You are on page 1of 8


Submitted in partial fulfillment of the
Requirements for the award of the Degree of

Master of Technology
Computer Science and Engineering

(Reg.No 14A41D5812)
Under the esteemed guidance of

Assistant Professor, (CSE)

Department of Computer Science and Engineering
Approved by AICTE New Delhi, Affillated to JNTU Kakinada

To the best of my knowledge. is worthy of consideration and is in accordance with the regulations of the JNTU KAKINADA. 14A41D5812 The thesis in our opinion. Guide of project Head of the Department Mr. Puli Venkata Sivalakshman bearing Regd. Ph.LOYOLA INSTITUTE OF TECHNOLOGY & MANAGEMENT: DHULIPALLA [Approved by AICTE New Delhi:: Affillated To JNTU Kakinada] CERTIFICATE This is to certify that the following project with thesis entitled “A New Cloud Architecture for Secure verified Deduplication” has been successfully completed as a part of course curriculum in our organization submitted by Mr.Vijay Kumar (M. the results embodied in this thesis have not been submitted to any other University or Institute for the award of any degree or diploma.Suresh (M.D) Assistant Professor External Examiner . N. Y.Tech) Prof. No.E.

Vijay Kumar.Tech. M. The Author would like to thank Dr. S.Tech) and the other faculty members for their kind cooperation.Tech) for extending the facilities for the present study.SIVA REDDY. Y. PULI VENKATA SIVALAKSHMAN [14A41D5812] . The Author would like to acknowledge the MANAGEMENT for extending all the facilities throughout the course of his study. The author would also thank all his friends who are involved directly or indirectly during the project work.Acknowledgements The Author would like thank to Mr. N. Principal. Ph. Head and Department of PG (M. Acknowledgment is due for all the course coordinators in the Department of PG (M.Tech). It is a pleasure for the author to acknowledge the affection and inspiration of Parents for their extreme tolerance and encouragement during entire course.D for giving the opportunity and encouragement to complete this course of study in Privacy Protection Personalized Web Search. for the immense guidance and cooperation in completing his thesis. The Author would like to extend his gratitude to Prof.Suresh in the Department of PG (M.

LOYOLA INSTITUTE OF TECHNOLOGY & MANAGEMENT. PULI VENKATA SIVALAKSHMAN (Reg. is a record of an original work done by us under the guidance of Mr. and this project work has not been submitted by any one berore from any other University or Institute for the award of any degree or diploma.Y.DECLARATION I hereby declare that the project work entitled “A NEW CLOUD ARCHITECTURE FOR SECURE VERIFIED DEDUPLICATION” Submitted to the JAWAHARLAL NEHRU TECHNOLOGY UNIVERSITY KAKINADA.SURESH Faculty Member. No 14A41D5812) .

this paper makes the first attempt to formally address the problem of authorized data deduplication. Deduplication eliminates these extra copies by saving just one copy of the data and replacing the other copies with pointers that lead back to the original copy. the storage systems contain duplicate copies of many pieces of data. the convergent encryption technique has been proposed to encrypt the data before outsourcing. In most organizations. Companies frequently use deduplication in backup and disaster recovery applications. To better protect data security. but it can be used to free up space in primary storage as well. or two or more files that aren't identical may still include much of the same data. the same file may be saved in several different places by different users. . To avoid this duplication of data and to maintain the confidentiality in the cloud we using the concept of Hybrid cloud. For example. To protect the confidentiality of sensitive data while supporting deduplication.ABSTRACT Data deduplication is a technique for reducing the amount of storage space an organization needs to save its data.

SYSTEM DESIGN 10-11 4. Technical Feasibility 3.2 Data flow Diagram 13 4.3. Certificate i Acknowledgement ii Declaration iii Abstract iv List of Diagram v Economical Feasibility 3. Activity Diagram 18 .3.4. Feasibility Study 3. LITURATUR SURVEY 6-7 3.3 UML Diagram 14 4.3.CONTENTS Titles Page No.1. INTRODUCTION 1-5 2.3. Proposed System Class Diagram 15 4. Existing System 3.3.1. Sequence Diagram 17 4. Operational Feasibility 4.2 Use Case Diagram 16 4.1 System Architecture 12 4. SYSTEM ANALYSIS 8-9 3.

IMPLEMENTATION 66-67 10.5.3 Java Web Applications 33-36 5.5 System Requirements 39 6. SAMPLE CODE 40-50 7. REFERENCES 69-70 12. APENDIX 71 . SCREEN SHOTS 51-62 8.1 introductions Java Technology 19-28 5. TCHNOLOGY DESCRIPTION 5.4 My SQL 37-38 5. SYSTEM TESTING 63-65 9.2 Networking 29-32 5. CONCLUSION 68 11.

8 User Email Token Screen 59 7.1 Home Page Screen 51 7.5 Private Login users Status Screen 56 7.3 User Login Screen 53 7.10 Rights of user Access After Authentication 61 7.2 User Registration Screen 52 7.1 System Architecture Overview 12 4.9 User Email Token Number Activity 60 7.3.2 Data Flow Diagram 13 4.4 Structure of Service Modules 4 4.4 Activity Diagram 18 7.3.11 Rights of User Accessing Status after Authentication 62 .3.2 Use Diagram 16 4.3 Sequence Diagram 17 4.3.LIST OF DIAGRAMS Figure No Figure Page No 1.1 Class Diagram 15 4.1 Structure of Cloud Computing 1 1.7 Data Login Screen 58 7.4 Private Cloud Login 55 7.6 Rights to Activated Users Screen 57 7.3 Essential Characteristics of Cloud Computing 3 1.