You are on page 1of 3


In this project, the notion of authorized data deduplication was proposed to
protect the data security by including differential privileges of users in the
duplicate check. We also presented several new deduplication constructions
supporting authorized duplicate check in hybrid cloud architecture, in which the
duplicate-check tokens of files are generated by the private cloud server with
private keys. Security analysis demonstrates that our schemes are secure in terms
of insider and outsider attacks specified in the proposed security model. As a proof
of concept, we implemented a prototype of our proposed authorized duplicate
check scheme and conduct testbed experiments on our prototype. We showed
that our authorized duplicate check scheme incurs minimal overhead compared to
convergent encryption and network transfer.

The world of computing is moving away from the on premises IT model, where
you keep buying servers, PCs and software licenses as your business grows. Cloud
computing disrupts the conventional model and opens a new IT path for the small-
to mid size business: “clouds” of computing power, accessed over the Internet,
become your server and your data center. Among the clouds: inexpensive
applications that users can access on demand from any location and through a
variety of devices.Cloud computing—or SaaS, if you prefer—frees up budget for
companies hand-cuffed by IT expenses. Instead of purchasing additional software
licenses and hardware for new employees and new locations, businesses can
simply open new employee accounts with providers of their cloud based services
to expand computing capacity With the workload factoring technology in cloud
computing, the hybrid cloud computing model allows enterprise IT systems to

One of the ways to reduce it would be to create redundancy across its data centers. Given the elastic nature of the cloud infrastructure.adopt a hybrid cloud computing model where a dedicated resource platform runs for hosting application base loads. it creates a situation where cloud resources are used as an extension of existing infrastructure. We are working on a fast data on demand service and integrating the dynamic web service scaling approach proposed in into our mechanism. are compliant with the company’s security policies and more importantly. Many new problems arise such as session maintenance. Any negligence on this part could defeat the purpose of deploying the hybrid cloud model. In order to mitigate the risks. extending the hybrid cloud computing model scope to stateful applications such as n-tier web services is a natural and challenging step. It’s not an all or nothing decision. 2. the organization has to rely on the internal IT for any support to handle the outages in the hybrid environment. both public and private. The data transferred between any of the cloud services are protected against any misdeeds. abiding the regulations set by their respective governed bodies. and a separate and shared resource platform serves trespassing peak load. For the future work. Infrastructure Dependency In case of an outage. and data consistency. service time estimation. . Security compliance Ensuring that all the cloud services. the company may have to use multiple cloud services. LIMITATION: 1. companies can ease into the cloud without abandoning established infrastructure and applications.

The involvement of public and private cloud would invariably make networking in the organization quite complex. and the cost is bound to increase in future as the business keeps growing. . the same cannot be said for the private cloud model. Cost Although a business can easily setup a public cloud for a low cost. A clear strategy for the perfect combination of public and private clouds are required to bring this cost to the minimum. which needs to be handled in the most effective manner possible.3. 4. Building the private cloud can increase the cost. Networking Having a network setup which ensures fluid and effortless transfer of data is the key in Hybrid model.