SlideShare a Scribd company logo
ISSN 2350-1022
International Journal of Recent Research in Mathematics Computer Science and Information Technology
Vol. 2, Issue 2, pp: (44-47), Month: October 2015 – March 2016, Available at: www.paperpublications.org
Page | 44
Paper Publications
Control Cloud Data Access Using Attribute-
Based Encryption
1
Shinde Rupali R, 2
Mane Manisha B, 3
Malkhede Pallavi D, 4
Karavade Rupali M,
5
Prof. Sahane Prema B
1,2,3,4
BE Computer Engineering, Pune.
5
Assistant Professor in PKTC, Chakan
Abstract: Cloud computing is a revolutionary computing paradigm which enables flexible, on-demand and low-cost
usage of computing resources. Those advantages, ironically, are the causes of security and privacy problems,
which emerge because the data owned by different users are stored in some cloud servers instead of under their
own control. To deal with security problems, various schemes based on the Attribute-Based Encryption have been
proposed recently. Data access control is an effective way to ensure the data security in the cloud. However, due to
data outsourcing and untrusted cloud servers, the data access control becomes a challenging issue in cloud storage
systems. Data security is the key concern in the distributed system. Various schemes based on the attribute-based
encryption have been proposed to secure the cloud storage. However, most work focuses on the data contents
privacy and the access control, while less attention is paid to the privilege control and the identity privacy. In this
paper, we present a semianonymous privilege control scheme AnonyControl to address not only the data privacy,
but also the user identity privacy in existing access control schemes. AnonyControl decentralizes the central
authority to limit the identity leakage and thus achieves semianonymity. Besides, it also generalizes the file access
control to the privilege control, by which privileges of all operations on the cloud data can be managed in a fine-
grained manner. Subsequently, we present the AnonyControl-F, which fully prevents the identity leakage and
achieve the full anonymity. Our security analysis shows that both AnonyControl and AnonyControl-F are secure
under the decisional bilinear Diffie–Hellman assumption, and our performance evaluation exhibits the feasibility
of our schemes.
Keywords: Anonymity, multi-authority, attribute-based encryption.
I. INTRODUCTION
CLOUD computing is a revolutionary computing technique, by which computing resources are provided dynamically via
Internet and the data storage and computation are outsourced to someone or some party in a „cloud‟. It greatly attracts
attention and interest from both academia and industry due to the profitability, but it also has at least three challenges that
must be handled before coming to our real life to the best of our knowledge. First of all, data confidentiality should be
guaranteed. The data privacy is not only about the data contents. Since the most attractive part of the cloud computing is
the computation outsourcing, it is far beyond enough to just conduct an access control. More likely, users want to control
the privileges of data manipulation over other users or cloud servers. This is because when sensitive information or
computation is outsourced to the cloud servers or another user, which is out of users‟ control in most cases, privacy risks
would rise dramatically because the servers might illegally inspect users‟ data and access sensitive information, or other
users might be able to infer sensitive information from the outsourced computation. Therefore, not only the access but
also the operation should be controlled. Secondly, personal information (defined by each user‟s attributes set) is at risk
because one‟s identity is authenticated based on his information for the purpose of access control (or privilege control in
this paper). As people are becoming more concerned about their identity privacy these days, the identity privacy also
needs to be protected before the cloud enters our life. Preferably, any authority or server alone should not know any
client‟s personal information. Last but not least, the cloud computing system should be resilient in the case of security
breach in which some part of the system is compromised by attackers.
ISSN 2350-1022
International Journal of Recent Research in Mathematics Computer Science and Information Technology
Vol. 2, Issue 2, pp: (44-47), Month: October 2015 – March 2016, Available at: www.paperpublications.org
Page | 45
Paper Publications
They are counterparts to each other in the sense that the decision of encryption policy (who can or cannot decrypt the
message) is made by different parties.
In the KP-ABE, a cipher text is associated with a set of attributes, and a private key is associated with a monotonic access
structure like a tree, which describes this user‟s identity (e.g. IIT AND (Ph.D. OR Master)). A user can decrypt the cipher
text if and only if the access tree in his private key is satisfied by the attributes in the cipher text. However, the encryption
policy is described in the keys, so the encrypted does not have entire control over the encryption policy. He has to trust
that the key generators issue keys with correct structures to correct users. Furthermore, when are-encryption occurs, all of
the users in the same system must have their private keys re-issued so as to gain access to there-encrypted files, and this
process causes considerable problems in implementation. On the other hand, those problems and overhead are all solved
in the CP-ABE [. In the CP-ABE, cipher texts are created with an access structure, which specifies the encryption policy,
and private keys are generated according to users‟ attributes. A user can decrypt the cipher text if and only if his attributes
in the private key satisfy the access tree specified in the cipher text. By doing so, the encrypted holds the ultimate
authority about the encryption policy. Also, the already issued private keys will never be modified unless the whole
system reboots.
II. LITERATURE SURVEY
K. Yang, X. Jia, K. Ren, and B. Zhang[4] This paper describes Data access control is an effective way to ensure the data
security in the cloud. However, due to data outsourcing and untrusted cloud servers, the data access control becomes a
challenging issue in cloud storage systems.
W.-G. Tzeng [5], This paper describes propose efficient and secure (string) oblivious transfer (OT1n ) schemes for any n
_ 2. We build our OT1 n scheme from fundamental cryptographic techniques directly. The receiver‟s choice is
unconditionally secure and the secrecy of the unchosen secrets is based on the hardness of the decisional Diffie-Hellman
problem.
S. Yu, C. Wang, K. Ren, and W. Lou[5] This paper describes Personal health record (PHR) is an emerging patient-centric
model of health information exchange, which is often outsourced to be stored at a third party, such as cloud providers.
However, there have been wide privacy concerns as personal health information could be exposed to those third party
servers and to unauthorized parties.
A. Shamir, [1] This paper introduce a novel type of cryptographic scheme, which enables any pair of users to
communicate securely and to verify each other 's signatures without exchanging private or public keys, without keeping
key directories , and without using the services of a third party. The scheme assumes t h e existence of trusted key
generation centers, whose sole purpose is t o give each user a personalized smart card v when he first join st he network.
A. Sahai and B. Waters,[2] This paper introduce a new type of Identity-Based Encryption (IBE) scheme that we call
Fuzzy Identity-Based Encryption. In Fuzzy IBE we view an identity as set of descriptive attributes. A Fuzzy IBE scheme
allows for a private key for an identity, ω, to decrypt a ciphertext encrypted with an identity, ω_ , if and only if the
identities ω and ω are close to each other as measured by the “set overlap” distance metric.
V. Goyal, O. Pandey, A. Sahai, and B. Waters,[3] This paper describes As more sensitive data is shared and stored by
third-party sites on the Internet, there will be a need to encrypt data stored at these sites. One drawback of encrypting data,
is that it can be selectively shared only at a coarse-grained level(i.e., giving another party your private key). We develop a
new cryptosystem for fine-grained sharing of encrypted data that we call Key-Policy Attribute-Based Encryption
(KPABE).
III. PROPOSED WORK
In this scheme Various schemes based on the attribute-based encryption have been proposed to secure the cloud storage.
Various techniques have been proposed to protect the data contents privacy via access control. we propose AnonyControl
and AnonyControl-F (Fig. 1) to allow cloud servers to control users‟ access privileges without knowing their identity
information.
ISSN 2350-1022
International Journal of Recent Research in Mathematics Computer Science and Information Technology
Vol. 2, Issue 2, pp: (44-47), Month: October 2015 – March 2016, Available at: www.paperpublications.org
Page | 46
Paper Publications
They will follow our proposed protocol in general, but try to find out as much information as possible individually .The
proposed schemes are able to protect user‟s privacy against each single authority. Partial information is disclosed in
AnonyControl and no information is disclosed in AnonyControl-F. We firstly implement the real toolkit of a
multiauthority based encryption scheme AnonyControl and AnonyControl-F.
Fig 1.1: architecture of system
Implementation:
Implementation is the stage of the project when the theoretical design is turned out into a working system. Thus it can be
considered to be the most critical stage in achieving a successful new system and in giving the user, confidence that the
new system will work and be effective. The implementation stage involves careful planning, investigation of the existing
system and it‟s constraints on implementation, designing of methods to achieve changeover and evaluation of changeover
methods.
Module description:
Number of Modules
After careful analysis the system has been identified to have the following modules:
1. Registration based Social Authentication Module
2. Security Module Attribute-based encryption module.
3. Multi-authority module.
1. Registration -Based Social Authentication Module:
The system prepares trustees for a user Alice in this phase. Specifically, Alice is first authenticated with her main
authenticator (i.e., password),and then a few(e.g., 5) friends, who also have accounts in the system, are selected by either
Alice herself or the service provider from Alice‟s friend list and are appointed as Alice‟s Registration.
2. Security Module:
Authentication is essential for securing your account and preventing spoofed messages from damaging your online
reputation. Imagine a phishing email being sent from your mail because someone had forged your information. Angry
recipients and spam complaints resulting from it become your mess to clean up, in order to repair your reputation. trustee-
based social authentication systems ask users to select their own trustees without any constraint. In our experiments (i.e.,
Section VII), we show that the service provider can constrain trustee selections via imposing that no users are selected as
trustees by too many other users, which can achieve better security guarantees.
ISSN 2350-1022
International Journal of Recent Research in Mathematics Computer Science and Information Technology
Vol. 2, Issue 2, pp: (44-47), Month: October 2015 – March 2016, Available at: www.paperpublications.org
Page | 47
Paper Publications
3. Attribute-based encryption module:
Attribute-based encryption module is using for each and every node encrypt data store. After encrypted data and again the
re-encrypted the same data is using for fine-grain concept using user data uploaded. the attribute-based encryption have
been proposed to secure the cloud storage. Attribute-Based Encryption (ABE). In such encryption scheme, an identity is
viewed as a set of descriptive attributes, and decryption is possible if a decrypter‟s identity has some overlaps with the one
specified in the ciphertext.
4. Multi-authority module:
A multi-authority system is presented in which each user has an id and they can interact with each key generator
(authority) using different pseudonyms. Our goal is to achieve a multi-authority CP-ABE which achieves the security
defined above; guarantees the confidentiality of Data Consumers‟ identity information; and tolerates compromise attacks
on the authorities or the collusion attacks by the authorities. This is the first implementation of a multi-authority attribute
based encryption scheme.
III. CONCLUSIONS AND FUTURE WORK
This paper proposes a semi-anonymous attribute-based privilege control scheme AnonyControl and a fully-anonymous
attribute-based privilege control scheme AnonyControl-F to address the user privacy problem in a cloud storage
server.We also conducted detailed security and performance analysis which shows that Anony- Control both secure and
efficient for cloud storage system.
The AnonyControl-F directly inherits the security of the AnonyControl and thus is equivalently secure as it, but extra
communication overhead is incurred during the 1-out-of-n oblivious transfer. One of the promising future works is to
introduce the efficient user revocation mechanism on top of our anonymous ABE. Supporting user revocation is an
important issue in the real application, and this is a great challenge in the application of ABE schemes
ACKNOWLEDGMENT
The satisfaction that accompanies the successful completion of any task would be in-complete without mentioning the
people who make it possible. I am grateful to number of individuals, faculty members, whose professional guidance along
their encouragement have made it very pleasant endeavor to undertake this project. I have a great pleasure in presenting
the dissertation Control Cloud Data Access Using Attribute-Based Encryption under the guidance of Prof. Sahane
Prema B. for giving us the opportunity to work on this topic and their support and also all the teaching and non-teaching
staff of Computer Engineering Department for their encouragement, support and untiring cooperation. Finally I express
my sincere thanks to our parents, friends and all those who helped us directly or indirectly in many ways in completion of
this dissertation work.
REFERENCES
[1] Shamir, “Identity-based cryptosystems and signature schemes,”in Advances in Cryptology. Berlin, Germany:
Springer-Verlag, 1985, pp. 47–53.
[2] Sahai and B. Waters, “Fuzzy identity-based encryption,” in Advances in Cryptology. Berlin, Germany: Springer-
Verlag, 2005, pp. 457–473.
[3] V. Goyal, O. Pandey, A. Sahai, and B. Waters, “Attribute-based encryption for fine-grained access control of
encrypted data,” in Proc. 13thCCS, 2006, pp. 89–98.
[4] K. Yang, X. Jia, K. Ren, and B. Zhang, “DAC-MACS: Effective data access control for multi-authority cloud
storage systems,” in Proc. IEEE INFOCOM, Apr. 2013, pp. 2895–2903.
[5] W.-G. Tzeng, “Efficient 1-out-of-n oblivious transfer schemes with universally usable parameters,” IEEE Trans.
Comput., vol. 53, no. 2, pp. 232–240, Feb. 2004.
[6] M. Li, S. Yu, Y. Zheng, K. Ren, and W. Lou, “Scalable and secure sharing of personal health records in cloud
computing using attribute based encryption,” IEEE Trans. Parallel Distrib. Syst., vol. 24, no. 1, pp. 131–143, Jan.
2013.

More Related Content

PDF
Accessing secured data in cloud computing environment
PDF
A Survey on Access Control Mechanisms using Attribute Based Encryption in cloud
PDF
Attribute-Based Data Sharing
PDF
J018145862
PDF
Ijaiem 2014-11-30-122
PDF
Preserving Privacy Policy- Preserving public auditing for data in the cloud
PDF
Control Cloud Data Access Privilege and Anonymity with Fully Anonymous Attrib...
PPTX
Cloud assisted mobile-access of health data with privacy and auditability
Accessing secured data in cloud computing environment
A Survey on Access Control Mechanisms using Attribute Based Encryption in cloud
Attribute-Based Data Sharing
J018145862
Ijaiem 2014-11-30-122
Preserving Privacy Policy- Preserving public auditing for data in the cloud
Control Cloud Data Access Privilege and Anonymity with Fully Anonymous Attrib...
Cloud assisted mobile-access of health data with privacy and auditability

What's hot (19)

PDF
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
PDF
Cloud assisted mobile-access of health data with privacy and auditability
DOCX
Cloud assisted mobile-access of health data with privacy and auditability
PDF
PDF
Augmenting Publish/Subscribe System by Identity Based Encryption (IBE) Techni...
PDF
5.[40 44]enhancing security in cloud computing
DOCX
Cam cloud assisted privacy preserving mobile health monitoring
PDF
Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Co...
PDF
Iaetsd enhancement of performance and security in bigdata processing
PDF
A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...
PDF
International Journal of Computational Engineering Research(IJCER)
PDF
Secure Redundant Data Avoidance over Multi-Cloud Architecture.
PPTX
2nd rvw
DOCX
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
PDF
Data Partitioning In Cloud Storage Using DESD Crypto Technique
PDF
Iaetsd a novel approach to provide the security for distributed adaptive netw...
PDF
Secure system based on recombined fingerprints for sharing multimedia files i...
DOCX
Cost effective authentic and anonymous data sharing with forward security
PDF
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
Cloud assisted mobile-access of health data with privacy and auditability
Cloud assisted mobile-access of health data with privacy and auditability
Augmenting Publish/Subscribe System by Identity Based Encryption (IBE) Techni...
5.[40 44]enhancing security in cloud computing
Cam cloud assisted privacy preserving mobile health monitoring
Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Co...
Iaetsd enhancement of performance and security in bigdata processing
A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...
International Journal of Computational Engineering Research(IJCER)
Secure Redundant Data Avoidance over Multi-Cloud Architecture.
2nd rvw
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
Data Partitioning In Cloud Storage Using DESD Crypto Technique
Iaetsd a novel approach to provide the security for distributed adaptive netw...
Secure system based on recombined fingerprints for sharing multimedia files i...
Cost effective authentic and anonymous data sharing with forward security
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
Ad

Viewers also liked (20)

PDF
Wireless Charging for Multi-Node Using Wireless Charging Vehicle
PPT
Halloween
PPTX
Examen de computacion patricio an drade pasos para pintar el cabello
DOC
Assine aventuras na história saladino
PPT
Csc alunos
PPTX
Персонален брендинг
PDF
013fertilizantes[1]
PPT
大寶貝建築作品展
PDF
Contrato de compra e venda, afastamento de Cláusula arbitral
PDF
DE-Group.Microsoft Exchange
PPT
1228사례발표자료
PPTX
Segundo parcial
PPTX
Parcial 2 laura insaurralde avila
ODP
Presentación sobre gerena
PPT
40 Lecie Patrona PSP Olesnica
PPT
Jugoslovenska žena u digitalnoj Politici
PPT
Internet i istoriografija
PDF
Sci finder manual
PPTX
Billar
Wireless Charging for Multi-Node Using Wireless Charging Vehicle
Halloween
Examen de computacion patricio an drade pasos para pintar el cabello
Assine aventuras na história saladino
Csc alunos
Персонален брендинг
013fertilizantes[1]
大寶貝建築作品展
Contrato de compra e venda, afastamento de Cláusula arbitral
DE-Group.Microsoft Exchange
1228사례발표자료
Segundo parcial
Parcial 2 laura insaurralde avila
Presentación sobre gerena
40 Lecie Patrona PSP Olesnica
Jugoslovenska žena u digitalnoj Politici
Internet i istoriografija
Sci finder manual
Billar
Ad

Similar to Control Cloud Data Access Using Attribute-Based Encryption (20)

PDF
Control Cloud Data Access Privilege and Anonymity with Fully Anonymous Attrib...
PDF
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...
PDF
IRJET- Secure Cloud Data Using Attribute Based Encryption
PDF
IRJET- Integrity Verification and Attribute based Encryption for Cloud Storage
PDF
IRJET- Protecting E-Health Record with Data Sharing in Public Cloud
PDF
IRJET- A Review Paper on an Efficient File Hierarchy Attribute Based Encr...
DOCX
Control cloud data access privilege and
PDF
A Secure & Scalable Access Method in Cloud Computing
PDF
The Recent Trend: Vigorous unidentified validation access control system with...
PDF
Secure Data Sharing In an Untrusted Cloud
PDF
An Improved Integrated Hash and Attributed based Encryption Model on High Dim...
PDF
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
PDF
Volume 2-issue-6-2073-2076
PDF
Volume 2-issue-6-2073-2076
PDF
AN EFFICIENT FILE HIERARCHY ATTRIBUTE-BASED ENCRYPTION SCHEME IN CLOUD COMPUT...
PDF
Ieeepro techno solutions 2014 ieee java project - decentralized access cont...
PDF
Ieeepro techno solutions 2014 ieee dotnet project - decentralized access co...
PDF
Ieeepro techno solutions 2014 ieee dotnet project - decentralized access co...
PDF
A review on key aggregate cryptosystem for scalable data sharing in cloud sto...
PDF
IRJET- A Novel and Secure Approach to Control and Access Data in Cloud St...
Control Cloud Data Access Privilege and Anonymity with Fully Anonymous Attrib...
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...
IRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET- Integrity Verification and Attribute based Encryption for Cloud Storage
IRJET- Protecting E-Health Record with Data Sharing in Public Cloud
IRJET- A Review Paper on an Efficient File Hierarchy Attribute Based Encr...
Control cloud data access privilege and
A Secure & Scalable Access Method in Cloud Computing
The Recent Trend: Vigorous unidentified validation access control system with...
Secure Data Sharing In an Untrusted Cloud
An Improved Integrated Hash and Attributed based Encryption Model on High Dim...
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
Volume 2-issue-6-2073-2076
Volume 2-issue-6-2073-2076
AN EFFICIENT FILE HIERARCHY ATTRIBUTE-BASED ENCRYPTION SCHEME IN CLOUD COMPUT...
Ieeepro techno solutions 2014 ieee java project - decentralized access cont...
Ieeepro techno solutions 2014 ieee dotnet project - decentralized access co...
Ieeepro techno solutions 2014 ieee dotnet project - decentralized access co...
A review on key aggregate cryptosystem for scalable data sharing in cloud sto...
IRJET- A Novel and Secure Approach to Control and Access Data in Cloud St...

Recently uploaded (20)

PDF
Operating System & Kernel Study Guide-1 - converted.pdf
PDF
Arduino robotics embedded978-1-4302-3184-4.pdf
DOCX
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
PDF
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
PPTX
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
PDF
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
DOCX
573137875-Attendance-Management-System-original
PDF
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
PPTX
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
PPTX
Internet of Things (IOT) - A guide to understanding
PPTX
web development for engineering and engineering
PPTX
Sustainable Sites - Green Building Construction
PPT
Project quality management in manufacturing
PDF
composite construction of structures.pdf
PDF
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
PPTX
Geodesy 1.pptx...............................................
PDF
Model Code of Practice - Construction Work - 21102022 .pdf
PDF
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
PPTX
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
PPTX
OOP with Java - Java Introduction (Basics)
Operating System & Kernel Study Guide-1 - converted.pdf
Arduino robotics embedded978-1-4302-3184-4.pdf
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
573137875-Attendance-Management-System-original
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
Internet of Things (IOT) - A guide to understanding
web development for engineering and engineering
Sustainable Sites - Green Building Construction
Project quality management in manufacturing
composite construction of structures.pdf
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
Geodesy 1.pptx...............................................
Model Code of Practice - Construction Work - 21102022 .pdf
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
OOP with Java - Java Introduction (Basics)

Control Cloud Data Access Using Attribute-Based Encryption

  • 1. ISSN 2350-1022 International Journal of Recent Research in Mathematics Computer Science and Information Technology Vol. 2, Issue 2, pp: (44-47), Month: October 2015 – March 2016, Available at: www.paperpublications.org Page | 44 Paper Publications Control Cloud Data Access Using Attribute- Based Encryption 1 Shinde Rupali R, 2 Mane Manisha B, 3 Malkhede Pallavi D, 4 Karavade Rupali M, 5 Prof. Sahane Prema B 1,2,3,4 BE Computer Engineering, Pune. 5 Assistant Professor in PKTC, Chakan Abstract: Cloud computing is a revolutionary computing paradigm which enables flexible, on-demand and low-cost usage of computing resources. Those advantages, ironically, are the causes of security and privacy problems, which emerge because the data owned by different users are stored in some cloud servers instead of under their own control. To deal with security problems, various schemes based on the Attribute-Based Encryption have been proposed recently. Data access control is an effective way to ensure the data security in the cloud. However, due to data outsourcing and untrusted cloud servers, the data access control becomes a challenging issue in cloud storage systems. Data security is the key concern in the distributed system. Various schemes based on the attribute-based encryption have been proposed to secure the cloud storage. However, most work focuses on the data contents privacy and the access control, while less attention is paid to the privilege control and the identity privacy. In this paper, we present a semianonymous privilege control scheme AnonyControl to address not only the data privacy, but also the user identity privacy in existing access control schemes. AnonyControl decentralizes the central authority to limit the identity leakage and thus achieves semianonymity. Besides, it also generalizes the file access control to the privilege control, by which privileges of all operations on the cloud data can be managed in a fine- grained manner. Subsequently, we present the AnonyControl-F, which fully prevents the identity leakage and achieve the full anonymity. Our security analysis shows that both AnonyControl and AnonyControl-F are secure under the decisional bilinear Diffie–Hellman assumption, and our performance evaluation exhibits the feasibility of our schemes. Keywords: Anonymity, multi-authority, attribute-based encryption. I. INTRODUCTION CLOUD computing is a revolutionary computing technique, by which computing resources are provided dynamically via Internet and the data storage and computation are outsourced to someone or some party in a „cloud‟. It greatly attracts attention and interest from both academia and industry due to the profitability, but it also has at least three challenges that must be handled before coming to our real life to the best of our knowledge. First of all, data confidentiality should be guaranteed. The data privacy is not only about the data contents. Since the most attractive part of the cloud computing is the computation outsourcing, it is far beyond enough to just conduct an access control. More likely, users want to control the privileges of data manipulation over other users or cloud servers. This is because when sensitive information or computation is outsourced to the cloud servers or another user, which is out of users‟ control in most cases, privacy risks would rise dramatically because the servers might illegally inspect users‟ data and access sensitive information, or other users might be able to infer sensitive information from the outsourced computation. Therefore, not only the access but also the operation should be controlled. Secondly, personal information (defined by each user‟s attributes set) is at risk because one‟s identity is authenticated based on his information for the purpose of access control (or privilege control in this paper). As people are becoming more concerned about their identity privacy these days, the identity privacy also needs to be protected before the cloud enters our life. Preferably, any authority or server alone should not know any client‟s personal information. Last but not least, the cloud computing system should be resilient in the case of security breach in which some part of the system is compromised by attackers.
  • 2. ISSN 2350-1022 International Journal of Recent Research in Mathematics Computer Science and Information Technology Vol. 2, Issue 2, pp: (44-47), Month: October 2015 – March 2016, Available at: www.paperpublications.org Page | 45 Paper Publications They are counterparts to each other in the sense that the decision of encryption policy (who can or cannot decrypt the message) is made by different parties. In the KP-ABE, a cipher text is associated with a set of attributes, and a private key is associated with a monotonic access structure like a tree, which describes this user‟s identity (e.g. IIT AND (Ph.D. OR Master)). A user can decrypt the cipher text if and only if the access tree in his private key is satisfied by the attributes in the cipher text. However, the encryption policy is described in the keys, so the encrypted does not have entire control over the encryption policy. He has to trust that the key generators issue keys with correct structures to correct users. Furthermore, when are-encryption occurs, all of the users in the same system must have their private keys re-issued so as to gain access to there-encrypted files, and this process causes considerable problems in implementation. On the other hand, those problems and overhead are all solved in the CP-ABE [. In the CP-ABE, cipher texts are created with an access structure, which specifies the encryption policy, and private keys are generated according to users‟ attributes. A user can decrypt the cipher text if and only if his attributes in the private key satisfy the access tree specified in the cipher text. By doing so, the encrypted holds the ultimate authority about the encryption policy. Also, the already issued private keys will never be modified unless the whole system reboots. II. LITERATURE SURVEY K. Yang, X. Jia, K. Ren, and B. Zhang[4] This paper describes Data access control is an effective way to ensure the data security in the cloud. However, due to data outsourcing and untrusted cloud servers, the data access control becomes a challenging issue in cloud storage systems. W.-G. Tzeng [5], This paper describes propose efficient and secure (string) oblivious transfer (OT1n ) schemes for any n _ 2. We build our OT1 n scheme from fundamental cryptographic techniques directly. The receiver‟s choice is unconditionally secure and the secrecy of the unchosen secrets is based on the hardness of the decisional Diffie-Hellman problem. S. Yu, C. Wang, K. Ren, and W. Lou[5] This paper describes Personal health record (PHR) is an emerging patient-centric model of health information exchange, which is often outsourced to be stored at a third party, such as cloud providers. However, there have been wide privacy concerns as personal health information could be exposed to those third party servers and to unauthorized parties. A. Shamir, [1] This paper introduce a novel type of cryptographic scheme, which enables any pair of users to communicate securely and to verify each other 's signatures without exchanging private or public keys, without keeping key directories , and without using the services of a third party. The scheme assumes t h e existence of trusted key generation centers, whose sole purpose is t o give each user a personalized smart card v when he first join st he network. A. Sahai and B. Waters,[2] This paper introduce a new type of Identity-Based Encryption (IBE) scheme that we call Fuzzy Identity-Based Encryption. In Fuzzy IBE we view an identity as set of descriptive attributes. A Fuzzy IBE scheme allows for a private key for an identity, ω, to decrypt a ciphertext encrypted with an identity, ω_ , if and only if the identities ω and ω are close to each other as measured by the “set overlap” distance metric. V. Goyal, O. Pandey, A. Sahai, and B. Waters,[3] This paper describes As more sensitive data is shared and stored by third-party sites on the Internet, there will be a need to encrypt data stored at these sites. One drawback of encrypting data, is that it can be selectively shared only at a coarse-grained level(i.e., giving another party your private key). We develop a new cryptosystem for fine-grained sharing of encrypted data that we call Key-Policy Attribute-Based Encryption (KPABE). III. PROPOSED WORK In this scheme Various schemes based on the attribute-based encryption have been proposed to secure the cloud storage. Various techniques have been proposed to protect the data contents privacy via access control. we propose AnonyControl and AnonyControl-F (Fig. 1) to allow cloud servers to control users‟ access privileges without knowing their identity information.
  • 3. ISSN 2350-1022 International Journal of Recent Research in Mathematics Computer Science and Information Technology Vol. 2, Issue 2, pp: (44-47), Month: October 2015 – March 2016, Available at: www.paperpublications.org Page | 46 Paper Publications They will follow our proposed protocol in general, but try to find out as much information as possible individually .The proposed schemes are able to protect user‟s privacy against each single authority. Partial information is disclosed in AnonyControl and no information is disclosed in AnonyControl-F. We firstly implement the real toolkit of a multiauthority based encryption scheme AnonyControl and AnonyControl-F. Fig 1.1: architecture of system Implementation: Implementation is the stage of the project when the theoretical design is turned out into a working system. Thus it can be considered to be the most critical stage in achieving a successful new system and in giving the user, confidence that the new system will work and be effective. The implementation stage involves careful planning, investigation of the existing system and it‟s constraints on implementation, designing of methods to achieve changeover and evaluation of changeover methods. Module description: Number of Modules After careful analysis the system has been identified to have the following modules: 1. Registration based Social Authentication Module 2. Security Module Attribute-based encryption module. 3. Multi-authority module. 1. Registration -Based Social Authentication Module: The system prepares trustees for a user Alice in this phase. Specifically, Alice is first authenticated with her main authenticator (i.e., password),and then a few(e.g., 5) friends, who also have accounts in the system, are selected by either Alice herself or the service provider from Alice‟s friend list and are appointed as Alice‟s Registration. 2. Security Module: Authentication is essential for securing your account and preventing spoofed messages from damaging your online reputation. Imagine a phishing email being sent from your mail because someone had forged your information. Angry recipients and spam complaints resulting from it become your mess to clean up, in order to repair your reputation. trustee- based social authentication systems ask users to select their own trustees without any constraint. In our experiments (i.e., Section VII), we show that the service provider can constrain trustee selections via imposing that no users are selected as trustees by too many other users, which can achieve better security guarantees.
  • 4. ISSN 2350-1022 International Journal of Recent Research in Mathematics Computer Science and Information Technology Vol. 2, Issue 2, pp: (44-47), Month: October 2015 – March 2016, Available at: www.paperpublications.org Page | 47 Paper Publications 3. Attribute-based encryption module: Attribute-based encryption module is using for each and every node encrypt data store. After encrypted data and again the re-encrypted the same data is using for fine-grain concept using user data uploaded. the attribute-based encryption have been proposed to secure the cloud storage. Attribute-Based Encryption (ABE). In such encryption scheme, an identity is viewed as a set of descriptive attributes, and decryption is possible if a decrypter‟s identity has some overlaps with the one specified in the ciphertext. 4. Multi-authority module: A multi-authority system is presented in which each user has an id and they can interact with each key generator (authority) using different pseudonyms. Our goal is to achieve a multi-authority CP-ABE which achieves the security defined above; guarantees the confidentiality of Data Consumers‟ identity information; and tolerates compromise attacks on the authorities or the collusion attacks by the authorities. This is the first implementation of a multi-authority attribute based encryption scheme. III. CONCLUSIONS AND FUTURE WORK This paper proposes a semi-anonymous attribute-based privilege control scheme AnonyControl and a fully-anonymous attribute-based privilege control scheme AnonyControl-F to address the user privacy problem in a cloud storage server.We also conducted detailed security and performance analysis which shows that Anony- Control both secure and efficient for cloud storage system. The AnonyControl-F directly inherits the security of the AnonyControl and thus is equivalently secure as it, but extra communication overhead is incurred during the 1-out-of-n oblivious transfer. One of the promising future works is to introduce the efficient user revocation mechanism on top of our anonymous ABE. Supporting user revocation is an important issue in the real application, and this is a great challenge in the application of ABE schemes ACKNOWLEDGMENT The satisfaction that accompanies the successful completion of any task would be in-complete without mentioning the people who make it possible. I am grateful to number of individuals, faculty members, whose professional guidance along their encouragement have made it very pleasant endeavor to undertake this project. I have a great pleasure in presenting the dissertation Control Cloud Data Access Using Attribute-Based Encryption under the guidance of Prof. Sahane Prema B. for giving us the opportunity to work on this topic and their support and also all the teaching and non-teaching staff of Computer Engineering Department for their encouragement, support and untiring cooperation. Finally I express my sincere thanks to our parents, friends and all those who helped us directly or indirectly in many ways in completion of this dissertation work. REFERENCES [1] Shamir, “Identity-based cryptosystems and signature schemes,”in Advances in Cryptology. Berlin, Germany: Springer-Verlag, 1985, pp. 47–53. [2] Sahai and B. Waters, “Fuzzy identity-based encryption,” in Advances in Cryptology. Berlin, Germany: Springer- Verlag, 2005, pp. 457–473. [3] V. Goyal, O. Pandey, A. Sahai, and B. Waters, “Attribute-based encryption for fine-grained access control of encrypted data,” in Proc. 13thCCS, 2006, pp. 89–98. [4] K. Yang, X. Jia, K. Ren, and B. Zhang, “DAC-MACS: Effective data access control for multi-authority cloud storage systems,” in Proc. IEEE INFOCOM, Apr. 2013, pp. 2895–2903. [5] W.-G. Tzeng, “Efficient 1-out-of-n oblivious transfer schemes with universally usable parameters,” IEEE Trans. Comput., vol. 53, no. 2, pp. 232–240, Feb. 2004. [6] M. Li, S. Yu, Y. Zheng, K. Ren, and W. Lou, “Scalable and secure sharing of personal health records in cloud computing using attribute based encryption,” IEEE Trans. Parallel Distrib. Syst., vol. 24, no. 1, pp. 131–143, Jan. 2013.