preview

Installing Convergent Encryption By Aes Encryption

Decent Essays

CHAPTER5 PROPOSEDARCHITECTUREANDMETHODOLOGY 5.1Proposed Architecture Inthis section,wedescribetheproposedarchitecture of deduplication system.In our proposed architecture we replace some technique with new technique like we replaced convergent encryption by AES encryption. We eliminate some steps that are not necessary to be there. That will help to reduce execution time. Mainly we made three changes in our proposed architecture: 1. We use AES encryption in place of convergent encryption. 2. We eliminate secret key encryption between server and metadata manager. 3. We proposed to check duplication at starting stage. In old architecture duplication checked when data converted in another form means after encryption. These three changes in …show more content…

So we eliminate one secret encryption layer that was present between server and metadata manager. System takes so much time every time to check integrity and address of file because of that secret encryption layer. So clearly this step will reduce execution time. And at last we check duplication at starting stage. Now, there is no need to encrypt every data for integrity checking. This also eliminates extra overload from system. 5.2 COMPONENTS: In this section we describe the role of each component. A. User The role of the user is limited to uploading files to the system,encrypting them with the AES encryption technique,signing the resulting encrypted files and creating the storagerequest. In addition, the user also generates the key to AES system by his ID and PASSWORD. It works as file identifier to the system. For each file, this key will be used to decrypt and re-build the file when it will be retrieved. Instead, thefile identifier is necessary to univocally identify a file overthe whole system. Finally, the user also signs each files with a special signature scheme. In order not to apply costly signatureoperations for the file, for all it adds owner name to a separate MM. The main architecture is illustrated in Fig. 5.1. B. Server The server has three main roles: authenticating users duringthe storage/retrieval request, performing access control byverifying block signatures embedded in the data, encrypting/decrypting data traveling from users to the cloud

Get Access