Welcome to Final Year Projects!!
  • Newsletter
  • +91 90254 34960
  • Contact Us
  • FAQs
Select category
  • Select category
  • Artificial Intelligence
  • Biomedical
  • Block Chain
  • Cloud Computing
  • Cyber Security
  • Data mining
  • Deep Learning
  • Embedded Components
  • Generative AI
  • IoT
  • LORA
  • Machine Learning
  • Mini Projects
    • Embedded
    • Java
    • Matlab
    • Python
    • VLSI
      • pipeline
  • Natural Language Processing
  • Projects
    • Embedded
      • Agriculture
      • Artificial Intelligence(AI)
      • Biomedical
      • Digital Twin
      • Federated Learning
      • Image Processing
      • Internet of Things(IoT)
      • LoRaWAN
      • Python Interface
      • Raspberry PI
      • Robotics
      • Social Cause
      • Wireless Sensor Network
    • Java
      • Android
      • Artificial Intelligence
      • Augmented Reality
      • Blockchain
      • Cloud Computing
      • Cybersecurity
      • Data Mining
      • Internet of Things (IoT)
      • Machine Learning
      • Secure Computing
      • Social Cause
    • Matlab
      • Cryptography- Authentication
      • Cyber Security
      • Deep Learning
      • Digital Image Processing
      • Machine Learning
      • Natural Language Processing
    • Python
      • Agent AI
      • Blockchain
      • Cybersecurity
      • Deep Learning
      • Explainable AI
      • Federated Learning
      • Generative AI
      • GPT
      • Graph Neural Network
      • Machine Learning
      • OpenCV
      • Quantum Encryption
      • Reinforcement Learning
    • VLSI
      • Low Power VLSI Design
      • On-Chip Cryptography
      • Self Repairing Technology
  • Robotics
  • Secure Computing
Login / Register
0 Wishlist
0 Compare
0 items ₹0.00
Menu
0 items ₹0.00
Browse Categories
  • Java
  • Python
  • Embedded
  • Machine Learning
  • Mechanical
  • Matlab
  • VLSI
  • Raspberry PI
  • Artificial Intelligence
  • Home
  • Shop
    • PROJECTS
      • PROJECTS
        • Java
        • Python
        • Embedded
        • Matlab
        • VLSI
        • Mechanical
    • MINI PROJECTS
      • PROJECTS
        • Java
        • Python
        • Matlab
        • VLSI
        • Embedded
    • WORKSHOPS
      • Workshops
        • Python
        • Robotics
        • Industry Visit
        • Raspberry Pi
        • Image Processing
        • Mechanical Engineering
        • VLSI
        • Arduino
        • Matlab
        • Machine Learning
        • Embedded
        • Android
        • IoT
    • INTERNSHIPS
      • Internships
        • Python
        • Machine learning
        • Artificial intelligence
        • Web development
        • Android
        • IoT / internet of things
        • Cloud Computing
        • Digital Marketing
        • Big Data
  • Journal paper
  • Blog
  • About us
  • Contact us
Click to enlarge
Home Projects Java DEDUCT: A Secure Deduplication of Textual Data in Cloud Environments
Mulberry Leaf Disease Detection Using CNN-Based Smart Android Application
Mulberry Leaf Disease Detection Using CNN-Based Smart Android Application ₹5,500.00
Back to products
A Low-Cost Pipelined Architecture Based on a Hybrid Sorting Algorithm
A Low-Cost Pipelined Architecture Based on a Hybrid Sorting Algorithm ₹5,500.00

DEDUCT: A Secure Deduplication of Textual Data in Cloud Environments

₹5,500.00

Aim:Ā 

To design and implement DEDUCT, a secure and efficient data deduplication method for textual data. The goal is to reduce storage demands while ensuring data confidentiality and supporting resource-constrained devices.

Watch Product Video
Compare
Add to wishlist
Categories: Cloud Computing, Cloud Computing, Java, Projects Tags: Cloud Computing, Decryption, Deduplication, Encryption
Share:
  • Description
  • Reviews (0)
  • Software Download
  • Download Abstract
  • Shipping & Delivery
Description

Aim:Ā 

Ā Ā Ā Ā Ā Ā Ā  To design and implement DEDUCT, a secure and efficient data deduplication method for textual data. The goal is to reduce storage demands while ensuring data confidentiality and supporting resource-constrained devices.

Abstract:

Ā Ā Ā Ā Ā Ā  The rapid increase in textual data in navigation tasks for devices like GPS or smart assistants creates challenges for managing and storing data in large-scale systems. Data deduplication, which reduces storage needs by eliminating duplicate data, offers a solution but raises security concerns. This paper introduces DEDUCT, a new method that combines cloud-side and client-side deduplication to achieve high data compression while protecting data privacy.

Ā Ā Ā Ā Ā  Designed for devices with limited resources, such as IoT devices, DEDUCT includes lightweight preprocessing and safeguards against security risks like side-channel attacks. Testing on a navigation dataset shows that DEDUCT can compress data by up to 66%, significantly cutting storage costs while keeping data secure, making it an efficient choice for managing large-scale data systems.

