN (ONLINE): 2349-7084 GLOBAL IMPACT FACTOR 0.238 DIIF 0.876 Performance and Cost Evaluation of Adaptive Architecture with dual Layer Encryption 1 Barma Udayashanth Kumar, 2 N.Poorna Chandra Rao, 3 Dr.S.Prem
More informationA Survey on Deduplication Strategies and Storage Systems
A Survey on Deduplication Strategies and Storage Systems Guljar Shaikh ((Information Technology,B.V.C.O.E.P/ B.V.C.O.E.P, INDIA) Abstract : Now a day there is raising demands for systems which provide
More informationData Storage Security in Cloud Computing for Ensuring Effective and Flexible Distributed System
Data Storage Security in Cloud Computing for Ensuring Effective and Flexible Distributed System 1 K.Valli Madhavi A.P vallimb@yahoo.com Mobile: 9866034900 2 R.Tamilkodi A.P tamil_kodiin@yahoo.co.in Mobile:
More informationEFFICIENT AND SECURE ATTRIBUTE REVOCATION OF DATA IN MULTI-AUTHORITY CLOUD STORAGE
EFFICIENT AND SECURE ATTRIBUTE REVOCATION OF DATA IN MULTI-AUTHORITY CLOUD STORAGE Reshma Mary Abraham and P. Sriramya Computer Science Engineering, Saveetha University, Chennai, India E-Mail: reshmamaryabraham@gmail.com
More informationEfficient Framework for Deploying Information in Cloud Virtual Datacenters with Cryptography Algorithms
Efficient Framework for Deploying Information in Cloud Virtual Datacenters with Cryptography Algorithms Radhika G #1, K.V.V. Satyanarayana *2, Tejaswi A #3 1,2,3 Dept of CSE, K L University, Vaddeswaram-522502,
More informationSecurity Policy Revision Date: 23 April 2009
Security Policy Revision Date: 23 April 2009 Remote Desktop Support Version 3.2.1 or later for Windows Version 3.1.2 or later for Linux and Mac 4 ISL Light Security Policy This section describes the procedure
More informationIndex Terms: Cloud Computing, Cloud Security, Mitigation Attack, Service Composition, Data Integrity. 1. Introduction
Real-Time Service Composition and Deployment for Secure Computing in Cloud Environment R. Ushadevi 1, V. Rajamani 2 1 Research Scholar, Department of Computer Applications, St. Peter s University, Chennai
More informationGuntur (Dt.) Andhra Pradesh, India
Volume 5, Issue 10, October-2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Secure Multi-Owner
More informationThe Misuse of RC4 in Microsoft Word and Excel
The Misuse of RC4 in Microsoft Word and Excel Hongjun Wu Institute for Infocomm Research, Singapore hongjun@i2r.a-star.edu.sg Abstract. In this report, we point out a serious security flaw in Microsoft
More informationSecure Sockets Layer (SSL ) / Transport Layer Security (TLS) Network Security Products S31213
Secure Sockets Layer (SSL ) / Transport Layer Security (TLS) Network Security Products S31213 UNCLASSIFIED Example http ://www. greatstuf f. com Wants credit card number ^ Look at lock on browser Use https
More informationAssociate Prof. Dr. Victor Onomza Waziri
BIG DATA ANALYTICS AND DATA SECURITY IN THE CLOUD VIA FULLY HOMOMORPHIC ENCRYPTION Associate Prof. Dr. Victor Onomza Waziri Department of Cyber Security Science, School of ICT, Federal University of Technology,
More informationPart I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai 2001. Siemens AG 2001, ICN M NT
Part I Contents Part I Introduction to Information Security Definition of Crypto Cryptographic Objectives Security Threats and Attacks The process Security Security Services Cryptography Cryptography (code
More informationNear Sheltered and Loyal storage Space Navigating in Cloud
IOSR Journal of Engineering (IOSRJEN) e-issn: 2250-3021, p-issn: 2278-8719 Vol. 3, Issue 8 (August. 2013), V2 PP 01-05 Near Sheltered and Loyal storage Space Navigating in Cloud N.Venkata Krishna, M.Venkata
More informationTrusted Public Auditing Process for Secure Cloud Storage
Trusted Public Auditing Process for Secure Cloud Storage K.Adhiyaman 1, A. Jesudoss 2, D.Saravanan 3 1 Final Year MCA, Faculty of Computing, Department of MCA Sathyabama University, Chennai,Tamil Nadu,
More informationExpressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage
Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage Abstract: Cloud computing is one of the emerge technologies. To protect the data and privacy of users the access
More informationOverview. Timeline Cloud Features and Technology
Overview Timeline Cloud is a backup software that creates continuous real time backups of your system and data to provide your company with a scalable, reliable and secure backup solution. Storage servers
