Professional Documents
Culture Documents
An Efficient Data Compression and Storage Technique With Key Management Authentication in Cloud Computing
An Efficient Data Compression and Storage Technique With Key Management Authentication in Cloud Computing
ISSN 2229-5518
Abstract
IJSER
industry. Cloud storage is an application of cloud
many small blocks and all blocks are replicated over
computing. It’s the most developed part in cloud
several servers. The high demand for data processing and
leads to high computational requirement which is usually application. It depends on the cluster application, grid
not available at the user's end Compression algorithms technology and distributed file system, and provides
reduce the redundancy in data representation thus storage service to user through internet. In most
increasing effective data density. Data compression is a conditions, Cloud storage can provide high reliability
very useful technique that helps in reducing the size of text
and security storage service at competitive price. The
data and storing the same amount of data in relatively
most developed cloud storage application is online
fewer bits resulting in reducing the data storage space,
backup or file-syncing. Disaster may happen at any
resource usage or transmission capacity.In this paper a
time: fire, flood, tornado, hard driver failure. These
hybrid data compression algorithm is propose which
disasters can destroy all local-stored data. User can
involves the combination of LZW and run length encoding.
This hybrid algorithm increase the compression ratio and use remote backup to protect their data from disasters.
minimize the compression ,decompression time while The other choice is to store copies of files in the cloud
comparing with existing algorithms. storage[1]. Online backup is an Internet based system
Keyword: Data compression, LZW algorithm, run that is set to automatically back up all selected files.
length encoding, Third party auditing, Key management
These files are stored online, and can be accessed
authentication.
anywhere. Which is especially useful in case of local
IJSER © 2018
http://www.ijser.org
International Journal of Scientific & Engineering Research Volume 9, Issue 1, January-2018 980
ISSN 2229-5518
computer or server gets lost or damaged. The benefit difficult to email if they are too large or you have a lot
of using online storage services does not limited in of them. We can quickly circulate a URL and can
protecting data. Cloud storage services make it easy to share the files with anyone we choose, which would
share files from different machines and mobiles. mean uploading to the cloud storage.[3]
The benefits of the cloud storage are flexible with Management of data becomes paramount in
reduced cost and they also manage the data loss risk maintaining service levels and securing the critical
and so on. Recently many work focus towards third business information because all data in a cloud lives
party auditing and the remote integrity checking, in the same shared system. Small business under cloud
providing the data dynamics. Remote archive service computing is also dependent on the reliability of our
is responsible for properly preserving the data. The internet connection. But the internet outages make the
remote data integrity checking protocol detects the most reliable cloud computing service providers to
IJSER
data corruption and misbehaving server in the cloud suffer now and again. It is also noteworthy that the
storage. In the proposed work Data partitioning premier cloud computing service providers suffer
technique, remote data integrity checking is analyzed much outage. As the smaller organizations plan to
in internal and external ways. Partitioning happens in move forward with cloud computing, outages which
alphabetical order by using of index method whereby happen everywhere could have a profound impact on
the data being used is controlled.[2] them [4]. Cloud computing enables to be excessively
The security mechanism is also emphasized in dependent on the internet. The availability of the
order to prevent unrecoverable data loss. Storage and robust and reliable internet for all the time is the
retrieval process are simplified by reducing the storage premise on which the cloud computing exists. For the
space when there is need to store and retrieved by purpose of upholding the efficiency and effectiveness
merging technique. Cloud invisibly backs up the files of cloud computing in data management even in the
and folders and elevates the potentially endless and case of reduced bandwidth and irrespective of the
costly search for extra storage space from music files device used to retrieve data, a feasible solution could
to pictures to sensitive documents. Using cloud be to compress the data on cloud. Data compression
storage services means that you and others can access helps to reduce the consumption of expensive
and share files across a range of devices and locations. resources in this regard. For example, the disk space
IJSER © 2018
http://www.ijser.org
International Journal of Scientific & Engineering Research Volume 9, Issue 1, January-2018 981
ISSN 2229-5518
Many researchers have proposed the use of convergent encryption for secure deduplication. It is
compression in cloud computing which leads to realized that some business cloud storage suppliers,
effective use of storage disks and bandwidth in the for example, Bitcasa, likewise send convergent
scheme which can support public verification and Wang et al. [9] proposed a privacy protection
fully dynamic data at the same time because previous scheme which is considered user’s data privacy in the
studies only supported to modify and delete on a data public auditability. Data privacy implies personally
file. They define public auditability which implies identifiable information or sensitive information
public verification is delegated by a trusted third party whether they can be shared with third parties. As far
auditor (TPA) to verify. They propose a scheme to as users are concerned what they depend on TPA just
IJSER
improve complex the file index information because for the outsourced storage security of their data.
