SlideShare a Scribd company logo
Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram,
Nellore www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
Secure Auditing and Deduplicating
Data in Cloud
ABSTRACT:
As the cloud computing technology develops during the last decade,
outsourcing data to cloud service for storage becomes an attractive trend, which
benefits in sparing efforts on heavy data maintenance and management.
Nevertheless, since the outsourced cloud storage is not fully trustworthy, it
raises security concerns on how to realize data deduplication in cloud while
achieving integrity auditing. In this work, we study the problem of integrity
auditing and secure deduplication on cloud data. Specifically, aiming at
achieving both data integrity and deduplication in cloud, we propose two secure
systems, namely SecCloud and SecCloud+. SecCloud introduces an auditing
entity with a maintenance of a MapReduce cloud, which helps clients generate
data tags before uploading as well as audit the integrity of data having been
stored in cloud. Compared with previous work, the computation by user in
SecCloud is greatly reduced during the file uploading and auditing phases.
SecCloud+ is designed motivated by the fact that customers always want to
Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram,
Nellore www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
encrypt their data before uploading, and enables integrity auditing and secure
deduplication on encrypted data.
Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram,
Nellore www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
EXISTING SYSTEM:
SecCloud introduces an auditing entity with a maintenance of a Map
Reduce cloud, which helps clients generate data tags before uploading as well
as audit the integrity of data having been stored in cloud. This design fixes the
issue of previous work that the computational load at user or auditor is too huge
for tag generation. For completeness of fine-grained, the functionality of
auditing designed in SecCoud is supported on both block level and sector level.
In addition, SecCoud also enables secure deduplication. Notice that the
“security” considered in SecCoud is the prevention of leakage of side channel
information. In order to prevent the leakage of such side channel information,
we follow the tradition of and design a proof of ownership protocol between
clients and cloud servers, which allows clients to prove to cloud servers that
they exactly own the target data.
Motivated by the fact that customers always want to encrypt their data
before uploading, for reasons ranging from personal privacy to corporate policy,
we introduce a key server into SecCloud as with and propose the SecCloud+
schema. Besides supporting integrity auditing and secure deduplication,
SecCloud+ enables the guarantee of file confidentiality. Specifically, thanks to
the property of deterministic encryption in convergent encryption, we propose a
method of directly auditing integrity on encrypted data. The challenge of
deduplication on encrypted is the prevention of dictionary attack. As with, we
make a modification on convergent encryption such that the convergent key of
file is generated and controlled by a secret “seed”, such that any adversary could
not directly derive the convergent key from the content of file and the dictionary
attack is prevented.
Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram,
Nellore www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
Disadvantages :
 It is very difficult to audit the files huge and large amount of data in cloud
using integrity auditing.
 Data loss and lots of Duplicate files in cloud .
PROPOSED SYSTEM:
We specify that our proposed SecCloud system has achieved both integrity
auditing and file deduplication. However, it cannot prevent the cloud servers
from knowing the content of files having been stored. In other words, the
functionalities of integrity auditing and secure deduplication are only imposed
on plain files. In this section, we propose SecCloud+, which allows for integrity
auditing and deduplication on encrypted files. Cloud Clients have large data
files to be stored and rely on the cloud for data maintenance and computation.
They can be either individual consumers or commercial organizations;
Cloud Servers virtualize the resources according to the requirements of
clients and expose them as storage pools. Typically, the cloud clients may buy
or lease storage capacity from cloud servers, and store their individual data in
these bought or rented spaces for future utilization. Auditor which helps clients
Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram,
Nellore www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
upload and audit their outsourced data maintains a MapReduce cloud and acts