More informationNETAPP WHITE PAPER Looking Beyond the Hype: Evaluating Data Deduplication Solutions
NETAPP WHITE PAPER Looking Beyond the Hype: Evaluating Data Deduplication Solutions Larry Freeman, Network Appliance, Inc. September 2007 WP-7028-0907 Table of Contents The Deduplication Hype 3 What Is
More informationPublic Auditing & Automatic Protocol Blocking with 3-D Password Authentication for Secure Cloud Storage
Public Auditing & Automatic Protocol Blocking with 3-D Password Authentication for Secure Cloud Storage P. Selvigrija, Assistant Professor, Department of Computer Science & Engineering, Christ College
More informationImprove Access Policy Using Role Based System In Cloud Database
Improve Access Policy Using Role Based System In Cloud Database Dashrath Patil, Mahesh Jagtap, Yogesh Wadekar Abstract Nowadays Data Security is a most important aspect of cloud Computing. A cloud storage
More informationA Policy-based De-duplication Mechanism for Securing Cloud Storage
International Journal of Electronics and Information Engineering, Vol.2, No.2, PP.70-79, June 2015 70 A Policy-based De-duplication Mechanism for Securing Cloud Storage Zhen-Yu Wang 1, Yang Lu 1, Guo-Zi
More informationA Policy-based De-duplication Mechanism for Securing Cloud Storage
International Journal of Electronics and Information Engineering, Vol.2, No.2, PP.95-102, June 2015 95 A Policy-based De-duplication Mechanism for Securing Cloud Storage Zhen-Yu Wang 1, Yang Lu 1, Guo-Zi
More informationMETHODOLOGY FOR OPTIMIZING STORAGE ON CLOUD USING AUTHORIZED DE-DUPLICATION A Review
METHODOLOGY FOR OPTIMIZING STORAGE ON CLOUD USING AUTHORIZED DE-DUPLICATION A Review 1 Ruchi Agrawal, 2 Prof.D.R. Naidu 1 M.Tech Student, CSE Department, Shri Ramdeobaba College of Engineering and Management,
More information15-2394-3696 RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM
RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM Dhanashri Bamane Vinayak Pottigar Subhash Pingale Department of Computer Science and Engineering SKN
More informationA SMART AND EFFICIENT CLOUD APPROACH FOR BACKUP AND DATA STORAGE
A SMART AND EFFICIENT CLOUD APPROACH FOR BACKUP AND DATA STORAGE Allagadda Gurappa 1, M.Purushotham Reddy 2, G.Rama Subba Reddy 3 1 M.tech Scholar (CSE), 2 Asst.professor, Dept. of CSE, Vignana Bharathi
More informationCloud Storage Security
Cloud Storage Security Sven Vowé Fraunhofer Institute for Secure Information Technology (SIT) Darmstadt, Germany SIT is a member of CASED (Center for Advanced Security Research Darmstadt) Cloud Storage
More informationCLOUD COMPUTING SECURITY ARCHITECTURE - IMPLEMENTING DES ALGORITHM IN CLOUD FOR DATA SECURITY
CLOUD COMPUTING SECURITY ARCHITECTURE - IMPLEMENTING DES ALGORITHM IN CLOUD FOR DATA SECURITY Varun Gandhi 1 Department of Computer Science and Engineering, Dronacharya College of Engineering, Khentawas,
More informationNetwork Security - ISA 656 Email Security
Network Security - ISA 656 Angelos Stavrou November 13, 2007 The Usual Questions The Usual Questions Assets What are we trying to protect? Against whom? 2 / 33 Assets The Usual Questions Assets Confidentiality
More informationSide channels in cloud services, the case of deduplication in cloud storage
Side channels in cloud services, the case of deduplication in cloud storage Danny Harnik, Benny Pinkas, Alexandra Shulman-Peleg Presented by Yair Yona Yair Yona (TAU) Side channels in cloud services Advanced
More informationHomomorphic encryption and emerging technologies COSC412
Homomorphic encryption and emerging technologies COSC412 Learning objectives Describe useful work that can be done on encrypted data Appreciate the overall way in which an example homomorphic encryption
More informationCryptography & Digital Signatures
Cryptography & Digital Signatures CS 594 Special Topics/Kent Law School: Computer and Network Privacy and Security: Ethical, Legal, and Technical Consideration Prof. Sloan s Slides, 2007, 2008 Robert H.
More informationConnected from everywhere. Cryptelo completely protects your data. Data transmitted to the server. Data sharing (both files and directory structure)
Cryptelo Drive Cryptelo Drive is a virtual drive, where your most sensitive data can be stored. Protect documents, contracts, business know-how, or photographs - in short, anything that must be kept safe.