Existing System:

Ā Ā Ā Ā Ā Ā Ā  The existing system for managing encrypted data focuses on efficient storage and transmission by utilizing two main components: the Cloud Service Provider (CSP) and authorized clients. The CSP stores encrypted data and employs a pointer-based approach to avoid storing duplicate data, saving valuable storage space. Authorized clients, who have limited storage resources, follow a five-step process before uploading data. This process begins with tokenization, breaking the data into smaller parts, followed by transformation into base and deviation pairs using the Wagner-Fischer algorithm. Clients then calculate unique CRC values for each base, which are stored locally to detect and avoid duplicates.

Ā Ā Ā Ā Ā Ā  After encrypting the data using a predefined encryption key, the client uploads the encrypted base, CRC value, and deviation to the CSP. If the CRC value already exists locally, only the CRC and deviation are sent, further optimizing bandwidth and storage usage. This approach helps ensure data security, reduces redundancy, and minimizes resource consumption in cloud storage systems. However, it lacks advanced integrity checks, which could enhance data reliability and security in the future.

Disadvantage in Existing System:

Ā Ā Ā Ā Ā Ā Ā Ā Ā  No File Downloading – Users are unable to download files, limiting access to their stored data.

Ā Ā Ā Ā Ā Ā Ā Ā Ā  No File Viewing – Users cannot view details of the chunks of data or the contents of their Encrypted files directly.

Ā Ā Ā Ā Ā Ā Ā Ā Ā  No File Sharing – The system does not currently support file sharing, limiting users’ ability to collaborate or distribute their files to others.

Lack of Real-Time Access – Without the ability to download or view files, users cannot access their data in real-time when needed.

information about the individual chunks of their uploaded files.

Proposed System:

Ā Ā Ā Ā Ā Ā Ā Ā Ā  In the proposed system, users can easily register, log in, and access their personal accounts with a secure authentication process. After logging in, users are provided with the ability to upload a wide range of file types, including images, PDFs, Word documents, and text files, to the cloud for secure storage. Once a file is uploaded, the system processes the data securely and efficiently. The first step involves tokenizing the file, where the data is divided into smaller, manageable components or tokens.

Ā Ā Ā Ā Ā Ā Ā  The Wagner-Fischer algorithm is then applied to transform these tokens into base and deviation pairs, which helps to handle the data more accurately, enabling efficient comparison and deduplication. Following this, CRC values are calculated for each base to detect duplicate data, which minimizes storage redundancy and optimizes space. After processing the data, the system encrypts the file to ensure that it remains secure and confidential during storage in the cloud. Users can view their files securely within the system, with the data remaining encrypted to maintain privacy.

Ā Ā Ā Ā Ā Ā Ā  Furthermore, the system provides users with the ability to download their files at any time. When downloading a file, users must decrypt the file using a unique decryption key. This key, which is securely associated with the user’s account, ensures that only authorized users can access and decrypt the file. The decryption process restores the original content of the file, allowing users to view or use the data in its original, unencrypted form.

Ā Ā Ā Ā Ā Ā Ā Ā Ā  The decryption key is carefully managed and protected within the system to maintain data confidentiality and prevent unauthorized access. This secure download process ensures that even during transmission, the data remains encrypted and protected, preserving privacy. Overall, the system integrates strong encryption techniques, tokenization for efficient storage, and secure user access, providing a seamless, secure, and efficient file management experience, all while minimizing redundancy and maximizing storage efficiency.

Advantages in Proposed System:

Support for Multiple File Types – The system allows users to upload a variety of file types, including images, PDFs, Word documents, and text files, offering flexibility in file management.

Secure File Viewing The Encrypted Data – Users can view their files securely, with data remaining encrypted to maintain privacy while being accessed.

File Download with Decryption – When downloading, users must decrypt files using a unique decryption key, ensuring that only authorized users can access their data.

File Sharing – The system enables users to easily share their files with other users, facilitating collaboration and data exchange. By securely sharing files

View Chunk Details – Users have the ability to view detailed information about the individual chunks of their uploaded files.

Reviews (0)

Reviews

There are no reviews yet.

Be the first to review “DEDUCT: A Secure Deduplication of Textual Data in Cloud Environments” Cancel reply

Your email address will not be published. Required fields are marked *


The reCAPTCHA verification period has expired. Please reload the page.

Software Download

You must be logged in to download the software.

Download Abstract

You must be logged in to download the abstract.

Shipping & Delivery
wd-ship-1
wd-ship-2

MAECENAS IACULIS

Vestibulum curae torquent diam diam commodo parturient penatibus nunc dui adipiscing convallis bulum parturient suspendisse parturient a.Parturient in parturient scelerisque nibh lectus quam a natoque adipiscing a vestibulum hendrerit et pharetra fames nunc natoqueĀ dui.

ADIPISCING CONVALLIS BULUM

  • Vestibulum penatibus nunc dui adipiscing convallis bulum parturient suspendisse.
  • Abitur parturient praesent lectus quam a natoque adipiscing a vestibulum hendre.
  • Diam parturient dictumst parturient scelerisque nibh lectus.

