SlideShare a Scribd company logo
Attribute-Based Access to Scalable Media in Cloud-Assisted Content
Sharing Networks
ABSTRACT:
This paper presents a novel Multi-message Ciphertext Policy Attribute-Based Encryption
(MCP-ABE) technique, and employs the MCP-ABE to design an access control scheme for
sharing scalable media based on data consumers’ attributes (e.g., age, nationality, or
gender)rather than an explicit list of the consumers’ names. The scheme is efficient and flexible
because MCP-ABE allows a content provider to specify an access policy and encrypt multiple
messages within one Ciphertext such that only the users whose attributes satisfy the access
policy can decrypt the Ciphertext. Moreover, the paper shows how to support resource-limited
mobile devices by offloading computational intensive operations to cloud servers while without
compromising data privacy
EXISTING SYSTEM:
A promising approach to access control in content sharing services is to empower users to
enforce access controls on their data directly, rather than through a central administrator.
However, this requires flexible and scalable cryptographic key management to support complex
access control policies. A native access control solution is to assign one key for each user
attribute, distribute the appropriate keys to users who have the corresponding attributes, and
GLOBALSOFT TECHNOLOGIES
IEEE PROJECTS & SOFTWARE DEVELOPMENTS
IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE
BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS
CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401
Visit: www.finalyearprojects.org Mail to:ieeefinalsemprojects@gmail.com
encrypt the media with the attribute keys repeatedly Another method is to classify users into
different roles based on their attributes, assign role keys to users, and then encrypt the content
using the role keys. However, this approach results in high complexity, i.e., the number of keys
for each user and the number of cipher texts for one message are on the order of where is the
number of all possible user attributes. Both of these solutions suffer from the rigid and
inflexible definition of the underlying access control policies. A remedy to this problem is
employing Ciphertext Policy Attribute-Based Encryption (CP-ABE). In CP-ABE, a Ciphertext
is embedded with an access control policy, or access policy for short, associated with user
attributes. A recipient of the ciphertext is able to decrypt the ciphertext only if her attributes
satisfy the access policy in the ciphertext. CP-ABE can be viewed as a one-to-many public key
encryption scheme and hence enables a data owner to grant access to an unknown set of users.
Nonetheless, existing CP-ABE schemes merely deliver one encrypted message per ciphertext to
all authorized users and are not optimal for efficient sharing of scalable media.
DISADVANTAGES OF EXISTING SYSTEM:
 In an existing system solution is flexible, but it is vulnerable to collusion attack.
 The existing method is to classify users into different roles based on their attributes, assign
role keys to users, and then encrypt the content using the role keys. However, this approach
results in high complexity.
 Existing CP-ABE schemes merely deliver one encrypted message per ciphertext to all
authorized users and are not optimal for efficient sharing of scalable media.
PROPOSED SYSTEM:
In this paper we present an access control scheme for scalable media. The scheme has several
benefits which make it especially suitable for content delivery. For example, it is extremely
scalable by allowing a data owner to grant data access privileges based on the data consumers’
attributes (e.g., age, nationality, gender) rather than an explicit list of user names; and it ensures
data privacy and exclusiveness of access of scalable media by employing attribute-based
encryption. For this purpose, we introduce a novel Multi-message Ciphertext Policy
AttributeBased Encryption (MCP-ABE) technique. MCP-ABE encrypts multiple messages
within one ciphertext so as to enforceflexible attribute-based access control on scalable media.
Specifically, the scheme constructs a key graph which matches users’ access privileges,
encrypts media units with the corresponding keys, and then encrypts the key graph with MCP-
ABE; only those data consumers with the required user attributes can decrypt the encryption of
the key (sub) graph and then decrypt the encrypted media units. To cater for resource-limited
mobile devices, the scheme offloads computational intensive operations to cloud servers while
without compromising user data privacy.
ADVANTAGES OF PROPOSED SYSTEM:
 The present scheme is also secure against user collusion attacks due to use of attribute-
based encryption.
 The experiments demonstrate that the present scheme is applicable on smartphone,
especially when a cloud platform is available.
 We present an access control scheme for scalable media. The scheme has several benefits
which make it especially suitable for content delivery
SYSTEM ARCHITECTURE:
SYSTEM REQUIREMENTS:
HARDWARE REQUIREMENTS:
• System : Pentium IV 2.4 GHz.
• Hard Disk : 40 GB.
• Floppy Drive : 1.44 Mb.
• Monitor : 15 VGA Colour.
• Mouse : Logitech.
• Ram : 512 Mb.
SOFTWARE REQUIREMENTS:
• Operating system : - Windows XP.
• Coding Language : ASP.NET, C#.Net.
• Data Base : SQL Server 2005
REFERENCE:
Yongdong Wu, Zhuo Wei, and Robert H. Deng “Attribute-Based Access to Scalable Media in
Cloud-Assisted Content Sharing Networks”- IEEE TRANSACTIONS ON MULTIMEDIA,
VOL. 15, NO. 4, JUNE 2013.
CLOUING
DOMAIN: WIRELESS NETWORK PROJECTS

