Anda di halaman 1dari 7

A HYBRID CLOUD APPROACH FOR SECURE

AUTHORIZED DEDUPLICATION
A major project report submitted to CUSAT
in partial fulfillment of the requirements
for the award of degree of

BACHELOR OF TECHNOLOGY
IN
COMPUTER SCIENCE & ENGINEERING
Submitted by,
BRAHMANAND KUMAR (Reg No: 12130217)
CHANDRASHEKHAR KUMAR (Reg No: 13130214)
DHEERAJ KUMAR (Reg No: 12130218)
VISHWAJEET KUMAR GUPTA (Reg No:12130253)

Under the guidance of

Dr. Preetha Mathew K


Associate Professor, Dept. of CSE

Department of Computer Science & Engineering

COCHIN UNIVERSITY COLLEGE OF ENGINEERING


KUTTANADU, ALLAPUZZHA
MARCH 2016

COCHIN UNIVERSITY COLLEGE OF ENGINEERING


KUTTANADU, ALAPPUZHA

BONAFIDE CERTIFICATE
This is to certify that the project report entitled A HYBRID CLOUD APPROACH
FOR SECURE AUTHORIZED DEDUPLICATION has been submitted by
BRAHMANAND KUMAR (Reg No:12130217),CHANDRASHEKHAR KUMAR(Reg No:
13130214), DHEERAJ KUMAR (Reg No: 12130218), VISHWAJEET KUMAR GUPTA (Reg No:
12130253) in partial fulfillment of the requirements for the award of degree of Bachelor

of Technology in Computer Science & Engg., is a bonafide record of the work carried
out by them under my guidance and supervision at Cochin University College of
Engineering, Kuttanadu, Alappuzha, during the academic year 2012-2016.

Dr. Preetha Mathew K

Mrs. Bindu.P.K

Manoj Kumar P

Associate Professor

Associate Professor

Head of Department,CSE

Dept. of CSE

Dept. of CSE

Project Guide

Co-ordinator

Date:
Place: Pulincunoo

ACKNOWLEDGEMENT
First and the foremost, we thank God the Almighty for His grace and blessings in
making all this possible.
We are grateful to our respected principal, DR. SREEJTH P.S, for his guidance and
support. We extend deep gratitude to, Mr. MANOJ KUMAR P, Head of Department,
Computer Science and Engineering, whos invaluable and meticulous reviews
improved the quality of this work.
We express our sincere thanks to our project guides, Dr. PREETHA MATHEW K
and Mrs BINDU P K, Associate Professors and VINEETHA G R, Assistant
Professor in Computer Science Department, for their support and guidance.
Last but not the least, we would like to thank all our friends and our parents whose
support with their love and encouragement for the completion of this project report.

BRAHMANAND KUMAR
CHANDRASHEKHAR KUMAR
DHEERAJ KUMAR
VISHWAJEET KUMAR GUPTA

ABSTRACT
Data deduplication is one of important data compression techniques for
eliminating duplicate copies of repeating data, and has been widely used in cloud
storage to reduce the amount of storage space and save bandwidth. To protect
the confidentiality of sensitive data while supporting deduplication, the
convergent encryption technique has been proposed to encrypt the data before
outsourcing. To better protect data security, this paper makes the first attempt to
formally address the problem of authorized data deduplication. Different from
traditional deduplication systems, the differential privileges of users are further
considered in duplicate check besides the data itself. We also present several new
deduplication constructions supporting authorized duplicate check in a hybrid
cloud architecture. Security analysis demonstrates that our scheme is secure in
terms of the definitions specified in the proposed security model. As a proof of
concept, we implement a prototype of our proposed authorized duplicate check
scheme and conduct tested experiments using our prototype. We show that our
proposed authorized duplicate check scheme incurs minimal overhead compared
to normal operations.

CONTENTS
Page No.
LIST OF TABLES
LIST OF FIGURES

i
ii

1. INTRODUCTION
2. RELATED WORK
3. PROPOSED SYSTEM

1
7
10

3.1 System Study


3.2 System Architecture
3.3 Implementation

10
12
12

3.3.1 Module Description

12

3.4Requirement Specification

15

3.4.1
3.4.2

Hardware Specification
Software Specification

4. SYSTEM DESIGN
4.1 DFD

15
15

16
16
18

4.2UML Diagrams
4.2.1 Use Case Diagram
4.2.2 Class Diagram
4.2.3 Sequence Diagram
4.2.4 Activity Diagram

5. ALGORITHMS

19
20
21
22

26

5.1 AES

26

6. ADVANTAGES OF THE SYSTEM


7. APPLICATION OF THE SYSTEM
8. RESULTS
9. VALIDATION

34
35
36
37

10. CONCLUSION
11. FUTURE WORK
REFRENCES
APPENDICES

42
43
44
45

LIST OF TABLES

Table. No

TABLE

1
2
3

Downloads Table

Updates Table

User_Reg Table

User_Req Table

Files Table
Rights Table

Page No
23
23
24
24
25
25

LIST OF FIGURES

Fig. No

Figures

Page No

1.

Structure of cloud computing

2.

Characteristics Of cloud computing

3.

Structure of service models


System Architecture

4.

DFD

12

5.

Use case diagram

17

6.

Class diagram
Sequence diagram

19

7.

Activity diagram

20

8.

Overview of AES

21

9.

AddRoundkey
The AES S Box

22

10.

Shift Rows

27

11.

MixColums

28

12.

KeySchedule
Inverse shift row

29

13.

Inverse S-Box table

29

14.
15.

Inverse mix column

30
31
32
32
33

16.
17.

ii

Anda mungkin juga menyukai