like a certificate authority. This assumption presumes that the auditor is
associated with a pair of public and private keys. Its public key is made
available to the other entities in the system
Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram,
Nellore www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
The design goal of file confidentiality requires to prevent the cloud
servers from accessing the content of files. Specially, we require that the goal of
file confidentiality needs to be resistant to “dictionary attack”. That is, even the
adversaries have pre-knowledge of the “dictionary” which includes all the
possible files, they still cannot recover the target file.
Advantages:
 It provides the Integrity auditing by Clustering the files with removing
the duplicate files
 The duplicate files are mapped with a single copy of the file by mapping
with the existing file in the cloud
MODULE DESCRIPTION:
File Confidentiality:
The design goal of file confidentiality requires to prevent the cloud
servers from accessing the content of files. Specially, we require that the goal of
file confidentiality needs to be resistant to “dictionary attack”. That is, even the
adversaries have pre-knowledge of the “dictionary” which includes all the
possible files, they still cannot recover the target file
Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram,
Nellore www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram,
Nellore www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
Secure Deduplication:
Deduplication is a technique where the server stores only a single copy of
each file, regardless of how many clients asked to store that file, such that the
disk space of cloud servers as well as network bandwidth are saved. However,
trivial client side deduplication leads to the leakage of side channel information.
For example, a server telling a client that it need not send the file reveals that
some other client has the exact same file, which could be sensitive information
in some case.
Encryption & Decryption:
Encryption and decryption provides data confidentiality in
deduplication. A user (or data owner) derives a convergent key from the data
content and encrypts the data copy with the convergent key. In addition, the
user derives a tag for the data copy, such that the tag will be used to detect
duplicates. Here, we assume that the tag correctness property holds, i.e., if two
data copies are the same, then their tags are the same. Formally, a convergent
encryption scheme can be defined with four primitive functions:
Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram,
Nellore www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
Integrity Auditing:
The first design goal of this work is to provide the capability of verifying
correctness of the remotely stored data. The integrity verification further
requires two features:
1. Public verification, which allows anyone, not just the clients originally
stored the file, to perform verification;
2. Stateless verification, which is able to eliminate the need for state
information maintenance at the verifier side between the actions of auditing and
data storage.
ARCHITECTURE
Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram,
Nellore www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram,
Nellore www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
SOFTWARE REQUIREMENTS:
 Operating System : Windows 7
 Technology : Java and J2EE
 Web Technologies : Html, JavaScript, CSS
 IDE : My Eclipse
 Web Server : Tomcat
 Database : My SQL
 Java Version : J2SDK1.7
HARDWARE REQUIREMENTS:
 Hardware : Pentium Dual Core
 Speed : 2.80 GHz
 RAM : 1GB
 Hard Disk : 20 GB
 Floppy Drive : 1.44 MB
 Key Board : Standard Windows Keyboard
 Mouse : Two or Three Button Mouse
 Monitor : SVGA
Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram,
Nellore www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
CONCLUSION:
Aiming at achieving both data integrity and deduplication in cloud, we
propose SecCloud and SecCloud+. SecCloud introduces an auditing entity with
maintenance of a MapReduce cloud, which helps clients generate data tags
before uploading as well as audit the integrity of data having been stored in
cloud. In addition, SecCoud enables secure deduplication through introducing a
Proof of Ownership protocol and preventing the leakage of side channel
information in data deduplication. Compared with previous work, the
computation by user in SecCloud is greatly reduced during the file uploading
and auditing phases. SecCloud+ is an advanced construction motivated by the
fact that customers always want to encrypt their data before uploading, and
allows for integrity auditing and secure deduplication directly on encrypted
data.

