SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 04 | Apr 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 994
A Novel Approach Implementing Deduplication using Message Locked
Encryption
Kapil Srivastava1 , Rahul Saini2, P. Mohamed Fathimal3
1Kapilsrivatava, Student, Dept. of Computer Science Engineering, SRM Institute of Science and Technology, Chennai,
Tamilnadu, India
2Rahul Saini, Student, Dept. of Computer Science Engineering, SRM Institute of Science and Technology, Chennai,
Tamilnadu, India
3P.Mohamed Fathimal, Proffessor, Dept. of Computer Science Engineering, SRM Institute of Science and Technology,
Chennai, Tamilnadu, India
------------------------------------------------------------------------***-----------------------------------------------------------------------
ABSTRACT: Cloud is the most prominent and fastest-
growing technology after the start of the 20th century. Since
it becomes, most brilliant and intelligent service, accessible
across all the domains of technology makes it vulnerable to
attacks, and even some other errors like replicating of data,
the efficiency of storage, and the amount of space needed. To
sort the problem of duplication and storage of data, Data
compression known as deduplication used on the cloud. We
have implemented a system that overcomes the limitations
which use Erasure Code technology, tokenization, and
encryption algorithms to protect data loaded onto the cloud
by the client. Our implementation sees not only one side of
the problem but also another side; this is how. People always
want their particulars, personals, and essential date to be
perfectly safe and secured, and nobody should control and
rule over except them themselves. So instead of making a
third-party auditor, we have given the power to the client to
choose who is the person can check and access the there
data. The client can even check what happens with the data,
which uploads onto the cloud, which ensures the proof of
ownership principle. Here, I like all good things all together
and nothing impure. It sounds perfect, but we know that
perfection is a myth. Convergent encryption has some
vulnerabilities. That's why we planned to implement
message locked encryption, as described above.
Keywords: erasure code technology, DES, MD5Sum,
deduplication, tokenization
1. INTRODUCTION
In this article, we see the process of deduplication in the
cloud. Traditional deduplication algorithms such as
convergent encryption which fails to protect the data. We
have implemented a technique called Message Locked
Encryption; in this, we used various encryption algorithms
and tokenization with Erasure code technology to protect
and save the data. MD5 Sum is used to check deduplication
between the files on the application.
Our paper is organized as follows. First, we formally
review the present state of data storing and read
performance. Second, we introduce our approach. Third,
we present our experimental methodology. Finally, we
highlight our conclusions and outline future steps.
2. OBJECTIVE
The objective of this project is to implement secure
deduplication on the cloud with all the necessary terms
mentioned terms and not just making it deduplication in
all aspects but also no compromise with the security.
3. LITERATURE REVIEW
3.1 Secure Enterprise and Read Performance
Enhancement in data deduplication
Description: With the tremendous growth of data in the
world, the use of Cloud technology and providers are
gaining more popularity since these types of services
provide end to end-user benefit it is essential to provide
with the best computational power they need. The paper
talks about the proof of retrievability and proof of
ownership concept to save the data of the user from
tampering or manipulation. They used data in the form of
Chunk to retrieve the data readily over the period. It helps
in useful communication of data.[16].
3.2 A Hybrid Cloud Approach for secure Authorised
Deduplication
Description: paper revolves around securing the cloud
storage and adding a way of maintaining ownership of
data. They used the concept of differential privileges of
users to check duplicate data on the cloud. They even used
a hybrid cloud architecture to check the data and save it on
the cloud. The proposed idea in the paper is useful for
backup storage. They showed a lock level encryption on
the file .even private and public cloud is a significant
helpful way to show how data is secured and stored.[3]
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 04 | Apr 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 995
3.3ASurveyofSecureDataDeduplication
Description: The paper discusses the way and how to
effect storage in the cloud is shown by less costly means
.the article discusses the backup storage and how
companies are spending a lot of money on the room .it also
surveys the method of deduplication which helps the
companies to save the data and money. [2]
4. EXISTING SYSTEM
Since the modern era of the digital world has begun, .the
concern over the storage and accessing of data is also
increased, which inturns gain a lot of attraction of tech
genius and company working to protect it. In late 2000,
after the introduction of the cloud system, the way of
storing and accessing the data has improved a lot in recent
times. Still, various problems also arise with traditional
cloud-based encryption, such as deduplication attacks on
the cloud system. Convergent encryption was introduced
to protect the data and remove deduplication. As time
passed, the encryption technique is disregarded since it is
posed to file system attacks on the server. It also does not
support the principle of POW(proof of ownership). [3]
5. PROPOSED SYSTEM
Paper discusses our proposed technique that we called
message locked encryption on data. Using Erasure code
technology, which results in efficient storage and
encryption, we are using DES and MD5 for hashing
.tokenization for efficient file retrieval. Since it envelops
the message with layers of encryption and by code
technology, we are data breaking into the pieces before
storage, connecting it by tokens for easier retrieval and
protection from attacks. To check deduplication ewe used
a program called MD5Sum, which acts as a checksum to
check the deduplication. We have also provided proof of
ownership by giving the client the power to choose whom
file to be shared and can check what changes have done to
file over time.
