SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 07 | July -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 433
Deduplication on Encrypted Big Data in HDFS
Saif Ahmed Salim1, Prof. Latika R. Desai 2
1Department of Computer Engineering, Dr. D.Y. Patil Institute of Technology, Pune University, Pune, India
2Department of Computer Engineering, Dr. D.Y. Patil Institute of Technology, Pune University, Pune, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract—Data de-duplication is single of essential data
compression systems for rejecting duplicate replicas of
repeating data, and has been generally used in cloud storage
to decrease the total of storage space and save bandwidth. To
make sure the privacy been proposed to ascent the
information already outsourcing. To wellconfirminformation
security, this paper makes the primary endeavor to formally
address the issue of approved information de-duplication. Not
the same as usual de-duplication frameworks, the degree of
difference assistances of clients are further considered in copy
check other than the data itself. We additionally present a
limited new de-duplication changes supportiveapprovedcopy
check in a limit cloud design. Securitystudy demonstratesthat
our system is protected in expressions of the definitions
definite in the planned safety model. As a impervious of
thought, we execute a model of our future authorized
duplicate check system and conduct test bed experiment with
our prototype. We displaythatourfutureauthorizedduplicate
verify scheme incurs nominal above compared to normal
processes.
Key words—Access control, Big data, HDFS, data-
deduplication.
1.INTRODUCTION
Our aim is to minimize repetitive information and augment
space funds. A strategy which has been generally embraced
is cross-client deduplication. The fundamental idea behind
deduplication is to store duplicate data (either records or
pieces) just once. Appropriately, if a customer needs to
exchange a record (piece) which is currently secured, the
cloud provider will add the customer to the proprietoronce-
over of that report (square). Deduplication has
demonstrated to accomplish high space and cost reserve
funds and numerous Huge Informationstockpilingsuppliers
are as of now receiving it. Deduplication can diminish
capacity needs by up to 90-95% for reinforcement
applications and up to 68% in standard document
frameworks. Distributed computing gives apparently
boundless "virtualized" assets to clients as administrations
over the entire Web, while concealing stageandusagesubtle
elements. The present cloud advantage providers offer both
exceedingly available limit and massively parallel figuring
resources at reasonably low costs. As disseminated figuring
gets the opportunityto beoverwhelming,a growingmeasure
of data is being secured in the cloud and conferred by
customers to decided advantages, which describe the get to
benefits of the set away data. One fundamental trial of
appropriated stockpiling organizationsistheorganizationof
the consistently growing volume of data. To make data
organization flexible in dispersedregistering,de-duplication
has been a remarkable technique and has pulled in more
thought starting late. Data de-duplication isa particulardata
weight framework for wiping out duplicate copies of
repeating data away. The system is used to upgrade
stockpiling use and can similarly be associated with
arranging data trades to lessen a number of bytes that must
be sent. Instead of keeping various data copies with
comparable substance, de-duplication discards dull data by
keeping emerge physical copy and implying different
overabundance data to thatcopy.De-duplicationcanhappen
at either the report level or the piece level. For record level
de-duplication, it discards duplicate copies of the
comparable archive. De-duplicationcaninlikemanneroccur
at the piece level, which takes out duplicate squares of data
that occur in non-indistinct reports. Conveyed processing is
a rising organization show that gives estimation and limit
resources on the Web. One engaging convenience that
circulated registering can offer is appropriated capacity.
Individuals and endeavours are routinely required to
remotely record their data to remain from any information
mishap if there are any gear/programming frustrations or
unexpected disasters.Asopposedtopurchasingthe required
stockpiling media to keep data fortifications,individualsand
endeavours can essentially outsource their data support
organizations to the cloud banquet providers,whichgivethe
principal stockpiling advantages for have the data
fortifications. While disseminated capacity is engaging, how
to give security confirmationstooutsourceddata transforms
into a rising concern. One vital security test is to give the
property of ensured cancelation,i.e.,data recordsareforever
blocked stores of deletion. Keeping data fortifications
forever is undesirable, as fragile information may be
revealed later on in perspective of data break or wrong
organization of cloud managers. Along these lines, to avoid
liabilities, attempts and government associations typically
keep their fortifications for a predetermined number of
years and request to eradicate (or squash) the fortifications
a brief time frame later. For example, the US Congress is
figuring the Web Information Maintenance establishmentin
moving toward ISPs to hold data for quite a while, while in
the Joined Kingdom, associations are requiredtohold wages
and pay records for quite a while.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 07 | July -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 434
1.1 Related Work
Cloud specialist co-ops offer profoundly accessible storage
room and hugely parallel figuring assets at generally low
expenses. The coming of Cloud Storage inspiresventuresand
associations to outsource informationstockpilingtooutsider
cloud suppliers. An expanding measure of information is
being put away in the cloud and shared by clients with
indicated benefits, which characterize the get to privilegesof
the put away information. Gmail is a case of distributed
storage which is utilized by the greater part of us
consistently. One of the significant issues of distributed
storage administrations is the administration of the
perpetually expanding volume of information. To make
information administration versatile in distributed
computing, deduplication is a method and haspulledinmore
consideration as of late. Information deduplication is a
specific information pressure system for wiping out copy
duplicates of rehashed information away. Information
deduplication is otherwise called single instancing or clever
pressure system [1]. This system is utilized to enhance
stockpiling use. Rather than keeping various information
duplicates with a similar substance on the cloud,
deduplication disposes of repetitive information by keeping
just a single physical duplicate and alluding other access
informationtothatduplicatecopy.Deduplicationcanoccurat
either the record level or the square level [2]. For document-
level deduplication, it takes out copy duplicates of a similar
record. Microsoft's Single Instance Server (SIS) and EMC's
Centera utilize a record level deduplication [3]. For piece
level deduplication, it dispenses with copy squares of
information that happen in no indistinguishable records.
Dropbox distributed storageutilizes an extensivesettledsize
(4MB) piece level deduplication [3]. Deduplication can
happen at Inline, Post-prepare, Client-side,andTarget-based
[4]. In Inline deduplication,ithappensbeforeinformationput
away on cloud i.e. it is performed at the season of putting
away information on the capacity framework. It diminishes
the plate space required in the framework [4]. In Post-
prepare deduplication, it happens in the wake of putting
away information on cloud i.e. it alludes to the kind of
framework where programming forms, channels the excess
information from an informational collection simply after it
has as of now been exchanged to an information put away
area. In Client-side deduplication, it happens at Owner/User
side, in that copy informationis first just recognized beforeit
must be sent over the system. This will make trouble on the
CPU yet in the meantimedecreases the heap on thesystem.It
is proposedtolimittransmissioncapacityandspaceexpected
to transfer and store copied information. Kim et al. [3] given
that many driving cloud-based capacity administrations
including Dropbox, Wuala, Memopal, JustCloud, and Mozy
utilize information deduplication methods at a sourcei.e.ata
customer side to save network bandwidth from a user to
cloud servers, which in turn increases the speed of data
upload as well as storage space. In Target-based de-
duplication, it occurs at storage service provider side. The
Target deduplication will remove the redundancies from a
backup transmission as and when it passes through an
appliance that is present between the source and the target.
Unlike source deduplication, the Target deduplication does
not reduce the total amount of data that need to be
transferred across a WAN or LAN during the backup, but it
reduces the amount of storage room required [4].
Informationdeduplicationbringsalotofadvantages,security
and protection concerns emerge as clients' touchy
information are defenseless to both insider and untouchable
assaults. Conventional encryption, while giving information
classification,isincongruentwithinformationde-duplication.
Conventional encryption requires distinctive clients to
scramble their information with their own keys by which
indistinguishable information duplicates of various clients
will prompt diverse figure writings, making de-duplication
inconceivable [5]. The answer for adjusting privacy and
effectiveness in deduplication was portrayed by M.Bellareet
al [6] called united encryption. It has been proposed to
uphold information classification while making
deduplication. It scrambles/unscrambles an information
duplicate with a joined key, which is inferred by registering
the cryptographic hash estimation of the substance of the
information duplicate itself [7]. To forestall unapproved, get
to, a protected evidence of proprietorship convention [8] is
additionally expected to give the verification that the client
