Professional Documents
Culture Documents
report
Project
On
On
A
novel
encryption
technique
to
A novel encryption technique to
formallyaddress
addressthe
theproblem
problemofof
formally
authorizeddata
datadeduplication
deduplicationinin
authorized
hybridcloud
cloudarchitecture
architecture
hybrid
PRESENTED BY:
ARSHIA TABASSUM (14141D5803)
CSE
MR.P.RAJENDRA PRASAD
ASST. PROFESSOR M.TECH
DEPARTMENT OF IT
OVER VIEW:
Introduction
Existing System
Proposed System
Modules
Hardware Requirements
Software Requirements
Designing
Testing
Screenshots
Advantages
Conclusion
References
INTRODUCTION:
Data
It has been widely used in cloud storage to reduce the amount of storage
space and save bandwidth.
This
Different
We
SYSTEM:
SYSTEM:
SYSTEM
ARCHITECTURE:
MODULES:
Cloud Service Provider
Data Users Module
Private Cloud Module
CLOUD SERVICE
PROVIDER
DATA USERS
MODULE
A user is an entity that wants to outsource data
storage to the CSP and access the data later.
The user only uploads unique data but does not upload
any duplicate data to save the upload bandwidth,
which may be owned by the same user or different
users.
In the authorized deduplication system, each user is
issued a set of privileges in the setup of the system.
Each file is protected with the convergent encryption
key and privilege keys to realize the authorized
deduplication with differential privileges.
MODULE
HARDWARE:
REQUIREMENTS
System
Hard Disk
Floppy Drive
Monitor
Mouse
Ram
:
SOFTWARE:
REQUIREMENTS
DESIGNING:
CLASS Diagram.
SEQUENCE Diagram.
Account Activation
Login
Token Request
Private Cloud
Accept Request
Previlege Token
User
Encrypt
Logout
CLASS DIAGRAM
Private Cloud
Request details
Response details
User
File Request
Token Request
File Upload/Download
Request()
Account Activation()
Provide Rights()
Public Cloud
View User Details
Store Files
Encrypt()
SEQUENCE DIAGEAM
Cloud
User
Private Cloud
File Upload/Dowload
User Rquest
Create Account
Token Request
Provide Request
Deduplication
Database
TESTING:
TESTING:
White Box
Testing
TESTING:
Unit Testing :
TESTING:
Black Box
Testing
:
TESTING:
Acceptance
Testing
TESTING:
SCREENSHOTS:
Homepage
Admin
SQL Log
ADVANTAGES:
The user is only allowed to perform the duplicate
check for files marked with the corresponding
privileges.
We present an advanced scheme to support
stronger security by encrypting the file with
differential privilege keys.
Reduce the storage size of the tags for integrity
check. To enhance the security of deduplication and
protect the data confidentiality.
CONCLUSION:
REFERENCES:
ANY
Queries