6. SYSTEM ARCHITECTURE
The project of ours has three components.
6.1 The client
6.2 The Cloud
6.3 The Recipient
6.1 THE CLIENT
A Client is a person who is the one who uploads data onto
the cloud. He is the one who has the privilege to choose the
person whom the data is to receive.
6.2 THE CLOUD
The cloud is the basis of implementing all the functionality
in the project. All the deduplication related process occur
inside the cloud. People can access after the specific people
in an enterprise designate them.
6.3 THE RECIPIENT
A Recipient is a person who is selected by user access the
client data.
Fig 1.Architecture Diagram
7. PRELIMINARIES
7.1 SQLYOG
7.2 Erasure Code Technology
7.3 DES(data encryption Standard)
7.4 MD5Sum(checksum)
7.5 JDK(java development kit)
7.6 SMTP(mail transfer protocol)
7.7 Tokenization
7.8 Web Browser
7.9 Glassfish
7.1 SqlYog
SQLyog is a GUI tool for the RDBMS MySQL. It features
Visual Schema Designer, Visual Query Builder, Query
Formatter, Connectivity options for Direct client/server
using MySQL API (SSL supported), and the full character
set/Unicode support. [14].
7.2 ERASURE CODE TECHNOLOGY
Erasure codes are a way of data protection in which the
data brakes into fragments, expanded and encoded with
redundant data, and stored across a set of different
locations in the storage media. This technology is used
instead of RAID in various applications and current use
cases in Cloud Storage [9][7].
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 04 | Apr 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 996
7.3 MD5SUM(CHECKSUM)
MD5 is program that calculates and checks md5 128bit
hashes. It is to verify the integrity of files, as virtually any
change to a file will cause its MD5 hash to change. Most
commonly, md5sum is used to confirm that a file has not
changed as a result of a faulty file transfer, or non-
malicious meddling. The md5sum program is implemented
in most Unix-like operating systems or compatibility
layers, such as Cygwin. [5][6].
7.4 DATA ENCRYPTION STANDARD
The DES is most profound and one of the most important
algorithms used in encryption nowadays. The
programmers use this algorithm in various ways. It is
beneficial to use since it uses the plain text of size 64 bit
and generates block - ciphertext of the same size [18].
7.5 JDK(JAVA DEVELOPMENT KIT)
JDK is a software used for developing java applications
and applets.
7.6 SMTP
These are the security guideline used to allow the
software to send electronic mail on the internet based on
email addresses.
7.7 TOKENIZATION
Tokenization is a technique to provide the token to a given
data to secure the given data and access it with the help of
the token.[17]
7.8 WEB BROWSER
The implementation of ours is going to be in the form of a
web application. So a browser is necessary, although IE-11
is preferred specifically.
7.9 GLASSFISH
This web application is to runs on the localhost with the
help of glassfish. It is an application server that helps in the
smooth running of JAVA EE applications.[13]
8. MODULES
8.1 DEPLOYMENT OF APPLICATION
The first step is the compiling of application and then their
implementation. The directory is accessed using a tomcat
server and built-in NetBeans. And can accessed on the
browser.
Fig 2(a).First module
Fig 2(b). Setting up the application
Fig 3. The User Interface of the Web Application
Fig 4. Uploading of file
8.2 DEDUPLICATION MODULE
This module is heart of the application in this module.in
this module we take the file as the input split them into
parts using erasure code technology. we also provide
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 04 | Apr 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 997
indivisual token to each splited file part using tokenization
and hash each token using MD5 algorithim and store the
splited file and hashes for further use .keyword is also
further check the duplicacy of file
8.3 ENCRYPTION MODULE
This module deals with the encryption of file .the encrypts
the file using DES algorithim
Fig 5. The Recipient can download the file.