More Related Content

DOCX
Attribute based access to scalable media in cloud-assisted content sharing ne...
PDF
Securing broker less publish subscribe systems using identity-based encryption
DOCX
JPJ1449 Efficient Authentication for Mobile and Pervasive Computing
PDF
Ijcatr04051007
DOCX
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS Securing brokerless publish subs...
DOCX
Securing broker less publish subscribe systems using identity-based encryption
DOCX
Securing broker less publish subscribe systems using identity-based encryption
PPTX
Authentication on Cloud using Attribute Based Encryption
Attribute based access to scalable media in cloud-assisted content sharing ne...
Securing broker less publish subscribe systems using identity-based encryption
JPJ1449 Efficient Authentication for Mobile and Pervasive Computing
Ijcatr04051007
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS Securing brokerless publish subs...
Securing broker less publish subscribe systems using identity-based encryption
Securing broker less publish subscribe systems using identity-based encryption
Authentication on Cloud using Attribute Based Encryption

What's hot (15)

PPTX
Securing broker less publish subscribe systems using identity-based encryption
DOCX
Scalable Access Control For Privacy-Aware Media Sharing
DOCX
Access policy consolidation for event processing systems
DOCX
Access policy consolidation for event processing systems
DOCX
Secure Data Group Sharing and Conditional Dissemination with Multi-Owner in C...
DOC
Ieee 2014 java projects list
PDF
Secure Data Sharing Algorithm for Data Retrieval In Military Based Networks
DOCX
Attribute based encryption with verifiable outsourced decryption
DOCX
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
DOCX
Privacy preserving distributed profile matching in proximity-based mobile soc...
PDF
IRJET- Data Centric Access Control Solution with Role baesd Proxy Re-Encryption
DOCX
JPJ1435 Secure Data Retrieval For Decentralized Disruption-Tolerant Militar...
PDF
766 a secure-data-sharing-in-cloud-storage-with-independent-key-generation-ce...
PDF
Ieee 2015 2016
PDF
H0362052056
Securing broker less publish subscribe systems using identity-based encryption
Scalable Access Control For Privacy-Aware Media Sharing
Access policy consolidation for event processing systems
Access policy consolidation for event processing systems
Secure Data Group Sharing and Conditional Dissemination with Multi-Owner in C...
Ieee 2014 java projects list
Secure Data Sharing Algorithm for Data Retrieval In Military Based Networks
Attribute based encryption with verifiable outsourced decryption
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Privacy preserving distributed profile matching in proximity-based mobile soc...
IRJET- Data Centric Access Control Solution with Role baesd Proxy Re-Encryption
JPJ1435 Secure Data Retrieval For Decentralized Disruption-Tolerant Militar...
766 a secure-data-sharing-in-cloud-storage-with-independent-key-generation-ce...
Ieee 2015 2016
H0362052056
Ad

Viewers also liked (6)

PPTX
Selling a disney ticket with iTicket POS
PDF
Poste Ingenieur Support Client ip-label
PPTX
PDF
Young2
DOCX
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Attribute based access to scalable me...
PPTX
Interactieve workshop - maak veiligheid bespreekbaar in jouw organisatie
Selling a disney ticket with iTicket POS
Poste Ingenieur Support Client ip-label
Young2
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Attribute based access to scalable me...
Interactieve workshop - maak veiligheid bespreekbaar in jouw organisatie
Ad

Similar to DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Attribute based access to scalable media in cloud-assisted content sharing networks (20)

