SlideShare una empresa de Scribd logo
1 de 3
GLOBALSOFT TECHNOLOGIES 
IEEE PROJECTS & SOFTWARE DEVELOPMENTS 
IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE 
BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS 
CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401 
Visit: www.finalyearprojects.org Mail to:ieeefinalsemprojects@gmai l.com 
Secure Deduplication with Efficient and Reliable Convergent 
Key Management 
Abstract 
Data deduplication is a technique for eliminating duplicate copies of data, and has been widely used in 
cloud storage to reduce storage space and upload bandwidth. Promising as it is, an arising challenge is to 
perform secure deduplication in cloud storage. Although convergent encryption has been extensively 
adopted for secure deduplication, a critical issue of making convergent encryption practical is to 
efficiently and reliably manage a huge number of convergent keys. This paper makes the first attempt to 
formally address the problem of achieving efficient and reliable key management in secure 
deduplication. We first introduce a baseline approach in which each user holds an independent master 
key for encrypting the convergent keys and outsourcing them to the cloud. However, such a baseline key 
management scheme generates an enormous number of keys with the increasing number of users and 
requires users to dedicatedly protect the master keys. To this end, we propose Dekey , a new 
construction in which users do not need to manage any keys on their own but instead securely 
distribute the convergent key shares across multiple servers. Security analysis demonstrates that Dekey 
is secure in terms of the definitions specified in the proposed security model. As a proof of concept, we
implement Dekey using the Ramp secret sharing scheme and demonstrate that Dekey incurs limited 
overhead in realistic environments. 
Existing system 
Data deduplication is a technique for eliminating duplicate copies of data, and has been wi dely used in 
cloud storage to reduce storage space and upload bandwidth. Promising as it is, an arising challenge is to 
perform secure deduplication in cloud storage. Although convergent encryption has been extensively 
adopted for secure deduplication, a critical issue of making convergent encryption practical is to 
efficiently and reliably manage a huge number of convergent keys. This paper makes the first attempt to 
formally address the problem of achieving efficient and reliable key management in secure 
deduplication. We first introduce a baseline approach in which each user holds an independent master 
key for encrypting the convergent keys and outsourcing them to the cloud. However, such a baseline key 
management scheme generates an enormous number of keys with the increasing number of users and 
requires users to dedicatedly protect the master keys. 
Proposed system 
we propose Dekey , a new construction in which users do not need to manage any keys on their own but 
instead securely distribute the convergent key shares across multiple servers. Security analysis 
demonstrates that Dekey is secure in terms of the definitions specified in the proposed security model. 
As a proof of concept, we implement Dekey using the Ramp secret sharing scheme and demonstrate 
that Dekey incurs limited overhead in realistic environments. 
SYSTEM CONFIGURATION:- 
HARDWARE CONFIGURATION:- 
 Processor - Pentium –IV 
 Speed - 1.1 Ghz 
 RAM - 256 MB(min) 
 Hard Disk - 20 GB 
 Key Board - Standard Windows Keyboard 
 Mouse - Two or Three Button Mouse 
 Monitor - SVGA
SOFTWARE CONFIGURATION:- 
 Operating System : Windows XP 
 Programming Language : JAVA 
 Java Version : JDK 1.6 & above.

Más contenido relacionado

Más de IEEEGLOBALSOFTSTUDENTSPROJECTS

Más de IEEEGLOBALSOFTSTUDENTSPROJECTS (16)

2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A system-for-denial-of-service-...
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A system-for-denial-of-service-...2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A system-for-denial-of-service-...
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A system-for-denial-of-service-...
 
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A probabilistic-misbehavior-det...
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A probabilistic-misbehavior-det...2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A probabilistic-misbehavior-det...
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A probabilistic-misbehavior-det...
 
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Trajectory improves data delivery...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Trajectory improves data delivery...2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Trajectory improves data delivery...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Trajectory improves data delivery...
 
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Tracon interference aware schedul...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Tracon interference aware schedul...2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Tracon interference aware schedul...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Tracon interference aware schedul...
 
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT The design-and-evaluation-of-an-i...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT The design-and-evaluation-of-an-i...2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT The design-and-evaluation-of-an-i...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT The design-and-evaluation-of-an-i...
 
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT The client assignment problem for...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT The client assignment problem for...2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT The client assignment problem for...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT The client assignment problem for...
 
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Streaming applications on bus bas...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Streaming applications on bus bas...2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Streaming applications on bus bas...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Streaming applications on bus bas...
 
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Securing brokerless publish subsc...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Securing brokerless publish subsc...2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Securing brokerless publish subsc...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Securing brokerless publish subsc...
 
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Secure outsourced-attribute-based...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Secure outsourced-attribute-based...2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Secure outsourced-attribute-based...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Secure outsourced-attribute-based...
 