More Related Content

DOCX
Secure auditing and deduplicating data in cloud
DOCX
SECURE AUDITING AND DEDUPLICATING DATA IN CLOUD
PDF
Doc A hybrid cloud approach for secure authorized deduplication
DOCX
Secure distributed deduplication systems with improved reliability
DOCX
Hybrid Cloud Approach for Secure Authorized Deduplication
PPTX
Secure deduplicaton with efficient and reliable convergent
DOCX
A Hybrid Cloud Approach for Secure Authorized Deduplication
DOCX
A hybrid cloud approach for secure authorized deduplication
Secure auditing and deduplicating data in cloud
SECURE AUDITING AND DEDUPLICATING DATA IN CLOUD
Doc A hybrid cloud approach for secure authorized deduplication
Secure distributed deduplication systems with improved reliability
Hybrid Cloud Approach for Secure Authorized Deduplication
Secure deduplicaton with efficient and reliable convergent
A Hybrid Cloud Approach for Secure Authorized Deduplication
A hybrid cloud approach for secure authorized deduplication

What's hot (19)

PDF
Secure distributed deduplication systems with improved reliability 2
PPTX
A hybrid cloud approach for secure authorized deduplication.
DOC
A hybrid cloud approach for secure authorized deduplication
PDF
A hybrid cloud approach for secure authorized deduplication
PDF
A Hybrid Cloud Approach for Secure Authorized De-Duplication
PDF
an enhanced multi layered cryptosystem based secure
PPTX
A hybrid cloud approach for secure authorized deduplication
PDF
A hybrid cloud approach for secure authorized deduplication
PDF
Secure Authorised De-duplication using Convergent Encryption Technique
PPTX
Deduplication in Open Spurce Cloud
PPTX
Secure erasure code based cloud storage system with secure data forwarding
PPTX
Privacy preserving public auditing
PPTX
Identity based distributed provable data possession in multi-cloud storage
PPTX
Privacy preserving public auditing for regenerating-code-based cloud storage
PDF
IRJET - A Secure Access Policies based on Data Deduplication System
PPTX
PUBLIC AUDITING FOR SECURE CLOUD STORAGE ...
PPTX
Identity Based Secure Distributed Storage Scheme
PDF
Authenticated key exchange protocols for parallel network file systems
DOCX
A secure erasure code based cloud storage
Secure distributed deduplication systems with improved reliability 2
A hybrid cloud approach for secure authorized deduplication.
A hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplication
A Hybrid Cloud Approach for Secure Authorized De-Duplication
an enhanced multi layered cryptosystem based secure
A hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplication
Secure Authorised De-duplication using Convergent Encryption Technique
Deduplication in Open Spurce Cloud
Secure erasure code based cloud storage system with secure data forwarding
Privacy preserving public auditing
Identity based distributed provable data possession in multi-cloud storage
Privacy preserving public auditing for regenerating-code-based cloud storage
IRJET - A Secure Access Policies based on Data Deduplication System
PUBLIC AUDITING FOR SECURE CLOUD STORAGE ...
Identity Based Secure Distributed Storage Scheme
Authenticated key exchange protocols for parallel network file systems
A secure erasure code based cloud storage
Ad

Viewers also liked (20)

DOCX
Secure auditing and deduplicating data in cloud
DOCX
A Novel privacy preserving public auditing for shared data in cloud
PPTX
Cloud Computing Security From Single To Multicloud
PDF
Oruta project report
DOCX
CLOUD CPOMPUTING SECURITY
PPT
Privacy preserving public auditing for secure cloud storage
DOCX
A lightweight secure scheme for detecting
DOCX
Fahad Project On Spencer
PPT
Privacy Preserving Public Auditing for Data Storage Security in Cloud.ppt
PDF
Mobile cloud computing
PDF
Ieee 2015 2016
PPTX
Visible Light Communication
PPTX
Palm vein technology
PPT
Mobile cloud computing; Future of Cloud Computing
PPTX
VISIBLE LIGHT COMMUNICATION
PPT
palm vein technology and its applications
PPTX
Palm vein technology.pptx
PPTX
Palm Vein Technology
PPTX
Mobile Cloud Computing
PDF
visible light communication
Secure auditing and deduplicating data in cloud
A Novel privacy preserving public auditing for shared data in cloud
Cloud Computing Security From Single To Multicloud
Oruta project report
CLOUD CPOMPUTING SECURITY
Privacy preserving public auditing for secure cloud storage
A lightweight secure scheme for detecting
Fahad Project On Spencer
Privacy Preserving Public Auditing for Data Storage Security in Cloud.ppt
Mobile cloud computing
Ieee 2015 2016
Visible Light Communication
Palm vein technology
Mobile cloud computing; Future of Cloud Computing
VISIBLE LIGHT COMMUNICATION
palm vein technology and its applications
Palm vein technology.pptx
Palm Vein Technology
Mobile Cloud Computing
visible light communication
Ad

Similar to Secure auditing and deduplicating data in cloud (20)

