Presentation is loading. Please wait.

Presentation is loading. Please wait.

BY S.S.SUDHEER VARMA (13NT1D5816)

Similar presentations


Presentation on theme: "BY S.S.SUDHEER VARMA (13NT1D5816)"— Presentation transcript:

1 BY S.S.SUDHEER VARMA (13NT1D5816)
Monitoring of Cloud Storage by a Hybrid Cloud Inorder to perform Data De-duplication BY S.S.SUDHEER VARMA (13NT1D5816)

2 ABSTRACT In Cloud Computing ,the data will be stored on remote server in which the user will retrieve the data from that server at the time of need whish is done at rental basis. As data is stored in remote system we need to have a facility to avoid the duplicate data on servers, if this is not avoided the user need to pay excess amount for that duplicated storage. For this, we need to apply a new principle called as Data which is a best data compression technique to eliminate the duplicated data and this was widely used in recent cloud storage.

3 ABSTRACT As this data deduplication technique is used inorder to avoid the duplicate records not to be stored onto the data base, we need to protect the data confidentiality also. Inorder to protect the confidentiality of sensitive data ,the convergent encryption technique has been proposed inorder to encrypt the data.

4 INTRODUCTION In this concept a novel encryption technique has been implemented prior to storing the data onto the cloud server. The Private cloud server will generate the privileges .The user gets the access privileges then only he can operate the data , by acquiring token id from the cloud service provider. All these mechanisms incur minimal overhead compared to normal operations.

5 EXISTING SYSTEM & ITS LIMITATIONS
In the existing cloud either public or private the following are the limitations that takes place in storing and retrieving the data. Limitations of Existing System are : The major limitation in current cloud server is data is not encrypted by any means of encryption technique. All the data which is stored in either public cloud or private cloud is stored in a plain manner. By using the current cloud storage technology, de-duplication of data cant be minimized. The data owners only outsource their data storage by utilizing public cloud while the data operation is managed in private cloud

6 PROPOSED SYSTEM & ITS ADVANTAGES
In this concept, we can enhance the system by providing security. by encrypting the file with differential privilege keys. In this way, the users without corresponding privileges cannot perform the duplicate check. Furthermore, such unauthorized users cannot decrypt the cipher text even though collude with the S-CSP. The Private cloud server will generate the privileges for whatever the user want to have access .The user gets the access privileges then only he can operate the data, as well as inorder to access the data he will get an token id from the cloud service provider

7 ADVANTAGES OF PROPOSED SYSTEM
The user is only allowed to perform the duplicate check for files marked with the corresponding privileges. This concept offers more security to the sensitive data in the proposed security model. Reduce the unwanted storage space utilisation due to data redundancy through verification of the tags for integrity check. To enhance the security of deduplication and protect the data confidentiality. In this proposed system as an extension we have implemented proposed storage on real cloud service like : DriveHq Cloud Service provider. For the first time we have implemented encryption of data that is stored in cloud without having any data duplication.

8 HARDWARE REQUIREMENTS
Processor : Pentium IV 2.4 GHz. (Minimum) Hard Disk Space required : 40 GB. Monitor : Standard VGA type. Input devices : Standard mouse & keyboard. RAM : 512 MB(Minimum).

9 SOFTWARE REQUIREMENTS
Operating system : Windows XP/7. Coding Language : JAVA/J2EE IDE : Net Beans 7.4 Database : MYSQL 5.0

10 SYSTEM ARCHITECTURE SCHEMATIC VIEW OF HYBRID CLOUD ENVIRONMENT

11 USE CASE DIAGRAM

12 SEQUENCE DIAGRAM

13 COLLABORATION DIAGRAM

14 CLASS DIAGRAM

15 ACTIVITY DIAGRAM

16 STATE CHART DIAGRAM

17 COMPONENT DIAGRAM

18 DEPLOYMENT DIAGRAM

19 MODULES The proposed system can be divided into following subsystems:
Cloud Service Provider Data Users Module Private Cloud Module Secure data de-duplication System

20 SCREEN SHOTS

21 SCREEN SHOTS

22 SCREEN SHOTS

23 SCREEN SHOTS

24 SCREEN SHOTS

25 SCREEN SHOTS

26 SCREEN SHOTS

27 SCREEN SHOTS

28 SCREEN SHOTS

29 SCREEN SHOTS

30 SCREEN SHOTS

31 SCREEN SHOTS

32 SCREEN SHOTS

33 SCREEN SHOTS

34 CONCLUSION The proposed concept protects the data security by including differential privileges of users in the duplicate check, in which the duplicate-check tokens of files are generated by the private cloud server with private keys. Security analysis demonstrates that our schemes are secure in terms of insider and outsider attacks specified in the proposed security model.

35 THANK YOU


Download ppt "BY S.S.SUDHEER VARMA (13NT1D5816)"

Similar presentations


Ads by Google