Welcome to Final Year Projects!!
  • Newsletter
  • +91 90254 34960
  • Contact Us
  • FAQs
Select category
  • Select category
  • Artificial Intelligence
  • Biomedical
  • Block Chain
  • Cloud Computing
  • Cyber Security
  • Data mining
  • Deep Learning
  • Embedded Components
  • Generative AI
  • IoT
  • LORA
  • Machine Learning
  • Mini Projects
    • Embedded
    • Java
    • Matlab
    • Python
    • VLSI
      • pipeline
  • Natural Language Processing
  • Projects
    • Embedded
      • Agriculture
      • Artificial Intelligence(AI)
      • Biomedical
      • Digital Twin
      • Image Processing
      • Internet of Things(IoT)
      • LoRaWAN
      • Raspberry PI
      • Robotics
      • Social Cause
    • Java
      • Android
      • Augmented Reality
      • Blockchain
      • Cloud Computing
      • Data Mining
      • Internet of Things (IoT)
      • Machine Learning
      • Secure Computing
    • Matlab
      • Cryptography- Authentication
      • Cyber Security
      • Deep Learning
      • Digital Image Processing
      • Machine Learning
      • Natural Language Processing
    • Mechanical
      • Automation
      • Automobile
      • Design and Analysis
      • Fabrication
      • Pnumatics
    • Python
      • Blockchain
      • Cybersecurity
      • Deep Learning
      • Explainable AI
      • Generative AI
      • GPT
      • Machine Learning
      • OpenCV
    • VLSI
      • Low Power VLSI Design
      • On-Chip Cryptography
      • Self Repairing Technology
  • Robotics
  • Secure Computing
Login / Register
0 Wishlist
0 Compare
0 items ₹0.00
Menu
0 items ₹0.00
Browse Categories
  • Java
  • Python
  • Embedded
  • Machine Learning
  • Mechanical
  • Matlab
  • VLSI
  • Raspberry PI
  • Artificial Intelligence
  • Home
  • Shop
    • PROJECTS
      • PROJECTS
        • Java
        • Python
        • Embedded
        • Matlab
        • VLSI
        • Mechanical
    • MINI PROJECTS
      • PROJECTS
        • Java
        • Python
        • Matlab
        • VLSI
        • Embedded
    • WORKSHOPS
      • Workshops
        • Python
        • Robotics
        • Industry Visit
        • Raspberry Pi
        • Image Processing
        • Mechanical Engineering
        • VLSI
        • Arduino
        • Matlab
        • Machine Learning
        • Embedded
        • Android
        • IoT
    • INTERNSHIPS
      • Internships
        • Python
        • Machine learning
        • Artificial intelligence
        • Web development
        • Android
        • IoT / internet of things
        • Cloud Computing
        • Digital Marketing
        • Big Data
  • Journal paper
  • Blog
  • About us
  • Contact us
Click to enlarge
Home Projects Java DEDUCT: A Secure Deduplication of Textual Data in Cloud Environments
Mulberry Leaf Disease Detection Using CNN-Based Smart Android Application
Mulberry Leaf Disease Detection Using CNN-Based Smart Android Application ₹5,500.00
Back to products
A Low-Cost Pipelined Architecture Based on a Hybrid Sorting Algorithm
A Low-Cost Pipelined Architecture Based on a Hybrid Sorting Algorithm ₹5,500.00

DEDUCT: A Secure Deduplication of Textual Data in Cloud Environments

₹5,500.00

Aim:Ā 

To design and implement DEDUCT, a secure and efficient data deduplication method for textual data. The goal is to reduce storage demands while ensuring data confidentiality and supporting resource-constrained devices.

Watch Product Video
Compare
Add to wishlist
Categories: Cloud Computing, Cloud Computing, Java, Projects Tags: Cloud Computing, Decryption, Deduplication, Encryption
Share:
  • Description
  • Reviews (0)
  • Software Download
  • Download Abstract
  • Shipping & Delivery
Description

Aim:Ā 

Ā Ā Ā Ā Ā Ā Ā  To design and implement DEDUCT, a secure and efficient data deduplication method for textual data. The goal is to reduce storage demands while ensuring data confidentiality and supporting resource-constrained devices.

Abstract:

Ā Ā Ā Ā Ā Ā  The rapid increase in textual data in navigation tasks for devices like GPS or smart assistants creates challenges for managing and storing data in large-scale systems. Data deduplication, which reduces storage needs by eliminating duplicate data, offers a solution but raises security concerns. This paper introduces DEDUCT, a new method that combines cloud-side and client-side deduplication to achieve high data compression while protecting data privacy.

Ā Ā Ā Ā Ā  Designed for devices with limited resources, such as IoT devices, DEDUCT includes lightweight preprocessing and safeguards against security risks like side-channel attacks. Testing on a navigation dataset shows that DEDUCT can compress data by up to 66%, significantly cutting storage costs while keeping data secure, making it an efficient choice for managing large-scale data systems.