DOCX
Secure distributed deduplication systems with improved reliability
PDF
IRJET- Secure Data Deduplication for Cloud Server using HMAC Algorithm
PDF
J017236366
PDF
Secure Data Storage in Cloud Using Encryption and Steganography
PDF
EXPLORING WOMEN SECURITY BY DEDUPLICATION OF DATA
PDF
Secure Auditing and Deduplicating Data on Cloud
PDF
International Journal of Engineering Research and Development (IJERD)
PDF
IRJET- Continuous Auditing Approach to the Cloud Service Addressing Attri...
DOCX
O po r enabling proof of retrievability in cloud computing with resource cons...
PDF
L01246974
DOCX
Control cloud data access privilege and anonymity with fully anonymous attrib...
PDF
Remote data integrity checking with a third party auditor in public cloud usi...
PDF
Enabling Integrity for the Compressed Files in Cloud Server
PDF
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
PDF
International Journal of Engineering and Science Invention (IJESI)
PDF
I017225966
PDF
A Secure Framework for Cloud Computing With Multi-cloud Service Providers
PDF
Survey on securing outsourced storages in cloud
PDF
Survey on securing outsourced storages in cloud
PDF
Periodic Auditing of Data in Cloud Using Random Bits
Secure distributed deduplication systems with improved reliability
IRJET- Secure Data Deduplication for Cloud Server using HMAC Algorithm
J017236366
Secure Data Storage in Cloud Using Encryption and Steganography
EXPLORING WOMEN SECURITY BY DEDUPLICATION OF DATA
Secure Auditing and Deduplicating Data on Cloud
International Journal of Engineering Research and Development (IJERD)
IRJET- Continuous Auditing Approach to the Cloud Service Addressing Attri...
O po r enabling proof of retrievability in cloud computing with resource cons...
L01246974
Control cloud data access privilege and anonymity with fully anonymous attrib...
Remote data integrity checking with a third party auditor in public cloud usi...
Enabling Integrity for the Compressed Files in Cloud Server
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
International Journal of Engineering and Science Invention (IJESI)
I017225966
A Secure Framework for Cloud Computing With Multi-cloud Service Providers
Survey on securing outsourced storages in cloud
Survey on securing outsourced storages in cloud
Periodic Auditing of Data in Cloud Using Random Bits

More from Pvrtechnologies Nellore (20)

DOCX
A High Throughput List Decoder Architecture for Polar Codes
DOCX
Performance/Power Space Exploration for Binary64 Division Units
DOCX
Hybrid LUT/Multiplexer FPGA Logic Architectures
DOCX
Input-Based Dynamic Reconfiguration of Approximate Arithmetic Units for Video...
DOCX
2016 2017 ieee matlab project titles
DOCX
2016 2017 ieee vlsi project titles
DOCX
2016 2017 ieee ece embedded- project titles
DOCX
A High-Speed FPGA Implementation of an RSD-Based ECC Processor
DOCX
6On Efficient Retiming of Fixed-Point Circuits
DOCX
Pre encoded multipliers based on non-redundant radix-4 signed-digit encoding
DOCX
Quality of-protection-driven data forwarding for intermittently connected wir...
DOC
11.online library management system
DOC
06.e voting system
DOCX
New web based projects list
DOCX
Power controlled medium access control
DOCX
IEEE PROJECTS LIST
DOCX
Control cloud-data-access-privilege-and-anonymity-with-fully-anonymous-attrib...
DOCX
Cloud keybank privacy and owner authorization
DOCX
Circuit ciphertext policy attribute-based hybrid encryption with verifiable
DOCX
Closeness through-microaggregation-strict-privacy-with-enhanced-utility-prese...
A High Throughput List Decoder Architecture for Polar Codes
Performance/Power Space Exploration for Binary64 Division Units
Hybrid LUT/Multiplexer FPGA Logic Architectures
Input-Based Dynamic Reconfiguration of Approximate Arithmetic Units for Video...
2016 2017 ieee matlab project titles
2016 2017 ieee vlsi project titles
2016 2017 ieee ece embedded- project titles
A High-Speed FPGA Implementation of an RSD-Based ECC Processor
6On Efficient Retiming of Fixed-Point Circuits
Pre encoded multipliers based on non-redundant radix-4 signed-digit encoding
Quality of-protection-driven data forwarding for intermittently connected wir...
11.online library management system
06.e voting system
New web based projects list
Power controlled medium access control
IEEE PROJECTS LIST
Control cloud-data-access-privilege-and-anonymity-with-fully-anonymous-attrib...
Cloud keybank privacy and owner authorization
Circuit ciphertext policy attribute-based hybrid encryption with verifiable
Closeness through-microaggregation-strict-privacy-with-enhanced-utility-prese...