undoubtedly possesses a similar document when a copy is
found. After the confirmation, ensuing clients with a similar
record will be given a pointer from the server without
expecting to transfer a similar document.
Nonetheless, past deduplication frameworks can't bolster
differential approval copy check [8]. In an approved
deduplication framework, every client is issued an
arrangement of benefits amid framework instatement. Each
record transferred to the cloud is additionally limited by an
arrangement of benefits to determine which sort of clients is
permitted to play out the copy check and get to the
documents. Before presenting his copy check ask for some
document, the client needs to take this record and his/her
benefits as data sources. The client can locate a copy for this
record if and just if there is aduplicateofthisdocumentanda
coordinated benefit put away in cloud.
2. PROPOSED WORK AND METHODOLOGY
From the above literature survey we have concluded that an
existing data de-duplication system, the private cloud is
involved as a proxy to allow data owner/users to securely
perform duplicate check with differential privileges. Such
architecture is practical and has attracted much attention
from researchers. The data owners only outsource theirdata
storage by utilizing public cloud while the data operation is
managed in private cloud.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 07 | July -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 435
In the proposed research work to design and implement a
system which will provide the parallel processing to detect
the data de-duplicationprobleminbigdataenvironment.The
system also provides benefit access control of data
management and proxy revocation of system.
2.1 System Overview
Proposed scheme contain following main aspects
Encrypted Data Upload:
If data duplication check is negative, the data holder
encrypts its data utilizingan arbitrarilyculledsymmetrickey
DEK in order to ascertain the security and privacy of data,
and stores the encrypted data at database together with the
token utilized for data duplication check. The data holder
encrypts DEK with pkAP and passes the encrypted key to
database.
Data owner:
First data owner can upload the text file from atthesame
system can take all files from data nodes and check the
duplication with given file. If the VCS score is greater than
threshold system can denote this file as duplicate. If the file
is not duplicate, then job manager first check each server
load and find the trustworthy of them base on CPU aswell as
memory load. Then the encrypted data can distribute into
HDFS, and store the file tokens and other details into hash
table.
Figure-1: Proposed System architecture
User:
In case that an authentic data owner uploads the data
later than the data holder, the job manager can manage to
preserve the data encrypted by the authentic data owner at
the HDFS. But at the same time manager can use the hash
table efficient data retrieval, that can be reduce the time and
cost also.
2.2 ALGORITHM
Document retrieval Algorithm
Input: Users query as Q , Network Connection N;
Output: result from relevancy calculation top k pages’
base on Q.
Step 1: User provide the Q to system.
Step 2: if (N!=Null)
Process
Read each attribute A from ith Row in D
Res[i]=Calcsim(Q,A)
Else No connection
Step 3: For each (k to Res)
Step 4: Array list Objarray to bind Q to Res[i] or k
Step 5: Return to users Objarray
Step 6: Display Objarray
Weight Calculation Algorithm
Input: Query generated from user Q, each retrieved list L
from webpage.
Output: Each list with weight.
Here system have to find similarity of two lists:
and
where and are the components of the vector
(features of the document, or values for each word of the
comment) and the is the dimension of the vectors:
Step 1: Read each row R from Data List L
Step 2: for each (Column c from R)
Step 3: Apply formula (1) on c and Q
Step 4: Score=Calc(c,Q)
Step 5: calculate relevancy score for attribute list.
Step 6: assign each Row to current weight
Step 7: Categorize all instances
Step 8: end for end procedure
2.3 MATHEMETICAL MODEL
S= {s, e, F, X, Y,}
Where,
s = Start of the program.
1. Log in with webpage.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 07 | July -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 436
2. Input Query.
e = End of the program.
Retrieve the similar features.
F=Function Using Algorithm
1) Searching algorithm
2) Find similar clusters base on query approach
3) Select the results similar to query
4) SimilarityFunction (vector base cosine similarity) and
return the result list
X = Input of the program. Input should be query.
Y = Output of the program.
First query submitted into server then server load
datasets then divide into subspaces, again apply constraint
propagation on subspaces then clustering after that server
will do updated these layer repeatedly and final output will
have generated into ensemble clusters.
X, Y U
Let U be the Set of System.
U= {Client, D, C, C1, N, E }
Where Client, F, S, T, M, D are the elements of the set.
Client= User, Server
D= Divide data into subspace
C= Apply constraint propagation on subspaces
C1= Clustering Solutions
N= update layers/nodes
E= Result clusters
Here system proposes to find similarity of two vectors:
and ,
where and are the components of the vector
(features of the document, or values for each word of the
comment ) and the is the dimension of the vectors:
Success Condition
if(Query != Null)
Failure Condition
if (Query==Null || Db==Null || Connection==Null)
3. EXPERIMENTAL RESULT
The final results of the designed system are given below.
From those results we get the detailed information to Check
de-duplication and upload the files, Fetching the Signs using
Hashing Algorithm, checking for Duplication, file uploading,
file downloading andattacker trying to attack(block)ondata
node. Detailed procedure of the proposed system is given.
Based on this we confirm that securely authorized de-
duplication is successfully achieved with hybrid cloud
approach.
We also evaluated the computation costs of system for
varying values of k, l and K. Throughout this sub-section, we
fix m = 6 and n = 2000. However, we observed that the
running time of grows almost linearly with n and m. The
below tables 1 shows current system evaluation outcome.
Table-1: current system evaluation outcome
Approach Data
Records
Times in
Seconds
Proposed
2000 35
4000 68
6000 102
8000 132
10000 171
For the results and comparative analysis, we compare the
system with some existing approaches like cloud base de-
duplication, KNN base duplication, the below graphs show
the time required for retrieve the data with propose as well
as existing.
ms ms ms
ms
0
50
100
150
200
250
300
350
Cloud Base Content
Base
KNN Base VCS
Figure-2: Proposed system comparison with others
After the complete implementation of system evaluate with
different experiments. For the second experiment system
focuses on time complexity of cryptography algorithm. The
system takes use different timefordata encryptionaswell as
data decryption purpose. The below figure 3 shows the
encryption and decryption time complexity.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 07 | July -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 437
Figure-3: Data encryption and decryption performance
with different approaches
4. CONCLUSIONS
Managing encrypted data with deduplication is
consequential and consequential in practice for achieving a
prosperous cloud storage accommodation, especially for
astronomically immense data storage. In this paper, we
proposed a practical scheme to manage the encrypted
sizably voluminous data in cloud with deduplication
predicated on ownershipchallengeand PRE.Ourschemecan
flexibly support data update and sharing with deduplication
even when the data holders are offline. Encrypted data can
be securely accessed because only sanctioned data holders
can obtain the symmetric keys utilized for data decryption.
Extensive performance analysis and test showed that our
scheme is secure and efficient under the described security
model and very opportune for sizably voluminous data
deduplication. The results of our computer simulations
further showed the practicability of our scheme.
Future work includes optimizing our design and
implementation for practical deployment and studying
verifiable computation to ascertain that SP deports as
expected in deduplication management.
REFERENCES
[1] Deepak Mishra, Dr. Sanjeev Sharma, “Comprehensive
study of data de-duplication”, International Conference on
Cloud, Big Data and Trust, Nov 2013.
[2] Gaurav Kakariya, Prof. Sonali Rangdale, “A Hybrid Cloud
Approach for Secure Authorized Deduplication”,
International Journal of Computer Engineering and
Applications, Volume VIII, Issue I, October 2014.
[3] Daehee Kim, Sejun Song, Baek-Young Choi, “SAFE:
Structure-Aware File and Email Deduplication for Cloud-
based Storage Systems”.
[4] Pooja S Dodamani, Pradeep Nazareth, “A Survey on
Hybrid Cloud with De-Duplication”, International Journal of
Innovative Research in Computer and Communication
Engineering, December 2014.
[5] Boga Venkatesh, Anamika Sharma, Gaurav Desai,
Dadaram Jadhav, “Secure AuthorisedDeduplication byUsing
Hybrid Cloud Approach”, November 2014.
[6] M. Bellare, S. Keelveedhi, and T. Ristenpart, “Message-
locked encryption and secure deduplication”, in Proc. IACR
Cryptology ePrint Archive, 2012
[7] Jin. Li, Xiaofeng Chen, M. Li, J. Li, P. Lee, and W. Lou.,
“SecureDeduplicationwithEfficientandReliableConvergent
Key Management”, In IEEE Transactions on Parallel and
Distributed Systems,June- 2014.
[8] Jin. Li, Yan Kit Li, Xiaofeng, P. Lee, and W. Lou., “A Hybrid
Cloud Approach for Secure Deduplication”, In IEEE
Transactions on Parallel and Distributed Systems, 2014.
[9] Jan Stanek, Alessandro Sorniotti, Elli Androulakiy, Lukas
Kencl, “A Secure Data Deduplication Scheme for Cloud
Storage”.
[10] Jaehong Min, Daeyoung Yoon,andYoujip Won,“Efficient
Deduplication Techniques for Modern Backup Operation”,
IEEE Transactions on Computers, Vol. 60, No. 6, June 2011
[11] Mihir Bellare,Sriram Keelveedhi and Thomas
Ristenpart, "Message-Locked Encryption and Secure
Deduplication",Proceedings ofEurocrypt,Vol.6,March2013.
Ad

