AN EFFICIENT DATA COMPRESSION SCHEME FOR REDUCTION OF CLOUD STORAGE SPACE



Similar documents
Optimized And Secure Data Backup Solution For Cloud Using Data Deduplication

DATA SECURITY IN CLOUD USING ADVANCED SECURE DE-DUPLICATION

Authorized data deduplication check in hybrid cloud With Cluster as a Service

SURVEY ON DISTRIBUTED DEDUPLICATION SYSTEM WITH AUDITING AND IMPROVED RELIABILITY IN CLOUD Rekha R 1, ChandanRaj BR 2

Data Deduplication Scheme for Cloud Storage

EFFECTIVE DATA RECOVERY FOR CONSTRUCTIVE CLOUD PLATFORM

PUBLIC ANALYZING FOR SHARED AND SECURE INFORMATION STORAGE IN CLOUD USING STEGANOGRAPHY

An Authorized Duplicate Check Scheme for Removing Duplicate Copies of Repeating Data in The Cloud Environment to Reduce Amount of Storage Space

Two-Level Metadata Management for Data Deduplication System

Sharing Of Multi Owner Data in Dynamic Groups Securely In Cloud Environment

EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY

A NOVEL APPROACH FOR MULTI-KEYWORD SEARCH WITH ANONYMOUS ID ASSIGNMENT OVER ENCRYPTED CLOUD DATA

Data Integrity for Secure Dynamic Cloud Storage System Using TPA

DELEGATING LOG MANAGEMENT TO THE CLOUD USING SECURE LOGGING

Multi-level Metadata Management Scheme for Cloud Storage System

How To Secure Cloud Computing, Public Auditing, Security, And Access Control In A Cloud Storage System

IMPLEMENTATION OF RESPONSIBLE DATA STORAGE IN CONSISTENT CLOUD ENVIRONMENT

Secure Hybrid Cloud Architecture for cloud computing

TITLE: Secure Auditing and Deduplicating Data in Cloud(Survey Paper)

Secure Authentication of Distributed Networks by Single Sign-On Mechanism

CONSIDERATION OF TRUST LEVELS IN CLOUD ENVIRONMENT

ISSN Vol.04,Issue.19, June-2015, Pages:

A Survey on Secure Auditing and Deduplicating Data in Cloud

Efficient and Secure Dynamic Auditing Protocol for Integrity Verification In Cloud Storage

SECURE AND TRUSTY STORAGE SERVICES IN CLOUD COMPUTING

Secure Group Oriented Data Access Model with Keyword Search Property in Cloud Computing Environment

SECURITY ENHANCEMENT OF GROUP SHARING AND PUBLIC AUDITING FOR DATA STORAGE IN CLOUD

Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage

EXAMINING OF HEALTH SERVICES BY UTILIZATION OF MOBILE SYSTEMS. Dokuri Sravanthi 1, P.Rupa 2

Side channels in cloud services, the case of deduplication in cloud storage

SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD

AN EFFICIENT STRATEGY OF THE DATA INTEGRATION BASED CLOUD

Implementation of Data Sharing in Cloud Storage Using Data Deduplication

Data Security Using Reliable Re-Encryption in Unreliable Cloud

Near Sheltered and Loyal storage Space Navigating in Cloud

IMPLEMENTATION OF NOVEL MODEL FOR ASSURING OF CLOUD DATA STABILITY

AN EXPOSURE TO RELIABLE STORAGE SERVICES IN CLOUD COMPUTING

CONSIDERATION OF DYNAMIC STORAGE ATTRIBUTES IN CLOUD

An Efficient Secure Multi Owner Data Sharing for Dynamic Groups in Cloud Computing

SECURE RE-ENCRYPTION IN UNRELIABLE CLOUD USINGSYNCHRONOUS CLOCK

A Review: Data Security Approach in Cloud computing by using RSA Algorithm

A Layered Signcryption Model for Secure Cloud System Communication

RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM

An Efficient Security Based Multi Owner Data Sharing for Un-Trusted Groups Using Broadcast Encryption Techniques in Cloud

