International Journal of Advance Engineering and Research Development IMPROVED RELIABILITY IN DISTRIBUTED DEDUPLICATION SYSTEMS

Size: px
Start display at page:

Download "International Journal of Advance Engineering and Research Development IMPROVED RELIABILITY IN DISTRIBUTED DEDUPLICATION SYSTEMS"

Transcription

1 Scientific Journal of Impact Factor (SJIF): e-issn (O): p-issn (P): International Journal of Advance Engineering and Research Development Volume 3, Issue 2, February IMPROVED RELIABILITY IN DISTRIBUTED DEDUPLICATION SYSTEMS Pratik Mirjapure 1, Srisrimal Praveen 2, Vivek Shirsat 3, Shubham Kalaskar 4, Prof. Ashish Patel 5 1,2,3,4,5 Department Of Computer Engineering, D Y Patil College of Engg. Pimpri, Pune Abstract Information de-duplication is a system for putting off reproduction duplicates of information, and has been extensively utilized as a part of disbursed garage to diminish garage room and transfer information switch capacity. Be that as it can, there is one and simplest duplicate for each report put away in cloud no matter the opportunity that any such report is claimed by means of endless. For that reason, de-duplication framework complements outsource utilization whilst diminishing dependability. Furthermore, the test of safety for delicate facts likewise emerges when they're outsourced with the aid of clients to cloud. Looking forward to address the above security challenges, this paper makes the first endeavor to formalize the idea of disseminated strong de-duplication framework. We recommend new disseminated de-duplication frameworks with better unwavering nice in which the information pieces are circulated over distinct cloud servers. The safety stipulations of data privacy and label consistency are additionally executed with the aid of supplying a deterministic thriller sharing plan in conveyed outsource frameworks, in preference to utilizing focalized encryption as part of beyond de-duplication frameworks. Protection examination famous that our de-duplication frameworks are relaxed regarding the definitions determined in the proposed protection model. As a proof of concept, we actualize the proposed frameworks and exhibit that they brought about overhead is notably restricted in realistic conditions. Keywords- De-duplication, distributed storage system, reliability, secret sharing. I. INTRODUCTION There are two styles of de-duplication as a long way as the dimensions: (i) File level de-duplication, which finds redundancies between diverse files and uproots these redundancies to lessen restriction requests, and (ii) block stage deduplication, which unearths and evacuates redundancies between data blocks. The file may be partitioned into littler altered length or variable-length blocks. Utilizing settled size squares disentangles the calculations of block limits, while utilizing variable length portions (e.g., taking into consideration Rabin fingerprinting) gives higher de-duplication effectiveness. II. LITERATURE REVIEW 1. Reclaiming Space from Duplicate Files in a Server less Distributed File System Author: John R. Douceur We exhibit that it's miles workable to increase hidden Markov models to have a countable endless variety of hidden states. by way of utilizing the speculation of Dirichlet paperwork we are able to verifiably contain out the boundlessly sever circulate parameters, leaving simply three hyper parameters which can be received from facts. These three hyper parameters symbolize a diverse leveled Dirichlet process equipped for catching a wealthy arrangement of transition dynamics. The three hyper parameters control the time length of the movement, the sparsely of the fundamental statepass framework, and the ordinary wide variety of unique concealed states in a confined grouping. On this structure it is moreover every day to allow the letter set of radiated pictures to be giant take into account, as an example, symbols being possible phrases showing up in English text. 2. DupLESS: Server-Aided Encryption for Deduplicated Storage Author: Mihir Bellare Cloud garage service providers such as Dropbox, Mozy, and others carry out deduplication to save area by means of most effective storing one copy of every file uploaded. Have to clients conventionally encrypt their files, however, financial savings are lost. Message-locked encryption (the most distinguished manifestation of which is convergent encryption) resolves this anxiety. But it is inherently problem to brute-force attacks which can get better files falling right into a regarded set. We endorse a structure that offers relaxed de-duplicated storage resisting brute-force assaults, and comprehend it in a system called DupLESS. In DupLESS, clients encrypt below message-primarily based keys obtained from a key-server via an oblivious PRF protocol. It permits clients to save encrypted information with present All rights Reserved 67

2 have the service perform de-duplication on their behalf, and yet achieves sturdy confidentiality guarantees. We display that encryption for de-duplicated storage can acquire overall performance and area savings near that of the usage of the storage carrier with plaintext statistics. 3. Message-Locked Encryption and Secure De-duplication Author: Mihir Bellare We formalize a brand new cryptographic primitive, Message-Locked Encryption (MLE), where the important thing below which encryption and decryption are executed is itself derived from the message. MLE provides a manner to achieve comfy de-duplication (space-efficient secure outsourced garage), a purpose currently targeted via numerous cloud-garage companies. We offer definitions both for privacy and for a shape of integrity that we name tag consistency. Based in this foundation, we make both sensible and theoretical contributions. at the sensible facet, we provide ROM protection analyses of a herbal circle of relatives of MLE schemes that includes deployed schemes. on the theoretical side the project is preferred version answers, and we make connections with deterministic encryption, hash capabilities relaxed on correlated inputs and the sample-then-extract paradigm to supply schemes below deferent assumptions and for different training of message assets. Our work indicates that MLE is a primitive of each realistic and theoretical interest. 4. Secure Deduplication And Data Security With Efficient And Reliable CEKM Author: N.O.AGRAWAL Relaxed de-duplication is a technique for removing duplicate copies of garage information, and affords security to them. To lessen storage space and upload bandwidth in cloud garage de-duplication has been a well-known method. For that cause convergent encryption has been extensively undertake for relaxed de-duplication, critical issue of making convergent encryption practical is to effectively and reliably control a large variety of convergent keys. The primary concept in this paper is that we can cast off duplicate copies of garage information and restrict the harm of stolen records if we lower the cost of that stolen statistics to the attacker. This paper makes the first try to officially address the hassle of reaching green and dependable key control in at ease de-duplication. We first introduce a baseline technique wherein each user holds an unbiased grasp key for encrypting the convergent keys and outsourcing them. However, this sort of baseline key control scheme generates widespread wide variety of keys with the growing number of users and calls for customers to dedicatedly protect the master keys. To this case, we advise Dekey, person behavior profiling and Decoys generation. Dekey new productions wherein users do no longer need to control any keys on their very own however as a substitute securely distribute the convergent key stocks across a couple of servers for insider attacker. As a evidence of idea, we put into effect Dekey using the Ramp mystery sharing scheme and show that Dekey incurs limited overhead in realistic environments. 5. Proofs of Ownership in Remote Storage Systems Author: Shai Halevi, Danny Harnik Cloud storage frameworks are progressively mainstream these days, and a promising innovation to hold their expense down is deduplication, to be specific uprooting superfluous duplicates of rehashing information. In addition, customer side deduplication endeavors to distinguish deduplication opportunities as of now at the customer and save the transfer speed in transferring another duplicate of a current file to the server. In this work author recognize assaults that adventure customer side deduplication, permitting an assailant to access conceivably colossal files of different clients in view of a little measure of side data. For instance, an aggressor who knows the hash mark of a file can persuade the capacity benefit that it possesses that file, thus the server later lets the assailant download the whole file. To overcome such assaults, we present confirmations of-proprietorship (PoWs), where a customer demonstrates to the server that it really holds the information of the file and not only some short data about it. We formalize confirmation of proprietorship; present arrangements taking into account Merkle trees and specific encodings, and examine their security. We actualized one variation of the plan, our performance estimations show that our convention brings about just a little overhead (contrasted with credulous customer side deduplication that is powerless against the assault) III. PROPOSED SYSTEM Four new secure deduplication frameworks are proposed to furnish effective deduplication with high dependability for file level and block level deduplication, individually. The conventional encryption techniques, is used to secure information privacy. In particular, information are split into sections by utilizing secure sharing plots and put away at diverse servers. Our proposed developments support both file level and block level deduplications. IV. Mathematical All rights Reserved 68