Fig 6. Auditing the data by the client
8.4 AUDITING MODULE
This module is used to audit the file by the client
(uploader) this module also ensures proof of ownership as
the person to whom keyword is shared.is only allowed to
access the file . It can confirm the information provided
and the changes happened is right or wrong.
9. CONCLUSIONS
In this paper, the notion of effectively storing and retrieval
of data in the cloud with deduplication proposed we used
Erasure code technology to save the data and tokenization
with some encryption algorithm to create the layer of
security around the data to preserve it.
We gave power to the client to check what changes
occurred on the data after uploading the data onto the
cloud. It can also confirm whether the changes occurred
were right or wrong in the file. On the application, we have
a portal that allows the user to check the changes that
occurred to file. At the back, when the receiver uploads the
same file again, the server verifies it against the original
hash created of file for the changes and deduplication .the
result is shown to the client onto the portal.
REFERENCES
[1] A Secure Data Deduplication Scheme for Cloud Storage
Jan Stanek∗ , Alessandro Sorniotti†, Elli Androulaki†, and
Lukas Kencl∗Tech Rep. IBM Research, Zurich, ZUR 1308-
022,2013
[2] A Survey of Secure Data Deduplication Riddhi Movaliya and
Harshal Shah. Article: A Survey of Secure Data Deduplication.
International Journal of Computer Applications 138(11):6-8, March
2016. Published by Foundation of Computer Science (FCS), N.Y.,
USA.
[3] A hybrid Cloud Approach for secure Authorised
Deduplication IEEE Transactions on Parallel and
Distributed Systems ( Volume: 26, Issue: 5, May 1, 2015 )
[4] Secure Evaluation and Prevention of Duplicate Data in
Cloud A. Aarthi Sowmiya, A. Ananda Kumari, IJIRST –
International Journal for Innovative Research in Science &
Technology| Volume 2 | Issue 11 | April 2016 ISSN
(online): 2349-6010
[5] AES and MD5 based secure authentication in cloud
computing Shefali Ojha, Vikram Rajput
2017 International Conference on I-SMAC (IoT in Social,
Mobile, Analytics, and Cloud) (I-SMAC)
[6] Cloud Application Security Based on Enhanced MD5
Algorithm Nalluri Sravani, Ramasubbareddy, SomulaAND
Kannayaram, G Journal of Computational and Theoretical
Nanoscience, Volume 16, Numbers 5-6, May 2019, pp.
2022-2027(6)
[7] Erasure Coding in Windows Azure Storage Cheng
Huang, Huseyin Simitci, Yikang Xu, Aaron Ogus, Brad
Calder, Parikshit Gopalan, Jin Li, and Sergey Yekhanin
Microsoft Corporation
[8] Role-Based Access Controls reprint from 15th National
Computer Security Conference (1992) Baltimore, Oct 13-
16, 1992. pp. 554 – 563 David F. Ferraiolo and D. Richard
Kuhn
[9] Erasure Coding for Cloud Storage Systems: A Survey
Jun Li and Baochun Li, TSINGHUA SCIENCE AND
TECHNOLOGY ISSNll1007-0214ll06/11llpp259-272
Volume 18, Number 3, June 2013
[10] Review On Data Deduplication In Cloud Computing
International Journal of Advance Engineering and
Research DevelopmentVolume 4, Issue 11, November -
2017
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 04 | Apr 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 998
[11] Ensuring security for Fixed Block Level Deduplication
in Cloud Backup Akhila K, Amal Ganesh, Sunitha C, IOSR
Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-
0661,p-ISSN: 2278-8727 PP 06-12
[12] Analyzing Data Security for Cloud Computing Using
Cryptographic Algorithms Gurpreet Kaur, Manish Mahajan,
Gurpreet Kaur et al. Int. Journal of Engineering Research
and Applications www.ijera.com ISSN: 2248-9622, Vol. 3,
Issue 5, Sep-Oct 2013, pp.782-786
[13] Glassfish available at
https://javaee.github.io/glassfish/
[14] SQLYOG Available at
https://en.wikipedia.org/wiki/SQLyog
[15] G. Ateniese, R. Di Pietro, L. V. Mancini, and G. Tsudik.