Public Auditing & Automatic Protocol Blocking with 3-D Password Authentication for Secure Cloud Storage

How To Make A Secure Storage On A Mobile Device Secure

Secure Collaborative Privacy In Cloud Data With Advanced Symmetric Key Block Algorithm

Secrecy Maintaining Public Inspecting For Secure Cloud Storage

How To Ensure Data Integrity In Clouds

Ranked Keyword Search Using RSE over Outsourced Cloud Data

SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTING SECURITY ENVIRONMENT

A Secure Model for Cloud Computing Based Storage and Retrieval

Authentication. Authorization. Access Control. Cloud Security Concerns. Trust. Data Integrity. Unsecure Communication

MANAGING OF AUTHENTICATING PASSWORD BY MEANS OF NUMEROUS SERVERS

MUTI-KEYWORD SEARCH WITH PRESERVING PRIVACY OVER ENCRYPTED DATA IN THE CLOUD

Development of enhanced Third party Auditing Scheme for Secure Cloud Storage

Global Soft Solutions JAVA IEEE PROJECT TITLES

A Secure Decentralized Access Control Scheme for Data stored in Clouds

Analyze & Classify Intrusions to Detect Selective Measures to Optimize Intrusions in Virtual Network

Review On Deduplicating Data and Secure Auditing in Cloud

Exploring Resource Provisioning Cost Models in Cloud Computing

PRIVACY ASSURED IMAGE STACK MANAGEMENT SERVICE IN CLOUD

SECURITY FOR ENCRYPTED CLOUD DATA BY USING TOP-KEY TREE TECHNOLOGIES

A Road Map on Security Deliverables for Mobile Cloud Application

Categorical Heuristic for Attribute Based Encryption in the Cloud Server

SPACK FIREWALL RESTRICTION WITH SECURITY IN CLOUD OVER THE VIRTUAL ENVIRONMENT

International Journal of Advance Research in Computer Science and Management Studies

Byte-index Chunking Algorithm for Data Deduplication System

ADVANCE SECURITY TO CLOUD DATA STORAGE

An Object Oriented Role-based Access Control Model for Secure Domain Environments

Data management using Virtualization in Cloud Computing

A Novel Re-Authentication Scheme on Cloud Based Storage Services T.G.V.V.Srinivas 1, P.Suresh Babu 2 1 Final M.Tech Student, 2 Associate professor

Secure cloud access system using JAR ABSTRACT:

A NOVEL GRAPHICAL PASSWORD APPROACH FOR ACCESSING CLOUD & DATA VERIFICATION

Proof of Retrivability: A Third Party Auditor Using Cloud Computing

Secure Role-Based Access Control on Encrypted Data in Cloud Storage using Raspberry PI

Distributed auditing mechanism in order to strengthen user s control over data in Cloud computing Environment

DISTRIBUTION OF DATA SERVICES FOR CORPORATE APPLICATIONS IN CLOUD SYSTEM

Signature Amortization Technique for Authenticating Delay Sensitive Stream

A Secure & Efficient Data Integrity Model to establish trust in cloud computing using TPA

Secure Deduplication and Data Security with Efficient and Reliable Convergent Key Management

A Security Integrated Data Storage Model for Cloud Environment

Transcription:

INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE AN EFFICIENT DATA COMPRESSION SCHEME FOR REDUCTION OF CLOUD STORAGE SPACE Draksharapu Prameela 1, N.Brahma Naidu 2 1 PG Scholar, Dept of CSE, Krishnaveni Engineering College for Women, Narasaraopet, AP, India Email:prameela.draksharapu@gmail.com 2 Assistant Professor, Dept of CSE, Krishnaveni Engineering College for Women, Narasaraopet, AP, India Email: nbnaidu1208@gmail.com ABSTRACT: Important challenge concerning cloud storage services is data management of rising volume. Convergent encryption will makes sure of secured data in the process of deduplication. Process of convergent encryption was proposed to put into effect data privacy while making of deduplication practicable. For protecting of security in an effective means our work will make an initial attempt to deal with difficulty of authorized data deduplication. Although data deduplication will bring several issues of benefits, security as well as privacy takes place as user sensitive data is vulnerable to attacks. Differential privileges of users are measured in duplicate check in addition to data itself and this is different from the de-duplication methods of earlier ones. In our work we sort out authorization difficulty of deduplication above data within public cloud and also deal with the privacy preserving problem of deduplication within cloud computing. We put forward a novel de-duplication system supporting for Differential Authorization and Authorized Duplicate Check. Keywords: Convergent encryption, De-duplication, Privacy preserving, Cloud computing, Differential privileges, Data management, Cloud storage. 4834 P a g e

