SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue:08 | Aug 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1624
DATA DEDUPLICATION SECURITY WITH DYNAMIC OWNERSHIP
MANAGEMENT
Tanvi Rudrashetty1
1B. Tech Student, Department of CSE, Gurunanak Institutions, Ibrahimpatnam, Hyderabad, India
---------------------------------------------------------------------***----------------------------------------------------------------------
Abstract -To provide security of deduplication systemwith
high authentication during which the information is being
distributed across multiple cloud servers. Deduplication
technique eliminates redundant data and stores only a single
copy of that data. By the use of hash table formula, the
requirement of informationconfidentialityandreducingspace
storage are achieved. It converts a range of key values into a
range of indexes of an array. It performs a basic operations of
a research, insert, and deletion. As a result, security analysis
demonstrate that our deduplication systems are secure in the
proposed system. To protect the confidentiality of sensitive
data while supporting deduplication, thehashtablealgorithm
technique has been proposed to encrypt the data before
outsourcing. To safeguard information security which has
been different from conventional deduplication systems, the
differential rights of users are further considered induplicate
check besides the data itself. Data deduplication is one of the
principal information compression approach for terminating
duplicate copies of redundant information, and has been
widely incorporated in cloud storage to decrease the quantity
of storage space and save bandwidth. To protecttheprivacyof
sensitive information while supporting deduplication, the
convergent coding technique has been planned to encode the
information before outsourcing.
Key Words: Security, Data De-duplication, Convergent
Encryption, Privacy, Authentication.
1. INTRODUCTION
Because of the importance in serving users to form real time
decisions, information dissemination hasbecomeimportant
in several large-scale emergency applications, like
earthquake observation, disaster weather warning, and
status update in social networks. Recently, information
dissemination in these emergency applications presents a
number of contemporary trends. One is the rapid growth of
live content. For example, Facebook users publish over
600,000 pieces of content and Twitter users send over
100,000 tweets on average per minute.
The other is the highly dynamic network environment. For
instance, the measurement studies indicate that most users’
sessions in social networks only last several minutes. In
emergency eventualities, the fulminant disasters like
earthquake or weather condition might causethefailureofa
large range of users instantly. These characteristics require
the data dissemination system to be scalable and reliable.
Firstly, the system should be scalable to supportthe massive
quantity of live content. The key is to supply an ascendable
event matching service to separate extraneous users.
Otherwise, the content may have to traverse a large number
of uninterested users before they reach interested users.
Secondly, with the dynamic network environment, it’s quite
necessary to provide reliable schemes to keep continuous
data dissemination capacity. Otherwise, the system
interruption might cause the live content becomes obsolete
content. Driven by these necessities, publish/subscribe
(pub/ sub) pattern is widely used to disseminatedata due to
its flexibility, scalability, and efficient support of complex
event processing. In pub/sub systems(pub/subs),a receiver
(subscriber) registers its interest in the form of a
subscription. Events are published by senders to the pub/
sub system. In conventional information dissemination
applications, the live content isgeneratedbypublishersatan
occasional speed, that makes several pubs/subs adopt the
multi-hop routing techniques to distribute events. A large
body of broker-based pub/subs forward events and
