Escolar Documentos
Profissional Documentos
Cultura Documentos
Volume: 3 Issue: 9
ISSN: 2321-8169
5596 - 5599
______________________________________________________________________________________
Pardeshi Yogita K.
Computer engineering,
SND COE & RC YEOLA,
Yeola, Maharashtra, India
poojashelke93@gmail.com
Computer engineering,
SND COE & RC YEOLA,
Yeola, Maharashtra, India
pyogita56@gmail.com
Shelke Aarti H.
Khairnar Shweta S.
Computer engineering,
SND COE & RC YEOLA,
Yeola, Maharashtra, India
aartishelke94@gmail.com
Computer engineering,
SND COE & RC YEOLA,
Yeola, Maharashtra, India
khairnarshweta6@gmail.com
Abstract Due to enormous increase in use of web services in our day today life, web services have moved to multitier design
where in web server runs the application front-end logic and data are outsourced to a database or file server. In our system, we
will implement secure de-duplication which is a technique for eliminating duplicate copies of data, it has been largely used in
cloud storage to reduce storage space and upload bandwidth with Container security, an IDS system that models the network acts
as user sessions across both front-end web server and back-end database. By monitoring both the web and subsequent database
requests, we are capable to search out attacks that an independent Intrusion Detection System (IDS) unable to identify. In this
system, each user requesting for our application will be allocated separate container. The container based web architecture not
only fasters profiling of causal mapping, but it also provides an isolation that obstruct future session hijacking attacks .Each user
will hold de-key which is a new construction in which users do not require to manage any keys on their own but as an alternative
securely distribute the convergent key shares across multiple servers. We implement De-key to demonstrate that De-key incurs
limited overhead in realistic environments.
Keywords- De-duplication, secret sharing, multitier web application, Container Architecture, Session ID.
__________________________________________________*****_________________________________________________
I.
INTRODUCTION
5596
IJRITCC | September 2015, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
ISSN: 2321-8169
5596 - 5599
______________________________________________________________________________________
II.
RELATED WORK
EXISTING SYSTEM
5597
IJRITCC | September 2015, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
ISSN: 2321-8169
5596 - 5599
______________________________________________________________________________________
IV.
PROPOSED SYSTEM
MATHEMATICAL MODEL
VI.
CONCLUSION
5598
IJRITCC | September 2015, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
ISSN: 2321-8169
5596 - 5599
______________________________________________________________________________________
REFERENCES
[1]
[2]
[3]
[4]
[5]
[6]
[7]
[8]
[9]
5599
IJRITCC | September 2015, Available @ http://www.ijritcc.org
_______________________________________________________________________________________