Implementation of Client-Side Deduplication on Encrypted Data with Public Auditing in Cloud Storage
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Masters Thesis | Computer Science & Engineering | India | Volume 9 Issue 9, September 2020

Implementation of Client-Side Deduplication on Encrypted Data with Public Auditing in Cloud Storage

Lekhashree N R, Shashidhara M S, Santhosh S

Cloud storage is one of popular cloud service model that stores data on the Internet through the cloud computing provider who manages and provides Storage as a service to the end users. In cloud storage huge amount of data will becomes duplicated due to the multiple uploads from the different users for the same data. The cloud servers want to reduce the volume of data stored by the client which has the similar content and the client wants to maintain the integrity of the data uploaded to the cloud storage. To achieve this there are several models defined using the deduplication and integrity auditing delegation techniques. This paper work is to show an implementation of the combining the deduplication algorithm with the data integrity auditing algorithm to achieve the goals of removing the duplication of data and providing the integrity of data to the client. The data considered will be in encrypted form and the hash data is used to verify the correctness of the data. The proposed algorithm will satisfy the fundamental security requirements and provides an user interface for the client and the server admin to present the proper management of the data stored on cloud storage. The project work is implemented using the java language on Google drive storage.

Keywords: Cloud storage, deduplication, Data integrity, Google drive, Java, Public auditing algorithm

Edition: Volume 9 Issue 9, September 2020

Pages: 130 - 134

Share this Article

How to Cite this Article?

Lekhashree N R, Shashidhara M S, Santhosh S, "Implementation of Client-Side Deduplication on Encrypted Data with Public Auditing in Cloud Storage", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SR20901125249, Volume 9 Issue 9, September 2020, 130 - 134

130 PDF Views | 71 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Cloud storage'

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 2242 - 2246

Efficient and Secure Auditing of Cloud Data with Key -Updating

Niranjana S, Manjusha M S

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 3075 - 3078

Secret Data Hiding in Compressed Video Bit Streams for Privacy Information Protection

B. Vengadalakshmi, S. Abiramasundari

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015

Pages: 1939 - 1946

An Approach for Video Compression Technique for Efficient Data Backup and Recovery in Public Cloud

Nagaraj S Kolhar, Dr. Suvarna Nandyal

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 598 - 602

Dynamic Key Generation Algorithm for User Authentication at Mobile Cloud Enviroinment

Deepak G, Dr. Pradeep. B. S, Shreyas Srinath

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2712 - 2714

Privacy Preserving DAC for Data in Cloud

Pankaj R. Chandre, Swati S. Gore

Share this Article

Similar Articles with Keyword 'deduplication'

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1812 - 1814

A Survey on Deduplication Scheme in Cloud Storage

Deepa.D, Revathi.M

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015

Pages: 1806 - 1810

A Hybrid Cloud Approach for Secure Authorized Deduplication

Jagadish, Dr.Suvarna Nandyal

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 4, April 2016

Pages: 1258 - 1261

Multilevel Cryptosystem for Authorized Deduplication in Hybrid Cloud

P. Narasimhulu, Jayavarthini.C

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 11, November 2016

Pages: 1685 - 1688

An Advanced Data De-duplication Using Novel Variable Size Hashing Technique for Text Files Using Hybrid Cloud Architecture

Haritha Nair, Varsha Botre, Hina Khan, Pritee Nalage, Hiranwale S.B.

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 6 Issue 3, March 2017

Pages: 1613 - 1618

Review of Various Encryption and Compression Mechanisms Used within Deduplication in Cloud Computing

Nancy Digra, Sandeep Sharma

Share this Article

Similar Articles with Keyword 'Data integrity'

Review Papers, Computer Science & Engineering, India, Volume 9 Issue 10, October 2020

Pages: 1251 - 1256

IT Auditing and its Standards

Dr D S Kushwaha, Ankur Singh

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 1450 - 1453

Multi-Cloud Data Storing Strategy with Cost Efficiency and High Availability

Shilpa B Kodli, Pramila D Reshmi

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 2098 - 2102

Public Auditing System with Auto-Data Recovery System on Cloud Scheme

Dhane Sachin V., Joshi P.

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1058 - 1060

Data Integrity Proof in Cloud Computing using TPA with Privacy Preserving

Rushikesh P. Dhanokar

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 2619 - 2622

Information Security in Multi-Cloud Environment

Digambar D. Patil, Megha Singh

Share this Article

Similar Articles with Keyword 'Google drive'

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 2366 - 2370

A Survey on Multi-Keyword Ranked Query Search over Encrypted Cloud Storage

Jaikishan Tindwani, Aruna Gupta

Share this Article

Masters Thesis, Computer Science & Engineering, India, Volume 9 Issue 9, September 2020

Pages: 130 - 134

Implementation of Client-Side Deduplication on Encrypted Data with Public Auditing in Cloud Storage

Lekhashree N R, Shashidhara M S, Santhosh S

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 7 Issue 6, June 2018

Pages: 229 - 232

Exploration of AWS Cloud Drive on Windows Recent

J. Devika, S. Sasipriya

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 3, March 2016

Pages: 7 - 12

Survey: Anomaly Detection in Cloud Based Networks and Security Measures in Cloud Date Storage Applications

Dr. Chinthagunta Mukundha

Share this Article

Similar Articles with Keyword 'Java'

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1353 - 1357

Algorithm to Increase Energy Efficiency and Coverage for Wireless Sensor Network

Aphrin S Pathan, Shabda Dongavkar

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 1096 - 1101

Parallel Data Shuffling for Hadoop Acceleration with Network Levitated Merge and RDMA for Interconnectivity

Kishorkumar Shinde, Venkatesan N.

Share this Article

Informative Article, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1852 - 1855

Land Vehicle Tracking System

Aniket Sankpal, Narendradatta Kadam

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 2, February 2016

Pages: 1922 - 1929

Subclasses of Meromorphically Multivalent Functions Defined By a Differential Operator

Dr. Rajkumar Anandrao Sukne

Share this Article

Case Studies, Computer Science & Engineering, Iraq, Volume 6 Issue 7, July 2017

Pages: 1357 - 1362

A Hopfield Neural Network Based Building Agent for Detection and Correction of Programming Errors

Dr. Buthainah F. AL-Dulaimi, Hameed Taha Khaleel

Share this Article
Top