Scelerisque adipiscing bibendum sem vestibulum et in a a a purus lectus faucibus lobortis tincidunt purus lectus nisl class eros.Condimentum a et ullamcorper dictumst mus et tristique elementum nam inceptos hac parturient scelerisqueĀ vestibulum amet elit ut volutpat.

Related products

Compare

Agri-4-All: A Framework for Blockchain Based Agricultural Food Supply Chains in the Era of Fourth Industrial Revolution

Projects, Java, Blockchain, Block Chain
₹5,500.00
Aim: Ā Ā Ā Ā Ā Ā Ā Ā Ā  Our study aims to develop a blockchain-based web application that enhances transparency and traceability in the agricultural food
Add to wishlist
Add to cart
Quick view
Compare

AR Interactive Story Telling for Children Book

Java, Augmented Reality, Android
₹5,500.00
The goal of this project is to develop an AR (Augmented Reality) Interactive Storytelling system for children's books. The primary aim is to create an engaging and educational experience that immerses children into the story through visual and interactive elements, making the reading experience more enjoyable and educational.
Add to wishlist
Add to cart
Quick view
Bio Touch Pass Handwritten Passwords for Touch screen Biometrics
Compare

Bio Touch Pass: Handwritten Passwords for Touch screen Biometrics

Projects, Java, Android
₹4,500.00
Aim: Ā Ā Ā Ā Ā Ā Ā  The main aim of this project is to develop user-friendly mobile applications ensuring data protection and high security.
Add to wishlist
Add to cart
Quick view
Compare

Ephemeral Secret Leakage-Free ID-Role-Based Access Control Authentication and Key Exchange Protocol for Securing Electric Vehicle Data

Java, Cloud Computing
₹5,500.00
The aim of this work is to develop a robust and efficient authorization management system for accessing electric vehicle (EV) data stored in a cloud server by integrating Role-based Access Control (RBAC) with identity-based cryptography (IBC).
Add to wishlist
Add to cart
Quick view
Compare

KiRTi: A Blockchain-based Credit Recommender System for Financial Institutions

Projects, Java, Blockchain, Block Chain
₹5,500.00
Aim Ā Ā Ā Ā Ā Ā  The main aim of this project to remove the third party agent between the perspective lenders and perspective
Add to wishlist
Add to cart
Quick view
Compare

Mulberry Leaf Disease Detection Using CNN-Based Smart Android Application

Projects, Java, Android, Machine Learning, Machine Learning
₹5,500.00
Aim:Ā  To develop an Android application for detecting diseases in mulberry leaves using deep learning and provide actionable insights like weather data analysis and fertilization recommendations.
Add to wishlist
Add to cart
Quick view
Compare

Quantum Safe Multi-Factor User Authentication Protocol for Cloud-Assisted Medical IoT

Java, Cloud Computing
₹5,500.00
Aim: Ā  Ā  Ā  Ā  Ā  Ā  Ā  Ā  To design and implement a Quantum-Safe Multi-Factor User Authentication Protocol for Cloud-Assisted Medical IOT systems, ensuring secure, privacy-preserving, and tamper-resistant access to sensitive healthcare data, even against future quantum-computing attacks, by integrating post-quantum cryptography.
Add to wishlist
Add to cart
Quick view
Compare

Secured Electronic voting system using Blockchain Technology

Projects, Java, Blockchain, Block Chain
₹5,500.00
Aim: Ā Ā Ā Ā Ā Ā Ā Ā Ā  The aim of this paper is to explore the potential of Ethereum’s smart contracts in creating secure, transparent,
Add to wishlist
Add to cart
Quick view

    Global Techno Solutions - GTS, started by young engineering graduates to overcome a problem they faced during their academic years. That is "Providing Solutions". They kept it as the motto for their company.

    • Phone: (+91) 90254 34960
    • Mail: sales@finalyearprojects.in
    Our Category
    • Java
    • Python
    • Embedded
    • Matlab
    • VLSI
    • Mechanical
    USEFUL LINKS
    • Privacy Policy
    • Returns
    • Terms & Conditions
    • Contact Us
    • Latest News
    • FAQ
    Mini Projects
    • Java
    • Python
    • Embedded
    • Matlab
    • VLSI
    Copyright Finalyearprojects.In 2024
    payments
    • Menu
    • Categories
    • Java
    • Python
    • Embedded
    • Machine Learning
    • Mechanical
    • Matlab
    • VLSI
    • Raspberry PI
    • Artificial Intelligence
    • Home
    • Shop
    • Blog
    • About us
    • Contact us
    • Wishlist
    • Compare
    • Login / Register
    Shopping cart
    Close
    Sign in
    Close

    Lost your password?

    OR
    Don't have an account? Signup

    No account yet?

    Create an Account

    HEY YOU, SIGN UP AND CONNECT TO GLOBAL TECHNO SOLUTIONS

    Be the first to learn about our latest trends and get exclusive offers

    Will be used in accordance with ourĀ Privacy Policy

    Shop
    0 Wishlist
    0 items Cart
    My account

    Back