subscriptions through organizing nodes into diverse
distributed overlays, such astreebaseddesigncluster-based
design and DHT-based design. However, the multichip
routing techniques in these broker-based systems cause an
occasional matching turnout, that is insufficient to apply to
current high arrival rate of live content.
2. EXSISTING SYSTEM
In the existing deduplication system,eachuserisissueda set
of privileges during system initialization.
Each file uploaded to the cloud is additionally finite by a
group of privileges to specify which type of users is allowed
to perform the duplicate check and access the files. Before
presenting his duplicate check request for a file, the user
needs to take that particular file and his veryown benefits as
inputs. The user is in a position to seek out a replica for this
file if and provided that there's a duplicate of this file and a
matched privilege stored in cloud.
3. PROPOSED SYSTEM
The proposing system, we terminating redundant copies of
repeating information has been widely usedincloudstorage
to minimize the amount of storage capacity and save
bandwidth. To protect the privacy of sensitive information
while supporting deduplication, the convergent encryption
technique has been proposed to encrypt the data before
outsourcing. To better protect information security, this
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue:08 | Aug 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1625
paper makes the first attempt to formally address the
problem of authorized data deduplication.
4. SYSTEM ARCHITECTURE
Architecture diagram shows the connection between
completely different elements of system.
This diagram is extremely necessary to know the general
idea of system. Architecture representation might be a plan
of a system, within which the essential components or roles
and tasks are described by blocks connected by lines that
show the relationships of the blocks. They are heavily
employed in the engineering world in hardware model,
electronic plan, package representation, and process flow
diagrams.
Fig-1: System Architecture
5. IMPLEMENTATION
Fig-2.1: Cloud Login
Description: Page when we run the project where the
authentication server provides authorized logins.
Fig-2.2 Entering Convergent key
Description: creating convergent key for securing data
deduplication where we get access to user Id details.
Fig-2.3 Private cloud Login
Description: Private cloud connects to public cloud
infrastructure, allowing an organization to orchestrate
workloads across the two environments.
SEND REQUEST TO GET FILE TOKEN
USER
PRIVATE
CLOUD
PUBLIC
CLOUD
CONVER
GENT
KEY
GENERAT
ION
UPLOAD
ING A
FILE
DEDUPLIC
ATION
SYSTEM
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue:08 | Aug 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1626
Fig 2.4 Document creation and data representation
Description: Document creation for security purpose after
user access.
6. CONCLUSIONS
The notion of approved information deduplication was
planned to safeguard the information security by including
divergent rights of users within the duplicate check.
In which the replicated -check tokens of files are generated
by the private cloud server with private(special) keys.
7. FUTURE ENHANCEMENT
In future there are still some possible extensions of our
current work remaining. If user wants to modify a file in
already stored in cloud, user can modify.
REFERENCES
1. Paul Anderson, Le Zhang[1],FastandSecureLaptop
Backups with Encrypted De-duplication,2011
2. Pasquale puzio secludit and eurecom, refik molva
eurecom, melek o nen eurecom[2], Clouded up:
secure deduplication with encrypted data for cloud
storage,2012
3. N.O.agrawal,Prof Mr. s.s. kulkarni[3], Secure
deduplication and data security with efficient and
reliable CEKM,2014
4. Pierre-Louis Cayrel1, Philippe Gaborit1 and Marc
Girault2[4], Identity-basedsignatureschemesusing
correcting codes,2011.
5. B.C. Tea, M.R.K. Ariffin and J.J. Chin[5], An Efficient
Identification Scheme in Standard Model Based on
the Diophantine Equation Hard Problem,2013.

