International Journal of Computational Science, Mathematics and Engineering Volume2 , Issue6, June 2015 ISSN(online): 2349-8439 Copyright-IJCSME ____________________________________________________________________________________
A Hybrid Cloud Approach For Data Authentication and Deduplication 1
N.Venkatesh Naik, 2 Dr K.Madhavi, 3P. Srivally 1 Research scholar, JNTUA,Anatapuramu,A.P.,India 2 Assistant Professor, JNTUA,Anatapuramu, A.P.,India 3 M.Tech, Sree Visvesvaraya Institute Of Technology & Science, Chowderpally (Vill), Devarkadra (Mdl),Mahabubnagar (Dist) AP – 509 204 _________________________________________________________________________ ABSTRACT: Data deduplication is an important technique for eliminating redundant data. Instead of taking no. of same files, it store only single copy of file. In most organizations, storage system contains many pieces of duplicate data. . For example, the same file may be saved in several different places by different users. Deduplication eliminates these extra copies by saving just one copy of the data and replacing the other copies with pointers that lead back to the original copy. It is data compression technique for improve the bandwidth efficiency and storage utilization. Data deduplication most widely used in cloud computing. It make data management scalable and storage problem in cloud computing. Data deduplication protect the confidentiality of sensitive data. data deduplication work with convergent encryption technique to encrypt the data before uploading. . Companies frequently use deduplication in backup and disaster recovery applications .In this paper we attempt authorized deduplication check, combine with convergent encryption for providing security to sensitive data using hybrid cloud computing. INDEX TERMS— Deduplication, Hybrid cloud computing, security. _________________________________________________________________________ I. INTRODUCTION: Computing, data Deduplication is a specialized data compression technique for eliminating duplicate copies of repeating data. Related and somewhat synonymous terms are intelligent (data) compression and single-instance (data) storage. This technique is used to improve storage utilization and can also be applied to network data transfers to reduce the number of bytes that must be sent. In the deduplication process, unique chunks of data, or byte patterns, are identified and stored during a process of analysis. As the analysis continues, other chunks are compared to the stored copy and whenever a match occurs, the redundant chunk is replaced with a small reference that points to the stored chunk. Given that the same byte pattern may occur dozens, hundreds, or even thousands of times (the match frequency is dependent on the chunk size), the amount of data that must be stored or transferred can be greatly reduced. A Hybrid Cloud is a combined form of private clouds and public clouds in which some critical data resides in the enterprise’s private cloud while other data is stored in and accessible from a public cloud. Hybrid clouds seek to deliver the advantages of scalability, reliability, rapid deployment and potential cost savings of public clouds with the security and increased control and management of private clouds. As cloud computing becomes famous, an increasing amount of data is being stored in the cloud and used by users with specified privileges, which define the access rights of the stored data. The critical challenge of cloud storage or cloud computing is the management of the continuously increasing volume of data. Data deduplication or Single Instancing essentially refers to the elimination of redundant data. In the deduplication process, duplicate data is deleted, leaving only one copy (single instance) of the data to be stored. However, indexing of all data is still retained should that data ever be required. In general the data Deduplication eliminates the duplicate copies of repeating data.
__________________________________________________________________________________ A Hybrid Cloud Approach For Data Authentication and Deduplication
8
International Journal of Computational Science, Mathematics and Engineering Volume2 , Issue6, June 2015 ISSN(online): 2349-8439 Copyright-IJCSME ____________________________________________________________________________________
Although data Deduplication brings a lot of benefits, security and privacy concerns arise as users’ sensitive data are susceptible to both inside and outside attacks .Traditional encryption, while providing data confidentiality ,is incompatible with data deduplication. Specifically, traditional encryption requires different users to encrypt their data with their own keys. Thus, identical data copies of different users will lead to different ciphertexts, making deduplication impossible. Convergent encryption has been proposed to enforce data confidentiality while making deduplication feasible.
Figure: 1. Architecture of cloud computing. II. PROPOSED SYSTEM In our system we implement a project that includes the public cloud and the private cloud and also the hybrid cloud which is a combination of the both public cloud and private cloud. In general by if we used the public cloud we can’t provide the security to our private data and hence our private data will be loss. So that we have to provide the security to our data for that we make a use of private cloud also. When we use a private clouds the greater security can be provided. In this system we also provides the data reduplication. which is used to avoid the duplicate copies of data. User can upload and download the files from public cloud but private cloud provides the security for that data. that means only the authorized person can upload and download the files from the public cloud. For that user generates the key and stored that key onto the private cloud. at the time of downloading user request to the private cloud for key and then access that Particular file. Hence it also minimizes the bandwidth. that means we requires the less storage space for storing the files on the public cloud. In the public cloud any person that means the unauthorized person can also access or store the data so we can conclude that in the public cloud the security is not provided. In general for providing more security user can use the private cloud instead of using the public cloud. User generates the key at the time of uploading file and stores it to the private cloud. When user wants to downloads the file that he/she upload. he/she sends the request to the public cloud. Public cloud provides the list of files that are uploads the many user of the public cloud because there is no security is provided in the public cloud. When user selects one of the file from the list of files then private cloud sends a message like enter the key!. User has to enter the key that he generated for that file. When user enter the key the private cloud checks the key for that file and if the key is correct that means user is valid then private cloud give access to that user to download that file successfully. then user downloads the file from the public cloud and decrypt that file by using the same convergent key which is used at the time of encrypt that file. in this way user can make a use of the architecture.