More Related Content

What's hot (16)

Connect July-Aug 2014
Connect July-Aug 2014Connect July-Aug 2014
Connect July-Aug 2014
Glenn Garrahan
 
ANALYSIS OF ATTACK TECHNIQUES ON CLOUD BASED DATA DEDUPLICATION TECHNIQUES
ANALYSIS OF ATTACK TECHNIQUES ON CLOUD BASED DATA DEDUPLICATION TECHNIQUESANALYSIS OF ATTACK TECHNIQUES ON CLOUD BASED DATA DEDUPLICATION TECHNIQUES
ANALYSIS OF ATTACK TECHNIQUES ON CLOUD BASED DATA DEDUPLICATION TECHNIQUES
neirew J
 
Struggling with data management
Struggling with data managementStruggling with data management
Struggling with data management
David Walker
 
BFC: High-Performance Distributed Big-File Cloud Storage Based On Key-Value S...
BFC: High-Performance Distributed Big-File Cloud Storage Based On Key-Value S...BFC: High-Performance Distributed Big-File Cloud Storage Based On Key-Value S...
BFC: High-Performance Distributed Big-File Cloud Storage Based On Key-Value S...
dbpublications
 
Keysum - Using Checksum Keys
Keysum - Using Checksum KeysKeysum - Using Checksum Keys
Keysum - Using Checksum Keys
David Walker
 
Data Ware House System in Cloud Environment
Data Ware House System in Cloud EnvironmentData Ware House System in Cloud Environment
Data Ware House System in Cloud Environment
IJERA Editor
 
Efficient multicast delivery for data redundancy minimization over wireless d...
Efficient multicast delivery for data redundancy minimization over wireless d...Efficient multicast delivery for data redundancy minimization over wireless d...
Efficient multicast delivery for data redundancy minimization over wireless d...
redpel dot com
 
Enabling Integrity for the Compressed Files in Cloud Server
Enabling Integrity for the Compressed Files in Cloud ServerEnabling Integrity for the Compressed Files in Cloud Server
Enabling Integrity for the Compressed Files in Cloud Server
IOSR Journals
 
50120140504001
5012014050400150120140504001
50120140504001
IAEME Publication
 
E newsletter promise_&_challenges_of_cloud storage-2
E newsletter promise_&_challenges_of_cloud storage-2E newsletter promise_&_challenges_of_cloud storage-2
E newsletter promise_&_challenges_of_cloud storage-2
Anil Vasudeva
 
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
ijcsit
 
Storage Virtualization: Towards an Efficient and Scalable Framework
Storage Virtualization: Towards an Efficient and Scalable FrameworkStorage Virtualization: Towards an Efficient and Scalable Framework
Storage Virtualization: Towards an Efficient and Scalable Framework
CSCJournals
 
Data Distribution Handling on Cloud for Deployment of Big Data
Data Distribution Handling on Cloud for Deployment of Big DataData Distribution Handling on Cloud for Deployment of Big Data
Data Distribution Handling on Cloud for Deployment of Big Data
ijccsa
 
IRJET- A Novel Approach for Appreciable Group Data Allocation System with...
IRJET-  	  A Novel Approach for Appreciable Group Data Allocation System with...IRJET-  	  A Novel Approach for Appreciable Group Data Allocation System with...
IRJET- A Novel Approach for Appreciable Group Data Allocation System with...
IRJET Journal
 
Cloud Computing: A Perspective on Next Basic Utility in IT World
Cloud Computing: A Perspective on Next Basic Utility in IT World Cloud Computing: A Perspective on Next Basic Utility in IT World
Cloud Computing: A Perspective on Next Basic Utility in IT World
IRJET Journal
 
PROVABLE MULTICOPY DYNAMIC DATA POSSESSION IN CLOUD COMPUTING SYSTEMS
PROVABLE MULTICOPY DYNAMIC DATA POSSESSION IN CLOUD COMPUTING SYSTEMSPROVABLE MULTICOPY DYNAMIC DATA POSSESSION IN CLOUD COMPUTING SYSTEMS
PROVABLE MULTICOPY DYNAMIC DATA POSSESSION IN CLOUD COMPUTING SYSTEMS
Nexgen Technology
 
ANALYSIS OF ATTACK TECHNIQUES ON CLOUD BASED DATA DEDUPLICATION TECHNIQUES
ANALYSIS OF ATTACK TECHNIQUES ON CLOUD BASED DATA DEDUPLICATION TECHNIQUESANALYSIS OF ATTACK TECHNIQUES ON CLOUD BASED DATA DEDUPLICATION TECHNIQUES
ANALYSIS OF ATTACK TECHNIQUES ON CLOUD BASED DATA DEDUPLICATION TECHNIQUES
neirew J
 
Struggling with data management
Struggling with data managementStruggling with data management
Struggling with data management
David Walker
 
BFC: High-Performance Distributed Big-File Cloud Storage Based On Key-Value S...
BFC: High-Performance Distributed Big-File Cloud Storage Based On Key-Value S...BFC: High-Performance Distributed Big-File Cloud Storage Based On Key-Value S...
BFC: High-Performance Distributed Big-File Cloud Storage Based On Key-Value S...
dbpublications
 
Keysum - Using Checksum Keys
Keysum - Using Checksum KeysKeysum - Using Checksum Keys
Keysum - Using Checksum Keys
David Walker
 
Data Ware House System in Cloud Environment
Data Ware House System in Cloud EnvironmentData Ware House System in Cloud Environment
Data Ware House System in Cloud Environment
IJERA Editor
 
Efficient multicast delivery for data redundancy minimization over wireless d...
Efficient multicast delivery for data redundancy minimization over wireless d...Efficient multicast delivery for data redundancy minimization over wireless d...
Efficient multicast delivery for data redundancy minimization over wireless d...
redpel dot com
 
Enabling Integrity for the Compressed Files in Cloud Server
Enabling Integrity for the Compressed Files in Cloud ServerEnabling Integrity for the Compressed Files in Cloud Server
Enabling Integrity for the Compressed Files in Cloud Server
IOSR Journals
 
E newsletter promise_&_challenges_of_cloud storage-2
E newsletter promise_&_challenges_of_cloud storage-2E newsletter promise_&_challenges_of_cloud storage-2
E newsletter promise_&_challenges_of_cloud storage-2
Anil Vasudeva
 
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
ijcsit
 
Storage Virtualization: Towards an Efficient and Scalable Framework
Storage Virtualization: Towards an Efficient and Scalable FrameworkStorage Virtualization: Towards an Efficient and Scalable Framework
Storage Virtualization: Towards an Efficient and Scalable Framework
CSCJournals
 
Data Distribution Handling on Cloud for Deployment of Big Data
Data Distribution Handling on Cloud for Deployment of Big DataData Distribution Handling on Cloud for Deployment of Big Data
Data Distribution Handling on Cloud for Deployment of Big Data
ijccsa
 
IRJET- A Novel Approach for Appreciable Group Data Allocation System with...
IRJET-  	  A Novel Approach for Appreciable Group Data Allocation System with...IRJET-  	  A Novel Approach for Appreciable Group Data Allocation System with...
IRJET- A Novel Approach for Appreciable Group Data Allocation System with...
IRJET Journal
 
Cloud Computing: A Perspective on Next Basic Utility in IT World
Cloud Computing: A Perspective on Next Basic Utility in IT World Cloud Computing: A Perspective on Next Basic Utility in IT World
Cloud Computing: A Perspective on Next Basic Utility in IT World
IRJET Journal
 
