AUTHORIZED DEDUPLICATION
A major project report submitted to CUSAT
in partial fulfillment of the requirements
for the award of degree of
BACHELOR OF TECHNOLOGY
IN
COMPUTER SCIENCE & ENGINEERING
Submitted by,
BRAHMANAND KUMAR (Reg No: 12130217)
CHANDRASHEKHAR KUMAR (Reg No: 13130214)
DHEERAJ KUMAR (Reg No: 12130218)
VISHWAJEET KUMAR GUPTA (Reg No:12130253)
BONAFIDE CERTIFICATE
This is to certify that the project report entitled A HYBRID CLOUD APPROACH
FOR SECURE AUTHORIZED DEDUPLICATION has been submitted by
BRAHMANAND KUMAR (Reg No:12130217),CHANDRASHEKHAR KUMAR(Reg No:
13130214), DHEERAJ KUMAR (Reg No: 12130218), VISHWAJEET KUMAR GUPTA (Reg No:
12130253) in partial fulfillment of the requirements for the award of degree of Bachelor
of Technology in Computer Science & Engg., is a bonafide record of the work carried
out by them under my guidance and supervision at Cochin University College of
Engineering, Kuttanadu, Alappuzha, during the academic year 2012-2016.
Mrs. Bindu.P.K
Manoj Kumar P
Associate Professor
Associate Professor
Head of Department,CSE
Dept. of CSE
Dept. of CSE
Project Guide
Co-ordinator
Date:
Place: Pulincunoo
ACKNOWLEDGEMENT
First and the foremost, we thank God the Almighty for His grace and blessings in
making all this possible.
We are grateful to our respected principal, DR. SREEJTH P.S, for his guidance and
support. We extend deep gratitude to, Mr. MANOJ KUMAR P, Head of Department,
Computer Science and Engineering, whos invaluable and meticulous reviews
improved the quality of this work.
We express our sincere thanks to our project guides, Dr. PREETHA MATHEW K
and Mrs BINDU P K, Associate Professors and VINEETHA G R, Assistant
Professor in Computer Science Department, for their support and guidance.
Last but not the least, we would like to thank all our friends and our parents whose
support with their love and encouragement for the completion of this project report.
BRAHMANAND KUMAR
CHANDRASHEKHAR KUMAR
DHEERAJ KUMAR
VISHWAJEET KUMAR GUPTA
ABSTRACT
Data deduplication is one of important data compression techniques for
eliminating duplicate copies of repeating data, and has been widely used in cloud
storage to reduce the amount of storage space and save bandwidth. To protect
the confidentiality of sensitive data while supporting deduplication, the
convergent encryption technique has been proposed to encrypt the data before
outsourcing. To better protect data security, this paper makes the first attempt to
formally address the problem of authorized data deduplication. Different from
traditional deduplication systems, the differential privileges of users are further
considered in duplicate check besides the data itself. We also present several new
deduplication constructions supporting authorized duplicate check in a hybrid
cloud architecture. Security analysis demonstrates that our scheme is secure in
terms of the definitions specified in the proposed security model. As a proof of
concept, we implement a prototype of our proposed authorized duplicate check
scheme and conduct tested experiments using our prototype. We show that our
proposed authorized duplicate check scheme incurs minimal overhead compared
to normal operations.
CONTENTS
Page No.
LIST OF TABLES
LIST OF FIGURES
i
ii
1. INTRODUCTION
2. RELATED WORK
3. PROPOSED SYSTEM
1
7
10
10
12
12
12
3.4Requirement Specification
15
3.4.1
3.4.2
Hardware Specification
Software Specification
4. SYSTEM DESIGN
4.1 DFD
15
15
16
16
18
4.2UML Diagrams
4.2.1 Use Case Diagram
4.2.2 Class Diagram
4.2.3 Sequence Diagram
4.2.4 Activity Diagram
5. ALGORITHMS
19
20
21
22
26
5.1 AES
26
34
35
36
37
10. CONCLUSION
11. FUTURE WORK
REFRENCES
APPENDICES
42
43
44
45
LIST OF TABLES
Table. No
TABLE
1
2
3
Downloads Table
Updates Table
User_Reg Table
User_Req Table
Files Table
Rights Table
Page No
23
23
24
24
25
25
LIST OF FIGURES
Fig. No
Figures
Page No
1.
2.
3.
4.
DFD
12
5.
17
6.
Class diagram
Sequence diagram
19
7.
Activity diagram
20
8.
Overview of AES
21
9.
AddRoundkey
The AES S Box
22
10.
Shift Rows
27
11.
MixColums
28
12.
KeySchedule
Inverse shift row
29
13.
29
14.
15.
30
31
32
32
33
16.
17.
ii