A SIGNIFICANT REDUCTION OF CLOUD STORAGE BY ELIMINATION OF REPETITIVE DATA



Similar documents
Optimized And Secure Data Backup Solution For Cloud Using Data Deduplication

DATA SECURITY IN CLOUD USING ADVANCED SECURE DE-DUPLICATION

AN EFFECTIVE STUDY ON IMPROVED DATA AUTHENTICATION IN CLOUD SYSTEM

Data Deduplication Scheme for Cloud Storage

Protected Deduplication of Data using Hybrid Cloud

CLOUD STORAGE SYSTEM MANAGING SECURE FILE EXCLUSION

EFFECTIVE DATA RECOVERY FOR CONSTRUCTIVE CLOUD PLATFORM

SURVEY ON DISTRIBUTED DEDUPLICATION SYSTEM WITH AUDITING AND IMPROVED RELIABILITY IN CLOUD Rekha R 1, ChandanRaj BR 2

An Authorized Duplicate Check Scheme for Removing Duplicate Copies of Repeating Data in The Cloud Environment to Reduce Amount of Storage Space

Secure Hybrid Cloud Architecture for cloud computing

Authorized data deduplication check in hybrid cloud With Cluster as a Service

CONSIDERATION OF TRUST LEVELS IN CLOUD ENVIRONMENT

IMPLEMENTATION OF RESPONSIBLE DATA STORAGE IN CONSISTENT CLOUD ENVIRONMENT

Selective dependable storage services for providing security in cloud computing

IMPLEMENTATION OF NOVEL MODEL FOR ASSURING OF CLOUD DATA STABILITY

DISTRIBUTION OF DATA SERVICES FOR CORPORATE APPLICATIONS IN CLOUD SYSTEM

EXAMINING OF HEALTH SERVICES BY UTILIZATION OF MOBILE SYSTEMS. Dokuri Sravanthi 1, P.Rupa 2

CLOUD BASED STORAGE SERVICES FOR SECURITY FOLLOWED BY THE DATA AUTHENTICATION

Sharing Of Multi Owner Data in Dynamic Groups Securely In Cloud Environment

A Survey Paper on Secure Auditing and Maintaining Block Level Integrity with Reliability of Data in Cloud

PERFORMANCE OF BALANCED STORAGE SERVICES IN CLOUD SYSTEM

METHODOLOGY FOR OPTIMIZING STORAGE ON CLOUD USING AUTHORIZED DE-DUPLICATION A Review

PUBLIC ANALYZING FOR SHARED AND SECURE INFORMATION STORAGE IN CLOUD USING STEGANOGRAPHY

AN EXPOSURE TO RELIABLE STORAGE SERVICES IN CLOUD COMPUTING

CONSIDERATION OF DYNAMIC STORAGE ATTRIBUTES IN CLOUD

Advanced HMAC Schemes for Hybrid Cloud Deduplication G. Siva Punyavathi 1, P. Neelima 2

DELEGATING LOG MANAGEMENT TO THE CLOUD USING SECURE LOGGING

Implementation of Data Sharing in Cloud Storage Using Data Deduplication

Side channels in cloud services, the case of deduplication in cloud storage

ASSURANCE OF PATIENT CONTROL TOWARDS PERSONAL HEALTH DATA

ADVANCEMENT TOWARDS PRIVACY PROCEEDINGS IN CLOUD PLATFORM

Multi-level Metadata Management Scheme for Cloud Storage System

IMPLEMENTATION OF VIRTUAL MACHINES FOR DISTRIBUTION OF DATA RESOURCES

A NOVEL APPROACH FOR MULTI-KEYWORD SEARCH WITH ANONYMOUS ID ASSIGNMENT OVER ENCRYPTED CLOUD DATA

How To Secure Cloud Computing, Public Auditing, Security, And Access Control In A Cloud Storage System

TITLE: Secure Auditing and Deduplicating Data in Cloud(Survey Paper)

AN EFFICIENT STRATEGY OF THE DATA INTEGRATION BASED CLOUD

SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD

MANAGING OF AUTHENTICATING PASSWORD BY MEANS OF NUMEROUS SERVERS

Near Sheltered and Loyal storage Space Navigating in Cloud

An Efficient Secure Multi Owner Data Sharing for Dynamic Groups in Cloud Computing

Data management using Virtualization in Cloud Computing

REDUCED FILE HASH FOOT PRINTS FOR OPTIMIZED DEDUPLICATION IN CLOUD PLATFORMS

Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage

A Road Map on Security Deliverables for Mobile Cloud Application

AN APPROACH TOWARDS FUNCTIONING OF PUBLIC AUDITABILITY FOR CLOUD ENRICHMENT

ISSN Vol.04,Issue.19, June-2015, Pages:

