Efficient Client-Side Deduplication of Encrypted Data with Public Auditing in Cloud Storage using java

ABSTRACT 

At present, there is a considerable increase in the amount of data stored in storage services, along with dramatic evolution of networking techniques. In storage services with huge data, the storage servers may want to reduce the volume of stored data, and the clients may want to monitor the integrity of their data with a low cost, since the cost of the functions related to data storage increase in proportion to the size of the data. To achieve these goals, secure de-duplication and integrity auditing delegation techniques have been studied, which can reduce the volume of data stored in storage by eliminating duplicated copies and permit clients to efficiently verify the integrity of stored files by delegating costly operations to a trusted party, respectively. So far many studies have been conducted on each topic, separately, whereas relatively few combined schemes, which support the two functions simultaneously, have been researched. In this
Paper, we design a combined technique which performs both secure de-duplication of encrypted data and public integrity auditing of data. To support the two functions, the proposed scheme performs challenge response protocols using the HMAC Algorithm. We utilize a third party auditor for performing public audit, in order to help low-powered clients. The proposed scheme satisfies all the fundamental security requirements. We also propose two variances that provide higher security and better performance.

EXISTING SYSTEM:

At present, there is a considerable increase in the amount of data stored in storage services, along with dramatic evolution of networking techniques. In storage services with huge data, the storage servers may want to reduce the volume of stored data, and the clients may want to monitor the integrity of their data with a low cost, since the cost of the functions related to data storage increase in proportion to the size of the data. To achieve these goals, secure de-duplication and integrity auditing delegation techniques have been studied, which can reduce the volume of data stored in storage by eliminating duplicated copies and permit clients to efficiently verify the integrity of stored files by delegating costly operations to a trusted party, respectively.

DISADVANTAGE:

The memory space should be wasted   
Upload file collaboration to be affect


PROPOSED SYSTEM

Here, we describe the system model of our scheme. We also give the corresponding security model. After that, we will give a detailed description of our scheme according to the models. Our scheme utilizes the BLS signature-based Homomorphism Linear Authenticator (HLA), which was proposed in [14], for integrity auditing and secure de-duplication. We also introduce TPA to support public integrity auditing. The proposed scheme consists of the following entities. Outsources data to a cloud storage. CE-encrypted data is first generated, and then uploaded to the cloud storage to protect confidentiality. The client also needs to verify the integrity of the outsourced data. To do this, the client delegates integrity auditing to the TPA.  De-duplication technology is applied to save storage space and cost. We consider that the CSS may act maliciously due to insider/ outsider attacks, software/hardware malfunctions, intentional saving of computational resources, etc. During the de-duplication process, the CSS carries out the PoW protocol to verify that the client owns the file. Moreover, in the integrity audit process, it is necessary to generate and respond to a proof corresponding to the request of the TPA. Performs  integrity auditing on behalf of the client to reduce the client’s processing cost. Instead of the client, the auditor sends a challenge to the storage server to periodically perform an integrity audit protocol. TPA is assumed to be a semi-trust model, that is, an honest but curious model. Under the assumption, it is assumed that the TPA does not collude with other entities.

ADVANTAGE:

Save memory and cost by files into cloud 
Easy to identify the duplication files

SYSTEM ARCHITECTURE

SYSTEM REQUIREMENTS:
HARDWARE REQUIREMENTS:

System : Pentium IV 2.4 GHz.
Hard Disk        : 40 GB.
Floppy Drive : 1.44 Mb.
Monitor : 15 VGA Colour.
Mouse : Logitech.
Ram : 512 Mb.

SOFTWARE REQUIREMENTS:

Operating system : Windows XP.
Coding Language :  JAVA
Data Base :  MYSQL
IDE : NetBeans

REFERENCES

G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, “Provable data possession at untrusted stores,” in Proc. Of the 14th ACM conference on Computer and communications security (CCS’07), Alexandria, Virginia, USA, 2007, pp. 598–609.