ABSTRACT:
Data
deduplication is a technique for eliminating duplicate copies of data, and has
been widely used in cloud storage to reduce storage space and upload bandwidth.
However, there is only one copy for each file stored in cloud even if such a
file is owned by a huge number of users. As a result, deduplication system
improves storage utilization while reducing reliability. Furthermore, the
challenge of privacy for sensitive data also arises when they are outsourced by
users to cloud. Aiming to address the above security challenges, this paper
makes the first attempt to formalize the notion of distributed reliable
deduplication system. We propose new distributed deduplication systems with
higher reliability in which the data chunks are distributed across multiple
cloud servers. The security requirements of data confidentiality and tag
consistency are also achieved by introducing a deterministic secret sharing scheme
in distributed storage systems, instead of using convergent encryption as in
previous deduplication systems. Security analysis demonstrates that our
deduplication systems are secure in terms of the definitions specified in the
proposed security model. As a proof of concept, we implement the proposed
systems and demonstrate that the incurred overhead is very limited in realistic
environments
AIM
The
main goal is to enable deduplication and distributed storage of the data across
multiple storage servers.
SCOPE
Data
deduplication techniques are widely employed to backup data and minimize
network and storage overhead by detecting and eliminating redundancy among data
SYNOPSIS
A
number of deduplication systems have been proposed based on various
deduplication strategies such as client-side or server-side deduplication,
file-level or block-level deduplication. Especially, with the advent of cloud
storage, data deduplication techniques become more attractive and critical for
the management of ever-increasing volumes of data in cloud storage services
which motivates enterprises and organizations to outsource data storage to
third-party cloud providers, as evidenced by many real-life case studies.
According to the analysis report of IDC, the volume of data in the world is
expected to reach 40 trillion gigabytes in 2020 [ Today’s commercial cloud
storage services, such as Drop box, Google Drive and Mozy, have been applying
deduplication to save the network bandwidth and the storage cost with client-side
deduplication.
EXISTING
SYSTEM
The
challenge for data privacy also arises as more and more sensitive data are
being outsourced by users to cloud. Encryption mechanisms have usually been
utilized to protect the confidentiality before outsourcing data into cloud.
Most commercial storage service provider are reluctant to apply encryption over
the data because it makes deduplication impossible. The reason is that the
traditional encryption mechanisms, including public key encryption and
symmetric key encryption, require different users to encrypt their data with
their own keys. As a result, identical data copies of different users will lead
to different cipher texts.
DISADVANTAGES:
- To work on secure deduplication can properly address the reliability and tag consistency problem in distributed storage systems
- To protect both confidentiality and reliability while achieving deduplication in a cloud storage system is still a challenge.
PROPOSED SYSTEM
Four
new secure deduplication systems are proposed to provide efficient
deduplication with high reliability for file-level and block-level
deduplication, respectively. The secret splitting technique, instead of
traditional encryption methods, is utilized to protect data confidentiality.
Specifically, data are split into fragments by using secure secret sharing
schemes and stored at different servers. Our proposed constructions support
both file-level and block-level deduplication Security analysis demonstrates
that the proposed deduplication systems are secure in terms of the definitions
specified in the proposed security model. In more details, confidentiality,
reliability and integrity can be achieved in our proposed system. Two kinds of
collusion attacks are considered in our solutions. These are the collusion
attack on the data and the collusion attack against servers. In particular, the
data remains secure even if the adversary controls a limited number of storage
servers. We implement our deduplication
systems using the Ramp secret sharing scheme that enables high reliability and
confidentiality levels. Our evaluation results demonstrate that the new
proposed constructions are efficient and the redundancies are optimized and
comparable with the other storage system supporting the same level of
reliability
ADVANTAGES
- To protect data confidentiality, the secret sharing technique is utilized, which is also compatible with the distributed storage systems
- To improve the reliability of data while achieving the confidentiality of the users’ outsourced data without an encryption mechanism.
SYSTEM
CONFIGURATION:-
Hardware Requirements
- Speed - 1.1 Ghz
- Processor - Pentium IV
- RAM - 512 MB (min)
- Hard Disk - 40 GB
- Key Board - Standard Windows Keyboard
- Mouse - Two or Three Button Mouse
- Monitor - LCD/LED
Software
requirements
- Operating System : Windows 7
- Front End : ASP.Net and C#
- Database : MSSQL
- Tool : Microsoft Visual studio
REFERENCE:
Chen,
X. ; Huang, X. ; Tang, S. “SECURE DISTRIBUTED DEDUPLICATION SYSTEMS WITH
IMPROVED RELIABILITY” IEEE Transactions on Computers, VOL PP, ISS 99,FEBRUARY 2015.
No comments:
Post a Comment