Byte-index Chunking Algorithm for Data Deduplication System

Secure Group Oriented Data Access Model with Keyword Search Property in Cloud Computing Environment

A secure two-phase data deduplication scheme

Smart Data Back-up Technique for Cloud Computing using Secure Erasure Coding

Data Security Using Reliable Re-Encryption in Unreliable Cloud

CHARACTERIZING OF INFRASTRUCTURE BY KNOWLEDGE OF MOBILE HYBRID SYSTEM

TRUSTWORTHY STORAGE FOR SUPPORTING MODERATELY RELIABLE CLOUD SETTING

ISSN: (Online) Volume 2, Issue 1, January 2014 International Journal of Advance Research in Computer Science and Management Studies

De-duplication-based Archival Storage System

ADVANCE SECURITY TO CLOUD DATA STORAGE

IMPACT OF DISTRIBUTED SYSTEMS IN MANAGING CLOUD APPLICATION

Review On Deduplicating Data and Secure Auditing in Cloud

EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY

Sheltered Multi-Owner Data distribution For vibrant Groups in the Cloud

SECURE RE-ENCRYPTION IN UNRELIABLE CLOUD USINGSYNCHRONOUS CLOCK

Secure Deduplication and Data Security with Efficient and Reliable Convergent Key Management

A Secure Decentralized Access Control Scheme for Data stored in Clouds

IMPLEMENTATION OF SOURCE DEDUPLICATION FOR CLOUD BACKUP SERVICES BY EXPLOITING APPLICATION AWARENESS

CLOUD COMPUTING SECURITY IN UNRELIABLE CLOUDS USING RELIABLE RE-ENCRYPTION

Efficient and Secure Dynamic Auditing Protocol for Integrity Verification In Cloud Storage

Public Auditing for Shared Data in the Cloud by Using AES

Ensuring Data Storage Security in Cloud Computing By IP Address Restriction & Key Authentication

EFFICIENT DISCOVERY OF INTEGRITY AUTOMATION IN HYBRID CLOUD COMPUTING

A Survey on Secure Auditing and Deduplicating Data in Cloud

International Journal of Advance Research in Computer Science and Management Studies

IDENTIFYING AND OPTIMIZING DATA DUPLICATION BY EFFICIENT MEMORY ALLOCATION IN REPOSITORY BY SINGLE INSTANCE STORAGE

Development of enhanced Third party Auditing Scheme for Secure Cloud Storage

INTENSIVE FIXED CHUNKING (IFC) DE-DUPLICATION FOR SPACE OPTIMIZATION IN PRIVATE CLOUD STORAGE BACKUP

A Policy-based De-duplication Mechanism for Securing Cloud Storage

A Policy-based De-duplication Mechanism for Securing Cloud Storage

A Survey on Security Issues and Security Schemes for Cloud and Multi-Cloud Computing

IMPLEMENTATION OF RELIABLE CACHING STRATEGY IN CLOUD ENVIRONMENT

Authentication. Authorization. Access Control. Cloud Security Concerns. Trust. Data Integrity. Unsecure Communication

Two-Level Metadata Management for Data Deduplication System

A Secure Cloud Backup System with Assured Deletion and Version Control

A SMART AND EFFICIENT CLOUD APPROACH FOR BACKUP AND DATA STORAGE

Hardware Configuration Guide

Application Based Access Control on Cloud Networks for Data Security

A Survey on Deduplication Strategies and Storage Systems

Usage of OPNET IT tool to Simulate and Test the Security of Cloud under varying Firewall conditions

DESIGN AND IMPLEMENTATION OF A SECURE MULTI-CLOUD DATA STORAGE USING ENCRYPTION

A FRAMEWORK FOR SECURE ACCESS OF HEALTH DATA WITH AUDIT ABILITY IN CLOUD

A Secure Model for Cloud Computing Based Storage and Retrieval

A Secure & Efficient Data Integrity Model to establish trust in cloud computing using TPA

AN APPROACH TOWARDS REDUCING SECURITY CONCERNS IN CLOUD ENVIRONMENT

Sharing Files Using Cloud Storage Services

February. ISSN:

Security Analysis of Cloud Computing: A Survey

Proof of Retrivability: A Third Party Auditor Using Cloud Computing

Secure Cloud Service Management and its Resource Utilization of Server Using Volunteer Computing