Scalable and efficient provable data possession.
[16] Secure Enterprise and Read Performance
Enhancement in data deduplication S.Ushaharani
K.Kungumaraj International journal of recent technology
and engineering (irjcet)
[17]about tokenization
:https://en.wikipedia.org/wiki/Tokenization_(data_securi
ty).

More Related Content

PDF
C017421624
PDF
Encryption based multi user manner secured data sharing and storing in cloud
PDF
Review on Key Based Encryption Scheme for Secure Data Sharing on Cloud
PDF
Secure Data Sharing In an Untrusted Cloud
PDF
H1803035056
PDF
3 ijece 1 ed iqbal qc
PDF
IRJET- Privacy Preserving Cloud Storage based on a Three Layer Security M...
PDF
Cloud Data Security using Elliptic Curve Cryptography
C017421624
Encryption based multi user manner secured data sharing and storing in cloud
Review on Key Based Encryption Scheme for Secure Data Sharing on Cloud
Secure Data Sharing In an Untrusted Cloud
H1803035056
3 ijece 1 ed iqbal qc
IRJET- Privacy Preserving Cloud Storage based on a Three Layer Security M...
Cloud Data Security using Elliptic Curve Cryptography

What's hot (19)

PDF
IRJET - Multimedia Security on Cloud Computing using Cryptography
PDF
A Privacy Preserving Three-Layer Cloud Storage Scheme Based On Computational ...
PDF
Big data security_issues_research_paper
DOCX
Secure distributed deduplication systems with improved reliability
PDF
A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...
PDF
IRJET - Multi Authority based Integrity Auditing and Proof of Storage wit...
PDF
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
PDF
Providing Secure Cloud for College Campus
PDF
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
PDF
IRJET- A Survey: Data Security in Cloud using Cryptography and Steganography
PDF
Accessing secured data in cloud computing environment
PDF
Improving Efficiency of Security in Multi-Cloud
PDF
Improved deduplication with keys and chunks in HDFS storage providers
PDF
Ijariie1196
PDF
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
PDF
Cloud Auditing With Zero Knowledge Privacy
PDF
Security Issues in Cloud Computing by rahul abhishek
PDF
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
PDF
Cloud Data Security and Secure Data Sharing Methods
IRJET - Multimedia Security on Cloud Computing using Cryptography
A Privacy Preserving Three-Layer Cloud Storage Scheme Based On Computational ...
Big data security_issues_research_paper
Secure distributed deduplication systems with improved reliability
A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...
IRJET - Multi Authority based Integrity Auditing and Proof of Storage wit...
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
Providing Secure Cloud for College Campus
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
IRJET- A Survey: Data Security in Cloud using Cryptography and Steganography
Accessing secured data in cloud computing environment
Improving Efficiency of Security in Multi-Cloud
Improved deduplication with keys and chunks in HDFS storage providers
Ijariie1196
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
Cloud Auditing With Zero Knowledge Privacy
Security Issues in Cloud Computing by rahul abhishek
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
Cloud Data Security and Secure Data Sharing Methods
Ad

Similar to IRJET - A Novel Approach Implementing Deduplication using Message Locked Encryption (20)

PDF
Efficient and Empiric Keyword Search Using Cloud
PDF
Execution Analysis of Different Cryptographic Encryption Algorithms on Differ...
PDF
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
PDF
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
PDF
An Approach towards Shuffling of Data to Avoid Tampering in Cloud
PDF
Bio-Cryptography Based Secured Data Replication Management in Cloud Storage
PDF
Improving Data Storage Security in Cloud using Hadoop
PDF
IRJET- Storage Security in Cloud Computing
PDF
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...
PDF
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
PDF
Cloud Computing Using Encryption and Intrusion Detection
PDF
IRJET- A Review on Lightweight Secure Data Sharing Scheme for Mobile Cloud Co...
PDF
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
PDF
Mitigating the Integrity Issues in Cloud Computing Utilizing Cryptography Alg...
PDF
Enhanced security framework to ensure data security in cloud using security b...