PDF
Acquisition of Secured Data from Cloud
PDF
Investigation on Revocable Fine-grained Access Control Scheme for Multi-Autho...
PDF
Application of CP-ABE Scheme in Data Sharing System for confidentiality
DOC
Hasbe a hierarchical attribute based solution for flexible and scalable acces...
PPTX
Secure data retrieval for decentralized disruption tolerant military networks
DOCX
expressive, efficient, and revocable data access control for multi authority ...
PDF
Access Policy Management For OSN Using Network Relationships
PPTX
Key aggregate cryptosystem for scalable data sharing in cloud storage
PDF
Cloud Computing Environment using Secured Access Control Technique
PPTX
Hasbe a hierarchical attribute based solution for flexible and scalable acces...
PDF
A Survey on Access Control Mechanisms using Attribute Based Encryption in cloud
DOCX
Privacy preserving delegated access control in public clouds
PDF
An Improved Integrated Hash and Attributed based Encryption Model on High Dim...
DOCX
Privacy preserving delegated access control in public clouds
DOCX
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Privacy preserving delegated access con...
PDF
Some Studies on Protection for the Hidden Attribute Based Signatures without ...
DOCX
JPJ1407 Expressive, Efficient, and Revocable Data Access Control for Multi-...
PDF
survey paper on cp abe cloud computing
PDF
Circuit Ciphertext-policy Attribute-based Hybrid Encryption with Verifiable D...
PDF
Access Control and Revocation for Digital Assets on Cloud with Consideration ...
Acquisition of Secured Data from Cloud
Investigation on Revocable Fine-grained Access Control Scheme for Multi-Autho...
Application of CP-ABE Scheme in Data Sharing System for confidentiality
Hasbe a hierarchical attribute based solution for flexible and scalable acces...
Secure data retrieval for decentralized disruption tolerant military networks
expressive, efficient, and revocable data access control for multi authority ...
Access Policy Management For OSN Using Network Relationships
Key aggregate cryptosystem for scalable data sharing in cloud storage
Cloud Computing Environment using Secured Access Control Technique
Hasbe a hierarchical attribute based solution for flexible and scalable acces...
A Survey on Access Control Mechanisms using Attribute Based Encryption in cloud
Privacy preserving delegated access control in public clouds
An Improved Integrated Hash and Attributed based Encryption Model on High Dim...
Privacy preserving delegated access control in public clouds
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Privacy preserving delegated access con...
Some Studies on Protection for the Hidden Attribute Based Signatures without ...
JPJ1407 Expressive, Efficient, and Revocable Data Access Control for Multi-...
survey paper on cp abe cloud computing
Circuit Ciphertext-policy Attribute-based Hybrid Encryption with Verifiable D...
Access Control and Revocation for Digital Assets on Cloud with Consideration ...

More from IEEEGLOBALSOFTTECHNOLOGIES (20)

DOCX
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Vampire attacks draining life from w...
DOCX
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT SSD a robust rf location fingerprint...
DOCX
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Privacy preserving distributed profi...
DOCX
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Optimal multicast capacity and delay...
DOCX
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT On the real time hardware implementa...
DOCX
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Model based analysis of wireless sys...
DOCX
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Mobile relay configuration in data i...
DOCX
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Distributed cooperative caching in s...
DOCX
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Delay optimal broadcast for multihop...
DOCX
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Dcim distributed cache invalidation ...
DOCX
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Cooperative packet delivery in hybri...
DOCX
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Content sharing over smartphone base...
DOCX
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Community aware opportunistic routin...
DOCX
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Capacity of hybrid wireless mesh net...
DOCX
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Adaptive position update for geograp...
DOCX
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT A scalable server architecture for m...
DOCX
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Scalable and secure sharing of person...
DOCX
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Qos ranking prediction for cloud serv...
DOCX
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Privacy preserving public auditing fo...
DOCX
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Facilitating document annotation usin...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Vampire attacks draining life from w...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT SSD a robust rf location fingerprint...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Privacy preserving distributed profi...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Optimal multicast capacity and delay...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT On the real time hardware implementa...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Model based analysis of wireless sys...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Mobile relay configuration in data i...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Distributed cooperative caching in s...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Delay optimal broadcast for multihop...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Dcim distributed cache invalidation ...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Cooperative packet delivery in hybri...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Content sharing over smartphone base...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Community aware opportunistic routin...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Capacity of hybrid wireless mesh net...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Adaptive position update for geograp...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT A scalable server architecture for m...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Scalable and secure sharing of person...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Qos ranking prediction for cloud serv...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Privacy preserving public auditing fo...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Facilitating document annotation usin...

Recently uploaded (20)

PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PPT
Teaching material agriculture food technology
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Encapsulation theory and applications.pdf
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Spectral efficient network and resource selection model in 5G networks
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Modernizing your data center with Dell and AMD
PDF
NewMind AI Monthly Chronicles - July 2025
PDF
Approach and Philosophy of On baking technology
PDF
Machine learning based COVID-19 study performance prediction
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
The AUB Centre for AI in Media Proposal.docx
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Teaching material agriculture food technology
Building Integrated photovoltaic BIPV_UPV.pdf
20250228 LYD VKU AI Blended-Learning.pptx
Dropbox Q2 2025 Financial Results & Investor Presentation
Encapsulation theory and applications.pdf
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Unlocking AI with Model Context Protocol (MCP)
Spectral efficient network and resource selection model in 5G networks
Digital-Transformation-Roadmap-for-Companies.pptx
Network Security Unit 5.pdf for BCA BBA.
Modernizing your data center with Dell and AMD
NewMind AI Monthly Chronicles - July 2025
Approach and Philosophy of On baking technology
Machine learning based COVID-19 study performance prediction
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication

DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Attribute based access to scalable media in cloud-assisted content sharing networks