Existing System:

Ā Ā Ā Ā Ā Ā Ā  The existing system for managing encrypted data focuses on efficient storage and transmission by utilizing two main components: the Cloud Service Provider (CSP) and authorized clients. The CSP stores encrypted data and employs a pointer-based approach to avoid storing duplicate data, saving valuable storage space. Authorized clients, who have limited storage resources, follow a five-step process before uploading data. This process begins with tokenization, breaking the data into smaller parts, followed by transformation into base and deviation pairs using the Wagner-Fischer algorithm. Clients then calculate unique CRC values for each base, which are stored locally to detect and avoid duplicates.

Ā Ā Ā Ā Ā Ā  After encrypting the data using a predefined encryption key, the client uploads the encrypted base, CRC value, and deviation to the CSP. If the CRC value already exists locally, only the CRC and deviation are sent, further optimizing bandwidth and storage usage. This approach helps ensure data security, reduces redundancy, and minimizes resource consumption in cloud storage systems. However, it lacks advanced integrity checks, which could enhance data reliability and security in the future.

Disadvantage in Existing System:

Ā Ā Ā Ā Ā Ā Ā Ā Ā  No File Downloading – Users are unable to download files, limiting access to their stored data.

Ā Ā Ā Ā Ā Ā Ā Ā Ā  No File Viewing – Users cannot view details of the chunks of data or the contents of their Encrypted files directly.

Ā Ā Ā Ā Ā Ā Ā Ā Ā  No File Sharing – The system does not currently support file sharing, limiting users’ ability to collaborate or distribute their files to others.

Lack of Real-Time Access – Without the ability to download or view files, users cannot access their data in real-time when needed.

information about the individual chunks of their uploaded files.

Proposed System:

Ā Ā Ā Ā Ā Ā Ā Ā Ā  In the proposed system, users can easily register, log in, and access their personal accounts with a secure authentication process. After logging in, users are provided with the ability to upload a wide range of file types, including images, PDFs, Word documents, and text files, to the cloud for secure storage. Once a file is uploaded, the system processes the data securely and efficiently. The first step involves tokenizing the file, where the data is divided into smaller, manageable components or tokens.

Ā Ā Ā Ā Ā Ā Ā  The Wagner-Fischer algorithm is then applied to transform these tokens into base and deviation pairs, which helps to handle the data more accurately, enabling efficient comparison and deduplication. Following this, CRC values are calculated for each base to detect duplicate data, which minimizes storage redundancy and optimizes space. After processing the data, the system encrypts the file to ensure that it remains secure and confidential during storage in the cloud. Users can view their files securely within the system, with the data remaining encrypted to maintain privacy.

Ā Ā Ā Ā Ā Ā Ā  Furthermore, the system provides users with the ability to download their files at any time. When downloading a file, users must decrypt the file using a unique decryption key. This key, which is securely associated with the user’s account, ensures that only authorized users can access and decrypt the file. The decryption process restores the original content of the file, allowing users to view or use the data in its original, unencrypted form.

Ā Ā Ā Ā Ā Ā Ā Ā Ā  The decryption key is carefully managed and protected within the system to maintain data confidentiality and prevent unauthorized access. This secure download process ensures that even during transmission, the data remains encrypted and protected, preserving privacy. Overall, the system integrates strong encryption techniques, tokenization for efficient storage, and secure user access, providing a seamless, secure, and efficient file management experience, all while minimizing redundancy and maximizing storage efficiency.

Advantages in Proposed System:

Support for Multiple File Types – The system allows users to upload a variety of file types, including images, PDFs, Word documents, and text files, offering flexibility in file management.

Secure File Viewing The Encrypted Data – Users can view their files securely, with data remaining encrypted to maintain privacy while being accessed.

File Download with Decryption – When downloading, users must decrypt files using a unique decryption key, ensuring that only authorized users can access their data.

File Sharing – The system enables users to easily share their files with other users, facilitating collaboration and data exchange. By securely sharing files

View Chunk Details – Users have the ability to view detailed information about the individual chunks of their uploaded files.

Reviews (0)

Reviews

There are no reviews yet.

Be the first to review “DEDUCT: A Secure Deduplication of Textual Data in Cloud Environments” Cancel reply

Your email address will not be published. Required fields are marked *


The reCAPTCHA verification period has expired. Please reload the page.

Software Download

You must be logged in to download the software.

Download Abstract

You must be logged in to download the abstract.

Shipping & Delivery
wd-ship-1
wd-ship-2

MAECENAS IACULIS

Vestibulum curae torquent diam diam commodo parturient penatibus nunc dui adipiscing convallis bulum parturient suspendisse parturient a.Parturient in parturient scelerisque nibh lectus quam a natoque adipiscing a vestibulum hendrerit et pharetra fames nunc natoqueĀ dui.

ADIPISCING CONVALLIS BULUM

  • Vestibulum penatibus nunc dui adipiscing convallis bulum parturient suspendisse.
  • Abitur parturient praesent lectus quam a natoque adipiscing a vestibulum hendre.
  • Diam parturient dictumst parturient scelerisque nibh lectus.

Scelerisque adipiscing bibendum sem vestibulum et in a a a purus lectus faucibus lobortis tincidunt purus lectus nisl class eros.Condimentum a et ullamcorper dictumst mus et tristique elementum nam inceptos hac parturient scelerisqueĀ vestibulum amet elit ut volutpat.

