Authorized Duplicate Check Scheme

Page 1

International Research Journal of Engineering and Technology (IRJET)

e-ISSN: 2395 -0056

Volume: 04 Issue: 03 | Mar -2017

p-ISSN: 2395-0072

www.irjet.net

AUTHORIZED DUPLICATE CHECK SCHEME Mr. K.Ravindran1, K.Gayathri 2, J.Geethupriya 3, M.Manoranjitham 4, V.Pavithra5 1Assistant

Professor, Department of Information Technology, Valliammai Engineering College, Anna University, Chennai. 2,3,4,5 Student Scholars, Department of Information Technology, Valliammai Engineering College , Anna University, Chennai, Tamil Nadu, India ---------------------------------------------------------------------***---------------------------------------------------------------------

Abstract - Data Deduplication is the process of

and the private cloud. Private cloud plays an important role in the system, moreover security of the system is less, as the private cloud of the mechanism is not secured, and unauthorized access of the data results security fails. To provide more security, the private cloud is provided by multilevel authentication. This shows the system is secure and confidential. Example, the identical file may be saved in several different places by different users. Deduplication has abolished these duplicate copies by saving just one copy of the data and replacing the other copies with pointers that lead back to the original copy. The convergent encryption technique used to encrypt the user’s data before uploading, to protect the confidentiality of the data. The authorized duplicate check is implemented with the encryption technique to provide the confidential data in hybrid cloud storage.

eliminating repeated data copies. It provides security and privacy concerns arise as user’s sensitive data are susceptible to both inside and outside attacks. Traditional encryption, providing data confidentiality is incompatible in deduplication. It also requires different users to encrypt their data with their own keys. Thus, identical data copies of different users will lead to different ciphertext makes deduplication impossible. Convergent Encryption has been proposed to enforce the data confidentiality and makes the data deduplication possible. It encrypts/decrypts the data copy by using the convergent key. The convergent key can be obtained by computing the cryptographic hash value of the data content. After data encryption users retain the keys and the encryption operation is derived from the data content, identical data copies will generate the same convergent key and ciphertext. To protect data security, this project makes an attempt to address the problem of authorized data deduplication. KeyWords: confidentiality, convergent deduplication, encryption, hash value.

The objectives of this paper are to protect the data security in the duplicate check and to reduce the storage space. Advanced deduplication system – Supports authorized duplicate check and compare the storage system with the file content.

key,

It has three sub phases: file upload, hash value generation, File download. The first phase is the authorized user upload the file. The second phase of hash value generation phase, we have used the MD5, a SHA-1 algorithm which generates the hash value for the uploaded file and then the hash value of the file is compared with the database. If the hash value is different then its uploaded otherwise its discarded. If the file is same then the root file is provided to the user. For the third phase, the user downloads the file.

1. INTRODUCTION Authorized duplicate check scheme is a deduplication concept. Data deduplication is one of the important techniques for eliminating duplicate copies and has been widely used in cloud storage to reduce storage space. The deduplication has been widely used to reduce the amount of storage space and save bandwidth. To protect the confidentiality of data, authorized duplicate check is used. Apart from the traditional duplication system, different advantages of user are used. To reduce the computing time and response time between token request and response, file upload or download request and results. The authorized duplicate check is used in the hybrid cloud mechanism. The hybrid cloud architecture consists of both the public cloud

© 2017, IRJET

|

Impact Factor value: 5.181

The rest of this paper proceeds as follows. In section 2, exhibits the system analysis related work such as existing system problem, proposed system solution. In section 4, we propose the system design and functional design section 5. In section 6 deals with the conclusion and in the section 7 is the future enhancement.

|

ISO 9001:2008 Certified Journal

|

Page 1175


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.