PROVABLE MULTICOPY DYNAMIC DATA POSSESSION IN CLOUD COMPUTING SYSTEMS
PROVABLE MULTICOPY DYNAMIC DATA POSSESSION IN CLOUD COMPUTING SYSTEMSPROVABLE MULTICOPY DYNAMIC DATA POSSESSION IN CLOUD COMPUTING SYSTEMS
PROVABLE MULTICOPY DYNAMIC DATA POSSESSION IN CLOUD COMPUTING SYSTEMS
Nexgen Technology
 

Similar to Deduplication on Encrypted Big Data in HDFS (20)

Provable multicopy dynamic data possession in cloud computing systems
Provable multicopy dynamic data possession in cloud computing systemsProvable multicopy dynamic data possession in cloud computing systems
Provable multicopy dynamic data possession in cloud computing systems
Pvrtechnologies Nellore
 
Data Back-Up and Recovery Techniques for Cloud Server Using Seed Block Algorithm
Data Back-Up and Recovery Techniques for Cloud Server Using Seed Block AlgorithmData Back-Up and Recovery Techniques for Cloud Server Using Seed Block Algorithm
Data Back-Up and Recovery Techniques for Cloud Server Using Seed Block Algorithm
IJERA Editor
 
IRJET- Deduplication of Encrypted Bigdata on Cloud
IRJET- Deduplication of Encrypted Bigdata on CloudIRJET- Deduplication of Encrypted Bigdata on Cloud
IRJET- Deduplication of Encrypted Bigdata on Cloud
IRJET Journal
 
Authenticated Transfer of Files with Storage and Backup within a Cloud Enviro...
Authenticated Transfer of Files with Storage and Backup within a Cloud Enviro...Authenticated Transfer of Files with Storage and Backup within a Cloud Enviro...
Authenticated Transfer of Files with Storage and Backup within a Cloud Enviro...
IRJET Journal
 
A Hybrid Cloud Approach for Secure Authorized De-Duplication
A Hybrid Cloud Approach for Secure Authorized De-DuplicationA Hybrid Cloud Approach for Secure Authorized De-Duplication
A Hybrid Cloud Approach for Secure Authorized De-Duplication
Editor IJMTER
 
Provable Multicopy Dynamic Data Possession in Cloud Computing Systems
Provable Multicopy Dynamic Data Possession in Cloud Computing SystemsProvable Multicopy Dynamic Data Possession in Cloud Computing Systems
Provable Multicopy Dynamic Data Possession in Cloud Computing Systems
1crore projects
 
Dynamic Resource Allocation and Data Security for Cloud
Dynamic Resource Allocation and Data Security for CloudDynamic Resource Allocation and Data Security for Cloud
Dynamic Resource Allocation and Data Security for Cloud
AM Publications
 
A Survey Paper on Removal of Data Duplication in a Hybrid Cloud
 A Survey Paper on Removal of Data Duplication in a Hybrid Cloud  A Survey Paper on Removal of Data Duplication in a Hybrid Cloud
A Survey Paper on Removal of Data Duplication in a Hybrid Cloud
IRJET Journal
 
Cooperative Schedule Data Possession for Integrity Verification in Multi-Clou...
Cooperative Schedule Data Possession for Integrity Verification in Multi-Clou...Cooperative Schedule Data Possession for Integrity Verification in Multi-Clou...
Cooperative Schedule Data Possession for Integrity Verification in Multi-Clou...
IJMER
 
Improved deduplication with keys and chunks in HDFS storage providers
Improved deduplication with keys and chunks in HDFS storage providersImproved deduplication with keys and chunks in HDFS storage providers
Improved deduplication with keys and chunks in HDFS storage providers
IRJET Journal
 
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
AIRCC Publishing Corporation
 
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud ComputingDistributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
AIRCC Publishing Corporation
 
Flaw less coding and authentication of user data using multiple clouds
Flaw less coding and authentication of user data using multiple cloudsFlaw less coding and authentication of user data using multiple clouds
Flaw less coding and authentication of user data using multiple clouds
IRJET Journal
 
Fs2510501055
Fs2510501055Fs2510501055
Fs2510501055
IJERA Editor
 
Securing Your Future: Cloud-Based Data Protection Solutions
Securing Your Future: Cloud-Based Data Protection SolutionsSecuring Your Future: Cloud-Based Data Protection Solutions
Securing Your Future: Cloud-Based Data Protection Solutions
MaryJWilliams2
 
Securing the Future: A Guide to Cloud-Based Data Protection
Securing the Future: A Guide to Cloud-Based Data ProtectionSecuring the Future: A Guide to Cloud-Based Data Protection
Securing the Future: A Guide to Cloud-Based Data Protection
MaryJWilliams2
 
IRJET- An Efficient Data Replication in Salesforce Cloud Environment
IRJET-  	  An Efficient Data Replication in Salesforce Cloud EnvironmentIRJET-  	  An Efficient Data Replication in Salesforce Cloud Environment
IRJET- An Efficient Data Replication in Salesforce Cloud Environment
IRJET Journal
 
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Editor IJMTER
 
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
IRJET Journal
 
A Novel Method of Directly Auditing Integrity On Encrypted Data
A Novel Method of Directly Auditing Integrity On Encrypted DataA Novel Method of Directly Auditing Integrity On Encrypted Data
A Novel Method of Directly Auditing Integrity On Encrypted Data
IRJET Journal
 
Provable multicopy dynamic data possession in cloud computing systems
Provable multicopy dynamic data possession in cloud computing systemsProvable multicopy dynamic data possession in cloud computing systems
Provable multicopy dynamic data possession in cloud computing systems
Pvrtechnologies Nellore
 
Data Back-Up and Recovery Techniques for Cloud Server Using Seed Block Algorithm
Data Back-Up and Recovery Techniques for Cloud Server Using Seed Block AlgorithmData Back-Up and Recovery Techniques for Cloud Server Using Seed Block Algorithm
Data Back-Up and Recovery Techniques for Cloud Server Using Seed Block Algorithm
IJERA Editor
 
IRJET- Deduplication of Encrypted Bigdata on Cloud
IRJET- Deduplication of Encrypted Bigdata on CloudIRJET- Deduplication of Encrypted Bigdata on Cloud
IRJET- Deduplication of Encrypted Bigdata on Cloud
IRJET Journal
 
Authenticated Transfer of Files with Storage and Backup within a Cloud Enviro...
Authenticated Transfer of Files with Storage and Backup within a Cloud Enviro...Authenticated Transfer of Files with Storage and Backup within a Cloud Enviro...
Authenticated Transfer of Files with Storage and Backup within a Cloud Enviro...
IRJET Journal
 
A Hybrid Cloud Approach for Secure Authorized De-Duplication
A Hybrid Cloud Approach for Secure Authorized De-DuplicationA Hybrid Cloud Approach for Secure Authorized De-Duplication
A Hybrid Cloud Approach for Secure Authorized De-Duplication
Editor IJMTER
 
Provable Multicopy Dynamic Data Possession in Cloud Computing Systems
Provable Multicopy Dynamic Data Possession in Cloud Computing SystemsProvable Multicopy Dynamic Data Possession in Cloud Computing Systems
Provable Multicopy Dynamic Data Possession in Cloud Computing Systems
1crore projects
 
Dynamic Resource Allocation and Data Security for Cloud
Dynamic Resource Allocation and Data Security for CloudDynamic Resource Allocation and Data Security for Cloud
Dynamic Resource Allocation and Data Security for Cloud
AM Publications
 
A Survey Paper on Removal of Data Duplication in a Hybrid Cloud
 A Survey Paper on Removal of Data Duplication in a Hybrid Cloud  A Survey Paper on Removal of Data Duplication in a Hybrid Cloud
A Survey Paper on Removal of Data Duplication in a Hybrid Cloud
IRJET Journal
 
Cooperative Schedule Data Possession for Integrity Verification in Multi-Clou...
Cooperative Schedule Data Possession for Integrity Verification in Multi-Clou...Cooperative Schedule Data Possession for Integrity Verification in Multi-Clou...
Cooperative Schedule Data Possession for Integrity Verification in Multi-Clou...
IJMER
 
Improved deduplication with keys and chunks in HDFS storage providers
Improved deduplication with keys and chunks in HDFS storage providersImproved deduplication with keys and chunks in HDFS storage providers
Improved deduplication with keys and chunks in HDFS storage providers
IRJET Journal
 
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
AIRCC Publishing Corporation
 