__________________________________________________________________________________ A Hybrid Cloud Approach For Data Authentication and Deduplication
9
International Journal of Computational Science, Mathematics and Engineering Volume2 , Issue6, June 2015 ISSN(online): 2349-8439 Copyright-IJCSME ____________________________________________________________________________________
Fig 2: Architecture of Authorized Deduplication
ENCRYPTION OF FILES Here we are using the common secret key k to encrypt as well as decrypt data. This will use to convert the plain text to cipher text and again cipher text to plain text. Here we have used three basic functions, KeyGenSE: k is the key generation algorithm that generates κ using security parameter 1. EncSE (k, M): C is the symmetric encryption algorithm that takes the secret κ and message M and then outputs the ciphertext C; DecSE (k, C): M is the symmetric decryption algorithm that takes the secret κ and ciphertext C and then outputs the original message M. CONFIDENTIAL ENCRYPTION It provides data confidentiality in reduplication. A user derives a convergent key from each original data copy and encrypts the data copy with the convergent key. In addition, the user also derives a tag for the data copy, such that the tag will be used to detect duplicates.
Fig 3: confidential data encryption PROOF OF DATA The user has to prove that the data which he want to upload or download is its own data. That means he has to provide the convergent key and verifying data to prove his ownership at server.
__________________________________________________________________________________ A Hybrid Cloud Approach For Data Authentication and Deduplication
10
International Journal of Computational Science, Mathematics and Engineering Volume2 , Issue6, June 2015 ISSN(online): 2349-8439 Copyright-IJCSME ____________________________________________________________________________________
Fig 4: System Architecture III.CONCLUSION Cloud computing has reached a maturity that leads it into a productive phase. This means that most of the main issues with cloud computing have been addressed to a degree that clouds have become interesting for full commercial exploitation. This however does not mean that all the problems listed above have actually been solved, only that the according risks can be tolerated to a certain degree. Cloud computing is therefore still as much a research topic, as it is a market offering. For better confidentiality and security in cloud computing we have proposed new Deduplication constructions supporting authorized duplicate check in hybrid cloud architecture, in which the duplicate-check tokens of files are generated by the private cloud server with private keys. Proposed system includes proof of data owner so it will help to implement better security issues in cloud computing. IV. FUTURE SCOPE It excludes the security problems that may arise in the practical deployment of the present model. Also, it increases the national security. It saves the memory by deduplicating the data and thus provide us with sufficient memory. It provides authorization to the private firms and protect the confidentiality of the important data REFERENCES [1] P. Anderson and L. Zhang. Fast and secure laptop backups with encrypted de-uplication. In Proc. of USENIX LISA, 2010. [2] M. Bellare, S. Keelveedhi, and T. Ristenpart.Messagelocked encryption and secure deduplication. In EUROCRYPT, pages 296–312, 2013.. [3] M. Bellare, S. Keelveedhi, and T. Ristenpart.Dupless: Serveraided encryption for deduplicated storage. In USENIX Security Symposium, 2013. [4] S. Bugiel, S. Nurnberger, A. Sadeghi, and T. Schneider. Twin clouds: An architecture for secure cloud computing. In Workshop on Cryptography and Security in Clouds (WCSC 2011), 2011. [5] J. Li, X. Chen, M. Li, J. Li, P. Lee, and W. Lou. Secure deduplication with efficient and reliable convergent key management. In IEEE Transactions on Parallel and Distributed Systems, 2013. [6] Bugiel, S., N¨urnberger, S., Sadeghi, A.-R., Schneider, T.: Twin Clouds: An architecture for secure cloud computing (Extended Abstract). In: Workshop on Cryptography and Security in Clouds (WCSC 2011), March 15-16 (2011) [7] Chung, K.-M., Kalai, Y., Vadhan, S.: Improved delegation of computation using fully homomorphic encryption. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 483–501. Springer, Heidelberg (2010) [8] Cloud Security Alliance. Top threats to cloud computing, v. 1.0 (2010)
__________________________________________________________________________________ A Hybrid Cloud Approach For Data Authentication and Deduplication
11
International Journal of Computational Science, Mathematics and Engineering Volume2 , Issue6, June 2015 ISSN(online): 2349-8439 Copyright-IJCSME ____________________________________________________________________________________ N.Venkatesh Naik Research Scholar,Computer Science & Engg. Deptt jawaharlal nehru technological university anantapur,A.P.,India. Email:
[email protected]
Dr .K.Madhavi Assistant Professor,Computer Science & Engg. Dep jawaharlal nehru technological university anantapur,A.P.,India. Email:
[email protected]
P. Srivally Computer Science & Engg. Deptt, Sree Visvesvaraya Institute of Technology & Science, Mahabubnagar,Telangana,India.
__________________________________________________________________________________ A Hybrid Cloud Approach For Data Authentication and Deduplication
12