3 Let S be the Whole system which consists, S= {I, P, O} Where, I-Input, P- procedure, O- Output. I-{F,U} F-Filesset of {F1, F2,.,FN} U- No of Users{U1,U2,,UN} Procedure (P): P= {POW, n, ᶲ, i, j,m, k}. Where, 1. POW - proof of ownership. 2. n - No of servers. 3. Proof of ownership in blocks. 4. Proof of ownership in files 5. ᶲ - tag. 6. i- Fragmentation. 7. j- No of server. 8. m-message 9. k- Key. V. SYSTEM All rights Reserved 69

4 VI. CONCLUSION We targeting the problem of comparing if an un trusted server shops a customer's information. We presented a model for provable data possession (PDP), wherein it is eye-catching to limit the file piece receives to, the calculation at the server, and the purchaser server correspondence. Our answers for PDP fit this model: They reason a low (or even regular) overhead on the server and oblige a bit, regular degree of correspondence according to project. Key components of our plans are the backing for spot checking, which ensures that the plans stay mild weight, and the homomorphism capable labels, which allow to affirm records possession while not having access to the genuine facts file. We likewise define the idea of hearty inspecting, which coordinates remote data checking (RDC) with forward mistake amending codes to moderate discretionarily little file basements and advocate a non unique alternate for adding energy to any spot checkingbased RDC plan. Examinations show that our plans make it all the way down to earth to test ownership of large information sets. Beyond plans that do not permit checking out aren't commonsense whilst PDP is applied to illustrate ownership of lots of facts, as they force a significant I/O and computational weigh on the server. VII. REFERENCES [1] J. R. Douceur, A. Adya, W. J. Bolosky, D. Simon, and M. Theimer, Reclaiming space from duplicate files in a serverless distributed file system. in ICDCS, 2002, pp [2] M. Bellare, S. Keelveedhi, and T. Ristenpart, Dupless: Serveraided encryption for deduplicated storage, in USENIX Security Symposium, [3] Thomas Ristenpart, Message-locked encryption and secure de-duplication, in EUROCRYPT, 2013, pp [4] J. Li, X. Chen, M. Li, J. Li, P. Lee, and W. Lou, Secure deduplication with efficient and reliable convergent key management, in IEEE Transactions on Parallel and Distributed Systems, 2014, pp. vol. 25(6), pp All rights Reserved 70

5 AUTHORS DETAILS Pratik Mirjapure, pursuing the B.E degree in Computer Engineering at D Y Patil College of Srisrimal Praveen, pursuing the B.E degree in Computer Engineering at D Y Patil College of Shubham Kalaskar, pursuing the B.E degree in Computer Engineering at D Y Patil College of Vivek Shirsat, pursuing the B.E degree in Computer Engineering at D Y Patil College All rights Reserved 71

Secure Data De-Duplication With Dynamic Ownership Management In Cloud Storage

Secure Data De-Duplication With Dynamic Ownership Management In Cloud Storage Secure Data De-Duplication With Dynamic Ownership Management In Cloud Storage 1 A. Sumathi, PG Scholar, Department Of Computer Science And Engineering, Maha Barathi Engineering College, Chinna Salem, Villupuram,

More information

Secure Data Deduplication with Dynamic Ownership Management in Cloud Storage

Secure Data Deduplication with Dynamic Ownership Management in Cloud Storage Secure Data Deduplication with Dynamic Ownership Management in Cloud Storage Dr.S.Masood Ahamed 1, N.Mounika 2, N.vasavi 3, M.Vinitha Reddy 4 HOD, Department of Computer Science & Engineering,, Guru Nanak

More information

S. Indirakumari, A. Thilagavathy

S. Indirakumari, A. Thilagavathy International Journal of Scientific Research in Computer Science, Engineering and Information Technology 2017 IJSRCSEIT Volume 2 Issue 2 ISSN : 2456-3307 A Secure Verifiable Storage Deduplication Scheme

More information

ENCRYPTED DATA MANAGEMENT WITH DEDUPLICATION IN CLOUD COMPUTING

ENCRYPTED DATA MANAGEMENT WITH DEDUPLICATION IN CLOUD COMPUTING ENCRYPTED DATA MANAGEMENT WITH DEDUPLICATION IN CLOUD COMPUTING S KEERTHI 1*, MADHAVA REDDY A 2* 1. II.M.Tech, Dept of CSE, AM Reddy Memorial College of Engineering & Technology, Petlurivaripalem. 2. Assoc.