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud ComputingDistributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
AIRCC Publishing Corporation
 
Flaw less coding and authentication of user data using multiple clouds
Flaw less coding and authentication of user data using multiple cloudsFlaw less coding and authentication of user data using multiple clouds
Flaw less coding and authentication of user data using multiple clouds
IRJET Journal
 
Securing Your Future: Cloud-Based Data Protection Solutions
Securing Your Future: Cloud-Based Data Protection SolutionsSecuring Your Future: Cloud-Based Data Protection Solutions
Securing Your Future: Cloud-Based Data Protection Solutions
MaryJWilliams2
 
Securing the Future: A Guide to Cloud-Based Data Protection
Securing the Future: A Guide to Cloud-Based Data ProtectionSecuring the Future: A Guide to Cloud-Based Data Protection
Securing the Future: A Guide to Cloud-Based Data Protection
MaryJWilliams2
 
IRJET- An Efficient Data Replication in Salesforce Cloud Environment
IRJET-  	  An Efficient Data Replication in Salesforce Cloud EnvironmentIRJET-  	  An Efficient Data Replication in Salesforce Cloud Environment
IRJET- An Efficient Data Replication in Salesforce Cloud Environment
IRJET Journal
 
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Editor IJMTER
 
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
IRJET Journal
 
A Novel Method of Directly Auditing Integrity On Encrypted Data
A Novel Method of Directly Auditing Integrity On Encrypted DataA Novel Method of Directly Auditing Integrity On Encrypted Data
A Novel Method of Directly Auditing Integrity On Encrypted Data
IRJET Journal
 
Ad

More from IRJET Journal (20)

Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
IRJET Journal
 
BRAIN TUMOUR DETECTION AND CLASSIFICATION
BRAIN TUMOUR DETECTION AND CLASSIFICATIONBRAIN TUMOUR DETECTION AND CLASSIFICATION
BRAIN TUMOUR DETECTION AND CLASSIFICATION
IRJET Journal
 
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
IRJET Journal
 
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ..."Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
IRJET Journal
 
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
IRJET Journal
 
Breast Cancer Detection using Computer Vision
Breast Cancer Detection using Computer VisionBreast Cancer Detection using Computer Vision
Breast Cancer Detection using Computer Vision
IRJET Journal
 
Auto-Charging E-Vehicle with its battery Management.
Auto-Charging E-Vehicle with its battery Management.Auto-Charging E-Vehicle with its battery Management.
Auto-Charging E-Vehicle with its battery Management.
IRJET Journal
 
Analysis of high energy charge particle in the Heliosphere
Analysis of high energy charge particle in the HeliosphereAnalysis of high energy charge particle in the Heliosphere
Analysis of high energy charge particle in the Heliosphere
IRJET Journal
 
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
A Novel System for Recommending Agricultural Crops Using Machine Learning App...A Novel System for Recommending Agricultural Crops Using Machine Learning App...
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
IRJET Journal
 
Auto-Charging E-Vehicle with its battery Management.
Auto-Charging E-Vehicle with its battery Management.Auto-Charging E-Vehicle with its battery Management.
Auto-Charging E-Vehicle with its battery Management.
IRJET Journal
 
Analysis of high energy charge particle in the Heliosphere
Analysis of high energy charge particle in the HeliosphereAnalysis of high energy charge particle in the Heliosphere
Analysis of high energy charge particle in the Heliosphere
IRJET Journal
 
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
IRJET Journal
 
FIR filter-based Sample Rate Convertors and its use in NR PRACH
FIR filter-based Sample Rate Convertors and its use in NR PRACHFIR filter-based Sample Rate Convertors and its use in NR PRACH
FIR filter-based Sample Rate Convertors and its use in NR PRACH
IRJET Journal
 
Kiona – A Smart Society Automation Project
Kiona – A Smart Society Automation ProjectKiona – A Smart Society Automation Project
Kiona – A Smart Society Automation Project
IRJET Journal
 
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
IRJET Journal
 
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
IRJET Journal
 
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
Invest in Innovation: Empowering Ideas through Blockchain Based CrowdfundingInvest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
IRJET Journal
 
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
IRJET Journal
 
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUBSPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
IRJET Journal
 
AR Application: Homewise VisionMs. Vaishali Rane, Om Awadhoot, Bhargav Gajare...
AR Application: Homewise VisionMs. Vaishali Rane, Om Awadhoot, Bhargav Gajare...AR Application: Homewise VisionMs. Vaishali Rane, Om Awadhoot, Bhargav Gajare...
AR Application: Homewise VisionMs. Vaishali Rane, Om Awadhoot, Bhargav Gajare...
IRJET Journal
 
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
IRJET Journal
 
BRAIN TUMOUR DETECTION AND CLASSIFICATION
BRAIN TUMOUR DETECTION AND CLASSIFICATIONBRAIN TUMOUR DETECTION AND CLASSIFICATION
BRAIN TUMOUR DETECTION AND CLASSIFICATION
IRJET Journal
 
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
IRJET Journal
 
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ..."Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
IRJET Journal
 
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
IRJET Journal
 
Breast Cancer Detection using Computer Vision
Breast Cancer Detection using Computer VisionBreast Cancer Detection using Computer Vision
Breast Cancer Detection using Computer Vision
IRJET Journal
 
Auto-Charging E-Vehicle with its battery Management.
Auto-Charging E-Vehicle with its battery Management.Auto-Charging E-Vehicle with its battery Management.
Auto-Charging E-Vehicle with its battery Management.
IRJET Journal
 
Analysis of high energy charge particle in the Heliosphere
Analysis of high energy charge particle in the HeliosphereAnalysis of high energy charge particle in the Heliosphere
Analysis of high energy charge particle in the Heliosphere
IRJET Journal
 
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
A Novel System for Recommending Agricultural Crops Using Machine Learning App...A Novel System for Recommending Agricultural Crops Using Machine Learning App...
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
IRJET Journal
 
Auto-Charging E-Vehicle with its battery Management.
Auto-Charging E-Vehicle with its battery Management.Auto-Charging E-Vehicle with its battery Management.
Auto-Charging E-Vehicle with its battery Management.
IRJET Journal
 
Analysis of high energy charge particle in the Heliosphere
Analysis of high energy charge particle in the HeliosphereAnalysis of high energy charge particle in the Heliosphere
Analysis of high energy charge particle in the Heliosphere
IRJET Journal
 
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
IRJET Journal
 
FIR filter-based Sample Rate Convertors and its use in NR PRACH
FIR filter-based Sample Rate Convertors and its use in NR PRACHFIR filter-based Sample Rate Convertors and its use in NR PRACH
FIR filter-based Sample Rate Convertors and its use in NR PRACH
IRJET Journal
 
Kiona – A Smart Society Automation Project
Kiona – A Smart Society Automation ProjectKiona – A Smart Society Automation Project
Kiona – A Smart Society Automation Project
IRJET Journal
 
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
IRJET Journal
 
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
IRJET Journal
 
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
Invest in Innovation: Empowering Ideas through Blockchain Based CrowdfundingInvest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
IRJET Journal
 
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
IRJET Journal
 
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUBSPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
IRJET Journal
 
AR Application: Homewise VisionMs. Vaishali Rane, Om Awadhoot, Bhargav Gajare...
AR Application: Homewise VisionMs. Vaishali Rane, Om Awadhoot, Bhargav Gajare...AR Application: Homewise VisionMs. Vaishali Rane, Om Awadhoot, Bhargav Gajare...
AR Application: Homewise VisionMs. Vaishali Rane, Om Awadhoot, Bhargav Gajare...
IRJET Journal
 
Ad

Recently uploaded (20)

Water Industry Process Automation & Control Monthly May 2025
Water Industry Process Automation & Control Monthly May 2025Water Industry Process Automation & Control Monthly May 2025
Water Industry Process Automation & Control Monthly May 2025
Water Industry Process Automation & Control
 
SICPA: Fabien Keller - background introduction
SICPA: Fabien Keller - background introductionSICPA: Fabien Keller - background introduction
SICPA: Fabien Keller - background introduction
fabienklr
 
Artificial intelligence and machine learning.pptx
Artificial intelligence and machine learning.pptxArtificial intelligence and machine learning.pptx
Artificial intelligence and machine learning.pptx
rakshanatarajan005
 