Recently uploaded (20)

PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
KodekX | Application Modernization Development
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PPTX
Spectroscopy.pptx food analysis technology
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
cuic standard and advanced reporting.pdf
PDF
Approach and Philosophy of On baking technology
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PPTX
sap open course for s4hana steps from ECC to s4
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
Empathic Computing: Creating Shared Understanding
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PPTX
Big Data Technologies - Introduction.pptx
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
MIND Revenue Release Quarter 2 2025 Press Release
KodekX | Application Modernization Development
NewMind AI Weekly Chronicles - August'25 Week I
Per capita expenditure prediction using model stacking based on satellite ima...
Building Integrated photovoltaic BIPV_UPV.pdf
Spectroscopy.pptx food analysis technology
Advanced methodologies resolving dimensionality complications for autism neur...
cuic standard and advanced reporting.pdf
Approach and Philosophy of On baking technology
The Rise and Fall of 3GPP – Time for a Sabbatical?
sap open course for s4hana steps from ECC to s4
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Empathic Computing: Creating Shared Understanding
Dropbox Q2 2025 Financial Results & Investor Presentation
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Big Data Technologies - Introduction.pptx

Secure auditing and deduplicating data in cloud

  • 1. Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457 Secure Auditing and Deduplicating Data in Cloud ABSTRACT: As the cloud computing technology develops during the last decade, outsourcing data to cloud service for storage becomes an attractive trend, which benefits in sparing efforts on heavy data maintenance and management. Nevertheless, since the outsourced cloud storage is not fully trustworthy, it raises security concerns on how to realize data deduplication in cloud while achieving integrity auditing. In this work, we study the problem of integrity auditing and secure deduplication on cloud data. Specifically, aiming at achieving both data integrity and deduplication in cloud, we propose two secure systems, namely SecCloud and SecCloud+. SecCloud introduces an auditing entity with a maintenance of a MapReduce cloud, which helps clients generate data tags before uploading as well as audit the integrity of data having been stored in cloud. Compared with previous work, the computation by user in SecCloud is greatly reduced during the file uploading and auditing phases. SecCloud+ is designed motivated by the fact that customers always want to
  • 2. Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457 encrypt their data before uploading, and enables integrity auditing and secure deduplication on encrypted data.
  • 3. Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457 EXISTING SYSTEM: SecCloud introduces an auditing entity with a maintenance of a Map Reduce cloud, which helps clients generate data tags before uploading as well as audit the integrity of data having been stored in cloud. This design fixes the issue of previous work that the computational load at user or auditor is too huge for tag generation. For completeness of fine-grained, the functionality of auditing designed in SecCoud is supported on both block level and sector level. In addition, SecCoud also enables secure deduplication. Notice that the “security” considered in SecCoud is the prevention of leakage of side channel information. In order to prevent the leakage of such side channel information, we follow the tradition of and design a proof of ownership protocol between clients and cloud servers, which allows clients to prove to cloud servers that they exactly own the target data. Motivated by the fact that customers always want to encrypt their data before uploading, for reasons ranging from personal privacy to corporate policy, we introduce a key server into SecCloud as with and propose the SecCloud+ schema. Besides supporting integrity auditing and secure deduplication, SecCloud+ enables the guarantee of file confidentiality. Specifically, thanks to the property of deterministic encryption in convergent encryption, we propose a method of directly auditing integrity on encrypted data. The challenge of deduplication on encrypted is the prevention of dictionary attack. As with, we make a modification on convergent encryption such that the convergent key of file is generated and controlled by a secret “seed”, such that any adversary could not directly derive the convergent key from the content of file and the dictionary attack is prevented.