PDF
Enhanced security framework to ensure data security
PDF
IRJET- Data Security in Cloud Computing using Cryptographic Algorithms
PDF
Towards Secure Data Distribution Systems in Mobile Cloud Computing: A Survey
PDF
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
PDF
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
Efficient and Empiric Keyword Search Using Cloud
Execution Analysis of Different Cryptographic Encryption Algorithms on Differ...
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
An Approach towards Shuffling of Data to Avoid Tampering in Cloud
Bio-Cryptography Based Secured Data Replication Management in Cloud Storage
Improving Data Storage Security in Cloud using Hadoop
IRJET- Storage Security in Cloud Computing
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
Cloud Computing Using Encryption and Intrusion Detection
IRJET- A Review on Lightweight Secure Data Sharing Scheme for Mobile Cloud Co...
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
Mitigating the Integrity Issues in Cloud Computing Utilizing Cryptography Alg...
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security
IRJET- Data Security in Cloud Computing using Cryptographic Algorithms
Towards Secure Data Distribution Systems in Mobile Cloud Computing: A Survey
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
Ad

More from IRJET Journal (20)

PDF
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
PDF
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
PDF
Kiona – A Smart Society Automation Project
PDF
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
PDF
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
PDF
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
PDF
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
PDF
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
PDF
BRAIN TUMOUR DETECTION AND CLASSIFICATION
PDF
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
PDF
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
PDF
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
PDF
Breast Cancer Detection using Computer Vision
PDF
Auto-Charging E-Vehicle with its battery Management.
PDF
Analysis of high energy charge particle in the Heliosphere
PDF
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
PDF
Auto-Charging E-Vehicle with its battery Management.
PDF
Analysis of high energy charge particle in the Heliosphere
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
Kiona – A Smart Society Automation Project
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
BRAIN TUMOUR DETECTION AND CLASSIFICATION
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
Breast Cancer Detection using Computer Vision
Auto-Charging E-Vehicle with its battery Management.
Analysis of high energy charge particle in the Heliosphere
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
Auto-Charging E-Vehicle with its battery Management.
Analysis of high energy charge particle in the Heliosphere
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...

Recently uploaded (20)

DOCX
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
PDF
III.4.1.2_The_Space_Environment.p pdffdf
PDF
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
PPTX
additive manufacturing of ss316l using mig welding
PPTX
6ME3A-Unit-II-Sensors and Actuators_Handouts.pptx
PPT
Introduction, IoT Design Methodology, Case Study on IoT System for Weather Mo...
PPTX
UNIT-1 - COAL BASED THERMAL POWER PLANTS
PDF
Automation-in-Manufacturing-Chapter-Introduction.pdf
PDF
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
PPTX
Fundamentals of safety and accident prevention -final (1).pptx
PDF
PPT on Performance Review to get promotions
PPTX
Geodesy 1.pptx...............................................
PDF
null (2) bgfbg bfgb bfgb fbfg bfbgf b.pdf
PPTX
Internet of Things (IOT) - A guide to understanding
PDF
Human-AI Collaboration: Balancing Agentic AI and Autonomy in Hybrid Systems
DOCX
573137875-Attendance-Management-System-original
PDF
Artificial Superintelligence (ASI) Alliance Vision Paper.pdf
PDF
Categorization of Factors Affecting Classification Algorithms Selection
PDF
Well-logging-methods_new................
PDF
R24 SURVEYING LAB MANUAL for civil enggi
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
III.4.1.2_The_Space_Environment.p pdffdf
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
additive manufacturing of ss316l using mig welding
6ME3A-Unit-II-Sensors and Actuators_Handouts.pptx
Introduction, IoT Design Methodology, Case Study on IoT System for Weather Mo...
UNIT-1 - COAL BASED THERMAL POWER PLANTS
Automation-in-Manufacturing-Chapter-Introduction.pdf
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
Fundamentals of safety and accident prevention -final (1).pptx
PPT on Performance Review to get promotions
Geodesy 1.pptx...............................................
null (2) bgfbg bfgb bfgb fbfg bfbgf b.pdf
Internet of Things (IOT) - A guide to understanding
Human-AI Collaboration: Balancing Agentic AI and Autonomy in Hybrid Systems
573137875-Attendance-Management-System-original
Artificial Superintelligence (ASI) Alliance Vision Paper.pdf
Categorization of Factors Affecting Classification Algorithms Selection
Well-logging-methods_new................