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Rre a-game-theoretic-intrusion-re...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Rre a-game-theoretic-intrusion-re...2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Rre a-game-theoretic-intrusion-re...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Rre a-game-theoretic-intrusion-re...
 
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Peer assisted vod systems an effi...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Peer assisted vod systems an effi...2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Peer assisted vod systems an effi...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Peer assisted vod systems an effi...
 
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT On false-data-injection-attacks-a...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT On false-data-injection-attacks-a...2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT On false-data-injection-attacks-a...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT On false-data-injection-attacks-a...
 
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT On social delay tolerant networki...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT On social delay tolerant networki...2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT On social delay tolerant networki...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT On social delay tolerant networki...
 
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Constructing load balanced data a...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Constructing load balanced data a...2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Constructing load balanced data a...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Constructing load balanced data a...
 
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT An ontology based hybrid approach...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT An ontology based hybrid approach...2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT An ontology based hybrid approach...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT An ontology based hybrid approach...
 
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT A security and privacy aware loca...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT A security and privacy aware loca...2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT A security and privacy aware loca...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT A security and privacy aware loca...
 

Último

Teachers record management system project report..pdf
Teachers record management system project report..pdfTeachers record management system project report..pdf
Teachers record management system project report..pdf
Kamal Acharya
 
ENCODERS & DECODERS - Digital Electronics - diu swe
ENCODERS & DECODERS - Digital Electronics - diu sweENCODERS & DECODERS - Digital Electronics - diu swe
ENCODERS & DECODERS - Digital Electronics - diu swe
MohammadAliNayeem
 
DR PROF ING GURUDUTT SAHNI WIKIPEDIA.pdf
DR PROF ING GURUDUTT SAHNI WIKIPEDIA.pdfDR PROF ING GURUDUTT SAHNI WIKIPEDIA.pdf
DR PROF ING GURUDUTT SAHNI WIKIPEDIA.pdf
DrGurudutt
 
Paint shop management system project report.pdf
Paint shop management system project report.pdfPaint shop management system project report.pdf
Paint shop management system project report.pdf
Kamal Acharya
 
Activity Planning: Objectives, Project Schedule, Network Planning Model. Time...
Activity Planning: Objectives, Project Schedule, Network Planning Model. Time...Activity Planning: Objectives, Project Schedule, Network Planning Model. Time...
Activity Planning: Objectives, Project Schedule, Network Planning Model. Time...
Lovely Professional University
 

Último (20)

Teachers record management system project report..pdf
Teachers record management system project report..pdfTeachers record management system project report..pdf
Teachers record management system project report..pdf
 
Planetary Gears of automatic transmission of vehicle
Planetary Gears of automatic transmission of vehiclePlanetary Gears of automatic transmission of vehicle
Planetary Gears of automatic transmission of vehicle
 
ENCODERS & DECODERS - Digital Electronics - diu swe
ENCODERS & DECODERS - Digital Electronics - diu sweENCODERS & DECODERS - Digital Electronics - diu swe
ENCODERS & DECODERS - Digital Electronics - diu swe
 
Lect_Z_Transform_Main_digital_image_processing.pptx
Lect_Z_Transform_Main_digital_image_processing.pptxLect_Z_Transform_Main_digital_image_processing.pptx
Lect_Z_Transform_Main_digital_image_processing.pptx
 
Research Methodolgy & Intellectual Property Rights Series 1
Research Methodolgy & Intellectual Property Rights Series 1Research Methodolgy & Intellectual Property Rights Series 1
Research Methodolgy & Intellectual Property Rights Series 1
 
Arduino based vehicle speed tracker project
Arduino based vehicle speed tracker projectArduino based vehicle speed tracker project
Arduino based vehicle speed tracker project
 
RM&IPR M5 notes.pdfResearch Methodolgy & Intellectual Property Rights Series 5
RM&IPR M5 notes.pdfResearch Methodolgy & Intellectual Property Rights Series 5RM&IPR M5 notes.pdfResearch Methodolgy & Intellectual Property Rights Series 5
RM&IPR M5 notes.pdfResearch Methodolgy & Intellectual Property Rights Series 5
 
"United Nations Park" Site Visit Report.
"United Nations Park" Site  Visit Report."United Nations Park" Site  Visit Report.
"United Nations Park" Site Visit Report.
 
Peek implant persentation - Copy (1).pdf
Peek implant persentation - Copy (1).pdfPeek implant persentation - Copy (1).pdf
Peek implant persentation - Copy (1).pdf
 
Electrical shop management system project report.pdf
Electrical shop management system project report.pdfElectrical shop management system project report.pdf
Electrical shop management system project report.pdf
 
DR PROF ING GURUDUTT SAHNI WIKIPEDIA.pdf
DR PROF ING GURUDUTT SAHNI WIKIPEDIA.pdfDR PROF ING GURUDUTT SAHNI WIKIPEDIA.pdf
DR PROF ING GURUDUTT SAHNI WIKIPEDIA.pdf
 
Top 13 Famous Civil Engineering Scientist
Top 13 Famous Civil Engineering ScientistTop 13 Famous Civil Engineering Scientist
Top 13 Famous Civil Engineering Scientist
 
Paint shop management system project report.pdf
Paint shop management system project report.pdfPaint shop management system project report.pdf
Paint shop management system project report.pdf
 
Software Engineering - Modelling Concepts + Class Modelling + Building the An...
Software Engineering - Modelling Concepts + Class Modelling + Building the An...Software Engineering - Modelling Concepts + Class Modelling + Building the An...
Software Engineering - Modelling Concepts + Class Modelling + Building the An...
 