More information

International Journal of Advance Research in Engineering, Science & Technology. Deduplication & Proof Of Storage with Data Dynamic Operation

International Journal of Advance Research in Engineering, Science & Technology. Deduplication & Proof Of Storage with Data Dynamic Operation Impact Factor (SJIF): 5.301 International Journal of Advance Research in Engineering, Science & Technology e-issn: 2393-9877, p-issn: 2394-2444 Volume 5, Issue 7, July-2018 Deduplication & Proof Of Storage

More information

Message-Locked Encryption and Secure Deduplication

Message-Locked Encryption and Secure Deduplication Message-Locked Encryption and Secure Deduplication Eurocrypt 2013 Mihir Bellare 1 Sriram Keelveedhi 1 Thomas Ristenpart 2 1 University of California, San Diego 2 University of Wisconsin-Madison 1 Deduplication

More information

LOAD BALANCING AND DEDUPLICATION

LOAD BALANCING AND DEDUPLICATION LOAD BALANCING AND DEDUPLICATION Mr.Chinmay Chikode Mr.Mehadi Badri Mr.Mohit Sarai Ms.Kshitija Ubhe ABSTRACT Load Balancing is a method of distributing workload across multiple computing resources such

More information

COMPOSABLE AND ROBUST OUTSOURCED STORAGE

COMPOSABLE AND ROBUST OUTSOURCED STORAGE SESSION ID: CRYP-R14 COMPOSABLE AND ROBUST OUTSOURCED STORAGE Christian Badertscher and Ueli Maurer ETH Zurich, Switzerland Motivation Server/Database Clients Write Read block 2 Outsourced Storage: Security

More information

Survey on Authorized Data Deduplication System using Cryptographic and Access Control Techniques

Survey on Authorized Data Deduplication System using Cryptographic and Access Control Techniques Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 1, January 2015,

More information

Survey Paper on Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud

Survey Paper on Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 1, January 2014,

More information

ISSN (PRINT): , (ONLINE): , VOLUME-4, ISSUE-9,

ISSN (PRINT): , (ONLINE): , VOLUME-4, ISSUE-9, DATA DEDUPLICATION FOR DISTRIBUTED STORAGE SYSTEMS M. Manjusha 1, S. Rajesh 2 1,2 M.Tech, CSE, V. R. Siddhartha Engineering College, Andhra Pradesh, India Abstract Distributed Storage Data Storages reduces

More information

ISSN: [Shubhangi* et al., 6(8): August, 2017] Impact Factor: 4.116

ISSN: [Shubhangi* et al., 6(8): August, 2017] Impact Factor: 4.116 IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY DE-DUPLICABLE EFFECTIVE VALIDATION of CAPACITY for DYNAMIC USER ENVIRONMENT Dr. Shubhangi D C *1 & Pooja 2 *1 HOD, Department

More information

International Journal of Advance Engineering and Research Development

International Journal of Advance Engineering and Research Development Scientific Journal of Impact Factor (SJIF): 5.71 International Journal of Advance Engineering and Research Development Volume 5, Issue 05, May -2018 e-issn (O): 2348-4470 p-issn (P): 2348-6406 PRIVACY-PRESERVING

More information

DATA DEDUPLCATION AND MIGRATION USING LOAD REBALANCING APPROACH IN HDFS Pritee Patil 1, Nitin Pise 2,Sarika Bobde 3 1

DATA DEDUPLCATION AND MIGRATION USING LOAD REBALANCING APPROACH IN HDFS Pritee Patil 1, Nitin Pise 2,Sarika Bobde 3 1 DATA DEDUPLCATION AND MIGRATION USING LOAD REBALANCING APPROACH IN HDFS Pritee Patil 1, Nitin Pise 2,Sarika Bobde 3 1 Department of Computer Engineering 2 Department of Computer Engineering Maharashtra

More information

Encrypted Data Deduplication in Cloud Storage

Encrypted Data Deduplication in Cloud Storage Encrypted Data Deduplication in Cloud Storage Chun- I Fan, Shi- Yuan Huang, Wen- Che Hsu Department of Computer Science and Engineering Na>onal Sun Yat- sen University Kaohsiung, Taiwan AsiaJCIS 2015 Outline

More information

SECURE DEDUPLICATION OF DATA IN CLOUD STORAGE

SECURE DEDUPLICATION OF DATA IN CLOUD STORAGE SECURE DEDUPLICATION OF DATA IN CLOUD STORAGE 1 Babaso D. Aldar, 2 Vidyullata Devmane 1,2 Computer Engg. Dept, Shah and Anchor Kutchhi Engg. College, Mumbai University. 1 babaaldar@gmail.com, 2 devmane.vidyullata@gmail.com

More information

MANAGING OF CLOUD STORAGE AUDITING FOR DATA INTEGRITY

MANAGING OF CLOUD STORAGE AUDITING FOR DATA INTEGRITY MANAGING OF CLOUD STORAGE AUDITING FOR DATA INTEGRITY GARNEPALLI MOUNIKA 1, N.SANTHOSH RAMCHANDER 2 M. Tech Student, CSE, SVS Group of Institutions, Warangal, TS 1 M.Tech (Ph.D) Assoc. Prof, CSE Dept,

More information

A New Symmetric Key Algorithm for Modern Cryptography Rupesh Kumar 1 Sanjay Patel 2 Purushottam Patel 3 Rakesh Patel 4

A New Symmetric Key Algorithm for Modern Cryptography Rupesh Kumar 1 Sanjay Patel 2 Purushottam Patel 3 Rakesh Patel 4 IJSRD - International Journal for Scientific Research & Development Vol. 2, Issue 08, 2014 ISSN (online): 2321-0613 A New Symmetric Key Algorithm for Modern Cryptography Rupesh Kumar 1 Sanjay Patel 2 Purushottam

More information

International Journal of Advance Engineering and Research Development

International Journal of Advance Engineering and Research Development Scientific Journal of Impact Factor (SJIF): 3.134 International Journal of Advance Engineering and Research Development Volume 3, Issue 2, February -2016 e-issn (O): 2348-4470 p-issn (P): 2348-6406 Enabling

