Main Reference PaperA Hybrid Cloud Approach for Secure Authorized Deduplication, IEEE Transactions on Parallel and Distributed Systems, May 2015.
  • The main challenge in cloud storage service is the management of increasing volume of data. Data deduplication is an important data compression technique for eliminating duplicate copies of repeating data. For more data security in cloud storage, this project proposes a deduplication system supports authorized duplicate check in hybrid cloud architecture.

+ Description
  • The main challenge in cloud storage service is the management of increasing volume of data. Data deduplication is an important data compression technique for eliminating duplicate copies of repeating data. For more data security in cloud storage, this project proposes a deduplication system supports authorized duplicate check in hybrid cloud architecture.

  • To provide a duplicate check in constraints

  • To increase the volume of storage by deduplication

  • To provide data confidentiality

+ Aim & Objectives
  • To provide a duplicate check in constraints

  • To increase the volume of storage by deduplication

  • To provide data confidentiality

  • Deduplication System: The support hybrid cloud architecture, where the Storage-Cloud Service Provider (S-CSP) lies in the public cloud. The user needs to get the file token from the private cloud server to perform duplicate check for some file. The private cloud server also checks the user’s identity before issuing the corresponding file token to the user. The authorized duplicate check for this file can be performed by the user with the public cloud before uploading this file. Based on the results of duplicate check, the user either uploads this file or runs POW.

+ Contribution
  • Deduplication System: The support hybrid cloud architecture, where the Storage-Cloud Service Provider (S-CSP) lies in the public cloud. The user needs to get the file token from the private cloud server to perform duplicate check for some file. The private cloud server also checks the user’s identity before issuing the corresponding file token to the user. The authorized duplicate check for this file can be performed by the user with the public cloud before uploading this file. Based on the results of duplicate check, the user either uploads this file or runs POW.

  • Java JDK 1.8, MySQL 5.5.40

  • Netbeans 8.0.1, J2SE, (Cloudsim 3.0.3).

+ Software Tools & Technologies
  • Java JDK 1.8, MySQL 5.5.40

  • Netbeans 8.0.1, J2SE, (Cloudsim 3.0.3).

  • B.E / B.Tech / M.E / M.Tech

+ Project Recommended For
  • B.E / B.Tech / M.E / M.Tech

Professional Ethics: We S-Logix would appreciate the students those who willingly contribute with atleast a line of thinking of their own while preparing the project with us. It is advised that the project given by us be considered only as a model project and be applied with confidence to contribute your own ideas through our expert guidance and enrich your knowledge.