More Related Content

PDF
IRJET- Enhancing Information Leakage in Multi Cloud Storage Facilities
PDF
Iaetsd cloud computing and security challenges
PDF
A Comparative Review on Data Security Challenges in Cloud Computing
PDF
Issues of cloud security and its implications
PDF
Reliable security in cloud computing environment 2-3-4-5-6
PDF
A systematic mapping study of security, trust and privacy in clouds
PDF
A Security Model for Virtual Infrastructure in the Cloud
PDF
Ad4502189193
IRJET- Enhancing Information Leakage in Multi Cloud Storage Facilities
Iaetsd cloud computing and security challenges
A Comparative Review on Data Security Challenges in Cloud Computing
Issues of cloud security and its implications
Reliable security in cloud computing environment 2-3-4-5-6
A systematic mapping study of security, trust and privacy in clouds
A Security Model for Virtual Infrastructure in the Cloud
Ad4502189193

What's hot (20)

PDF
IRJET- Monitoring and Detecting Abnormal Behaviour in Mobile Cloud Infrastruc...
PDF
IRJET- A Data Sharing Protocol to Minimize Security and Privacy Risks in Clou...
PDF
Transforming the Data into Virtual Set Up Segmented usage and Adoption
PDF
A Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
PDF
INFORMATION SECURITY IN CLOUD COMPUTING
PDF
Investigative analysis of security issues and challenges in cloud computing a...
PPTX
A study on security issues in cloud based e learning
PDF
Hindering data theft attack through fog computing
PDF
A Data Sharing Protocol to Minimize Security and Privacy Risks in Cloud Storage
PDF
50120140503020
PDF
Advance security in cloud computing for military weapons
PDF
An Investigation of Using Privilege Level System to Restrict Employers for Us...
DOCX
Fog doc
PDF
Introduction to cloud security
PDF
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
PDF
Paper id 212014106
PDF
Cloud Computing Security Issues and Challenges
PDF
Excellent Manner of Using Secure way of data storage in cloud computing
PPTX
International Journal of Network Security & Its Applications (IJNSA)
PDF
A Multi-Level Security for Preventing DDOS Attacks in Cloud Environments
IRJET- Monitoring and Detecting Abnormal Behaviour in Mobile Cloud Infrastruc...
IRJET- A Data Sharing Protocol to Minimize Security and Privacy Risks in Clou...
Transforming the Data into Virtual Set Up Segmented usage and Adoption
A Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
INFORMATION SECURITY IN CLOUD COMPUTING
Investigative analysis of security issues and challenges in cloud computing a...
A study on security issues in cloud based e learning
Hindering data theft attack through fog computing
A Data Sharing Protocol to Minimize Security and Privacy Risks in Cloud Storage
50120140503020
Advance security in cloud computing for military weapons
An Investigation of Using Privilege Level System to Restrict Employers for Us...
Fog doc
Introduction to cloud security
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Paper id 212014106
Cloud Computing Security Issues and Challenges
Excellent Manner of Using Secure way of data storage in cloud computing
International Journal of Network Security & Its Applications (IJNSA)
A Multi-Level Security for Preventing DDOS Attacks in Cloud Environments
Ad

Similar to IRJET- Data Deduplication Security with Dynamic Ownership Management (20)

PDF
IRJET-Using Downtoken Secure Group Data Sharing on Cloud
PDF
IRJET- Secure Cloud Storage through Dual Protection
PDF
IRJET- Redsc: Reliablity of Data Sharing in Cloud
PDF
System Approach for Single Keyword Search for Encrypted Data Files Guarantees...
PDF
IRJET- Multimedia Content Security with Random Key Generation Approach in...
PDF
Anonymous Key Based Secure File Encryption in Cloud
PDF
A Survey Paper on Removal of Data Duplication in a Hybrid Cloud
PDF
IRJET- Compress and Secure Data Sharing for Mobile Cloud Computing
PDF
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
PDF
Enhanced security framework to ensure data security in cloud using security b...
PDF
Enhanced security framework to ensure data security
DOC
Breast Tissue Identification in Digital Mammogram Using Edge Detection Techni...
PDF
IRJET- Security Enhance using Hash and Chaostic Algorithm in Cloud
PDF
IRJET- Security Enhance using Hash and Chaostic Algorithm in Cloud
PDF
IRJET- Improving Data Storage Security and Performance in Cloud Environment
PDF
IRJET- Secure Database Management and Privacy Preserving in Cloud Server
PDF
IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
PDF
IRJET- Securing Cloud Data Under Key Exposure
PDF
Privacy Preserving Public Auditing and Data Integrity for Secure Cloud Storag...
PDF
Flaw less coding and authentication of user data using multiple clouds
IRJET-Using Downtoken Secure Group Data Sharing on Cloud
IRJET- Secure Cloud Storage through Dual Protection
IRJET- Redsc: Reliablity of Data Sharing in Cloud
System Approach for Single Keyword Search for Encrypted Data Files Guarantees...
IRJET- Multimedia Content Security with Random Key Generation Approach in...
Anonymous Key Based Secure File Encryption in Cloud
A Survey Paper on Removal of Data Duplication in a Hybrid Cloud
IRJET- Compress and Secure Data Sharing for Mobile Cloud Computing
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security
Breast Tissue Identification in Digital Mammogram Using Edge Detection Techni...
IRJET- Security Enhance using Hash and Chaostic Algorithm in Cloud
IRJET- Security Enhance using Hash and Chaostic Algorithm in Cloud
IRJET- Improving Data Storage Security and Performance in Cloud Environment
IRJET- Secure Database Management and Privacy Preserving in Cloud Server
IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET- Securing Cloud Data Under Key Exposure
Privacy Preserving Public Auditing and Data Integrity for Secure Cloud Storag...
Flaw less coding and authentication of user data using multiple clouds
Ad

More from IRJET Journal (20)