More information

Efficient integrity checking technique for securing client data in cloud computing

Efficient integrity checking technique for securing client data in cloud computing International Journal of Electrical & Computer Sciences IJECS-IJENS Vol: 11 No: 05 43 Efficient integrity checking technique for securing client data in cloud computing Dalia Attas and Omar Batrafi Computer

More information

A SURVEY ON MANAGING CLOUD STORAGE USING SECURE DEDUPLICATION

A SURVEY ON MANAGING CLOUD STORAGE USING SECURE DEDUPLICATION ISSN: 0976-3104 SPECIAL ISSUE: (Emerging Technologies in Networking and Security (ETNS) Keerthana et al. ARTICLE OPEN ACCESS A SURVEY ON MANAGING CLOUD STORAGE USING SECURE DEDUPLICATION K. Keerthana*,

More information

International Journal of Advance Engineering and Research Development

International Journal of Advance Engineering and Research Development Scientific Journal of Impact Factor (SJIF): 4.14 International Journal of Advance Engineering and Research Development Volume 3, Issue 3, March -2016 e-issn (O): 2348-4470 p-issn (P): 2348-6406 Identify

More information

Enhancing Reliability and Scalability in Dynamic Group System Using Three Level Security Mechanisms

Enhancing Reliability and Scalability in Dynamic Group System Using Three Level Security Mechanisms Enhancing Reliability and Scalability in Dynamic Group System Using Three Level Security Mechanisms A.Sarika*1, Smt.J.Raghaveni*2 M.Tech Student, Dept of CSE, S.R.K.R Engineering college, Bhimavaram, AP,

More information

Improving data integrity on cloud storage services

Improving data integrity on cloud storage services International Journal of Engineering Science Invention Volume 2 Issue 2 ǁ February. 2013 Improving data integrity on cloud storage services Miss. M.Sowparnika 1, Prof. R. Dheenadayalu 2 1 (Department of

More information

Achieving Processing Time Efficiency in Cloud-Based Systems by Implementing Data Sharing and Searching Scheme

Achieving Processing Time Efficiency in Cloud-Based Systems by Implementing Data Sharing and Searching Scheme Achieving Processing Time Efficiency in Cloud-Based Systems by Implementing Data Sharing and Searching Scheme 1 Varalakshmi Chagalamarri, 2 Humera.D 1 M.Tech Student, Department of CSE, Sri Vishveshwaraiah

More information

Computers and Security

Computers and Security The contents of this Supporting Material document have been prepared from the Eight units of study texts for the course M150: Date, Computing and Information, produced by The Open University, UK. Copyright

More information

A secure two-phase data deduplication scheme

A secure two-phase data deduplication scheme A secure two-phase data deduplication scheme Pierre Meye, Philippe Raipin, Frédéric Tronel, Emmanuelle Anceaume To cite this version: Pierre Meye, Philippe Raipin, Frédéric Tronel, Emmanuelle Anceaume.

More information

International Journal of Advance Engineering and Research Development. AN Optimal Matrix Approach for virtual load allocation and data sharing

International Journal of Advance Engineering and Research Development. AN Optimal Matrix Approach for virtual load allocation and data sharing Scientific Journal of Impact Factor (SJIF): 5.71 International Journal of Advance Engineering and Research Development Volume 5, Issue 02, February -2018 e-issn (O): 2348-4470 p-issn (P): 2348-6406 AN

More information

A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data

A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data An Efficient Privacy-Preserving Ranked Keyword Search Method Cloud data owners prefer to outsource documents in an encrypted form for the purpose of privacy preserving. Therefore it is essential to develop

More information

ABSTRACT I. INTRODUCTION

ABSTRACT I. INTRODUCTION 2018 IJSRSET Volume 4 Issue 4 Print ISSN: 2395-1990 Online ISSN : 2394-4099 Themed Section : Engineering and Technology An Efficient Search Method over an Encrypted Cloud Data Dipeeka Radke, Nikita Hatwar,

More information

Deduplication on Encrypted Big Data in HDFS

Deduplication on Encrypted Big Data in HDFS Deduplication on Encrypted Big Data in HDFS Saif Ahmed Salim 1, Prof. Latika R. Desai 2 1Department of Computer Engineering, Dr. D.Y. Patil Institute of Technology, Pune University, Pune, India 2Department

More information

ISSN Vol.08,Issue.16, October-2016, Pages:

ISSN Vol.08,Issue.16, October-2016, Pages: ISSN 2348 2370 Vol.08,Issue.16, October-2016, Pages:3146-3152 www.ijatir.org Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation VEDIRE AJAYANI 1, K. TULASI 2, DR P. SUNITHA

More information

INTRODUCTION TO CLOAKWARE/TRS TECHNOLOGY

INTRODUCTION TO CLOAKWARE/TRS TECHNOLOGY INTRODUCTION TO CLOAKWARE/TRS TECHNOLOGY VERSION 2.2 OCTOBER 2001 SUMMARY Software is easy to tamper with and reverse engineer so unprotected software deployed on malicious hosts can t be trusted by corporations

More information

Zero private information leak using multi-level security and privileged access for designated authorities on demand

Zero private information leak using multi-level security and privileged access for designated authorities on demand Zero private information leak using multi-level security and privileged access for designated authorities on demand Syama BabuRaj 1, Pretty Babu 2 Dept.Computer Science & Engg., Sree Buddha College of

More information

Remote Data Checking: Auditing the Preservation Status of Massive Data Sets on Untrusted Store

Remote Data Checking: Auditing the Preservation Status of Massive Data Sets on Untrusted Store Remote Data Checking: Auditing the Preservation Status of Massive Data Sets on Untrusted Store Randal Burns randal@cs.jhu.edu www.cs.jhu.edu/~randal/ Department of Computer Science, Johns Hopkins Univers

More information

Efficient Auditable Access Control Systems for Public Shared Cloud Storage

Efficient Auditable Access Control Systems for Public Shared Cloud Storage Efficient Auditable Access Control Systems for Public Shared Cloud Storage Vidya Patil 1, Prof. Varsha R. Dange 2 Student, Department of Computer Science Dhole Patil College of Engineering, Pune, Maharashtra,