  • 4. Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457 Disadvantages :  It is very difficult to audit the files huge and large amount of data in cloud using integrity auditing.  Data loss and lots of Duplicate files in cloud . PROPOSED SYSTEM: We specify that our proposed SecCloud system has achieved both integrity auditing and file deduplication. However, it cannot prevent the cloud servers from knowing the content of files having been stored. In other words, the functionalities of integrity auditing and secure deduplication are only imposed on plain files. In this section, we propose SecCloud+, which allows for integrity auditing and deduplication on encrypted files. Cloud Clients have large data files to be stored and rely on the cloud for data maintenance and computation. They can be either individual consumers or commercial organizations; Cloud Servers virtualize the resources according to the requirements of clients and expose them as storage pools. Typically, the cloud clients may buy or lease storage capacity from cloud servers, and store their individual data in these bought or rented spaces for future utilization. Auditor which helps clients
  • 5. Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457 upload and audit their outsourced data maintains a MapReduce cloud and acts like a certificate authority. This assumption presumes that the auditor is associated with a pair of public and private keys. Its public key is made available to the other entities in the system
  • 6. Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457 The design goal of file confidentiality requires to prevent the cloud servers from accessing the content of files. Specially, we require that the goal of file confidentiality needs to be resistant to “dictionary attack”. That is, even the adversaries have pre-knowledge of the “dictionary” which includes all the possible files, they still cannot recover the target file. Advantages:  It provides the Integrity auditing by Clustering the files with removing the duplicate files  The duplicate files are mapped with a single copy of the file by mapping with the existing file in the cloud MODULE DESCRIPTION: File Confidentiality: The design goal of file confidentiality requires to prevent the cloud servers from accessing the content of files. Specially, we require that the goal of file confidentiality needs to be resistant to “dictionary attack”. That is, even the adversaries have pre-knowledge of the “dictionary” which includes all the possible files, they still cannot recover the target file
  • 7. Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
  • 8. Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457 Secure Deduplication: Deduplication is a technique where the server stores only a single copy of each file, regardless of how many clients asked to store that file, such that the disk space of cloud servers as well as network bandwidth are saved. However, trivial client side deduplication leads to the leakage of side channel information. For example, a server telling a client that it need not send the file reveals that some other client has the exact same file, which could be sensitive information in some case. Encryption & Decryption: Encryption and decryption provides data confidentiality in deduplication. A user (or data owner) derives a convergent key from the data content and encrypts the data copy with the convergent key. In addition, the user derives a tag for the data copy, such that the tag will be used to detect duplicates. Here, we assume that the tag correctness property holds, i.e., if two data copies are the same, then their tags are the same. Formally, a convergent encryption scheme can be defined with four primitive functions:
  • 9. Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457 Integrity Auditing: The first design goal of this work is to provide the capability of verifying correctness of the remotely stored data. The integrity verification further requires two features: 1. Public verification, which allows anyone, not just the clients originally stored the file, to perform verification; 2. Stateless verification, which is able to eliminate the need for state information maintenance at the verifier side between the actions of auditing and data storage. ARCHITECTURE
  • 10. Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
  • 11. Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457 SOFTWARE REQUIREMENTS:  Operating System : Windows 7  Technology : Java and J2EE  Web Technologies : Html, JavaScript, CSS  IDE : My Eclipse  Web Server : Tomcat  Database : My SQL  Java Version : J2SDK1.7 HARDWARE REQUIREMENTS:  Hardware : Pentium Dual Core  Speed : 2.80 GHz  RAM : 1GB  Hard Disk : 20 GB  Floppy Drive : 1.44 MB  Key Board : Standard Windows Keyboard  Mouse : Two or Three Button Mouse  Monitor : SVGA
  • 12. Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457 CONCLUSION: Aiming at achieving both data integrity and deduplication in cloud, we propose SecCloud and SecCloud+. SecCloud introduces an auditing entity with maintenance of a MapReduce cloud, which helps clients generate data tags before uploading as well as audit the integrity of data having been stored in cloud. In addition, SecCoud enables secure deduplication through introducing a Proof of Ownership protocol and preventing the leakage of side channel information in data deduplication. Compared with previous work, the computation by user in SecCloud is greatly reduced during the file uploading and auditing phases. SecCloud+ is an advanced construction motivated by the fact that customers always want to encrypt their data before uploading, and allows for integrity auditing and secure deduplication directly on encrypted data.