You are on page 1of 8

A Secure Client Side

DeduplicationScheme in
Cloud Storage Environments
ABSTRACT
Recent years have witnessed the trend of leveraging
cloud-based services for large scale content storage,
processing, and distribution. Security and privacy are
amongtop concerns for the public cloud environments.
owards thesesecurity challenges, we propose and
implement, on !pen Stac" Swift, a new client-side
deduplication scheme for securely storing and sharing
outsourced data via the public cloud.he originality of our
proposal is twofold. #irst, it ensuresbetter con$dentiality
towards unauthori%ed users. hat is,every client
computes a per data "ey to encrypt the data that he
intends to store in the cloud. As such, the data access
ismanaged by the data owner. Second, by integrating
accessrights in metadata $le, an authori%ed user can
decipher an encrypted $le only with his private "ey.
Existing System
Although the e&isting schemes aim at providing integrity
veri$cation for di'erent data storage systems, data dynamics has
not been fully addressed. (ow to achieve a secure and e)cient
design to seamlessly integrate these two important components
for data storage service remains an open challenging tas" in
Cloud storage.
DISADVANTAGES OF EXISTING SYSTEM:
Although the infrastructures under the cloud are much more powerful and
reliable than personal computing devices, they are still facing the broad range of
both internal and external threats for data integrity.
Second, there do exist various motivations for CSP to behave unfaithfully
toward the cloud users regarding their outsourced data status.
In particular, simply downloading all the data for its integrity verification is not
a practical solution due to the expensiveness in I/ and transmission cost across
the networ!. "esides, it is often insufficient to detect the data corruption only when
accessing the data, as it does not give users correctness assurance for those
unaccessed data and might be too late to recover the data loss or damage.
#ncryption does not completely solve the problem of protecting data privacy
against clous service provider but $ust reduces it to the complex !ey management
domain. %nauthori&ed data lea!age still remains possible due to the potential
exposure of decryption !eys.
Proposed System:
proposed the use of the convergent encryption,
i.e., deriving "eys from the hash of plainte&t. hen,
Storer et al. pointed out some security problems,
and presented a security model for secure data
deduplication. (owever,these two protocols focus
on server-side deduplication and do not consider
data lea"age settings, against malicious users.
Advantage*
+, As a rising sub-ect, cloud storage is playing
an increasingly important role in the decision
support activity of every wal" of life.
., /et E)cient 0tem set result based on the
deduplication.
IMPLEMENTATION
0mplementation is the stage of the pro-ect
when the theoretical design is turned out into a
wor"ing system. hus it can be considered to be
the most critical stage in achieving a successful
new system and in giving the user, con$dence that
the new system will wor" and be e'ective.
he implementation stage involves careful
planning, investigation of the e&isting system and
it1s constraints on implementation, designing of
methods to achieve changeover and evaluation of
changeover methods.
Modues
+.2ser 3odule.
..client module.
4.csp 3odule.
5.Deduplication module.
Modues Des!ription
"ser Modue
0n this module, user should register their
details and get the secret "ey for loggin 66 and
user can download the clients uploaded $les the
users are able to access the content stored in the
cloud, depending on their access rights which are
authori%ations granted by the client, li"e the rights
re-store the modi$ed data in the cloud. 66..
#ient Modue
0n this module, a client ma"es use of provider1s
resources to store, retrieve and share data with
multiple users. A
client can be either an individual or an enterprise.
client can chec" the uploaded $le he can neglate
or upload the $le 6.
Client can view the deduplicate $le based on
this client can delete the unwanted datas.
!sp modue:
0n this module csp can view all the user details ,
client uploads details,clients details6
And clients activties6.regarding the A Secure
Client Side Deduplication Scheme in Cloud Storage
Environments
Dedupi!$tion modue:
0n this module , the clients uploaded $les can be
stored in cloud database.. it can be very secure
6.clients can view the $le from the database
based on the deduplicate factor it can be very
secure..
System Configuration:-
H/W System Configuration:-
Processor - Pentium III
Speed % &'& G()
*AM % +,- M./min0
1$rd Dis2 % +3 G.
Foppy Dri4e % &'55 M.
6ey .o$rd % St$nd$rd 7indo8s 6ey9o$rd
Mouse % T8o or T(ree .utton Mouse
Monitor % SVGA
S/W System Configuration:-
perating System '(indows )
*ront #nd ' vs+,-, Asp.net c.
/atabase ' s0l server +,,1
#ON#:"SION
he growing need for secure cloud storage services and the attractive properties of the
convergent cryptography lead us to combine them, thus, de$ning an innovative solution to
the data outsourcing security and e)ciency issues.!ur solution is based on a cryptographic
usage of symmetric encryption used for enciphering the data $le and asymmetric encryption
for meta data $les, due to the highest sensibility of these information towards several
intrusions. 0n
addition, than"s to the 3er"le tree properties, this proposal is shown to support data
deduplication, as it employs anpre-ver$cation of data e&istence, in cloud servers, which is
useful for saving bandwidth. 7esides, our solution is also shown to be resistant to
unauthori%ed access to data and to any data disclosure during sharing process, providing
two
levels of access control veri$cation.#inally, we believe that cloud data storage security is still
full of challenges and of paramount importance, and many research problems remain to be
identi$ed.

You might also like