Design of Variable Depth Single-Span Post.pdf
Design of Variable Depth Single-Span Post.pdfDesign of Variable Depth Single-Span Post.pdf
Design of Variable Depth Single-Span Post.pdf
Kamel Farid
 
introduction technology technology tec.pptx
introduction technology technology tec.pptxintroduction technology technology tec.pptx
introduction technology technology tec.pptx
Iftikhar70
 
Personal Protective Efsgfgsffquipment.ppt
Personal Protective Efsgfgsffquipment.pptPersonal Protective Efsgfgsffquipment.ppt
Personal Protective Efsgfgsffquipment.ppt
ganjangbegu579
 
Frontend Architecture Diagram/Guide For Frontend Engineers
Frontend Architecture Diagram/Guide For Frontend EngineersFrontend Architecture Diagram/Guide For Frontend Engineers
Frontend Architecture Diagram/Guide For Frontend Engineers
Michael Hertzberg
 
Prediction of Flexural Strength of Concrete Produced by Using Pozzolanic Mate...
Prediction of Flexural Strength of Concrete Produced by Using Pozzolanic Mate...Prediction of Flexural Strength of Concrete Produced by Using Pozzolanic Mate...
Prediction of Flexural Strength of Concrete Produced by Using Pozzolanic Mate...
Journal of Soft Computing in Civil Engineering
 
David Boutry - Specializes In AWS, Microservices And Python.pdf
David Boutry - Specializes In AWS, Microservices And Python.pdfDavid Boutry - Specializes In AWS, Microservices And Python.pdf
David Boutry - Specializes In AWS, Microservices And Python.pdf
David Boutry
 
Control Methods of Noise Pollutions.pptx
Control Methods of Noise Pollutions.pptxControl Methods of Noise Pollutions.pptx
Control Methods of Noise Pollutions.pptx
vvsasane
 
sss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptx
sss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptx
sss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptx
ajayrm685
 
Evonik Overview Visiomer Specialty Methacrylates.pdf
Evonik Overview Visiomer Specialty Methacrylates.pdfEvonik Overview Visiomer Specialty Methacrylates.pdf
Evonik Overview Visiomer Specialty Methacrylates.pdf
szhang13
 
Modelling of Concrete Compressive Strength Admixed with GGBFS Using Gene Expr...
Modelling of Concrete Compressive Strength Admixed with GGBFS Using Gene Expr...Modelling of Concrete Compressive Strength Admixed with GGBFS Using Gene Expr...
Modelling of Concrete Compressive Strength Admixed with GGBFS Using Gene Expr...
Journal of Soft Computing in Civil Engineering
 
How to Build a Desktop Weather Station Using ESP32 and E-ink Display
How to Build a Desktop Weather Station Using ESP32 and E-ink DisplayHow to Build a Desktop Weather Station Using ESP32 and E-ink Display
How to Build a Desktop Weather Station Using ESP32 and E-ink Display
CircuitDigest
 
Machine Learning basics POWERPOINT PRESENETATION
Machine Learning basics POWERPOINT PRESENETATIONMachine Learning basics POWERPOINT PRESENETATION
Machine Learning basics POWERPOINT PRESENETATION
DarrinBright1
 
2.3 Genetically Modified Organisms (1).ppt
2.3 Genetically Modified Organisms (1).ppt2.3 Genetically Modified Organisms (1).ppt
2.3 Genetically Modified Organisms (1).ppt
rakshaiya16
 
Transport modelling at SBB, presentation at EPFL in 2025
Transport modelling at SBB, presentation at EPFL in 2025Transport modelling at SBB, presentation at EPFL in 2025
Transport modelling at SBB, presentation at EPFL in 2025
Antonin Danalet
 
JRR Tolkien’s Lord of the Rings: Was It Influenced by Nordic Mythology, Homer...
JRR Tolkien’s Lord of the Rings: Was It Influenced by Nordic Mythology, Homer...JRR Tolkien’s Lord of the Rings: Was It Influenced by Nordic Mythology, Homer...
JRR Tolkien’s Lord of the Rings: Was It Influenced by Nordic Mythology, Homer...
Reflections on Morality, Philosophy, and History
 
01.คุณลักษณะเฉพาะของอุปกรณ์_pagenumber.pdf
01.คุณลักษณะเฉพาะของอุปกรณ์_pagenumber.pdf01.คุณลักษณะเฉพาะของอุปกรณ์_pagenumber.pdf
01.คุณลักษณะเฉพาะของอุปกรณ์_pagenumber.pdf
PawachMetharattanara
 
DED KOMINFO detail engginering design gedung
DED KOMINFO detail engginering design gedungDED KOMINFO detail engginering design gedung
DED KOMINFO detail engginering design gedung
nabilarizqifadhilah1
 
SICPA: Fabien Keller - background introduction
SICPA: Fabien Keller - background introductionSICPA: Fabien Keller - background introduction
SICPA: Fabien Keller - background introduction
fabienklr
 
Artificial intelligence and machine learning.pptx
Artificial intelligence and machine learning.pptxArtificial intelligence and machine learning.pptx
Artificial intelligence and machine learning.pptx
rakshanatarajan005
 
Design of Variable Depth Single-Span Post.pdf
Design of Variable Depth Single-Span Post.pdfDesign of Variable Depth Single-Span Post.pdf
Design of Variable Depth Single-Span Post.pdf
Kamel Farid
 
introduction technology technology tec.pptx
introduction technology technology tec.pptxintroduction technology technology tec.pptx
introduction technology technology tec.pptx
Iftikhar70
 
Personal Protective Efsgfgsffquipment.ppt
Personal Protective Efsgfgsffquipment.pptPersonal Protective Efsgfgsffquipment.ppt
Personal Protective Efsgfgsffquipment.ppt
ganjangbegu579
 
Frontend Architecture Diagram/Guide For Frontend Engineers
Frontend Architecture Diagram/Guide For Frontend EngineersFrontend Architecture Diagram/Guide For Frontend Engineers
Frontend Architecture Diagram/Guide For Frontend Engineers
Michael Hertzberg
 
David Boutry - Specializes In AWS, Microservices And Python.pdf
David Boutry - Specializes In AWS, Microservices And Python.pdfDavid Boutry - Specializes In AWS, Microservices And Python.pdf
David Boutry - Specializes In AWS, Microservices And Python.pdf
David Boutry
 
Control Methods of Noise Pollutions.pptx
Control Methods of Noise Pollutions.pptxControl Methods of Noise Pollutions.pptx
Control Methods of Noise Pollutions.pptx
vvsasane
 
sss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptx
sss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptx
sss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptx
ajayrm685
 
Evonik Overview Visiomer Specialty Methacrylates.pdf
Evonik Overview Visiomer Specialty Methacrylates.pdfEvonik Overview Visiomer Specialty Methacrylates.pdf
Evonik Overview Visiomer Specialty Methacrylates.pdf
szhang13
 
How to Build a Desktop Weather Station Using ESP32 and E-ink Display
How to Build a Desktop Weather Station Using ESP32 and E-ink DisplayHow to Build a Desktop Weather Station Using ESP32 and E-ink Display
How to Build a Desktop Weather Station Using ESP32 and E-ink Display
CircuitDigest
 
Machine Learning basics POWERPOINT PRESENETATION
Machine Learning basics POWERPOINT PRESENETATIONMachine Learning basics POWERPOINT PRESENETATION
Machine Learning basics POWERPOINT PRESENETATION
DarrinBright1
 
2.3 Genetically Modified Organisms (1).ppt
2.3 Genetically Modified Organisms (1).ppt2.3 Genetically Modified Organisms (1).ppt
2.3 Genetically Modified Organisms (1).ppt
rakshaiya16
 
Transport modelling at SBB, presentation at EPFL in 2025
Transport modelling at SBB, presentation at EPFL in 2025Transport modelling at SBB, presentation at EPFL in 2025
Transport modelling at SBB, presentation at EPFL in 2025
Antonin Danalet
 
01.คุณลักษณะเฉพาะของอุปกรณ์_pagenumber.pdf
01.คุณลักษณะเฉพาะของอุปกรณ์_pagenumber.pdf01.คุณลักษณะเฉพาะของอุปกรณ์_pagenumber.pdf
01.คุณลักษณะเฉพาะของอุปกรณ์_pagenumber.pdf
PawachMetharattanara
 