More information

CSC 5930/9010 Cloud S & P: Cloud Primitives

CSC 5930/9010 Cloud S & P: Cloud Primitives CSC 5930/9010 Cloud S & P: Cloud Primitives Professor Henry Carter Spring 2017 Methodology Section This is the most important technical portion of a research paper Methodology sections differ widely depending

More information

International Journal of Advance Engineering and Research Development. Secure and dynamic Multi-keyword Ranked Search Over Cloud Data

International Journal of Advance Engineering and Research Development. Secure and dynamic Multi-keyword Ranked Search Over Cloud Data Scientific Journal of Impact Factor (SJIF): 4.72 International Journal of Advance Engineering and Research Development Volume 4, Issue 5, May -2017 e-issn (O): 2348-4470 p-issn (P): 2348-6406 Secure and

More information

International Journal of Advance Engineering and Research Development

International Journal of Advance Engineering and Research Development Scientific Journal of Impact Factor (SJIF): 4.72 International Journal of Advance Engineering and Research Development Volume 4, Issue 12, December -2017 e-issn (O): 2348-4470 p-issn (P): 2348-6406 A SCRIPT

More information

International Journal of Advance Engineering and Research Development. Data Masking: A Secured Data Storage on Cloud

International Journal of Advance Engineering and Research Development. Data Masking: A Secured Data Storage on Cloud Scientific Journal of Impact Factor (SJIF): 4.72 International Journal of Advance Engineering and Research Development Volume 4, Issue 11, November -2017 Data Masking: A Secured Data Storage on Cloud Mrs.

More information

International Journal of Computer Engineering and Applications, Volume XII, Special Issue, March 18, ISSN

International Journal of Computer Engineering and Applications, Volume XII, Special Issue, March 18,   ISSN International Journal of Computer Engineering and Applications, Volume XII, Special Issue, March 18, www.ijcea.com ISSN 2321-3469 SECURE DATA DEDUPLICATION FOR CLOUD STORAGE: A SURVEY Vidya Kurtadikar

More information

DEDUPLICATION AWARE AND DUPLICATE ELIMINATION SCHEME FOR DATA REDUCTION IN BACKUP STORAGE SYSTEMS

DEDUPLICATION AWARE AND DUPLICATE ELIMINATION SCHEME FOR DATA REDUCTION IN BACKUP STORAGE SYSTEMS DEDUPLICATION AWARE AND DUPLICATE ELIMINATION SCHEME FOR DATA REDUCTION IN BACKUP STORAGE SYSTEMS NIMMAGADDA SRIKANTHI, DR G.RAMU, YERRAGUDIPADU Department Of Computer Science and Professor, Department

More information

A compact Aggregate key Cryptosystem for Data Sharing in Cloud Storage systems.

A compact Aggregate key Cryptosystem for Data Sharing in Cloud Storage systems. A compact Aggregate key Cryptosystem for Data Sharing in Cloud Storage systems. G Swetha M.Tech Student Dr.N.Chandra Sekhar Reddy Professor & HoD U V N Rajesh Assistant Professor Abstract Cryptography

More information

NETWORK SECURITY & CRYPTOGRAPHY

NETWORK SECURITY & CRYPTOGRAPHY Assignment for IT Applications in Management Project On NETWORK SECURITY & CRYPTOGRAPHY Course Instructor Submitted By: Mr. ANIL KUMAR ROHIT BARVE 2013240 Section E PGDM 2013-15 Table of Contents Chapter

More information

Chapter 4. Fundamental Concepts and Models

Chapter 4. Fundamental Concepts and Models Chapter 4. Fundamental Concepts and Models 4.1 Roles and Boundaries 4.2 Cloud Characteristics 4.3 Cloud Delivery Models 4.4 Cloud Deployment Models The upcoming sections cover introductory topic areas

More information

Public Verifiability of Stored Data in Cloud using Disassembly of Data Segment

Public Verifiability of Stored Data in Cloud using Disassembly of Data Segment Public Verifiability of Stored Data in Cloud using Disassembly of Data Segment Adhikrao.Y.Jadhav Department of Computer Science & Engg. Sachin P. Patil Department of Information Technology, Annasaheb Dange

More information

An Efficient Provable Data Possession Scheme based on Counting Bloom Filter for Dynamic Data in the Cloud Storage

An Efficient Provable Data Possession Scheme based on Counting Bloom Filter for Dynamic Data in the Cloud Storage , pp. 9-16 http://dx.doi.org/10.14257/ijmue.2016.11.4.02 An Efficient Provable Data Possession Scheme based on Counting Bloom Filter for Dynamic Data in the Cloud Storage Eunmi Jung 1 and Junho Jeong 2

More information

DataTraveler 5000 (DT5000) and DataTraveler 6000 (DT6000) Ultimate Security in a USB Flash Drive. Submitted by SPYRUS, Inc.

DataTraveler 5000 (DT5000) and DataTraveler 6000 (DT6000) Ultimate Security in a USB Flash Drive. Submitted by SPYRUS, Inc. Submitted by SPYRUS, Inc. Contents DT5000 and DT6000 Technology Overview...2 Why DT5000 and DT6000 Encryption Is Different...3 Why DT5000 and DT6000 Encryption Is Different - Summary...4 XTS-AES Sector-Based

More information

CRYPTOGRAPHY AND NETWORK SECURITY. K. Lakshmi Priya 1, P.Rubha 2,M.Niranjana 3 INTRODUCTION: ABSTRACT:

CRYPTOGRAPHY AND NETWORK SECURITY. K. Lakshmi Priya 1, P.Rubha 2,M.Niranjana 3 INTRODUCTION: ABSTRACT: CRYPTOGRAPHY AND NETWORK SECURITY K. Lakshmi Priya 1, P.Rubha 2,M.Niranjana 3 1 Email:lakshmikpriya3698@gmail.com, 2 Email:rubhapandian@gmail.com, 3 Email:niranjanamurugan@gmail.com, Nadar Saraswathi College