1. INTRODUCTION: such as certificate-based, identity-basis identification and so on. While data In the recent times deduplication approach deduplication will convey numerous issues was an eminent method for making data of benefits, security as well as privacy takes managing more efficient in cloud system. place as user sensitive data is vulnerable to This technique will improve usage of attacks. For protection of security in a better storage and is applicable towards transfers means our work will make an initial attempt of data network to decrease the sending to deal with difficulty of authorized data number of bytes. There is different deduplication. Differential privileges of functioning of convergent implementations users are considered in the process of of various variants of convergent encryption duplicate check in addition to the data itself for secured deduplication. The approach of and this is different from the de-duplication convergent encryption will provide secured methods of earlier ones [2][3]. In our work data within the process of deduplication and we deal with the authorization difficulty of the user will obtain a convergent key from deduplication above data within public each of the actual copy of data and encrypts cloud and also deal with the privacy that copy by convergent key. Conventional preserving problem of deduplication within de-duplication on basis of convergent cloud computing. We suggest a novel deduplication system supporting for encryption, though provision of privacy somewhat do not maintain duplicate check Differential Authorization in which each of by means of differential privileges [1]. For the approved user is capable to obtain detection of duplicates, user will send tag individual file token to carry out duplicate towards server side for checking whether the check on privilege basis. Authorized matching copy is stored or not. The idea of Duplicate Check in which approved user proof of ownership will permit users to make use of individual keys to produce confirm the copies of data ownership to query for assured file and privileges owned storage server. Particularly proof of by private cloud, whereas public cloud carry ownership is provided as an interactive out duplicate check and informs the user algorithm that was run by means of prover regarding any duplicates. as well as verifier. There are lots of efficient protocols of identification within literature 4835 P a g e

2. METHODOLOGY: differential authorization, which is significant in lots of applications. In such an Deduplication will get rid of outmoded approved system of deduplication, each of information by managing of one copy and the users is provided set of privileges referring others to that copy. Traditional throughout the initialization of system. encryption procedure, while providing data Traditional systems of deduplication on privacy, is unsuitable to data de-duplication basis of convergent encryption, though and particularly, traditional encryption provision of privacy somewhat do not process will need users to encrypt their maintain duplicate check by means of information by their individual keys. In differential privileges [4]. For security in an existing deduplication systems, private improved means our work will make an cloud is concerned as proxy to permit data initial attempt to deal with difficulty of owner to carry out duplicate check by means authorized data de-duplication. We deal with of differential privileges and this design is the authorization difficulty of deduplication practical. Practice of convergent encryption above data within public cloud and also deal was projected to put into effect data privacy with the privacy preserving problem of while making of deduplication practicable. deduplication within cloud computing. This approach will provide secured data Aiming at solving of deduplication by within the process of deduplication and the differential privileges within cloud user will obtain a convergent key from each computing, we consider hybrid architecture of the actual copy of data and encrypts that including public cloud as well as private copy by convergent key. Process of cloud. convergent encryption will authorize cloud to achieve de-duplication on cipher-texts as 3. AN OVERVIEW OF PROPOSED well as proof of ownership checks illegal SYSTEM: user to have accession to files. While data deduplication will bring several issues of benefits, security as well as privacy takes place as user sensitive data is vulnerable to attacks. Earlier schemes of deduplication will not administer duplicate check of With cloud computing, data de-duplication in an effective means has attracted attention in recent times. Notion of approved data deduplication was projected to defend data security by means of inclusion of differential 4836 P a g e

