Download presentation
Presentation is loading. Please wait.
1
BY S.S.SUDHEER VARMA (13NT1D5816)
Monitoring of Cloud Storage by a Hybrid Cloud Inorder to perform Data De-duplication BY S.S.SUDHEER VARMA (13NT1D5816)
2
ABSTRACT In Cloud Computing ,the data will be stored on remote server in which the user will retrieve the data from that server at the time of need whish is done at rental basis. As data is stored in remote system we need to have a facility to avoid the duplicate data on servers, if this is not avoided the user need to pay excess amount for that duplicated storage. For this, we need to apply a new principle called as Data which is a best data compression technique to eliminate the duplicated data and this was widely used in recent cloud storage.
3
ABSTRACT As this data deduplication technique is used inorder to avoid the duplicate records not to be stored onto the data base, we need to protect the data confidentiality also. Inorder to protect the confidentiality of sensitive data ,the convergent encryption technique has been proposed inorder to encrypt the data.
4
INTRODUCTION In this concept a novel encryption technique has been implemented prior to storing the data onto the cloud server. The Private cloud server will generate the privileges .The user gets the access privileges then only he can operate the data , by acquiring token id from the cloud service provider. All these mechanisms incur minimal overhead compared to normal operations.
5
EXISTING SYSTEM & ITS LIMITATIONS
In the existing cloud either public or private the following are the limitations that takes place in storing and retrieving the data. Limitations of Existing System are : The major limitation in current cloud server is data is not encrypted by any means of encryption technique. All the data which is stored in either public cloud or private cloud is stored in a plain manner. By using the current cloud storage technology, de-duplication of data cant be minimized. The data owners only outsource their data storage by utilizing public cloud while the data operation is managed in private cloud
6
PROPOSED SYSTEM & ITS ADVANTAGES
In this concept, we can enhance the system by providing security. by encrypting the file with differential privilege keys. In this way, the users without corresponding privileges cannot perform the duplicate check. Furthermore, such unauthorized users cannot decrypt the cipher text even though collude with the S-CSP. The Private cloud server will generate the privileges for whatever the user want to have access .The user gets the access privileges then only he can operate the data, as well as inorder to access the data he will get an token id from the cloud service provider
7
ADVANTAGES OF PROPOSED SYSTEM
The user is only allowed to perform the duplicate check for files marked with the corresponding privileges. This concept offers more security to the sensitive data in the proposed security model. Reduce the unwanted storage space utilisation due to data redundancy through verification of the tags for integrity check. To enhance the security of deduplication and protect the data confidentiality. In this proposed system as an extension we have implemented proposed storage on real cloud service like : DriveHq Cloud Service provider. For the first time we have implemented encryption of data that is stored in cloud without having any data duplication.
8
HARDWARE REQUIREMENTS
Processor : Pentium IV 2.4 GHz. (Minimum) Hard Disk Space required : 40 GB. Monitor : Standard VGA type. Input devices : Standard mouse & keyboard. RAM : 512 MB(Minimum).
9
SOFTWARE REQUIREMENTS
Operating system : Windows XP/7. Coding Language : JAVA/J2EE IDE : Net Beans 7.4 Database : MYSQL 5.0
10
SYSTEM ARCHITECTURE SCHEMATIC VIEW OF HYBRID CLOUD ENVIRONMENT
11
USE CASE DIAGRAM
12
SEQUENCE DIAGRAM
13
COLLABORATION DIAGRAM
14
CLASS DIAGRAM
15
ACTIVITY DIAGRAM
16
STATE CHART DIAGRAM
17
COMPONENT DIAGRAM
18
DEPLOYMENT DIAGRAM
19
MODULES The proposed system can be divided into following subsystems:
Cloud Service Provider Data Users Module Private Cloud Module Secure data de-duplication System
20
SCREEN SHOTS
21
SCREEN SHOTS
22
SCREEN SHOTS
23
SCREEN SHOTS
24
SCREEN SHOTS
25
SCREEN SHOTS
26
SCREEN SHOTS
27
SCREEN SHOTS
28
SCREEN SHOTS
29
SCREEN SHOTS
30
SCREEN SHOTS
31
SCREEN SHOTS
32
SCREEN SHOTS
33
SCREEN SHOTS
34
CONCLUSION The proposed concept protects the data security by including differential privileges of users in the duplicate check, in which the duplicate-check tokens of files are generated by the private cloud server with private keys. Security analysis demonstrates that our schemes are secure in terms of insider and outsider attacks specified in the proposed security model.
35
THANK YOU
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.