  • 1. Attribute-Based Access to Scalable Media in Cloud-Assisted Content Sharing Networks ABSTRACT: This paper presents a novel Multi-message Ciphertext Policy Attribute-Based Encryption (MCP-ABE) technique, and employs the MCP-ABE to design an access control scheme for sharing scalable media based on data consumers’ attributes (e.g., age, nationality, or gender)rather than an explicit list of the consumers’ names. The scheme is efficient and flexible because MCP-ABE allows a content provider to specify an access policy and encrypt multiple messages within one Ciphertext such that only the users whose attributes satisfy the access policy can decrypt the Ciphertext. Moreover, the paper shows how to support resource-limited mobile devices by offloading computational intensive operations to cloud servers while without compromising data privacy EXISTING SYSTEM: A promising approach to access control in content sharing services is to empower users to enforce access controls on their data directly, rather than through a central administrator. However, this requires flexible and scalable cryptographic key management to support complex access control policies. A native access control solution is to assign one key for each user attribute, distribute the appropriate keys to users who have the corresponding attributes, and GLOBALSOFT TECHNOLOGIES IEEE PROJECTS & SOFTWARE DEVELOPMENTS IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401 Visit: www.finalyearprojects.org Mail to:ieeefinalsemprojects@gmail.com
  • 2. encrypt the media with the attribute keys repeatedly Another method is to classify users into different roles based on their attributes, assign role keys to users, and then encrypt the content using the role keys. However, this approach results in high complexity, i.e., the number of keys for each user and the number of cipher texts for one message are on the order of where is the number of all possible user attributes. Both of these solutions suffer from the rigid and inflexible definition of the underlying access control policies. A remedy to this problem is employing Ciphertext Policy Attribute-Based Encryption (CP-ABE). In CP-ABE, a Ciphertext is embedded with an access control policy, or access policy for short, associated with user attributes. A recipient of the ciphertext is able to decrypt the ciphertext only if her attributes satisfy the access policy in the ciphertext. CP-ABE can be viewed as a one-to-many public key encryption scheme and hence enables a data owner to grant access to an unknown set of users. Nonetheless, existing CP-ABE schemes merely deliver one encrypted message per ciphertext to all authorized users and are not optimal for efficient sharing of scalable media. DISADVANTAGES OF EXISTING SYSTEM:  In an existing system solution is flexible, but it is vulnerable to collusion attack.  The existing method is to classify users into different roles based on their attributes, assign role keys to users, and then encrypt the content using the role keys. However, this approach results in high complexity.  Existing CP-ABE schemes merely deliver one encrypted message per ciphertext to all authorized users and are not optimal for efficient sharing of scalable media. PROPOSED SYSTEM: In this paper we present an access control scheme for scalable media. The scheme has several benefits which make it especially suitable for content delivery. For example, it is extremely scalable by allowing a data owner to grant data access privileges based on the data consumers’ attributes (e.g., age, nationality, gender) rather than an explicit list of user names; and it ensures data privacy and exclusiveness of access of scalable media by employing attribute-based encryption. For this purpose, we introduce a novel Multi-message Ciphertext Policy
  • 3. AttributeBased Encryption (MCP-ABE) technique. MCP-ABE encrypts multiple messages within one ciphertext so as to enforceflexible attribute-based access control on scalable media. Specifically, the scheme constructs a key graph which matches users’ access privileges, encrypts media units with the corresponding keys, and then encrypts the key graph with MCP- ABE; only those data consumers with the required user attributes can decrypt the encryption of the key (sub) graph and then decrypt the encrypted media units. To cater for resource-limited mobile devices, the scheme offloads computational intensive operations to cloud servers while without compromising user data privacy. ADVANTAGES OF PROPOSED SYSTEM:  The present scheme is also secure against user collusion attacks due to use of attribute- based encryption.  The experiments demonstrate that the present scheme is applicable on smartphone, especially when a cloud platform is available.  We present an access control scheme for scalable media. The scheme has several benefits which make it especially suitable for content delivery
  • 4. SYSTEM ARCHITECTURE: SYSTEM REQUIREMENTS: HARDWARE REQUIREMENTS: • System : Pentium IV 2.4 GHz. • Hard Disk : 40 GB. • Floppy Drive : 1.44 Mb.
  • 5. • Monitor : 15 VGA Colour. • Mouse : Logitech. • Ram : 512 Mb. SOFTWARE REQUIREMENTS: • Operating system : - Windows XP. • Coding Language : ASP.NET, C#.Net. • Data Base : SQL Server 2005 REFERENCE: Yongdong Wu, Zhuo Wei, and Robert H. Deng “Attribute-Based Access to Scalable Media in Cloud-Assisted Content Sharing Networks”- IEEE TRANSACTIONS ON MULTIMEDIA, VOL. 15, NO. 4, JUNE 2013.