Dairy management system project report..pdf
Dairy management system project report..pdfDairy management system project report..pdf
Dairy management system project report..pdf
 
Electrostatic field in a coaxial transmission line
Electrostatic field in a coaxial transmission lineElectrostatic field in a coaxial transmission line
Electrostatic field in a coaxial transmission line
 
Online resume builder management system project report.pdf
Online resume builder management system project report.pdfOnline resume builder management system project report.pdf
Online resume builder management system project report.pdf
 
2024 DevOps Pro Europe - Growing at the edge
2024 DevOps Pro Europe - Growing at the edge2024 DevOps Pro Europe - Growing at the edge
2024 DevOps Pro Europe - Growing at the edge
 
Activity Planning: Objectives, Project Schedule, Network Planning Model. Time...
Activity Planning: Objectives, Project Schedule, Network Planning Model. Time...Activity Planning: Objectives, Project Schedule, Network Planning Model. Time...
Activity Planning: Objectives, Project Schedule, Network Planning Model. Time...
 
Natalia Rutkowska - BIM School Course in Kraków
Natalia Rutkowska - BIM School Course in KrakówNatalia Rutkowska - BIM School Course in Kraków
Natalia Rutkowska - BIM School Course in Kraków
 

2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT Secure deduplication with efficient and reliable convergent key management

  • 1. GLOBALSOFT TECHNOLOGIES IEEE PROJECTS & SOFTWARE DEVELOPMENTS IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401 Visit: www.finalyearprojects.org Mail to:ieeefinalsemprojects@gmai l.com Secure Deduplication with Efficient and Reliable Convergent Key Management Abstract Data deduplication is a technique for eliminating duplicate copies of data, and has been widely used in cloud storage to reduce storage space and upload bandwidth. Promising as it is, an arising challenge is to perform secure deduplication in cloud storage. Although convergent encryption has been extensively adopted for secure deduplication, a critical issue of making convergent encryption practical is to efficiently and reliably manage a huge number of convergent keys. This paper makes the first attempt to formally address the problem of achieving efficient and reliable key management in secure deduplication. We first introduce a baseline approach in which each user holds an independent master key for encrypting the convergent keys and outsourcing them to the cloud. However, such a baseline key management scheme generates an enormous number of keys with the increasing number of users and requires users to dedicatedly protect the master keys. To this end, we propose Dekey , a new construction in which users do not need to manage any keys on their own but instead securely distribute the convergent key shares across multiple servers. Security analysis demonstrates that Dekey is secure in terms of the definitions specified in the proposed security model. As a proof of concept, we
  • 2. implement Dekey using the Ramp secret sharing scheme and demonstrate that Dekey incurs limited overhead in realistic environments. Existing system Data deduplication is a technique for eliminating duplicate copies of data, and has been wi dely used in cloud storage to reduce storage space and upload bandwidth. Promising as it is, an arising challenge is to perform secure deduplication in cloud storage. Although convergent encryption has been extensively adopted for secure deduplication, a critical issue of making convergent encryption practical is to efficiently and reliably manage a huge number of convergent keys. This paper makes the first attempt to formally address the problem of achieving efficient and reliable key management in secure deduplication. We first introduce a baseline approach in which each user holds an independent master key for encrypting the convergent keys and outsourcing them to the cloud. However, such a baseline key management scheme generates an enormous number of keys with the increasing number of users and requires users to dedicatedly protect the master keys. Proposed system we propose Dekey , a new construction in which users do not need to manage any keys on their own but instead securely distribute the convergent key shares across multiple servers. Security analysis demonstrates that Dekey is secure in terms of the definitions specified in the proposed security model. As a proof of concept, we implement Dekey using the Ramp secret sharing scheme and demonstrate that Dekey incurs limited overhead in realistic environments. SYSTEM CONFIGURATION:- HARDWARE CONFIGURATION:-  Processor - Pentium –IV  Speed - 1.1 Ghz  RAM - 256 MB(min)  Hard Disk - 20 GB  Key Board - Standard Windows Keyboard  Mouse - Two or Three Button Mouse  Monitor - SVGA
  • 3. SOFTWARE CONFIGURATION:-  Operating System : Windows XP  Programming Language : JAVA  Java Version : JDK 1.6 & above.