0% found this document useful (0 votes)
58 views12 pages

Secure Cloud Deduplication Guide

The document proposes a hybrid cloud approach for secure authorized deduplication. It includes data flow diagrams (DFDs) at three levels of detail, system design diagrams, UML diagrams including use case, sequence, component, activity and class diagrams. The diagrams show the system architecture and interactions between users, administrators and components for login, registration, file sharing, key generation and encryption/decryption in the deduplication system.

Uploaded by

Bala Sudhakar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
58 views12 pages

Secure Cloud Deduplication Guide

The document proposes a hybrid cloud approach for secure authorized deduplication. It includes data flow diagrams (DFDs) at three levels of detail, system design diagrams, UML diagrams including use case, sequence, component, activity and class diagrams. The diagrams show the system architecture and interactions between users, administrators and components for login, registration, file sharing, key generation and encryption/decryption in the deduplication system.

Uploaded by

Bala Sudhakar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 12

A HYBRID CLOUD APPROACH FOR

SECURE AUTHORIZED
DEDUPLICATION

1
DFD LEVEL-0:

2
DFD LEVEL-1:

3
DFD LEVEL-2:

4
SYSTEMS DESIGN DIAGRAM:

5
UML DIAGRAM:

USER

UserLogin

Check

No

yes
UserRegistration

Insert File

Shared Admin

Find Dedublicates

End Process
1

ADMIN

6
Admin Login

Check

No

yes
Registration

Send Files

R equest Key

End Process

7
Sequence Diagram

Sender User

Generate Key View Requst


user1 Login Send Message

Enter username and password


message

message

Receiver User

Send Key Request LOGOUT


User2 Login View Encrypted Message

Enter User2 name and password


message

message

Component Diagram

8
User

En ter Username a nd Password


L og in

Use r
no
yes

Re gister
Sen d File

Gen erate Ke y Sha re d To Admin

Receiver

Ent er Use r2 na me and Pa sswo rd


L og in

User2
no
yes

Re gister
Sen d File

Ke y Gen erate Req uest Sen d

Activity Diagram:

9
Sender Login

Userlogin

Send Message View Request Send Key Logout

Receiver Login

User2 login

Receive Message View Message Send Key Request Logout

Class Diagram:

10
Data Storing Centere

Data User 1 Data User 2

Sending Data Receiving Datas

USECASE Diagram:

11
12

You might also like