R24 SURVEYING LAB MANUAL for civil enggi

IRJET - A Novel Approach Implementing Deduplication using Message Locked Encryption

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 04 | Apr 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 994 A Novel Approach Implementing Deduplication using Message Locked Encryption Kapil Srivastava1 , Rahul Saini2, P. Mohamed Fathimal3 1Kapilsrivatava, Student, Dept. of Computer Science Engineering, SRM Institute of Science and Technology, Chennai, Tamilnadu, India 2Rahul Saini, Student, Dept. of Computer Science Engineering, SRM Institute of Science and Technology, Chennai, Tamilnadu, India 3P.Mohamed Fathimal, Proffessor, Dept. of Computer Science Engineering, SRM Institute of Science and Technology, Chennai, Tamilnadu, India ------------------------------------------------------------------------***----------------------------------------------------------------------- ABSTRACT: Cloud is the most prominent and fastest- growing technology after the start of the 20th century. Since it becomes, most brilliant and intelligent service, accessible across all the domains of technology makes it vulnerable to attacks, and even some other errors like replicating of data, the efficiency of storage, and the amount of space needed. To sort the problem of duplication and storage of data, Data compression known as deduplication used on the cloud. We have implemented a system that overcomes the limitations which use Erasure Code technology, tokenization, and encryption algorithms to protect data loaded onto the cloud by the client. Our implementation sees not only one side of the problem but also another side; this is how. People always want their particulars, personals, and essential date to be perfectly safe and secured, and nobody should control and rule over except them themselves. So instead of making a third-party auditor, we have given the power to the client to choose who is the person can check and access the there data. The client can even check what happens with the data, which uploads onto the cloud, which ensures the proof of ownership principle. Here, I like all good things all together and nothing impure. It sounds perfect, but we know that perfection is a myth. Convergent encryption has some vulnerabilities. That's why we planned to implement message locked encryption, as described above. Keywords: erasure code technology, DES, MD5Sum, deduplication, tokenization 1. INTRODUCTION In this article, we see the process of deduplication in the cloud. Traditional deduplication algorithms such as convergent encryption which fails to protect the data. We have implemented a technique called Message Locked Encryption; in this, we used various encryption algorithms and tokenization with Erasure code technology to protect and save the data. MD5 Sum is used to check deduplication between the files on the application. Our paper is organized as follows. First, we formally review the present state of data storing and read performance. Second, we introduce our approach. Third, we present our experimental methodology. Finally, we highlight our conclusions and outline future steps. 2. OBJECTIVE The objective of this project is to implement secure deduplication on the cloud with all the necessary terms mentioned terms and not just making it deduplication in all aspects but also no compromise with the security. 3. LITERATURE REVIEW 3.1 Secure Enterprise and Read Performance Enhancement in data deduplication Description: With the tremendous growth of data in the world, the use of Cloud technology and providers are gaining more popularity since these types of services provide end to end-user benefit it is essential to provide with the best computational power they need. The paper talks about the proof of retrievability and proof of ownership concept to save the data of the user from tampering or manipulation. They used data in the form of Chunk to retrieve the data readily over the period. It helps in useful communication of data.[16]. 3.2 A Hybrid Cloud Approach for secure Authorised Deduplication Description: paper revolves around securing the cloud storage and adding a way of maintaining ownership of data. They used the concept of differential privileges of users to check duplicate data on the cloud. They even used a hybrid cloud architecture to check the data and save it on the cloud. The proposed idea in the paper is useful for backup storage. They showed a lock level encryption on the file .even private and public cloud is a significant helpful way to show how data is secured and stored.[3]