More information

ANALYSIS OF AES ENCRYPTION WITH ECC

ANALYSIS OF AES ENCRYPTION WITH ECC ANALYSIS OF AES ENCRYPTION WITH ECC Samiksha Sharma Department of Computer Science & Engineering, DAV Institute of Engineering and Technology, Jalandhar, Punjab, India Vinay Chopra Department of Computer

More information

Message authentication. Why message authentication. Authentication primitives. and secure hashing. To prevent against:

Message authentication. Why message authentication. Authentication primitives. and secure hashing. To prevent against: Message authentication and secure hashing Why message authentication To prevent against: Masquerade/impersonation Modification of message content Modification of message sequence Acceptance of replayed/delayed

More information

A Less Weight Secure Data Sharing Scheme for Mobile Cloud Computing

A Less Weight Secure Data Sharing Scheme for Mobile Cloud Computing A Less Weight Secure Data Sharing Scheme for Mobile Cloud Computing P. Likitha Department of Computer Science and Engineering, MJR College of Engineering & Technology, Piler, A.P - 517214, India. ABSTRACT:

More information

Efficient Data Storage Security with Multiple Batch Auditing in Cloud Computing

Efficient Data Storage Security with Multiple Batch Auditing in Cloud Computing Efficient Data Storage Security with Multiple Batch Auditing in Cloud Computing P. Sukumar [1] Department of Computer Science Sri Venkateswara College of Engineering, Chennai B. Sathiya [2] Department

More information

As a 3rd generation currency, not only are transactions secured, private and fast, you actually get paid for holding DigitalPrice coins.

As a 3rd generation currency, not only are transactions secured, private and fast, you actually get paid for holding DigitalPrice coins. Introduction With the circulation of cryptocurrency becoming common, there is a need for additional information. The scope of this white paper is to provide that information. If you are under the impression

More information

PRIVACY PRESERVING CONTENT BASED SEARCH OVER OUTSOURCED IMAGE DATA

PRIVACY PRESERVING CONTENT BASED SEARCH OVER OUTSOURCED IMAGE DATA PRIVACY PRESERVING CONTENT BASED SEARCH OVER OUTSOURCED IMAGE DATA Supriya Pentewad 1, Siddhivinayak Kulkarni 2 1 Department of Computer Engineering. MIT College of Engineering, Pune, India 2 Department

More information

International Journal of Advance Engineering and Research Development

International Journal of Advance Engineering and Research Development Scientific Journal of Impact Factor (SJIF): 4.72 e-issn (O): 2348-4470 p-issn (P): 2348-66 International Journal of Advance Engineering and Research Development Volume 4, Issue 5, May-17 Comparaitive Analysis

More information

CHAPTER 1 INTRODUCTION TO CRYPTOGRAPHY. Badran Awad Computer Department Palestine Technical college

CHAPTER 1 INTRODUCTION TO CRYPTOGRAPHY. Badran Awad Computer Department Palestine Technical college CHAPTER 1 INTRODUCTION TO CRYPTOGRAPHY Badran Awad Computer Department Palestine Technical college CHAPTER 1 Introduction Historical ciphers Information theoretic security Computational security Cryptanalysis

More information

Secure Remote Storage Using Oblivious RAM

Secure Remote Storage Using Oblivious RAM Secure Remote Storage Using Oblivious RAM Giovanni Malloy Mentors: Georgios Kellaris, Kobbi Nissim August 11, 2016 Abstract Oblivious RAM (ORAM) is a protocol that allows a user to access the data she

More information

More crypto and security

More crypto and security More crypto and security CSE 199, Projects/Research Individual enrollment Projects / research, individual or small group Implementation or theoretical Weekly one-on-one meetings, no lectures Course grade

More information

ADVANCES in NATURAL and APPLIED SCIENCES

ADVANCES in NATURAL and APPLIED SCIENCES ADVANCES in NATURAL and APPLIED SCIENCES ISSN: 1995-0772 Published BY AENSI Publication EISSN: 1998-1090 http://www.aensiweb.com/anas 2016 May 10(5): pages 223-227 Open Access Journal An Efficient Proxy

More information

MODULE NO.28: Password Cracking

MODULE NO.28: Password Cracking SUBJECT Paper No. and Title Module No. and Title Module Tag PAPER No. 16: Digital Forensics MODULE No. 28: Password Cracking FSC_P16_M28 TABLE OF CONTENTS 1. Learning Outcomes 2. Introduction 3. Nature

More information

Sudipta Sahana Asst. Professor, Dept. of CSE JIS College of Engineering Kalyani, West Bengal, India

Sudipta Sahana Asst. Professor, Dept. of CSE JIS College of Engineering Kalyani, West Bengal, India Volume 4, Issue 10, October 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Dynamic Size

More information

BioTechnology. An Indian Journal FULL PAPER. Trade Science Inc. Study on secure data storage based on cloud computing ABSTRACT KEYWORDS

BioTechnology. An Indian Journal FULL PAPER. Trade Science Inc. Study on secure data storage based on cloud computing ABSTRACT KEYWORDS [Type text] [Type text] [Type text] ISSN : 0974-7435 Volume 10 Issue 22 BioTechnology 2014 An Indian Journal FULL PAPER BTAIJ, 10(22), 2014 [13778-13783] Study on secure data storage based on cloud computing

More information

Virtual Memory. Chapter 8

Virtual Memory. Chapter 8 Virtual Memory 1 Chapter 8 Characteristics of Paging and Segmentation Memory references are dynamically translated into physical addresses at run time E.g., process may be swapped in and out of main memory

More information

Preserving Data Privacy in the IoT World

Preserving Data Privacy in the IoT World MASSACHUSETTS INSTITUTE OF TECHNOLOGY Preserving Data Privacy in the IoT World Thomas Hardjono Alex Sandy Pentland Connection Science & Engineering Massachusetts Institute of Technology July 2016 connection.mit.edu

More information

Session Based Ciphertext Policy Attribute Based Encryption Method for Access Control in Cloud Storage

Session Based Ciphertext Policy Attribute Based Encryption Method for Access Control in Cloud Storage IOSR Journal of Engineering (IOSRJEN) ISSN (e): 2250-3021, ISSN (p): 2278-8719 Vol. 04, Issue 09 (September. 2014), V3 PP 21-25 www.iosrjen.org Session Based Ciphertext Policy Attribute Based Encryption

More information

International Journal of Advance Engineering and Research Development. Authenticated Key Exchange Protocols for Parallel Network File Systems

International Journal of Advance Engineering and Research Development. Authenticated Key Exchange Protocols for Parallel Network File Systems Scientific Journal of Impact Factor (SJIF): 3.134 International Journal of Advance Engineering and Research Development Volume 3, Issue 2, February -2016 e-issn (O): 2348-4470 p-issn (P): 2348-6406 Authenticated

More information

Cisco Start. IT solutions designed to propel your business

Cisco Start. IT solutions designed to propel your business Cisco Start IT solutions designed to propel your business Small and medium-sized businesses (SMBs) typically have very limited resources to invest in new technologies. With every IT investment made, they

More information

Ad-hoc Trusted Information Exchange Scheme for Location Privacy in VANET

Ad-hoc Trusted Information Exchange Scheme for Location Privacy in VANET Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 1, January 2015,

More information

Overview of Challenges in VANET

Overview of Challenges in VANET Overview of Challenges in VANET Er.Gurpreet Singh Department of Computer Science, Baba Farid College, Bathinda(Punjab), India ABSTRACT VANET are becoming active area of research and development because

More information

BIG DATA INDUSTRY PAPER

BIG DATA INDUSTRY PAPER BIG DATA INDUSTRY PAPER Encryption Key Management INFORMATION-RICH BIG DATA IS UNDER INCREASING THREAT OF THEFT AND BUSINESS DISRUPTION. AS THE NETWORKS AND TECHNOLOGIES THAT ENABLE BIG DATA COLLECTION,

More information

SECURE DEDUP WITH ENCRYPTED DATA

SECURE DEDUP WITH ENCRYPTED DATA Volume 119 No. 12 2018, 13221-13231 ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu SECURE DEDUP WITH ENCRYPTED DATA N SENTHIL SELVAN, G ANJALI, B KESINI, V SUBRAMANIYASWAMY* School

More information

Cisco 5G Vision Series: Vertical Value Creation

Cisco 5G Vision Series: Vertical Value Creation White Paper Cisco 5G Vision Series: Vertical Value Creation What You Will Learn 5G networks must be designed with new capabilities addressing the needs of new vertical markets. Current mobile standards

More information

Decentralized Anonymous Authentication of Data Stored in Clouds Praveen.N, Krishna Kumar.P.R, Vinitha V Yadav

Decentralized Anonymous Authentication of Data Stored in Clouds Praveen.N, Krishna Kumar.P.R, Vinitha V Yadav Decentralized Anonymous Authentication of Data Stored in Clouds Praveen.N, Krishna Kumar.P.R, Vinitha V Yadav Abstract: Distributed computing is area that permits clients to store the information. Distributed

More information

Secure Multiparty Computation

Secure Multiparty Computation CS573 Data Privacy and Security Secure Multiparty Computation Problem and security definitions Li Xiong Outline Cryptographic primitives Symmetric Encryption Public Key Encryption Secure Multiparty Computation

More information

II. LITERATURE SURVEY

II. LITERATURE SURVEY Secure Transaction By Using Wireless Password with Shuffling Keypad Shweta Jamkavale 1, Ashwini Kute 2, Rupali Pawar 3, Komal Jamkavale 4,Prashant Jawalkar 5 UG students 1,2,3,4, Guide 5, Department Of

More information

BLOWFISH ALGORITHM ON ITS OWN CLOUD COMPUTER PERFORMANCE AND IMPLEMENTATION

BLOWFISH ALGORITHM ON ITS OWN CLOUD COMPUTER PERFORMANCE AND IMPLEMENTATION 132 International Journal of Research in Computer Applications And Robotics, x(x): xx-xx INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND ROBOTICS ISSN 2320-7345 BLOWFISH ALGORITHM ON ITS

More information

Searchable symmetric encryption (SSE) Tom Ristenpart CS 6431

Searchable symmetric encryption (SSE) Tom Ristenpart CS 6431 Searchable symmetric encryption (SSE) Tom Ristenpart CS 6431 Outsourced storage settings Client wants to store data up on Dropbox High availability, synch across devices Server includes much value-add

More information

ABSTRACT I. INTRODUCTION. Telangana, India 2 Professor, Department of Computer Science & Engineering, Shadan College of Engineering & Technology,

ABSTRACT I. INTRODUCTION. Telangana, India 2 Professor, Department of Computer Science & Engineering, Shadan College of Engineering & Technology, International Journal of Scientific Research in Computer Science, Engineering and Information Technology 2017 IJSRCSEIT Volume 2 Issue 6 ISSN : 2456-3307 Secure Proxy Server Data Sharing Scheme in Hybrid

More information

Encrypted databases. Tom Ristenpart CS 6431

Encrypted databases. Tom Ristenpart CS 6431 Encrypted databases Tom Ristenpart CS 6431 Outsourced storage settings Client wants to store data up on Dropbox High availability, synch across devices Server includes much value-add functionality Keyword

More information

SecurityFirst DataKeep

SecurityFirst DataKeep A Report on the Technical and Usability Advantages of SecurityFirst DataKeep 2017 September 23 Prepared by Avi Rubin, Ph.D. and Paul D. Martin, Ph.D. Page 2 Table of Contents I. Introduction... 3 II. Security

More information

S. Erfani, ECE Dept., University of Windsor Network Security

S. Erfani, ECE Dept., University of Windsor Network Security 4.11 Data Integrity and Authentication It was mentioned earlier in this chapter that integrity and protection security services are needed to protect against active attacks, such as falsification of data

More information

ISSN Vol.04,Issue.05, May-2016, Pages:

ISSN Vol.04,Issue.05, May-2016, Pages: WWW.IJITECH.ORG ISSN 2321-8665 Vol.04,Issue.05, May-2016, Pages:0737-0741 Secure Cloud Storage using Decentralized Access Control with Anonymous Authentication C. S. KIRAN 1, C. SRINIVASA MURTHY 2 1 PG

More information

CLIENT DATA NODE NAME NODE

CLIENT DATA NODE NAME NODE Volume 6, Issue 12, December 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Efficiency

