PHD - Defense - MVB PDF
PHD - Defense - MVB PDF
PHD - Defense - MVB PDF
Delivered By:
Mr. Manoj V. Bramhe
Research Scholar
Under Supervision of
Dr. M.V Sarode
HOD,CE Dept., Govt. Polytechnic, Yavatmal
OSD, Government Engineering College, Yeotmal
4
Motivation
5
Problem Definition
Every big organization having web identity and have huge amount
of data created every day.
7
Literature Review (Multi-Cloud)
Proposed Method Technique Merits/Demerits/gap
CHARM
IEEE Transaction on Cost Efficient multi-cloud data • Focus on only saving cost
hosting With High availability of storage. 20 % saving
Cloud Computing
Use Replication and erasure coding • Focus on only 1 parameter
Sept. 2015
in multi-cloud of security : Integrity
[23]
RACS
Int. conference for Redundant Array of Cloud storage • Resolves Cloud outage and
Internet technology system economic failure problem.
and Secured It is proxy which stores data in • Does not have support for
Transaction multiple cloud. Similar to RAID confidentiality and
December 2012 systems Integrity of data.
[26]
Tahoe-LAFS
• Simple and easy to use
IEEE symposium on Uses open source distributed file
system
intelligent signal system Tahoe-LAFS for storing data
processing and comm. in multiple nodes
• System was tested on 4
systems, November
nodes and not in actual 8
2012
multi-cloud environment
…cont.
Proposed Method Technique Merits/Demerits/gap
9
…cont.
Method Technique Merits/Demerits/gap
10
Analysis and research gap
12
Objective of the Study
To ensure any time availability of data through backup and failure
management.
13
Proposed System Architecture
Reusable Packages
Work Flow
Registration
Verification
Authentication
File selection
Provide Key
Merge Encrypt
Decrypt Split
Download Distribute
Upload / Write File Process
Upload
Client
File
Algorithm: Read
Provide / Download file 1.
Connect to
ftp and
Upload
Ftp Server
Download / Read File Process
Get
Client Filename
and Key
Server Local
Disk
Get First
Part A
Download
Connect to Get Second
File
ftp 1 Part B
Decrypt
Ecry Key
file
Merge File
Queue it For
Download
Sequence Diagram
Data Owner Application Server Cloud Storage
Register Register
Login Verify
Allow Access
Select File
Provide Key
Upload File
Encrypt File
Split File
Connect Server
Allow Conn.
Upload File
Save File
Test bed setup for comparison
• Various files of
different size
were encrypted
with asymmetric
key algorithm in
the cloud
environment
• Diffie-Hellman is
found to be
fastest among
asymmetric key
algorithms tested
Upload & Download Compare
14
12.1
12
10
8.5
8.1 7.9
Time (sec)
8 7.1
6
4.6 4.8
4.2
4
0
AWS Azure GoDaddy D-HOM
1 MB File @ 512KB/s (High NT Priority)
Upload Download
10
Time (sec)
8 7.2 6.9
6.3 6
6
0
AWS Azure GoDaddy D-HOM
2 MB File @ 512KB/s (High NT Priority)
Upload Download
Time (sec)
250
203 198 210
196
200
150
100
50
0
Hybris Dep-Sky Tahoe-LAFS D-HOM
16
14.2 14.3 50 MB File @ 1024KB/s (High NT Priority)
14
12.1 11.6
12 Upload Download
10
Time (sec)
8 7.2 6.9
6.3 6
6
4
2
0
Hybris Dep-Sky Tahoe-LAFS D-HOM
10 MB File @ 1024KB/s (High NT Priority)
Upload Download
Candlestick Comparison
14
12
10
Time (Sec)
0
DepSky Hybris Tahoe-LAFS D-HOM
Min Time, Max Time, Normal Low Time, Normal High Time
Transfer Methods Compare
RPC
FTP
Azure API
HTTP
D-HOM
Hybris
Cost
DepSky
0 1 2 3 4 5
Overall
Security
D-HOM
D-HOM
Hybris
Overall
Hybris
Security DepSky
DepSky
0 5 10 15
0 1 2 3 4 5
Dependency
D-HOM
Hybris
Dependency
DepSky
0 1 2 3 4 5
Comparison with Similar Systems
Sr.No. Parameter Proposed Hybris DepSky Tahoe-LAFS RACS
System
1 Confidentiality Yes Yes Yes Yes No
11 Hidden Available
Ownership
Mechanism
Typical FTP Based File Management
FTP Drawback overcome
Hidden Ownership Mechanism
D-HOM Service
Write New file to index
Directory Listing Request
Read File From Index
Patent Claims
• 1. We claim to have system & method for secure file storage using hidden owner
identity mechanism, where no entity having file location and its contents details to
access file.
2. We claim to have novel index table which holds only partial information about file
storage location.
c. As claim in 2, complete information from user end and storage service end are
only exposed to decoding mechanism for temporary basis as a buffer.
Patent Claims
• [26] Hussam Abu-Libdeh, Lonnie Princehouse, Hakim Weatherspoon, " RACS: A Case for
Cloud Storage Diversity", International conference for Internet technology and Secured
Transaction, December 2012
• [27] Kevin D. Bowers, Ari Juels, Alina Oprea, "HAIL: A High-Availability and Integrity
Layer for Cloud Storage", 16th ACM conference on Computer and communications security,
November 2009.
• [28] Dan Dobre, Paolo Viotti, Marko Vukolic, " Hybris: Robust Hybrid Cloud Storage",
• ACM Transactions on Storage, Vol . 13, Issue 3, October 2017
• [29] Mazhar Ali, Kashif Bilal, Samee U. Khan, Bharadwaj Veeravalli, Keqin Li, Albert Y.
Zomaya, " DROPS: Division and Replication of Data in Cloud for Optimal Performance and
Security", IEEE Transactions on Cloud Computing, Vol. 6, Issue 2, June 2018
•
THANK YOU