privileges in the process of duplicate check. Deduplication system was proposed by Yuan et al. in cloud storage to decrease storage extent of the tags for checking of integrity. For improving To enhance deduplication security and protect data privacy, Bellare et al has showed protection of data privacy by means of transforming predictable message into un predictable. For protection of sensitive data privacy while supporting of de-duplication, method of convergent encryption was projected to encrypt data earlier than outsourcing. For protection of security in a better means our work will make an initial attempt to deal with difficulty of authorized data deduplication. Aiming at solving of deduplication by differential privileges within cloud computing, we consider hybrid architecture including public cloud as well as private cloud. In the schemes of existing deduplication systems, private cloud is concerned as proxy to permit data owner to carry out duplicate check by means of differential privileges and this design is realistic and has concerned much interest from researchers. In our work we deal with the authorization difficulty of deduplication above data within public cloud and also deal with the privacy preserving problem of deduplication within cloud computing. Differential privileges of users are considered in the process of duplicate check in addition to the data itself and this is different from the de-duplication methods of earlier ones. We propose a novel deduplication system supporting for Differential Authorization in which each of the approved user is capable to obtain individual file token to carry out duplicate check on privilege basis [5]. Authorized Duplicate Check in which approved user make use of individual keys to produce query for assured file and privileges owned by private cloud, whereas public cloud carry out duplicate check and informs the user regarding any duplicates. Our authorized duplicate check proposal will maintain negligible overhead when compared to convergent encryption as well as network transfer. At high level, enterprise network consists of affiliated clients who will make use of Storage-cloud service provider and store up information by means of deduplication method. De-duplication is used in these in support of data backup as well as disaster improvement applications although reducing their storage space and such systems are common and more appropriate 4837 P a g e

to user file backup as well as put forward a new de-duplication system synchronization applications [6]. supporting for Differential Authorization and Authorized Duplicate Check. Aiming at deduplication salvation by differential privileges within cloud computing, we consider hybrid architecture including public cloud as well as private cloud. Our approved duplicate check proposal will preserve negligible overhead when compared to convergent encryption as well as network transfer. Fig1: an overview of Authorized Deduplication 4. CONCLUSION: In the popular technology of cloud computing, increasing data is stored in cloud and shared by means of users with particular privileges, which describe access rights of stored information. For improvement of security in a better means our work will make an initial attempt to deal with difficulty of authorized data deduplication. Differential privileges regarding users are considered in the process of duplicate check in addition to the data itself and this is different from the de-duplication methods of earlier ones. In our work we manage authorization complexity of deduplication above data within public cloud and also deal with the privacy preserving problem of REFERENCES [1] M. Bellare and A. Palacio. Gq and schnorr identification schemes: Proofs of security against impersonation under active and concurrent attacks. In CRYPTO, pages 162 177, 2002. [2] S. Bugiel, S. Nurnberger, A. Sadeghi, and T. Schneider. Twin clouds: An architecture for secure cloud computing. In Workshop on Cryptography and Security in Clouds (WCSC 2011), 2011. [3] J. R. Douceur, A. Adya, W. J. Bolosky, D. Simon, and M. Theimer. Reclaiming space from duplicate files in a serverless distributed file system. In ICDCS, pages 617 624, 2002. [4] S. Quinlan and S. Dorward. Venti: a new approach to archival storage. In Proc. USENIX FAST, Jan 2002. [5] A. Rahumed, H. C. H. Chen, Y. Tang, P. P. C. Lee, and J. C. S. Lui. A secure cloud backup system with assured deletion and version control. In 3rd International Workshop on Security in Cloud Computing, 2011. deduplication within cloud computing. We 4838 P a g e

[6] R. S. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E. Youman. Role-based access control models. IEEE Computer, 29:38 47, Feb 1996. Draksharapu Prameela received her B.Tech degree in Computer Science and Engineering in the year 2012 and pursuing M.Tech degree in Computer Science and Engineering from Krishnaveni Engineering College for Women. N.Brahma Naidu received his M.Tech degree in Computer Science and Engineering and B.Tech degree in Computer Science and Information Technology. He is currently working as an Asst Professor in Krishnaveni Engineering College for Women. 4839 P a g e