Related products

Compare

A Holistic Framework for Crime Prevention, Response, and Analysis With Emphasis on Women Safety Using Technology and Societal Participation

Java, Internet of Things (IoT), IoT
₹5,500.00
Aim: Ā Ā Ā Ā Ā Ā Ā Ā  To prevent crime scenes before it takes place by alerting the victim (women) by Hi-Tech Framework and volunteer
Add to wishlist
Add to cart
Quick view
Compare

Crypt-DAC Cryptographically Enforced Dynamic Access Control in the Cloud

Projects, Java, Cloud Computing
₹5,000.00
Aim: Ā Ā Ā Ā Ā Ā Ā  The main aim of this project is to provide integrity of an organization data which is in public
Add to wishlist
Add to cart
Quick view
Compare

Enabling Ternary Hash Tree based Integrity Verification for Secure Cloud Data Storage

Projects, Java, Data Mining, Data mining
₹5,000.00
Aim Ā Ā Ā Ā Ā Ā Ā Ā  The main aim of this project is to provide a reliable and secure cloud service and also increase
Add to wishlist
Add to cart
Quick view
Compare

Ephemeral Secret Leakage-Free ID-Role-Based Access Control Authentication and Key Exchange Protocol for Securing Electric Vehicle Data

Java, Cloud Computing
₹5,500.00
The aim of this work is to develop a robust and efficient authorization management system for accessing electric vehicle (EV) data stored in a cloud server by integrating Role-based Access Control (RBAC) with identity-based cryptography (IBC).
Add to wishlist
Add to cart
Quick view
GreenLand: A Secure Land Registration Scheme for Blockchain and AI-Enabled Agriculture
Compare

GreenLand: A Secure Land Registration Scheme for Blockchain and AI-Enabled Agriculture Industry 5.0

Java, Machine Learning
₹5,500.00
Our study aims to introduce a Blockchain-Enabled Land Registration System powered by AI to ensure secure, transparent, and tamper-proof land ownership records in agriculture, enhancing trust and reducing fraud in the agricultural sector.
Add to wishlist
Add to cart
Quick view
Compare

Real Time Alert System based on Crime Area Mapping

Projects, Java, Android
₹5,500.00
Aim:Ā  The objective of this system is to provide real-time alerts for users based on crime-prone areas, allowing citizens to report complaints and enabling police verification through an integrated mapping and notification system.
Add to wishlist
Add to cart
Quick view
Compare

Securing EHRs With a Novel Token-Based and PPoS Blockchain Methodology

Java, Blockchain, Block Chain
₹5,500.00
The aim of this project is to develop a secure and scalable Electronic Health Record (EHR) system using blockchain technology to protect privacy, ensure data integrity, and provide controlled access to patient health records.
Add to wishlist
Add to cart
Quick view
Intelligent Package Evaluation
Compare

WIPE: A Novel Web-Based Intelligent Packaging Evaluation via Machine Learning and Association Mining

Projects, Java, Machine Learning, Machine Learning
₹5,500.00
Our study aims to introduce the Web-Based Intelligent Packaging Evaluation (WIPE) platform, which uses machine learning and association rule mining to assess packaging performance in e-commerce. By analyzing customer reviews, WIPE identifies packaging defects, their causes, and effects, offering a dynamic, real-world alternative to traditional laboratory methods. By using a pre-trained BERT, it ensures precise predictions even with varying data quality. Additionally, the system captures the full context of customer feedback by generating dynamic word clouds, which visually represent common issues and sentiments, offering deeper insights into customer concerns.
Add to wishlist
Add to cart
Quick view

    Global Techno Solutions - GTS, started by young engineering graduates to overcome a problem they faced during their academic years. That is "Providing Solutions". They kept it as the motto for their company.

    • Phone: (+91) 90254 34960
    • Mail: sales@finalyearprojects.in
    Our Category
    • Java
    • Python
    • Embedded
    • Matlab
    • VLSI
    • Mechanical
    USEFUL LINKS
    • Privacy Policy
    • Returns
    • Terms & Conditions
    • Contact Us
    • Latest News
    • FAQ
    Mini Projects
    • Java
    • Python
    • Embedded
    • Matlab
    • VLSI
    Copyright Finalyearprojects.In 2024
    payments
    • Menu
    • Categories
    • Java
    • Python
    • Embedded
    • Machine Learning
    • Mechanical
    • Matlab
    • VLSI
    • Raspberry PI
    • Artificial Intelligence
    • Home
    • Shop
    • Blog
    • About us
    • Contact us
    • Wishlist
    • Compare
    • Login / Register
    Shopping cart
    Close
    Sign in
    Close

    Lost your password?

    OR
    Don't have an account? Signup

    No account yet?

    Create an Account

    HEY YOU, SIGN UP AND CONNECT TO GLOBAL TECHNO SOLUTIONS

    Be the first to learn about our latest trends and get exclusive offers

    Will be used in accordance with ourĀ Privacy Policy

    Shop
    0 Wishlist
    0 items Cart
    My account

    Back