DED KOMINFO detail engginering design gedung
DED KOMINFO detail engginering design gedungDED KOMINFO detail engginering design gedung
DED KOMINFO detail engginering design gedung
nabilarizqifadhilah1
 

Deduplication on Encrypted Big Data in HDFS

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 07 | July -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 433 Deduplication on Encrypted Big Data in HDFS Saif Ahmed Salim1, Prof. Latika R. Desai 2 1Department of Computer Engineering, Dr. D.Y. Patil Institute of Technology, Pune University, Pune, India 2Department of Computer Engineering, Dr. D.Y. Patil Institute of Technology, Pune University, Pune, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract—Data de-duplication is single of essential data compression systems for rejecting duplicate replicas of repeating data, and has been generally used in cloud storage to decrease the total of storage space and save bandwidth. To make sure the privacy been proposed to ascent the information already outsourcing. To wellconfirminformation security, this paper makes the primary endeavor to formally address the issue of approved information de-duplication. Not the same as usual de-duplication frameworks, the degree of difference assistances of clients are further considered in copy check other than the data itself. We additionally present a limited new de-duplication changes supportiveapprovedcopy check in a limit cloud design. Securitystudy demonstratesthat our system is protected in expressions of the definitions definite in the planned safety model. As a impervious of thought, we execute a model of our future authorized duplicate check system and conduct test bed experiment with our prototype. We displaythatourfutureauthorizedduplicate verify scheme incurs nominal above compared to normal processes. Key words—Access control, Big data, HDFS, data- deduplication. 1.INTRODUCTION Our aim is to minimize repetitive information and augment space funds. A strategy which has been generally embraced is cross-client deduplication. The fundamental idea behind deduplication is to store duplicate data (either records or pieces) just once. Appropriately, if a customer needs to exchange a record (piece) which is currently secured, the cloud provider will add the customer to the proprietoronce- over of that report (square). Deduplication has demonstrated to accomplish high space and cost reserve funds and numerous Huge Informationstockpilingsuppliers are as of now receiving it. Deduplication can diminish capacity needs by up to 90-95% for reinforcement applications and up to 68% in standard document frameworks. Distributed computing gives apparently boundless "virtualized" assets to clients as administrations over the entire Web, while concealing stageandusagesubtle elements. The present cloud advantage providers offer both exceedingly available limit and massively parallel figuring resources at reasonably low costs. As disseminated figuring gets the opportunityto beoverwhelming,a growingmeasure of data is being secured in the cloud and conferred by customers to decided advantages, which describe the get to benefits of the set away data. One fundamental trial of appropriated stockpiling organizationsistheorganizationof the consistently growing volume of data. To make data organization flexible in dispersedregistering,de-duplication has been a remarkable technique and has pulled in more thought starting late. Data de-duplication isa particulardata weight framework for wiping out duplicate copies of repeating data away. The system is used to upgrade stockpiling use and can similarly be associated with arranging data trades to lessen a number of bytes that must be sent. Instead of keeping various data copies with comparable substance, de-duplication discards dull data by keeping emerge physical copy and implying different overabundance data to thatcopy.De-duplicationcanhappen at either the report level or the piece level. For record level de-duplication, it discards duplicate copies of the comparable archive. De-duplicationcaninlikemanneroccur at the piece level, which takes out duplicate squares of data that occur in non-indistinct reports. Conveyed processing is a rising organization show that gives estimation and limit resources on the Web. One engaging convenience that circulated registering can offer is appropriated capacity. Individuals and endeavours are routinely required to remotely record their data to remain from any information mishap if there are any gear/programming frustrations or unexpected disasters.Asopposedtopurchasingthe required stockpiling media to keep data fortifications,individualsand endeavours can essentially outsource their data support organizations to the cloud banquet providers,whichgivethe principal stockpiling advantages for have the data fortifications. While disseminated capacity is engaging, how to give security confirmationstooutsourceddata transforms into a rising concern. One vital security test is to give the property of ensured cancelation,i.e.,data recordsareforever blocked stores of deletion. Keeping data fortifications forever is undesirable, as fragile information may be revealed later on in perspective of data break or wrong organization of cloud managers. Along these lines, to avoid liabilities, attempts and government associations typically keep their fortifications for a predetermined number of years and request to eradicate (or squash) the fortifications a brief time frame later. For example, the US Congress is figuring the Web Information Maintenance establishmentin moving toward ISPs to hold data for quite a while, while in the Joined Kingdom, associations are requiredtohold wages and pay records for quite a while.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 07 | July -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 434 1.1 Related Work Cloud specialist co-ops offer profoundly accessible storage room and hugely parallel figuring assets at generally low expenses. The coming of Cloud Storage inspiresventuresand associations to outsource informationstockpilingtooutsider cloud suppliers. An expanding measure of information is being put away in the cloud and shared by clients with indicated benefits, which characterize the get to privilegesof the put away information. Gmail is a case of distributed storage which is utilized by the greater part of us consistently. One of the significant issues of distributed storage administrations is the administration of the perpetually expanding volume of information. To make information administration versatile in distributed computing, deduplication is a method and haspulledinmore consideration as of late. Information deduplication is a specific information pressure system for wiping out copy duplicates of rehashed information away. Information deduplication is otherwise called single instancing or clever pressure system [1]. This system is utilized to enhance stockpiling use. Rather than keeping various information duplicates with a similar substance on the cloud, deduplication disposes of repetitive information by keeping just a single physical duplicate and alluding other access informationtothatduplicatecopy.Deduplicationcanoccurat either the record level or the square level [2]. For document- level deduplication, it takes out copy duplicates of a similar record. Microsoft's Single Instance Server (SIS) and EMC's Centera utilize a record level deduplication [3]. For piece level deduplication, it dispenses with copy squares of information that happen in no indistinguishable records. Dropbox distributed storageutilizes an extensivesettledsize (4MB) piece level deduplication [3]. Deduplication can happen at Inline, Post-prepare, Client-side,andTarget-based [4]. In Inline deduplication,ithappensbeforeinformationput away on cloud i.e. it is performed at the season of putting away information on the capacity framework. It diminishes the plate space required in the framework [4]. In Post- prepare deduplication, it happens in the wake of putting away information on cloud i.e. it alludes to the kind of framework where programming forms, channels the excess information from an informational collection simply after it has as of now been exchanged to an information put away area. In Client-side deduplication, it happens at Owner/User side, in that copy informationis first just recognized beforeit must be sent over the system. This will make trouble on the CPU yet in the meantimedecreases the heap on thesystem.It is proposedtolimittransmissioncapacityandspaceexpected to transfer and store copied information. Kim et al. [3] given that many driving cloud-based capacity administrations including Dropbox, Wuala, Memopal, JustCloud, and Mozy utilize information deduplication methods at a sourcei.e.ata customer side to save network bandwidth from a user to cloud servers, which in turn increases the speed of data upload as well as storage space. In Target-based de- duplication, it occurs at storage service provider side. The Target deduplication will remove the redundancies from a backup transmission as and when it passes through an appliance that is present between the source and the target. Unlike source deduplication, the Target deduplication does not reduce the total amount of data that need to be transferred across a WAN or LAN during the backup, but it reduces the amount of storage room required [4]. Informationdeduplicationbringsalotofadvantages,security and protection concerns emerge as clients' touchy information are defenseless to both insider and untouchable assaults. Conventional encryption, while giving information classification,isincongruentwithinformationde-duplication. Conventional encryption requires distinctive clients to scramble their information with their own keys by which indistinguishable information duplicates of various clients will prompt diverse figure writings, making de-duplication inconceivable [5]. The answer for adjusting privacy and effectiveness in deduplication was portrayed by M.Bellareet al [6] called united encryption. It has been proposed to uphold information classification while making deduplication. It scrambles/unscrambles an information duplicate with a joined key, which is inferred by registering the cryptographic hash estimation of the substance of the information duplicate itself [7]. To forestall unapproved, get to, a protected evidence of proprietorship convention [8] is additionally expected to give the verification that the client undoubtedly possesses a similar document when a copy is found. After the confirmation, ensuing clients with a similar record will be given a pointer from the server without expecting to transfer a similar document. Nonetheless, past deduplication frameworks can't bolster differential approval copy check [8]. In an approved deduplication framework, every client is issued an arrangement of benefits amid framework instatement. Each record transferred to the cloud is additionally limited by an arrangement of benefits to determine which sort of clients is permitted to play out the copy check and get to the documents. Before presenting his copy check ask for some document, the client needs to take this record and his/her benefits as data sources. The client can locate a copy for this record if and just if there is aduplicateofthisdocumentanda coordinated benefit put away in cloud. 