ABSTRACT
Data deduplication is one of important
data compression techniques for eliminating duplicate copies of repeating data,
andhas been widely used in cloud storage to reduce the amount of storage space
and save bandwidth. To protect the confidentiality of sensitive data while
supporting deduplication, the convergent encryption technique has been proposed
to encrypt the data before outsourcing.
To better protect data security, this paper makes the first
attempt to formally address the problem of authorized data deduplication.
Different from traditional deduplication systems, the differential privileges
of users are further considered in duplicate check besides the data itself. We
also present several new deduplication constructions supporting authorized
duplicate check in a hybrid cloud architecture. Security analysis demonstrates
that our scheme is secure in terms of the definitions specified in the proposed
security model. As a proof of concept, we implement a prototype of our proposed
authorized duplicate check scheme and conduct tested experiments using our
prototype. We show that our proposed authorized duplicate check scheme incurs
minimal overhead compared to normal operations.
Software Requirements
Front End: HTML5,
CSS3, JS, BootStrap
BackEnd: PHP, MYSQL
Control End:
Angular JS
Tool : Cordova
DESCRIPTION OF THE PROPOSED SYSTEM
3.1
Module Description
. Our system is designed to solve the
differential privilegeproblem in secure deduplication. The security will be
analyzed in terms of two aspects, that is, the authorization of duplicate check
and the confidentiality of data. Some basic tools have been used to construct
the secure deduplication, which are assumed to be secure. These basic tools
include the convergent encryption scheme, symmetric encryption scheme, and the
PoW scheme.
3.2 System Features
In the life of the
software development, problem analysis provides a base for design and
development phase. The problem is analyzed so that sufficient matter is
provided to design a new system. Large problems are sub-divided into smaller
once to make them understandable and easy for finding solutions. Same in this
project all the task are sub-divided and categorized.
System
Modules:
Ø
USER
Ø Register
Ø Login
Ø Receive
Token key
Ø
Upload / Download File
3.3MODULES:
Ø USER:
Ø Register:
User registers their details and enters
this system.
Ø Login:
User after completed their registers
and they can enters to login this system.
Ø Receive Token Key:
User after completed their registers
and they can receive token key to enter this system.
Ø Upload/ Download File:
User enters this system and they can upload/
download their file.
project-center-salem-erode-namakal-tiruchengode-karur-gandhipuram
project-center-mannargudi-pattukkottai
project-center-ambattur-avadi-ashokpillar-adyar-ekkaduthangal
project-center-bangalore-chennai-trivandrum
project-center-bhubaneswar-belgum-bhopal
project-center-chidambaram-mayiladuthurai-nagapattinam-cuddalore
project-center-coimbatore-chennai-salem-madurai-erode-trichy-tirunelveli-pondicherry
project-center-delhi-mumbai-hyderabad-visakhapatnam
project-center-dharmapuri-hosur-krishnagiri
project-center-dindigul-palani-rasipuram
project-center-tirunelveli-tiruchendur-nagercoil-virudhunagar-rajapalayam
project-center-tnagar-tambaram-nungambakkam-velachery
project-center-trivandrum-ernakulam
project-center-in-chennai
Android Project Titles 2017-2018
Android Project Titles 2017-2018
Comments
Post a Comment