BY S.S.SUDHEER VARMA (13NT1D5816)

Slides:



Advertisements
Similar presentations
CLOSENESS: A NEW PRIVACY MEASURE FOR DATA PUBLISHING
Advertisements

Abstract There is significant need to improve existing techniques for clustering multivariate network traffic flow record and quickly infer underlying.
WEB USAGE MINING FRAMEWORK FOR MINING EVOLVING USER PROFILES IN DYNAMIC WEBSITE DONE BY: AYESHA NUSRATH 07L51A0517 FIRDOUSE AFREEN 07L51A0522.
Secure Data Storage in Cloud Computing Submitted by A.Senthil Kumar( ) C.Karthik( ) H.Sheik mohideen( ) S.Lakshmi rajan( )
Abstract Shortest distance query is a fundamental operation in large-scale networks. Many existing methods in the literature take a landmark embedding.
On the Node Clone Detection inWireless Sensor Networks.
Construction of efficient PDP scheme for Distributed Cloud Storage. By Manognya Reddy Kondam.
A Secure Protocol for Spontaneous Wireless Ad Hoc Networks Creation.
Abstract Provable data possession (PDP) is a probabilistic proof technique for cloud service providers (CSPs) to prove the clients' data integrity without.
Cross-Domain Privacy-Preserving Cooperative Firewall Optimization.
Layered Approach using Conditional Random Fields For Intrusion Detection.
NICE :Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems.
Dynamic Resource Allocation Using Virtual Machines for Cloud Computing Environment.
DATA DYNAMICS AND PUBLIC VERIFIABILITY CHECKING WITHOUT THIRD PARTY AUDITOR GUIDED BY PROJECT MEMBERS: Ms. V.JAYANTHI M.E Assistant Professor V.KARTHIKEYAN.
Privacy-Preserving Public Auditing for Secure Cloud Storage
Architecture for Protecting Critical Secrets in Microprocessors Ruby Lee Peter Kwan Patrick McGregor Jeffrey Dwoskin Zhenghong Wang Princeton Architecture.
Improving Network I/O Virtualization for Cloud Computing.
m-Privacy for Collaborative Data Publishing
PACK: Prediction-Based Cloud Bandwidth and Cost Reduction System
Protecting Sensitive Labels in Social Network Data Anonymization.
Identity-Based Secure Distributed Data Storage Schemes.
Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage Systems.
MOBILITY BILL DEFRAYMENT
EZee iCafe System. Contents Introduction Current Scenario Proposed Solution Architecture / Block Diagram Hardware / Software Requirements Features Benefits.
Accuracy-Constrained Privacy-Preserving Access Control Mechanism for Relational Data.
Identity-Based Distributed Provable Data Possession in Multi-Cloud Storage.
A System for Denial-of- Service Attack Detection Based on Multivariate Correlation Analysis.
© Paradigm Publishing Inc. 4-1 OPERATING SYSTEMS.
Privacy Preserving Delegated Access Control in Public Clouds.
Scalable Distributed Service Integrity Attestation for Software-as-a-Service Clouds.
Abstract With the advent of cloud computing, data owners are motivated to outsource their complex data management systems from local sites to the commercial.
Privacy Preserving Back- Propagation Neural Network Learning Made Practical with Cloud Computing.
Participatory Privacy: Enabling Privacy in Participatory Sensing
Presenting By CH . MADHURI(12QU1D5806) Under the supervision of
Supporting Privacy Protection in Personalized Web Search.
Under The Guidance of Smt. Ch.Ratna Kumari Asst.Professor Submitted by M Ravi Kumar Roll No:10021F0006 M.C.A.
m-Privacy for Collaborative Data Publishing
Attribute-Based Encryption With Verifiable Outsourced Decryption.
A Scalable Two-Phase Top-Down Specialization Approach for Data Anonymization Using MapReduce on Cloud.
Multiparty Access Control for Online Social Networks : Model and Mechanisms.
Harnessing the Cloud for Securely Outsourcing Large- Scale Systems of Linear Equations.
By Tom and James. Hardware is a physical part of the system that you can pick up and move. There are two types of hardware, external and internal. External.
Security Analysis of a Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption Scheme.
Privacy-Preserving and Content-Protecting Location Based Queries.
Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud.
Whole Test Suite Generation. Abstract Not all bugs lead to program crashes, and not always is there a formal specification to check the correctness of.
APARTMENT MAINTENANCE SYSTEM M.Tech( Ph.D) HOD of C.S.E & I.T Dept.
Fast Transmission to Remote Cooperative Groups: A New Key Management Paradigm.
Library Management System. Aim : To develop a project titled “LIBRARY MANAGEMENT” and is developed to maintain the operation done in a library. To develop.
UNIVERSITY MANAGEMENT SYSTEM
BY. Secured Data Transmission through Network handles hiding a secret message with in an image in such a way that others cannot discern the presence or.
Speed Cash System. Purpose of the Project  online Banking Transaction Information.  keeping in view of the distributed client server computing technology,
Fragile Watermarking Scheme for Relational Database Fragile Watermarking Scheme for Relational Database.
 Abstract  Introduction  Literature Survey  Conclusion on Literature Survey  Threat model and system architecture  Proposed Work  Attack Scenarios.
CAM: Cloud-Assisted Privacy Preserving Mobile Health Monitoring.
Secure and Practical Outsourcing of Linear Programming in Cloud Computing.
Securing Network Servers
Security Using Armstrong Numbers and Authentication using Colors
Under the Guidance of V.Rajashekhar M.Tech Assistant Professor
INFORMATION RETRIEVAL AND KNOWLEDGE MANAGEMENT SYSTEM
ABSTRACT   Recent work has shown that sink mobility along a constrained path can improve the energy efficiency in wireless sensor networks. Due to the.
ROBUST FACE NAME GRAPH MATCHING FOR MOVIE CHARACTER IDENTIFICATION
STEGANOGRAPHY.
APARTMENT MAINTENANCE SYSTEM
Department Of Computer Science Engineering
Cloud based Open Source Backup/Restore Tool
A Presentation on online voting system
ONLINE SECURE DATA SERVICE
Bioinformatics (Nursing)
Problem Statement To transform the traditional system to automated system(ERP). No centralized control. Low data privacy. Huge amount of human resources.
Presentation transcript:

BY S.S.SUDHEER VARMA (13NT1D5816) Monitoring of Cloud Storage by a Hybrid Cloud Inorder to perform Data De-duplication BY S.S.SUDHEER VARMA (13NT1D5816)

ABSTRACT In Cloud Computing ,the data will be stored on remote server in which the user will retrieve the data from that server at the time of need whish is done at rental basis. As data is stored in remote system we need to have a facility to avoid the duplicate data on servers, if this is not avoided the user need to pay excess amount for that duplicated storage. For this, we need to apply a new principle called as Data which is a best data compression technique to eliminate the duplicated data and this was widely used in recent cloud storage.

ABSTRACT As this data deduplication technique is used inorder to avoid the duplicate records not to be stored onto the data base, we need to protect the data confidentiality also. Inorder to protect the confidentiality of sensitive data ,the convergent encryption technique has been proposed inorder to encrypt the data.

INTRODUCTION In this concept a novel encryption technique has been implemented prior to storing the data onto the cloud server. The Private cloud server will generate the privileges .The user gets the access privileges then only he can operate the data , by acquiring token id from the cloud service provider. All these mechanisms incur minimal overhead compared to normal operations.

EXISTING SYSTEM & ITS LIMITATIONS In the existing cloud either public or private the following are the limitations that takes place in storing and retrieving the data. Limitations of Existing System are : The major limitation in current cloud server is data is not encrypted by any means of encryption technique. All the data which is stored in either public cloud or private cloud is stored in a plain manner. By using the current cloud storage technology, de-duplication of data cant be minimized. The data owners only outsource their data storage by utilizing public cloud while the data operation is managed in private cloud

PROPOSED SYSTEM & ITS ADVANTAGES In this concept, we can enhance the system by providing security. by encrypting the file with differential privilege keys. In this way, the users without corresponding privileges cannot perform the duplicate check. Furthermore, such unauthorized users cannot decrypt the cipher text even though collude with the S-CSP. The Private cloud server will generate the privileges for whatever the user want to have access .The user gets the access privileges then only he can operate the data, as well as inorder to access the data he will get an token id from the cloud service provider

ADVANTAGES OF PROPOSED SYSTEM The user is only allowed to perform the duplicate check for files marked with the corresponding privileges. This concept offers more security to the sensitive data in the proposed security model. Reduce the unwanted storage space utilisation due to data redundancy through verification of the tags for integrity check. To enhance the security of deduplication and protect the data confidentiality. In this proposed system as an extension we have implemented proposed storage on real cloud service like : DriveHq Cloud Service provider. For the first time we have implemented encryption of data that is stored in cloud without having any data duplication.

HARDWARE REQUIREMENTS Processor : Pentium IV 2.4 GHz. (Minimum) Hard Disk Space required : 40 GB. Monitor : Standard VGA type. Input devices : Standard mouse & keyboard. RAM : 512 MB(Minimum).

SOFTWARE REQUIREMENTS Operating system : Windows XP/7. Coding Language : JAVA/J2EE IDE : Net Beans 7.4 Database : MYSQL 5.0

SYSTEM ARCHITECTURE SCHEMATIC VIEW OF HYBRID CLOUD ENVIRONMENT

USE CASE DIAGRAM

SEQUENCE DIAGRAM

COLLABORATION DIAGRAM

CLASS DIAGRAM

ACTIVITY DIAGRAM

STATE CHART DIAGRAM

COMPONENT DIAGRAM

DEPLOYMENT DIAGRAM

MODULES The proposed system can be divided into following subsystems: Cloud Service Provider Data Users Module Private Cloud Module Secure data de-duplication System

SCREEN SHOTS

SCREEN SHOTS

SCREEN SHOTS

SCREEN SHOTS

SCREEN SHOTS

SCREEN SHOTS

SCREEN SHOTS

SCREEN SHOTS

SCREEN SHOTS

SCREEN SHOTS

SCREEN SHOTS

SCREEN SHOTS

SCREEN SHOTS

SCREEN SHOTS

CONCLUSION The proposed concept protects the data security by including differential privileges of users in the duplicate check, in which the duplicate-check tokens of files are generated by the private cloud server with private keys. Security analysis demonstrates that our schemes are secure in terms of insider and outsider attacks specified in the proposed security model.

THANK YOU