More information

Certification for Meaningful Use Experiences and Observations from the Field June 2011

Certification for Meaningful Use Experiences and Observations from the Field June 2011 Certification for Meaningful Use Experiences and Observations from the Field June 2011 Principles for Certification to Support Meaningful Use Certification should promote EHR adoption by giving providers

More information

ENCRYPTION IN USE FACT AND FICTION. White Paper

ENCRYPTION IN USE FACT AND FICTION. White Paper White Paper Table of Contents The Case for Encryption... Encryption in Use Not Some Kind of Magic... Evaluating Encryption in Use Claims... 3 4 4 The Vaultive Approach... 5 2 Risk-conscious enterprises

More information

Elastic Block Ciphers: Method, Security and Instantiations

Elastic Block Ciphers: Method, Security and Instantiations Elastic Block Ciphers: Method, Security and Instantiations Debra L. Cook 1, Moti Yung 2, Angelos D. Keromytis 3 1 Department of Computer Science, Columbia University, New York, NY, USA dcook@cs.columbia.edu

More information

The Road to a Secure, Compliant Cloud

The Road to a Secure, Compliant Cloud The Road to a Secure, Compliant Cloud The Road to a Secure, Compliant Cloud Build a trusted infrastructure with a solution stack from Intel, IBM Cloud SoftLayer,* VMware,* and HyTrust Technology innovation

More information

Provable ownership of files in deduplication cloud storage

Provable ownership of files in deduplication cloud storage SECURITY AND COMMUNICATION NETWORKS Security Comm. Networks 2015; 8:2457 2468 Published online 19 July 2013 in Wiley Online Library (wileyonlinelibrary.com)..784 SPECIAL ISSUE PAPER Provable ownership

More information

Next-generation IT Platforms Delivering New Value through Accumulation and Utilization of Big Data

Next-generation IT Platforms Delivering New Value through Accumulation and Utilization of Big Data Next-generation IT Platforms Delivering New Value through Accumulation and Utilization of Big Data 46 Next-generation IT Platforms Delivering New Value through Accumulation and Utilization of Big Data

More information

ENSURING PRIVACY OF E-MEDICAL HEALTH RECORDS USING TRIPLE- DES ALGORITHM

ENSURING PRIVACY OF E-MEDICAL HEALTH RECORDS USING TRIPLE- DES ALGORITHM ENSURING PRIVACY OF E-MEDICAL HEALTH RECORDS USING TRIPLE- DES ALGORITHM Ms. S. P. Vidhya Priya 1, Dharani.N.R 2, Gokilavani.M 3, Jeevitha.R 4 1,2,3,4 Department of Information Technology, Kathir College

More information

STORK Position Paper. Sean Murphy and Matt Robshaw. Information Security Group Royal Holloway, University of London Egham, Surrey, TW20 0EX

STORK Position Paper. Sean Murphy and Matt Robshaw. Information Security Group Royal Holloway, University of London Egham, Surrey, TW20 0EX STORK Position Paper Sean Murphy and Matt Robshaw Information Security Group Royal Holloway, University of London Egham, Surrey, TW20 0EX November 27, 2002 Information Security Group Royal Holloway, University

More information

Chapter 3 Traditional Symmetric-Key Ciphers 3.1

Chapter 3 Traditional Symmetric-Key Ciphers 3.1 Chapter 3 Traditional Symmetric-Key Ciphers 3.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 3 Objectives To define the terms and the concepts of symmetric

More information

Encrypting the Auto Detected Face Part of Human in a Image Using RC4 and Hiding the Data in Image

Encrypting the Auto Detected Face Part of Human in a Image Using RC4 and Hiding the Data in Image Encrypting the Auto Detected Face Part of Human in a Image Using RC4 and Hiding the Data in Image N.Mahesh Chandra M.Tech Student, Sreenidhi Institute of Science and Technology. Abstract: In this paper,

More information

Mitigating Data Skew Using Map Reduce Application

Mitigating Data Skew Using Map Reduce Application Ms. Archana P.M Mitigating Data Skew Using Map Reduce Application Mr. Malathesh S.H 4 th sem, M.Tech (C.S.E) Associate Professor C.S.E Dept. M.S.E.C, V.T.U Bangalore, India archanaanil062@gmail.com M.S.E.C,

More information

Attribute-based encryption with encryption and decryption outsourcing

Attribute-based encryption with encryption and decryption outsourcing Edith Cowan University Research Online Australian Information Security Management Conference Conferences, Symposia and Campus Events 2014 Attribute-based encryption with encryption and decryption outsourcing

More information

SECURE DATA AUDITING WITH PROXY CODE REGENERATION IN CLOUD DATA DEDUPLICATION ENVIRONMENT

SECURE DATA AUDITING WITH PROXY CODE REGENERATION IN CLOUD DATA DEDUPLICATION ENVIRONMENT SECURE DATA AUDITING WITH PROXY CODE REGENERATION IN CLOUD DATA DEDUPLICATION ENVIRONMENT Miss. Arti L. Bairagi 1, Prof. P. M. Yawalkar 2 1 M.E. Student, Department of Computer Engineering, Savitribai

More information

Integrating OpenID with proxy re-encryption to enhance privacy in cloud-based identity services

Integrating OpenID with proxy re-encryption to enhance privacy in cloud-based identity services Integrating OpenID with proxy re-encryption to enhance privacy in cloud-based identity services David Nuñez, Isaac Agudo, and Javier Lopez Network, Information and Computer Security Laboratory (NICS Lab)

More information

Implementation of IBE with Outsourced Revocation technique in Cloud Computing

Implementation of IBE with Outsourced Revocation technique in Cloud Computing Implementation of IBE with Outsourced Revocation technique in Cloud Computing M.MOHANRAO, POCKLA PAVANI Assistant Professor, M.TECH STUDENT Dept of CSE,Megha Institute of Engineering & Technology For womens,edulabad,ghatkesar

More information

The security challenge in a mobile world

The security challenge in a mobile world The security challenge in a mobile world Contents Executive summary 2 Executive summary 3 Controlling devices and data from the cloud 4 Managing mobile devices - Overview - How it works with MDM - Scenario

More information