2. PROPOSED WORK AND METHODOLOGY From the above literature survey we have concluded that an existing data de-duplication system, the private cloud is involved as a proxy to allow data owner/users to securely perform duplicate check with differential privileges. Such architecture is practical and has attracted much attention from researchers. The data owners only outsource theirdata storage by utilizing public cloud while the data operation is managed in private cloud.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 07 | July -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 435 In the proposed research work to design and implement a system which will provide the parallel processing to detect the data de-duplicationprobleminbigdataenvironment.The system also provides benefit access control of data management and proxy revocation of system. 2.1 System Overview Proposed scheme contain following main aspects Encrypted Data Upload: If data duplication check is negative, the data holder encrypts its data utilizingan arbitrarilyculledsymmetrickey DEK in order to ascertain the security and privacy of data, and stores the encrypted data at database together with the token utilized for data duplication check. The data holder encrypts DEK with pkAP and passes the encrypted key to database. Data owner: First data owner can upload the text file from atthesame system can take all files from data nodes and check the duplication with given file. If the VCS score is greater than threshold system can denote this file as duplicate. If the file is not duplicate, then job manager first check each server load and find the trustworthy of them base on CPU aswell as memory load. Then the encrypted data can distribute into HDFS, and store the file tokens and other details into hash table. Figure-1: Proposed System architecture User: In case that an authentic data owner uploads the data later than the data holder, the job manager can manage to preserve the data encrypted by the authentic data owner at the HDFS. But at the same time manager can use the hash table efficient data retrieval, that can be reduce the time and cost also. 2.2 ALGORITHM Document retrieval Algorithm Input: Users query as Q , Network Connection N; Output: result from relevancy calculation top k pages’ base on Q. Step 1: User provide the Q to system. Step 2: if (N!=Null) Process Read each attribute A from ith Row in D Res[i]=Calcsim(Q,A) Else No connection Step 3: For each (k to Res) Step 4: Array list Objarray to bind Q to Res[i] or k Step 5: Return to users Objarray Step 6: Display Objarray Weight Calculation Algorithm Input: Query generated from user Q, each retrieved list L from webpage. Output: Each list with weight. Here system have to find similarity of two lists: and where and are the components of the vector (features of the document, or values for each word of the comment) and the is the dimension of the vectors: Step 1: Read each row R from Data List L Step 2: for each (Column c from R) Step 3: Apply formula (1) on c and Q Step 4: Score=Calc(c,Q) Step 5: calculate relevancy score for attribute list. Step 6: assign each Row to current weight Step 7: Categorize all instances Step 8: end for end procedure 2.3 MATHEMETICAL MODEL S= {s, e, F, X, Y,} Where, s = Start of the program. 1. Log in with webpage.
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 07 | July -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 436 2. Input Query. e = End of the program. Retrieve the similar features. F=Function Using Algorithm 1) Searching algorithm 2) Find similar clusters base on query approach 3) Select the results similar to query 4) SimilarityFunction (vector base cosine similarity) and return the result list X = Input of the program. Input should be query. Y = Output of the program. First query submitted into server then server load datasets then divide into subspaces, again apply constraint propagation on subspaces then clustering after that server will do updated these layer repeatedly and final output will have generated into ensemble clusters. X, Y U Let U be the Set of System. U= {Client, D, C, C1, N, E } Where Client, F, S, T, M, D are the elements of the set. Client= User, Server D= Divide data into subspace C= Apply constraint propagation on subspaces C1= Clustering Solutions N= update layers/nodes E= Result clusters Here system proposes to find similarity of two vectors: and , where and are the components of the vector (features of the document, or values for each word of the comment ) and the is the dimension of the vectors: Success Condition if(Query != Null) Failure Condition if (Query==Null || Db==Null || Connection==Null) 3. EXPERIMENTAL RESULT The final results of the designed system are given below. From those results we get the detailed information to Check de-duplication and upload the files, Fetching the Signs using Hashing Algorithm, checking for Duplication, file uploading, file downloading andattacker trying to attack(block)ondata node. Detailed procedure of the proposed system is given. Based on this we confirm that securely authorized de- duplication is successfully achieved with hybrid cloud approach. We also evaluated the computation costs of system for varying values of k, l and K. Throughout this sub-section, we fix m = 6 and n = 2000. However, we observed that the running time of grows almost linearly with n and m. The below tables 1 shows current system evaluation outcome. Table-1: current system evaluation outcome Approach Data Records Times in Seconds Proposed 2000 35 4000 68 6000 102 8000 132 10000 171 For the results and comparative analysis, we compare the system with some existing approaches like cloud base de- duplication, KNN base duplication, the below graphs show the time required for retrieve the data with propose as well as existing. ms ms ms ms 0 50 100 150 200 250 300 350 Cloud Base Content Base KNN Base VCS Figure-2: Proposed system comparison with others After the complete implementation of system evaluate with different experiments. For the second experiment system focuses on time complexity of cryptography algorithm. The system takes use different timefordata encryptionaswell as data decryption purpose. The below figure 3 shows the encryption and decryption time complexity.
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 07 | July -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 437 Figure-3: Data encryption and decryption performance with different approaches 4. CONCLUSIONS Managing encrypted data with deduplication is consequential and consequential in practice for achieving a prosperous cloud storage accommodation, especially for astronomically immense data storage. In this paper, we proposed a practical scheme to manage the encrypted sizably voluminous data in cloud with deduplication predicated on ownershipchallengeand PRE.Ourschemecan flexibly support data update and sharing with deduplication even when the data holders are offline. Encrypted data can be securely accessed because only sanctioned data holders can obtain the symmetric keys utilized for data decryption. Extensive performance analysis and test showed that our scheme is secure and efficient under the described security model and very opportune for sizably voluminous data deduplication. The results of our computer simulations further showed the practicability of our scheme. Future work includes optimizing our design and implementation for practical deployment and studying verifiable computation to ascertain that SP deports as expected in deduplication management. REFERENCES [1] Deepak Mishra, Dr. Sanjeev Sharma, “Comprehensive study of data de-duplication”, International Conference on Cloud, Big Data and Trust, Nov 2013. [2] Gaurav Kakariya, Prof. Sonali Rangdale, “A Hybrid Cloud Approach for Secure Authorized Deduplication”, International Journal of Computer Engineering and Applications, Volume VIII, Issue I, October 2014. [3] Daehee Kim, Sejun Song, Baek-Young Choi, “SAFE: Structure-Aware File and Email Deduplication for Cloud- based Storage Systems”. [4] Pooja S Dodamani, Pradeep Nazareth, “A Survey on Hybrid Cloud with De-Duplication”, International Journal of Innovative Research in Computer and Communication Engineering, December 2014. [5] Boga Venkatesh, Anamika Sharma, Gaurav Desai, Dadaram Jadhav, “Secure AuthorisedDeduplication byUsing Hybrid Cloud Approach”, November 2014. [6] M. Bellare, S. Keelveedhi, and T. Ristenpart, “Message- locked encryption and secure deduplication”, in Proc. IACR Cryptology ePrint Archive, 2012 [7] Jin. Li, Xiaofeng Chen, M. Li, J. Li, P. Lee, and W. Lou., “SecureDeduplicationwithEfficientandReliableConvergent Key Management”, In IEEE Transactions on Parallel and Distributed Systems,June- 2014. [8] Jin. Li, Yan Kit Li, Xiaofeng, P. Lee, and W. Lou., “A Hybrid Cloud Approach for Secure Deduplication”, In IEEE Transactions on Parallel and Distributed Systems, 2014. [9] Jan Stanek, Alessandro Sorniotti, Elli Androulakiy, Lukas Kencl, “A Secure Data Deduplication Scheme for Cloud Storage”. [10] Jaehong Min, Daeyoung Yoon,andYoujip Won,“Efficient Deduplication Techniques for Modern Backup Operation”, IEEE Transactions on Computers, Vol. 60, No. 6, June 2011 [11] Mihir Bellare,Sriram Keelveedhi and Thomas Ristenpart, "Message-Locked Encryption and Secure Deduplication",Proceedings ofEurocrypt,Vol.6,March2013.
  翻译: