SlideShare a Scribd company logo
#13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, vellore – 6.
Off: 0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602,
Project Titles: http://shakastech.weebly.com/2015-2016-titles
Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com
CONTROL CLOUD DATA ACCESS PRIVILEGE AND ANONYMITY WITH FULLY
ANONYMOUS ATTRIBUTE-BASED ENCRYPTION
ABSTRACT:
Cloud computing is a revolutionary computing paradigm, which enables flexible, on-
demand, and low-cost usage of computing resources, but the data is outsourced to some cloud
servers, and various privacy concerns emerge from it. Various schemes based on the attribute-
based encryption have been proposed to secure the cloud storage. However, most work focuses
on the data contents privacy and the access control, while less attention is paid to the privilege
control and the identity privacy. In this paper, we present a semi anonymous privilege control
scheme Anony Control to address not only the data privacy, but also the user identity privacy in
existing access control schemes. Annoy Control decentralizes the central authority to limit the
identity leakage and thus achieves semi anonymity. Besides, it also generalizes the file access
control to the privilege control, by which privileges of all operations on the cloud data can be
managed in a fine-grained manner. Subsequently, we present the Anony Control-F, which fully
prevents the identity leakage and achieve the full anonymity. Our security analysis shows that
both AnonyControl and AnonyControl-F are secure under the decisional bilinear Diffie–Hellman
assumption, and our performance evaluation exhibits the feasibility of our schemes.
#13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, vellore – 6.
Off: 0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602,
Project Titles: http://shakastech.weebly.com/2015-2016-titles
Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com
EXISTING SYSTEM:
Identity-based encryption (IBE) was first introduced by Shamir, in which the sender of a
message can specify an identity such that only a receiver with matching identity can decrypt it.
Few years later, Fuzzy Identity-Based Encryption is proposed, which is also known as Attribute-
Based Encryption (ABE). In such encryption scheme, an identity is viewed as a set of descriptive
attributes, and decryption is possible if a decrypter’s identity has some overlaps with the one
specified in the cipher text. Soon after, more general tree-based ABE schemes, Key-Policy
Attribute- Based Encryption (KP-ABE) and Cipher text-Policy Attribute-Based Encryption (CP-
ABE), are presented to express more general condition than simple ‘overlap’. They are
counterparts to each other in the sense that the decision of encryption policy (who can or cannot
decrypt the message) is made by different parties.
PROPOSED SYSTEM:
A user can decrypt the ciphertext if and only if the access tree in his private key is
satisfied by the attributes in the ciphertext. However, the encryption policy is described in the
keys, so the encrypter does not have entire control over the encryption policy. He has to trust that
the key generators issue keys with correct structures to correct users.
#13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, vellore – 6.
Off: 0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602,
Project Titles: http://shakastech.weebly.com/2015-2016-titles
Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com
Hardware Requirements:
• System : Pentium IV 2.4 GHz.
• Hard Disk : 40 GB.
• Floppy Drive : 1.44 Mb.
• Monitor : 15 VGA Colour.
• Mouse : Logitech.
• RAM : 256 Mb.
Software Requirements:
• Operating system : - Windows XP.
• Front End : - JSP
• Back End : - SQL Server

More Related Content

PPTX
Hashing vs Encryption vs Encoding
PPTX
Cryptography
DOCX
Audit free cloud storage via deniable attribute-based encryption
DOCX
Audit free cloud storage via deniable attribute-based encryption
PPTX
Data encryption
PPTX
10 system.security.cryptography
PDF
CAN BLOCKCHAIN PRIVATE KEY BE HACKED?
PDF
Week 12 slide
Hashing vs Encryption vs Encoding
Cryptography
Audit free cloud storage via deniable attribute-based encryption
Audit free cloud storage via deniable attribute-based encryption
Data encryption
10 system.security.cryptography
CAN BLOCKCHAIN PRIVATE KEY BE HACKED?
Week 12 slide

What's hot (16)

PPTX
Data Encryption : A Powerful and an Approachable Technology!
PPT
Encryption technology
PDF
Privacy preserving ciphertext multi-sharing control for big data storage
PDF
Privacy preserving ciphertext multi-sharing control for big data storage
PDF
s117
PPTX
What is Hashing And Digital Signature In Blockchain?
PDF
Contributory broadcast encryption with efficient encryption and short ciphert...
PDF
Sw2 week12
PDF
PDF
Sp W12
DOCX
Audit free cloud storage via deniable attribute based encryption
DOCX
Attribute based access to scalable media in cloud-assisted content sharing ne...
PPTX
Dissemination of knowledge on Secure Systems Engineering
PPTX
Data encryption
DOCX
Comments on “mabs multicast authentication based on batch signature”
PDF
Sw week12
Data Encryption : A Powerful and an Approachable Technology!
Encryption technology
Privacy preserving ciphertext multi-sharing control for big data storage
Privacy preserving ciphertext multi-sharing control for big data storage
s117
What is Hashing And Digital Signature In Blockchain?
Contributory broadcast encryption with efficient encryption and short ciphert...
Sw2 week12
Sp W12
Audit free cloud storage via deniable attribute based encryption
Attribute based access to scalable media in cloud-assisted content sharing ne...
Dissemination of knowledge on Secure Systems Engineering
Data encryption
Comments on “mabs multicast authentication based on batch signature”
Sw week12
Ad

Viewers also liked (15)

DOCX
CONTROL CLOUD DATA ACCESS PRIVILEGE AND ANONYMITY WITH FULLY ANONYMOUS ATTRIB...
PDF
EWOS boost og lus
PPTX
Mapa conceptual Daniel Porras
PDF
Study of current pattern of Cervical Spondylotic Myelopathy and to evaluate t...
PDF
يهود مصر منذ الخروج الاول الي الخروج الثاني
PDF
Care for Business Feb 2015
PDF
endeling+FORUM
PPTX
Mahtani Group of Companies brings happiness to Luapula
PDF
Diploma Transcript 1
DOC
An efficient certificate less encryption for
PDF
/رسالة دكتوراه / أوقاف الحرمين الشريفين في العصر المملوكي ( 648 923هـ 1250...
PPTX
WWF Animal Conservation Presentation
DOC
DOC
As revision 99 qs
PPTX
Hidrostática
CONTROL CLOUD DATA ACCESS PRIVILEGE AND ANONYMITY WITH FULLY ANONYMOUS ATTRIB...
EWOS boost og lus
Mapa conceptual Daniel Porras
Study of current pattern of Cervical Spondylotic Myelopathy and to evaluate t...
يهود مصر منذ الخروج الاول الي الخروج الثاني
Care for Business Feb 2015
endeling+FORUM
Mahtani Group of Companies brings happiness to Luapula
Diploma Transcript 1
An efficient certificate less encryption for
/رسالة دكتوراه / أوقاف الحرمين الشريفين في العصر المملوكي ( 648 923هـ 1250...
WWF Animal Conservation Presentation
As revision 99 qs
Hidrostática
Ad

Similar to Control cloud data access privilege and anonymity with fully (20)

PDF
Control cloud data access privilege and anonymity with fully anonymous attrib...
PDF
Control cloud data access privilege and anonymity with fully anonymous attri...
PPTX
A Fully Anonymous Attribute-Based Encryption to Control Cloud Data Access and...
DOCX
CONTROL CLOUD DATA ACCESS PRIVILEGE AND ANONYMITY WITH FULLY ANONYMOUS ATTRIB...
DOCX
Control cloud data access privilege and anonymity with fully anonymous attrib...
DOCX
Control cloud data access privilege and anonymity with fully anonymous attrib...
DOCX
Control cloud-data-access-privilege-and-anonymity-with-fully-anonymous-attrib...
PDF
Control Cloud Data Access Using Attribute-Based Encryption
PDF
Control Cloud Data Access Privilege and Anonymity with Fully Anonymous Attrib...
PDF
Control Cloud Data Access Privilege and Anonymity with Fully Anonymous Attrib...
PDF
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...
PDF
Attribute Based Encryption with Attribute Hiding in Cloud Storage
DOCX
Control cloud data access privilege and
PDF
Analysis of classical encryption techniques in cloud computing
PPTX
Cyber security workshop talk.pptx
DOCX
Audit free cloud storage via deniable attribute-based encryption
DOCX
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
DOCX
Decentralized access control with anonymous authentication of data stored in ...
PPTX
Attribute Based Encryption with Privacy Preserving In Clouds
DOCX
Circuit ciphertext policy attribute-based hybrid encryption with verifiable d...
Control cloud data access privilege and anonymity with fully anonymous attrib...
Control cloud data access privilege and anonymity with fully anonymous attri...
A Fully Anonymous Attribute-Based Encryption to Control Cloud Data Access and...
CONTROL CLOUD DATA ACCESS PRIVILEGE AND ANONYMITY WITH FULLY ANONYMOUS ATTRIB...
Control cloud data access privilege and anonymity with fully anonymous attrib...
Control cloud data access privilege and anonymity with fully anonymous attrib...
Control cloud-data-access-privilege-and-anonymity-with-fully-anonymous-attrib...
Control Cloud Data Access Using Attribute-Based Encryption
Control Cloud Data Access Privilege and Anonymity with Fully Anonymous Attrib...
Control Cloud Data Access Privilege and Anonymity with Fully Anonymous Attrib...
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...
Attribute Based Encryption with Attribute Hiding in Cloud Storage
Control cloud data access privilege and
Analysis of classical encryption techniques in cloud computing
Cyber security workshop talk.pptx
Audit free cloud storage via deniable attribute-based encryption
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Decentralized access control with anonymous authentication of data stored in ...
Attribute Based Encryption with Privacy Preserving In Clouds
Circuit ciphertext policy attribute-based hybrid encryption with verifiable d...

More from Shakas Technologies (20)

DOCX
A Review on Deep-Learning-Based Cyberbullying Detection
DOCX
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
DOCX
A Novel Framework for Credit Card.
DOCX
A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...
DOCX
NS2 Final Year Project Titles 2023- 2024
DOCX
MATLAB Final Year IEEE Project Titles 2023-2024
DOCX
Latest Python IEEE Project Titles 2023-2024
DOCX
EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...
DOCX
CYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSE
DOCX
Detecting Mental Disorders in social Media through Emotional patterns-The cas...
DOCX
COMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTION
DOCX
CO2 EMISSION RATING BY VEHICLES USING DATA SCIENCE
DOCX
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
DOCX
Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...
DOCX
Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...
DOCX
Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...
DOCX
Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...
DOCX
Fighting Money Laundering With Statistics and Machine Learning.docx
DOCX
Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...
DOCX
Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...
A Review on Deep-Learning-Based Cyberbullying Detection
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
A Novel Framework for Credit Card.
A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...
NS2 Final Year Project Titles 2023- 2024
MATLAB Final Year IEEE Project Titles 2023-2024
Latest Python IEEE Project Titles 2023-2024
EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...
CYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSE
Detecting Mental Disorders in social Media through Emotional patterns-The cas...
COMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTION
CO2 EMISSION RATING BY VEHICLES USING DATA SCIENCE
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...
Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...
Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...
Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...
Fighting Money Laundering With Statistics and Machine Learning.docx
Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...
Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...

Recently uploaded (20)

DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PPTX
MYSQL Presentation for SQL database connectivity
PPTX
Big Data Technologies - Introduction.pptx
PDF
KodekX | Application Modernization Development
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Electronic commerce courselecture one. Pdf
PDF
Approach and Philosophy of On baking technology
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Encapsulation theory and applications.pdf
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Encapsulation_ Review paper, used for researhc scholars
The AUB Centre for AI in Media Proposal.docx
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Diabetes mellitus diagnosis method based random forest with bat algorithm
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
MYSQL Presentation for SQL database connectivity
Big Data Technologies - Introduction.pptx
KodekX | Application Modernization Development
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
“AI and Expert System Decision Support & Business Intelligence Systems”
Dropbox Q2 2025 Financial Results & Investor Presentation
Electronic commerce courselecture one. Pdf
Approach and Philosophy of On baking technology
Chapter 3 Spatial Domain Image Processing.pdf
Mobile App Security Testing_ A Comprehensive Guide.pdf
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Encapsulation theory and applications.pdf
Programs and apps: productivity, graphics, security and other tools
Encapsulation_ Review paper, used for researhc scholars

Control cloud data access privilege and anonymity with fully

  • 1. #13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, vellore – 6. Off: 0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602, Project Titles: http://shakastech.weebly.com/2015-2016-titles Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com CONTROL CLOUD DATA ACCESS PRIVILEGE AND ANONYMITY WITH FULLY ANONYMOUS ATTRIBUTE-BASED ENCRYPTION ABSTRACT: Cloud computing is a revolutionary computing paradigm, which enables flexible, on- demand, and low-cost usage of computing resources, but the data is outsourced to some cloud servers, and various privacy concerns emerge from it. Various schemes based on the attribute- based encryption have been proposed to secure the cloud storage. However, most work focuses on the data contents privacy and the access control, while less attention is paid to the privilege control and the identity privacy. In this paper, we present a semi anonymous privilege control scheme Anony Control to address not only the data privacy, but also the user identity privacy in existing access control schemes. Annoy Control decentralizes the central authority to limit the identity leakage and thus achieves semi anonymity. Besides, it also generalizes the file access control to the privilege control, by which privileges of all operations on the cloud data can be managed in a fine-grained manner. Subsequently, we present the Anony Control-F, which fully prevents the identity leakage and achieve the full anonymity. Our security analysis shows that both AnonyControl and AnonyControl-F are secure under the decisional bilinear Diffie–Hellman assumption, and our performance evaluation exhibits the feasibility of our schemes.
  • 2. #13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, vellore – 6. Off: 0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602, Project Titles: http://shakastech.weebly.com/2015-2016-titles Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com EXISTING SYSTEM: Identity-based encryption (IBE) was first introduced by Shamir, in which the sender of a message can specify an identity such that only a receiver with matching identity can decrypt it. Few years later, Fuzzy Identity-Based Encryption is proposed, which is also known as Attribute- Based Encryption (ABE). In such encryption scheme, an identity is viewed as a set of descriptive attributes, and decryption is possible if a decrypter’s identity has some overlaps with the one specified in the cipher text. Soon after, more general tree-based ABE schemes, Key-Policy Attribute- Based Encryption (KP-ABE) and Cipher text-Policy Attribute-Based Encryption (CP- ABE), are presented to express more general condition than simple ‘overlap’. They are counterparts to each other in the sense that the decision of encryption policy (who can or cannot decrypt the message) is made by different parties. PROPOSED SYSTEM: A user can decrypt the ciphertext if and only if the access tree in his private key is satisfied by the attributes in the ciphertext. However, the encryption policy is described in the keys, so the encrypter does not have entire control over the encryption policy. He has to trust that the key generators issue keys with correct structures to correct users.
  • 3. #13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, vellore – 6. Off: 0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602, Project Titles: http://shakastech.weebly.com/2015-2016-titles Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com Hardware Requirements: • System : Pentium IV 2.4 GHz. • Hard Disk : 40 GB. • Floppy Drive : 1.44 Mb. • Monitor : 15 VGA Colour. • Mouse : Logitech. • RAM : 256 Mb. Software Requirements: • Operating system : - Windows XP. • Front End : - JSP • Back End : - SQL Server