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 04 | Apr 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 995 3.3ASurveyofSecureDataDeduplication Description: The paper discusses the way and how to effect storage in the cloud is shown by less costly means .the article discusses the backup storage and how companies are spending a lot of money on the room .it also surveys the method of deduplication which helps the companies to save the data and money. [2] 4. EXISTING SYSTEM Since the modern era of the digital world has begun, .the concern over the storage and accessing of data is also increased, which inturns gain a lot of attraction of tech genius and company working to protect it. In late 2000, after the introduction of the cloud system, the way of storing and accessing the data has improved a lot in recent times. Still, various problems also arise with traditional cloud-based encryption, such as deduplication attacks on the cloud system. Convergent encryption was introduced to protect the data and remove deduplication. As time passed, the encryption technique is disregarded since it is posed to file system attacks on the server. It also does not support the principle of POW(proof of ownership). [3] 5. PROPOSED SYSTEM Paper discusses our proposed technique that we called message locked encryption on data. Using Erasure code technology, which results in efficient storage and encryption, we are using DES and MD5 for hashing .tokenization for efficient file retrieval. Since it envelops the message with layers of encryption and by code technology, we are data breaking into the pieces before storage, connecting it by tokens for easier retrieval and protection from attacks. To check deduplication ewe used a program called MD5Sum, which acts as a checksum to check the deduplication. We have also provided proof of ownership by giving the client the power to choose whom file to be shared and can check what changes have done to file over time. 6. SYSTEM ARCHITECTURE The project of ours has three components. 6.1 The client 6.2 The Cloud 6.3 The Recipient 6.1 THE CLIENT A Client is a person who is the one who uploads data onto the cloud. He is the one who has the privilege to choose the person whom the data is to receive. 6.2 THE CLOUD The cloud is the basis of implementing all the functionality in the project. All the deduplication related process occur inside the cloud. People can access after the specific people in an enterprise designate them. 6.3 THE RECIPIENT A Recipient is a person who is selected by user access the client data. Fig 1.Architecture Diagram 7. PRELIMINARIES 7.1 SQLYOG 7.2 Erasure Code Technology 7.3 DES(data encryption Standard) 7.4 MD5Sum(checksum) 7.5 JDK(java development kit) 7.6 SMTP(mail transfer protocol) 7.7 Tokenization 7.8 Web Browser 7.9 Glassfish 7.1 SqlYog SQLyog is a GUI tool for the RDBMS MySQL. It features Visual Schema Designer, Visual Query Builder, Query Formatter, Connectivity options for Direct client/server using MySQL API (SSL supported), and the full character set/Unicode support. [14]. 7.2 ERASURE CODE TECHNOLOGY Erasure codes are a way of data protection in which the data brakes into fragments, expanded and encoded with redundant data, and stored across a set of different locations in the storage media. This technology is used instead of RAID in various applications and current use cases in Cloud Storage [9][7].
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 04 | Apr 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 996 7.3 MD5SUM(CHECKSUM) MD5 is program that calculates and checks md5 128bit hashes. It is to verify the integrity of files, as virtually any change to a file will cause its MD5 hash to change. Most commonly, md5sum is used to confirm that a file has not changed as a result of a faulty file transfer, or non- malicious meddling. The md5sum program is implemented in most Unix-like operating systems or compatibility layers, such as Cygwin. [5][6]. 7.4 DATA ENCRYPTION STANDARD The DES is most profound and one of the most important algorithms used in encryption nowadays. The programmers use this algorithm in various ways. It is beneficial to use since it uses the plain text of size 64 bit and generates block - ciphertext of the same size [18]. 7.5 JDK(JAVA DEVELOPMENT KIT) JDK is a software used for developing java applications and applets. 7.6 SMTP These are the security guideline used to allow the software to send electronic mail on the internet based on email addresses. 7.7 TOKENIZATION Tokenization is a technique to provide the token to a given data to secure the given data and access it with the help of the token.[17] 7.8 WEB BROWSER The implementation of ours is going to be in the form of a web application. So a browser is necessary, although IE-11 is preferred specifically. 7.9 GLASSFISH This web application is to runs on the localhost with the help of glassfish. It is an application server that helps in the smooth running of JAVA EE applications.[13] 8. MODULES 8.1 DEPLOYMENT OF APPLICATION The first step is the compiling of application and then their implementation. The directory is accessed using a tomcat server and built-in NetBeans. And can accessed on the browser. Fig 2(a).First module Fig 2(b). Setting up the application Fig 3. The User Interface of the Web Application Fig 4. Uploading of file 8.2 DEDUPLICATION MODULE This module is heart of the application in this module.in this module we take the file as the input split them into parts using erasure code technology. we also provide