EFFICIENT AND SECURE ATTRIBUTE REVOCATION OF DATA IN MULTI-AUTHORITY CLOUD STORAGE

PRIVACY ASSURED IMAGE STACK MANAGEMENT SERVICE IN CLOUD

WHITEPAPER. 7 Reasons Why Businesses are Shifting to Cloud Backup

Transcription:

INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND SCIENCE A SIGNIFICANT REDUCTION OF CLOUD STORAGE BY ELIMINATION OF REPETITIVE DATA M.Rajashekar Reddy 1, B.Ramya 2 1 M.Tech Student, Dept of CSE, Arjun College of Technology & Sciences, Hyderabad, T.S, India 2 Assistant Professor, Dept of CSE, Arjun College of Technology & Sciences, Hyderabad, T.S, India ABSTRACT: Because of cloud system developing into an established technology, an increase amount of data is stored within cloud system and is shared by users by particular privileges specifying access rights of stored information. The process of de-duplication symbolizes a determined data compression for taking away of duplicate copies of repetitive data within storage system. We aim at working out deduplication problem by means of differential advantages in cloud system and hence consider a cloud design which is hybrid structure consisting of public along with a private cloud. An approved data deduplication was initiated in our work to defend data security by means of inclusion of differential opportunities of users within duplicate check. Contrasting from traditional works, private cloud is considerers as a proxy for data owner to execute duplicate check by differential privileges and such a design is useful and has offered much attention. Keywords: Cloud system, Private cloud, Deduplication, Hybrid structure, Duplicate check, Differential privileges. 2001 P a g e

1. INTRODUCTION: defending sensitive data confidentiality while managing the process of Rather than maintaining of several data with deduplication, technique of convergent similar content, deduplication concept encryption was introduced for the purpose of removes redundant data by means of encryption of data earlier than outsourcing. managing one physical copy and refers other Proposed system consists of twin clouds redundant data towards that copy. The such as public cloud as well as private knowledge of data deduplication helps in cloud. For securing of data protection, our improving of storage utilization and work makes an initial effort to formally for moreover it is apt towards network data addressing deduplication difficulty of transfers to decrease number of bytes that approved data. have to be sent [1]. In the earlier systems of deduplication, differential authorization duplicate check, was not supported which is 2. METHODOLOGY: the significant factor to be considered in The knowledge of data deduplication most of the applications. And in such method represents a focused data systems, each user is provided by a set of privileges throughout the period of system compression intended for elimination of duplicate copies of repetitive data within initialization. Earlier systems of storage system. deduplication method occurs deduplication on the basis of convergent encryption, even though provides privacy to some level, however do not manage duplicate check by differential privileges. Deduplication technique on the basis of at moreover file level or else block level. While the technique of data deduplication holds several benefits, however the issued regarding security as well as privacy happens since users data are prone to convergent encryption technique, there are various attacks [2][3]. Traditional no differential privileges considered. In our work we intend at working out deduplication problem by means of differential advantages in cloud system and hence consider a cloud design which is hybrid structure consisting of public along with a private cloud. For techniques of encryption, while offering confidentiality of data, are not compatible with data deduplication method. Traditional techniques of encryption necessitate several users to encrypt their information by personal keys and so data copies of 2002 P a g e

numerous users that are similar will guide to a variety of cipher-texts, making of deduplication impractical. Technique of convergent encryption was introduced to put into effect data privacy while making possibility of deduplication. Deduplication procedure on the basis of convergent encryption system, there are no differential privileges considered. Technique of convergent encryption allows cloud to carry out deduplication on ciphertexts as well as proof of ownership for preventing the unapproved user towards accessing of file. Deduplication techniques of earlier works based on convergent encryption, although providing privacy to some level; however do not manage duplicate check by differential privileges. Here in our work we intend to solve the deduplication problem by means of differential advantages in cloud system and hence consider a cloud design which is hybrid structure consisting of public along with a private cloud. In our proposed system, contrasting from the earlier works, private cloud is considerers as a proxy for data owner to execute duplicate check by differential privileges and such a design is useful and has offered much attention. The owners of data outsource their data storage by means of employing public cloud while data procedure is managed within private cloud. The innovative and efficient deduplication system that supports differential duplicate check was introduced in the hybrid cloud structural where the provider of Storage-cloud service resides within public cloud. Here user only carries out duplicate check for files that are marked by corresponding privileges. 3. AN OVERVIEW OF PROPOSED SYSTEM: In the modern times, providers of cloud service usually provide storage that is mostly accessible and the resources of computing at an extremely low price. One of the important issues to be considered regarding cloud storage services is managing of increased data volume. For managing of scalable data within cloud system, de-duplication has proved to be an effective means that has gained more attention in recent times. The process of deduplication occurs at block level that removes duplicate data blocks occurring in non-identical files [5]. This method represents a determined data compression intended for elimination of duplicate copies of repetitive data within storage system. deduplication method. In our work 2003 P a g e