this needs to consume a lot of computed resource. However, most studies do not consider the
Stanek et al. [7] The innovative encryption protection of clients’ private information in the
scheme which provides many different security of auditing phase. This is a serious problem because an
known and unknown data. For known information that auditor may leak information without the client’s
are not especially delicate or sensitive, the traditional authorization. Besides, there are legal regulations,
or classic ordinary encryption is performed. An such as the Health Insurance Portability and
alternate two-layered encryption plan with higher Accountability Act (HIPPA), it guarantees patient
security while giving support to deduplication is confidentiality for all healthcare-related data and
proposed for unknown information. Along these lines, demands the outsourced data not to be leaked to
proficiency and security of the outsourced In [10] proposed an architecture that ensures the
Xu et al. [8] additionally tended to the problem architecture can directly applicable to existing clouds
and demonstrated a protected convergent encryption without any modifications or any changes in cloud
for effective encryption, without considering problems database. It can be process that connects directly to an
of the block level deduplication and key-management. encrypted cloud database without an intermediate
IJSER © 2018
http://www.ijser.org
International Journal of Scientific & Engineering Research Volume 9, Issue 1, January-2018 982
ISSN 2229-5518
devices or systems with geographically distributed order to achieve better throughput and end to end
clients and it also allowed executing independent and delay. Figure 1 demonstrates of the general
operations including those changing the database architecture for the proposed work. The proposed
structure. Moreover the proposed architecture removes framework is sub divided into three stages:
intermediate proxies that limit the scalability, Requisition phase, authentication phase and storage
elasticity and availability properties that are intrinsic phase. The primary stage involves the requisition
in cloud-based solutions. phase which uses the basis login and password
Khobragade P. B. et al [11] reviewed a number requisition model. The secondary stage executes
of compression techniques for compressing image authentication and authorization, whereas the
such as Lempel-Ziv-Welch, Huffman coding, Run authorized user have separate key to access the data in
Length encoding,, compression based on discrete order to do that an efficient method named efficient
IJSER
cosine transform, discrete wavelet transform (DWT), key management authentication algorithm. In the final
integer wavelet transform (IWT) based compression stage the datas are compressed and stored in the
and concluded that integer wavelet transform based network using hybrid data compression.
The main objective of the proposed work is The authorized users from the requisition phase
to improve the storage capacity in cloud and secure generate a separate key. For tracing each attribute
the data in the cloud from the unauthorized users in users has the unique identity. These identity and user’s
IJSER © 2018
http://www.ijser.org
International Journal of Scientific & Engineering Research Volume 9, Issue 1, January-2018 983
ISSN 2229-5518
attributes are hiding from the users. Through this method uses a public key based encryption which can
cannot learn anything from the cipher texts about the be decrypted by the user.
attributes matching or mismatching. The attributes are 3.2 Key distribution centre:
classified as the hidden normal attributes (HN) and the A Distributed Key Distribution Center (DKDC,
hidden identity attributes (HID). for short) is a set of n servers of a network that jointly
A.Setup the key: This phase outputs the public realizes the same function as a KDC. In this setting,
key and the master key. users have secure point-to-point channels with all
B.Encryption: Encrypt the message M with the set servers. A user who needs to communicate with other
of attributes X, but the attributes are Xhide hidden. users securely, sends a key-request message to a
C.Key generation: Key generation can be done by subset at his choice of at least k out of the n
access structure as input and produces the output. servers[13]. With this approach, the concentration of
IJSER
D.Decryption: Decryption can be done with secrets and the slow down factor which arise in a
decryption keys for each attributes of users. network with a single KDC are removed. A single
TPA (Third party Auditor) is an entity, which server by itself does not know the secret keys, since
has expertise and capabilities for Encryption and they are shared between the n servers. Moreover, each
decryption Service. When client want to store data at user can send a key-request in parallel to different
the cloud storage at that time TPA servers. Hence, there is no loss of time in computing a
(encryption/decryption service) Encrypt the data and key, compared with a centralized setting. Finally, the
return back to user for storage purpose. users can obtain the keys they need even if they are
For sensitive attributes the method chooses a unable to contact some of the servers.[14]
hash function which verifies the identity of user with 3.3 Hybrid data compression algorithm:
the help of TPA (Third party Auditor) and once the Compression technique is mainly used to reduce
identity verification gets cleared then the access the space of storage and increases the capacity of the
clearance is computed. When the user request clears resources. The data or information which occupies
both the service is fulfilled and the sensitive values are more space is compressed using a compressing
encrypted using the specific key which could be technique (i.e) Lossless compression technique. Then
decrypted by the user. For non-sensitive attributes the the compressed data can again be decompressed to
IJSER © 2018
http://www.ijser.org
International Journal of Scientific & Engineering Research Volume 9, Issue 1, January-2018 984
ISSN 2229-5518
is mainly used to reduce the resources storage space sub range. Therefore, the entire source message can be
and hence increase its productivity. In this section, we represented using a fraction. To decode the encoded
are going use the Lossless data compression technique message, the number of characters of the source
where the data or information which is compressed to message and the probability/frequency distribution are
minimize its storage size does not undergo any loss of needed.