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 04 | Apr 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 997 indivisual token to each splited file part using tokenization and hash each token using MD5 algorithim and store the splited file and hashes for further use .keyword is also further check the duplicacy of file 8.3 ENCRYPTION MODULE This module deals with the encryption of file .the encrypts the file using DES algorithim Fig 5. The Recipient can download the file. Fig 6. Auditing the data by the client 8.4 AUDITING MODULE This module is used to audit the file by the client (uploader) this module also ensures proof of ownership as the person to whom keyword is shared.is only allowed to access the file . It can confirm the information provided and the changes happened is right or wrong. 9. CONCLUSIONS In this paper, the notion of effectively storing and retrieval of data in the cloud with deduplication proposed we used Erasure code technology to save the data and tokenization with some encryption algorithm to create the layer of security around the data to preserve it. We gave power to the client to check what changes occurred on the data after uploading the data onto the cloud. It can also confirm whether the changes occurred were right or wrong in the file. On the application, we have a portal that allows the user to check the changes that occurred to file. At the back, when the receiver uploads the same file again, the server verifies it against the original hash created of file for the changes and deduplication .the result is shown to the client onto the portal. REFERENCES [1] A Secure Data Deduplication Scheme for Cloud Storage Jan Stanek∗ , Alessandro Sorniotti†, Elli Androulaki†, and Lukas Kencl∗Tech Rep. IBM Research, Zurich, ZUR 1308- 022,2013 [2] A Survey of Secure Data Deduplication Riddhi Movaliya and Harshal Shah. Article: A Survey of Secure Data Deduplication. International Journal of Computer Applications 138(11):6-8, March 2016. Published by Foundation of Computer Science (FCS), N.Y., USA. [3] A hybrid Cloud Approach for secure Authorised Deduplication IEEE Transactions on Parallel and Distributed Systems ( Volume: 26, Issue: 5, May 1, 2015 ) [4] Secure Evaluation and Prevention of Duplicate Data in Cloud A. Aarthi Sowmiya, A. Ananda Kumari, IJIRST – International Journal for Innovative Research in Science & Technology| Volume 2 | Issue 11 | April 2016 ISSN (online): 2349-6010 [5] AES and MD5 based secure authentication in cloud computing Shefali Ojha, Vikram Rajput 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics, and Cloud) (I-SMAC) [6] Cloud Application Security Based on Enhanced MD5 Algorithm Nalluri Sravani, Ramasubbareddy, SomulaAND Kannayaram, G Journal of Computational and Theoretical Nanoscience, Volume 16, Numbers 5-6, May 2019, pp. 2022-2027(6) [7] Erasure Coding in Windows Azure Storage Cheng Huang, Huseyin Simitci, Yikang Xu, Aaron Ogus, Brad Calder, Parikshit Gopalan, Jin Li, and Sergey Yekhanin Microsoft Corporation [8] Role-Based Access Controls reprint from 15th National Computer Security Conference (1992) Baltimore, Oct 13- 16, 1992. pp. 554 – 563 David F. Ferraiolo and D. Richard Kuhn [9] Erasure Coding for Cloud Storage Systems: A Survey Jun Li and Baochun Li, TSINGHUA SCIENCE AND TECHNOLOGY ISSNll1007-0214ll06/11llpp259-272 Volume 18, Number 3, June 2013 [10] Review On Data Deduplication In Cloud Computing International Journal of Advance Engineering and Research DevelopmentVolume 4, Issue 11, November - 2017
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 04 | Apr 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 998 [11] Ensuring security for Fixed Block Level Deduplication in Cloud Backup Akhila K, Amal Ganesh, Sunitha C, IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278- 0661,p-ISSN: 2278-8727 PP 06-12 [12] Analyzing Data Security for Cloud Computing Using Cryptographic Algorithms Gurpreet Kaur, Manish Mahajan, Gurpreet Kaur et al. Int. Journal of Engineering Research and Applications www.ijera.com ISSN: 2248-9622, Vol. 3, Issue 5, Sep-Oct 2013, pp.782-786 [13] Glassfish available at https://javaee.github.io/glassfish/ [14] SQLYOG Available at https://en.wikipedia.org/wiki/SQLyog [15] G. Ateniese, R. Di Pietro, L. V. Mancini, and G. Tsudik. Scalable and efficient provable data possession. [16] Secure Enterprise and Read Performance Enhancement in data deduplication S.Ushaharani K.Kungumaraj International journal of recent technology and engineering (irjcet) [17]about tokenization :https://en.wikipedia.org/wiki/Tokenization_(data_securi ty).