PDF
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
PDF
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
PDF
Kiona – A Smart Society Automation Project
PDF
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
PDF
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
PDF
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
PDF
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
PDF
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
PDF
BRAIN TUMOUR DETECTION AND CLASSIFICATION
PDF
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
PDF
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
PDF
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
PDF
Breast Cancer Detection using Computer Vision
PDF
Auto-Charging E-Vehicle with its battery Management.
PDF
Analysis of high energy charge particle in the Heliosphere
PDF
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
PDF
Auto-Charging E-Vehicle with its battery Management.
PDF
Analysis of high energy charge particle in the Heliosphere
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
Kiona – A Smart Society Automation Project
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
BRAIN TUMOUR DETECTION AND CLASSIFICATION
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
Breast Cancer Detection using Computer Vision
Auto-Charging E-Vehicle with its battery Management.
Analysis of high energy charge particle in the Heliosphere
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
Auto-Charging E-Vehicle with its battery Management.
Analysis of high energy charge particle in the Heliosphere
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...

Recently uploaded (20)

PPTX
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
PDF
Operating System & Kernel Study Guide-1 - converted.pdf
PDF
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
PDF
Digital Logic Computer Design lecture notes
PDF
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
PPTX
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
DOCX
573137875-Attendance-Management-System-original
PPTX
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
PPTX
UNIT-1 - COAL BASED THERMAL POWER PLANTS
PDF
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
PPT
Project quality management in manufacturing
PPT
Mechanical Engineering MATERIALS Selection
PPTX
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
PPTX
bas. eng. economics group 4 presentation 1.pptx
PPTX
CYBER-CRIMES AND SECURITY A guide to understanding
PDF
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
PDF
composite construction of structures.pdf
PPTX
Geodesy 1.pptx...............................................
PPTX
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
PPTX
Welding lecture in detail for understanding
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
Operating System & Kernel Study Guide-1 - converted.pdf
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
Digital Logic Computer Design lecture notes
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
573137875-Attendance-Management-System-original
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
UNIT-1 - COAL BASED THERMAL POWER PLANTS
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
Project quality management in manufacturing
Mechanical Engineering MATERIALS Selection
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
bas. eng. economics group 4 presentation 1.pptx
CYBER-CRIMES AND SECURITY A guide to understanding
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
composite construction of structures.pdf
Geodesy 1.pptx...............................................
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
Welding lecture in detail for understanding

IRJET- Data Deduplication Security with Dynamic Ownership Management

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue:08 | Aug 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1624 DATA DEDUPLICATION SECURITY WITH DYNAMIC OWNERSHIP MANAGEMENT Tanvi Rudrashetty1 1B. Tech Student, Department of CSE, Gurunanak Institutions, Ibrahimpatnam, Hyderabad, India ---------------------------------------------------------------------***---------------------------------------------------------------------- Abstract -To provide security of deduplication systemwith high authentication during which the information is being distributed across multiple cloud servers. Deduplication technique eliminates redundant data and stores only a single copy of that data. By the use of hash table formula, the requirement of informationconfidentialityandreducingspace storage are achieved. It converts a range of key values into a range of indexes of an array. It performs a basic operations of a research, insert, and deletion. As a result, security analysis demonstrate that our deduplication systems are secure in the proposed system. To protect the confidentiality of sensitive data while supporting deduplication, thehashtablealgorithm technique has been proposed to encrypt the data before outsourcing. To safeguard information security which has been different from conventional deduplication systems, the differential rights of users are further considered induplicate check besides the data itself. Data deduplication is one of the principal information compression approach for terminating duplicate copies of redundant information, and has been widely incorporated in cloud storage to decrease the quantity of storage space and save bandwidth. To protecttheprivacyof sensitive information while supporting deduplication, the convergent coding technique has been planned to encode the information before outsourcing. Key Words: Security, Data De-duplication, Convergent Encryption, Privacy, Authentication. 1. INTRODUCTION Because of the importance in serving users to form real time decisions, information dissemination hasbecomeimportant in several large-scale emergency applications, like earthquake observation, disaster weather warning, and status update in social networks. Recently, information dissemination in these emergency applications presents a number of contemporary trends. One is the rapid growth of live content. For example, Facebook users publish over 600,000 pieces of content and Twitter users send over 100,000 tweets on average per minute. The other is the highly dynamic network environment. For instance, the measurement studies indicate that most users’ sessions in social networks only last several minutes. In emergency eventualities, the fulminant disasters like earthquake or weather condition might causethefailureofa large range of users instantly. These characteristics require the data dissemination system to be scalable and reliable. Firstly, the system should be scalable to supportthe massive quantity of live content. The key is to supply an ascendable event matching service to separate extraneous users. Otherwise, the content may have to traverse a large number of uninterested users before they reach interested users. Secondly, with the dynamic network environment, it’s quite necessary to provide reliable schemes to keep continuous data dissemination capacity. Otherwise, the system interruption might cause the live content becomes obsolete content. Driven by these necessities, publish/subscribe (pub/ sub) pattern is widely used to disseminatedata due to its flexibility, scalability, and efficient support of complex event processing. In pub/sub systems(pub/subs),a receiver (subscriber) registers its interest in the form of a subscription. Events are published by senders to the pub/ sub system. In conventional information dissemination applications, the live content isgeneratedbypublishersatan occasional speed, that makes several pubs/subs adopt the multi-hop routing techniques to distribute events. A large body of broker-based pub/subs forward events and subscriptions through organizing nodes into diverse distributed overlays, such astreebaseddesigncluster-based design and DHT-based design. However, the multichip routing techniques in these broker-based systems cause an occasional matching turnout, that is insufficient to apply to current high arrival rate of live content. 2. EXSISTING SYSTEM In the existing deduplication system,eachuserisissueda set of privileges during system initialization. Each file uploaded to the cloud is additionally finite by a group of privileges to specify which type of users is allowed to perform the duplicate check and access the files. Before presenting his duplicate check request for a file, the user needs to take that particular file and his veryown benefits as inputs. The user is in a position to seek out a replica for this file if and provided that there's a duplicate of this file and a matched privilege stored in cloud. 3. PROPOSED SYSTEM The proposing system, we terminating redundant copies of repeating information has been widely usedincloudstorage to minimize the amount of storage capacity and save bandwidth. To protect the privacy of sensitive information while supporting deduplication, the convergent encryption technique has been proposed to encrypt the data before outsourcing. To better protect information security, this
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue:08 | Aug 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1625 paper makes the first attempt to formally address the problem of authorized data deduplication. 4. SYSTEM ARCHITECTURE Architecture diagram shows the connection between completely different elements of system. This diagram is extremely necessary to know the general idea of system. Architecture representation might be a plan of a system, within which the essential components or roles and tasks are described by blocks connected by lines that show the relationships of the blocks. They are heavily employed in the engineering world in hardware model, electronic plan, package representation, and process flow diagrams. Fig-1: System Architecture 5. IMPLEMENTATION Fig-2.1: Cloud Login Description: Page when we run the project where the authentication server provides authorized logins. Fig-2.2 Entering Convergent key Description: creating convergent key for securing data deduplication where we get access to user Id details. Fig-2.3 Private cloud Login Description: Private cloud connects to public cloud infrastructure, allowing an organization to orchestrate workloads across the two environments. SEND REQUEST TO GET FILE TOKEN USER PRIVATE CLOUD PUBLIC CLOUD CONVER GENT KEY GENERAT ION UPLOAD ING A FILE DEDUPLIC ATION SYSTEM
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue:08 | Aug 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1626 Fig 2.4 Document creation and data representation Description: Document creation for security purpose after user access. 6. CONCLUSIONS The notion of approved information deduplication was planned to safeguard the information security by including divergent rights of users within the duplicate check. In which the replicated -check tokens of files are generated by the private cloud server with private(special) keys. 7. FUTURE ENHANCEMENT In future there are still some possible extensions of our current work remaining. If user wants to modify a file in already stored in cloud, user can modify. REFERENCES 1. Paul Anderson, Le Zhang[1],FastandSecureLaptop Backups with Encrypted De-duplication,2011 2. Pasquale puzio secludit and eurecom, refik molva eurecom, melek o nen eurecom[2], Clouded up: secure deduplication with encrypted data for cloud storage,2012 3. N.O.agrawal,Prof Mr. s.s. kulkarni[3], Secure deduplication and data security with efficient and reliable CEKM,2014 4. Pierre-Louis Cayrel1, Philippe Gaborit1 and Marc Girault2[4], Identity-basedsignatureschemesusing correcting codes,2011. 5. B.C. Tea, M.R.K. Ariffin and J.J. Chin[5], An Efficient Identification Scheme in Standard Model Based on the Diophantine Equation Hard Problem,2013.