data or information. The lossless compression Compression is achieved by taking each code
technique is highly secured. Our work comprises of from the file, and translating it through the code table
the combination of LZW algorithm and run length to find what character or characters it represents.
encoding. The LZW algorithm is very fast and simple Codes 0-255 in the code table are always assigned to
to implement but it has the limitation of compressing represent single bytes from the input file. For
the file that contain repetitive data whereas this can be example, if only these first 256 codes were used, each
IJSER
overcome by run length encoding. byte in the original file would be converted into 12
IJSER © 2018
http://www.ijser.org
International Journal of Scientific & Engineering Research Volume 9, Issue 1, January-2018 985
ISSN 2229-5518
Algorithm type Compression ratio
LZW 0.67
IJSER
proposed algorithm BAR algorithm 0.64 sec
Algorithm type Average Compression Proposed Hybrid data 0.21 sec
time for 100 kb compression algorithm
LZW 0.25 sec
Huffman encoding 0.54 sec
Reference based 0.19 sec
compression
BAR algorithm 0.43 sec
Proposed Hybrid data 0.152 sec
compression algorithm
IJSER © 2018
http://www.ijser.org
International Journal of Scientific & Engineering Research Volume 9, Issue 1, January-2018 986
ISSN 2229-5518
Huffman encoding 0.86 2011 IEEE International Conference on, pages 131–
Reference based 0.58 138. IEEE, 2011.
compression
[2] Qian Wang, Cong Wang, Jin Li, Kui Ren, and
BAR algorithm 0.23
Proposed Hybrid data 0.15 Wenjing Lou,” Enabling Public Audit ability and Data
compression algorithm Dynamics for Storage Security in Cloud Computing”,
ensuring the integrity of data storage in Cloud High Throughput Compression in the Cloud
Computing. We outline the challenges associated with Environment” IJARCSMS Volume 2, Issue 9,
IJSER
the retrieval of data from cloud in an appropriate September 2014.
manner. As the data gets compressed, it leads to a [4] "PPM performance with BWT Complexity: A fast
more optimized way of retrieving data from cloud. and effective data compression algorithm", M.
The use of compression in cloud computing leads to Effros,Proceedings of the IEEE, 88(11), 1703-1712,
work enables the user to fine-tune the trade-off [5] Yuan, Jiawei, and Shucheng Yu. "Secure and
between storage costs, computation time and constant cost public cloud storage auditing with
can be represented by fewer numbers of bits in Security (CNS), 2013 IEEE Conference on. IEEE,
data in the cloud environment. As a result the [6] Q. Wang, C. Wang, K. Ren, W. Lou, and J. Li,
proposed algorithm achieves the compression ratio “Enabling public auditability and data dynamics for
about 0.932 with the compression time 0.16 sec and storage security in cloud computing,” IEEE
decompression time 0.21 sec for 100 kb file. Transactions on Parallel and Distributed Systems, vol.
[1] C.C. Tan, Q. Liu, and J. Wu. Secure locking for [7] Stanek, Jan, et al. A secure data deduplication
untrusted clouds. In Cloud Computing (CLOUD), scheme for cloud storage. Technical Report, 2012.
IJSER © 2018
http://www.ijser.org
International Journal of Scientific & Engineering Research Volume 9, Issue 1, January-2018 987
ISSN 2229-5518
[8] Li, Jin, et al. "Secure deduplication with efficient Sharing in Cloud Storage ” , IEEE Transactions
and reliable convergent key management." (2013) 1-1 On Parallel And Distributed Systems, Vol. 25,
W. Lou, “Privacy-preserving public auditing for [15]Gurjeevan Singh, Ashwani Kumar Singla,
secure cloud storage,” IEEE Transactions on K.S.Sandha, “Through Put Analysis of Various
Computers, vol. 62, no. 2, pp. 362–375, 2014. Encryption Algorithms”, IJCST Vol.2, Issue3,
IJSER
Compression Techniques-A Review." International
1953.
IJSER © 2018
http://www.ijser.org