More informationSecret Sharing based on XOR for Efficient Data Recovery in Cloud
Secret Sharing based on XOR for Efficient Data Recovery in Cloud Computing Environment Su-Hyun Kim, Im-Yeong Lee, First Author Division of Computer Software Engineering, Soonchunhyang University, kimsh@sch.ac.kr
More informationA Secure & Efficient Data Integrity Model to establish trust in cloud computing using TPA
A Secure & Efficient Data Integrity Model to establish trust in cloud computing using TPA Mr.Mahesh S.Giri Department of Computer Science & Engineering Technocrats Institute of Technology Bhopal, India
More informationIDENTIFYING AND OPTIMIZING DATA DUPLICATION BY EFFICIENT MEMORY ALLOCATION IN REPOSITORY BY SINGLE INSTANCE STORAGE
IDENTIFYING AND OPTIMIZING DATA DUPLICATION BY EFFICIENT MEMORY ALLOCATION IN REPOSITORY BY SINGLE INSTANCE STORAGE 1 M.PRADEEP RAJA, 2 R.C SANTHOSH KUMAR, 3 P.KIRUTHIGA, 4 V. LOGESHWARI 1,2,3 Student,
More informationHow To Encrypt Data With Encryption
USING ENCRYPTION TO PROTECT SENSITIVE INFORMATION Commonwealth Office of Technology Security Month Seminars Alternate Title? Boy, am I surprised. The Entrust guy who has mentioned PKI during every Security
More informationData management using Virtualization in Cloud Computing
Data management using Virtualization in Cloud Computing A.S.R. Krishna Kanth M.Tech (CST), Department of Computer Science & Systems Engineering, Andhra University, India. M.Sitha Ram Research Scholar Department
More informationIaas for Private and Public Cloud using Openstack
Iaas for Private and Public Cloud using Openstack J. Beschi Raja, Assistant Professor, Department of CSE, Kalasalingam Institute of Technology, TamilNadu, India, K.Vivek Rabinson, PG Student, Department
More informationScalable Data Sharing in Cloud Storage using Key Aggregate Cryptosystems
Scalable Data Sharing in Cloud Storage using Key Aggregate Cryptosystems S.Palani 1 E.Sujith 2 Poun Kumar.V 3 Assistant Professor MCA Scholar MCA Scholar Department of Master of Computer Applications Sri
More informationA Survey on Secure Storage Services in Cloud Computing
Global Journal of Computer Science and Technology Cloud & Distributed Volume 12 Issue 12 Version 1.0 Year 2012 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals
More informationA SURVEY ON USER REVOCATION IN THE PUBLIC CLOUD FOR SHARED DATA
Journal homepage: www.mjret.in A SURVEY ON USER REVOCATION IN THE PUBLIC CLOUD FOR SHARED DATA Suryakant Kadam, Prof. Pankaj Agarkar Department of Computer Engineering, Savitribai Phule Pune University
More informationSecurity Analysis of Cloud Computing: A Survey
Security Analysis of Cloud Computing: A Survey Kamaljeet Pakhre 1, Navdeep Singh 2, Sanket Mani Tiwari 3 1,2,3 Research Scholar, M. Tech. (CSE), Galgotias University, Greater Noida, India. Abstract Now
More informationHow To Make A Secure Storage On A Mobile Device Secure
Outsourcing with secure accessibility in mobile cloud computing Monika Waghmare 1, Prof T.A.Chavan 2 Department of Information technology, Smt.Kashibai Navale College of Engineering, Pune, India. Abstract
More informationSync Security and Privacy Brief
Introduction Security and privacy are two of the leading issues for users when transferring important files. Keeping data on-premises makes business and IT leaders feel more secure, but comes with technical
More informationDESIGN AND IMPLEMENTATION OF A SECURE MULTI-CLOUD DATA STORAGE USING ENCRYPTION
DESIGN AND IMPLEMENTATION OF A SECURE MULTI-CLOUD DATA STORAGE USING ENCRYPTION Prof. M. Ben Swarup Professor, Department of CSE Vignan's Institute of Information Technology Visakhapatnam-49, India Chukkala
More informationDELEGATING LOG MANAGEMENT TO THE CLOUD USING SECURE LOGGING
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IJCSMC, Vol. 3, Issue.
More informationIMPROVED SECURITY MEASURES FOR DATA IN KEY EXCHANGES IN CLOUD ENVIRONMENT
INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND ROBOTICS ISSN 2320-7345 IMPROVED SECURITY MEASURES FOR DATA IN KEY EXCHANGES IN CLOUD ENVIRONMENT Merlin Shirly T 1, Margret Johnson 2 1 PG
More information