approved data deduplication was introduced to defend data security by means of inclusion of differential opportunities of users within duplicate check. We intend at working out deduplication problem by means of differential advantages in cloud system and hence consider a cloud design which is hybrid structure consisting of public along with a private cloud. In our system private cloud is considerers as a proxy for data owner to execute duplicate check by differential privileges and such a design is useful and has offered much attention. For securing of data, our work address deduplication difficulty of approved data. The deduplication system supporting differential duplicate check was set up within hybrid cloud structural where the provider of Storage-cloud service resides within public cloud and in this only user carries out duplicate check for files that are marked by corresponding privileges. In the security representation of our systems private cloud is supposed to be honest however curious. Proposed structure for effective Deduplication is a new structural design for data deduplication within cloud computing system that consisting of twin clouds such as public cloud as well as private cloud. In the proposed structure deduplication technique is normally employed for data backup as well as applications for disaster recovery whereas reducing storage space to a great extent. These systems are prevalent and more appropriate towards backing up of user file as well as synchronization applications than comfortable storage abstractions. There are different entities in proposed system such as users, private cloud as well as provider of storage-cloud service provider within public cloud as in fig1. Users contain permission towards private cloud server, which is a semi trustworthy third party supporting in performing of deduplicable encryption by means of generating file tokens for the requested users [4]. To upload a file, user act upon file-level duplicate check and when file is duplicate, subsequently the entire blocks have to be duplicates if not, user performs block-level duplicate check and make out exceptional blocks to be uploaded. Provider of storage-cloud service provides services of data outsourcing and stores up data in support of users. In our work we imagine that the entire files are imagined to be protected against public and private cloud since the files are sensitive [6]. 2004 P a g e

Fig1: Design of proposed system. of Storage-cloud service resides within public cloud. Here user carries out duplicate check for files that are marked by equivalent privileges. In the proposed structure deduplication technique is normally employed for data backup as well as applications for disaster recovery whereas reducing storage space to a great extent. 4. CONCLUSION: For supporting scalable data within cloud structure, de-duplication has proved to be an effective means that has gained more attention in recent times. This technique represents a determined data compression intended for elimination of duplicate copies of repetitive data within storage system and occurs at moreover file level or else block level. In our work we propose deduplication problem by differential advantages in cloud system and hence consider a cloud design which is hybrid structure consisting of public along with a private cloud. For securing of data privacy, our work makes a try to formally for addressing deduplication difficulty of approved data. The innovative deduplication system that supports differential duplicate check was introduced in hybrid cloud structural where the provider REFERENCES [1] M. Bellare and A. Palacio. Gq and schnorr identification schemes: Proofs of security against impersonation under active and concurrent attacks. In CRYPTO, pages 162 177, 2002. [2] S. Bugiel, S. Nurnberger, A. Sadeghi, and T. Schneider. Twin clouds: An architecture for secure cloud computing. In Workshop on Cryptography and Security in Clouds (WCSC 2011), 2011. [3] J. R. Douceur, A. Adya, W. J. Bolosky, D. Simon, and M. Theimer. Reclaiming space from duplicate files in a serverless distributed file system. In ICDCS, pages 617 624, 2002. [4] R. D. Pietro and A. Sorniotti. Boosting efficiency and security in proof of ownership for deduplication. In H. Y. Youm and Y. Won, editors, ACM Symposium on Information, Computer and Communications Security, pages 81 82. ACM, 2012. [5] S. Quinlan and S. Dorward. Venti: a new approach to archival storage. In Proc. USENIX FAST, Jan 2002. [6] A. Rahumed, H. C. H. Chen, Y. Tang, P. P. C. Lee, and J. C. S. Lui. A secure cloud backup system with assured deletion and version control. In 3rd International Workshop on Security in Cloud 2005 P a g e

Computing, 2011. M.Rajasekhar Reddy graduated in 2013 in B.Tech,CSE, Arjun College of Technology & Sciences,R.R. Dist. B.Ramya Graduated in B.Tech CSE in 2008 from Swami Ramanand Thirde Institute of Science, NLG Dist. She received Masters Degree in M.Tech [IT] Aurora Scientific Technology & Research Academy,Hyd. Presently She is working as Associate Professor in CSE Dept. in Arjun College of Technology & Sciences, Hayathnagar,R.R. Dist Telangana State, India. 2006 P a g e