SlideShare a Scribd company logo
Decentralized Access Control with Anonymous
Authentication of Data Stored in Clouds
ABSTRACT
We propose a new decentralized access control scheme for secure data storage in clouds,
that supports anonymous authentication. In the proposed scheme, the cloud verifies the
authenticity of the ser without knowing the user’s identity before storing data. Our scheme also
has the added feature of access control in which only valid users are able to decrypt the stored
information. The scheme prevents replay attacks and supports creation, modification, and
reading data stored in the cloud. We also address user revocation. Moreover, our authentication
and access control scheme is decentralized and robust, unlike other access control schemes
designed for clouds which are centralized. The communication, computation, and storage
overheads are comparable to centralized approaches.
Existing System
Existing work on access control in cloud are centralized in nature. Except and , all other
schemes use attribute based encryption (ABE). The scheme in uses a symmetric key approach
and does not support authentication. The schemes do not support authentication as well. Earlier
work by Zhao et al. provides privacy preserving authenticated access control in cloud. However,
the authors take a centralized approach where a single key distribution center (KDC) distributes
secret keys and attributes to all users. Unfortunately, a single KDC is not only a single point of
failure but difficult to maintain because of the large number of users that are supported in a cloud
environment. We, therefore, emphasize that clouds should take a decentralized approach while
distributing secret keys and attributes to users. It is also quite natural for clouds to have many
KDCs in different locations in the world.
Disadvantage:
A single KDC is not only a single point of failure but difficult to maintain because of the
large number of users that are supported in a cloud environment
Proposed System:
proposed a decentralized approach, their technique does not authenticate users, who want
to remain anonymous while accessing the cloud. In an earlier work, Ruj et al. proposed a
distributed access control mechanism in clouds. However, the scheme did not provide user
authentication. The other drawback was that a user can create and store a file and other users can
only read the file. Write access was not permitted to users other than the creator. In the
preliminary version of this paper, we extend our previous work with added features which
enables to authenticate the validity of the message without revealing the identity of the user who
has stored information in the cloud. In this version we also address user revocation. We use
attribute based signature scheme to achieve authenticity and privacy.
Advantages:
we extend our previous work with added features which enables to authenticate the
validity of the message without revealing the identity of the user who has stored information in
the cloud.
Architecture:
MODULES”
1. System Initialization.
2. User Registration.
3. KDC setup.
4. Attribute generation.
5. Sign.
6. Verify.
Modules Description
1. System Initialization
Select a prime q, and groups G1 and G2, which are of order q. We define the mapping ˆe
: G1 ×G1 → G2. Let g1, g2 be generators of G1 and hj be generators of G2, for j ∈ [tmax], for
arbitrary tmax. Let H be a hash function. Let A0 = ha0 0 , where a0 ∈ Z∗ q is chosen at random.
(TSig,TV er) mean TSig is the private key with which a message is signed and TV er is the
public key used for verification. The secret key for the trustee is TSK = (a0, TSig) and public key
is TPK = (G1,G2,H, g1,A0, h0, h1, . . . , htmax, g2, TV er).
2. User Registration
For a user with identity Uu the KDC draws at random Kbase ∈ G. Let K0 = K1/a0 base .
The following token γ is output γ = (u,Kbase,K0, ρ), where ρ is signature on u||Kbase using the
signing key TSig.
3. KDC setup
We emphasize that clouds should take a decentralized approach while distributing secret
keys and attributes to users. It is also quite natural for clouds to have many KDCs in different
locations in the world. The architecture is decentralized, meaning that there can be several KDCs
for key management.
4. Attribute generation
The token verification algorithm verifies the signature contained in γ using the signature
verification key TV er in TPK. This algorithm extracts Kbase from γ using (a, b) from ASK[i]
and computes Kx = K1/(a+bx) base , x ∈ J[i, u]. The key Kx can be checked for consistency
using algorithm ABS.KeyCheck(TPK,APK[i], γ,Kx), which checks ˆe(Kx,AijBx ij) = ˆe(Kbase,
hj), for all x ∈ J[i, u] and j ∈ [tmax].
5. Sign
The access policy decides who can access the data stored in the cloud. The creator
decides on a claim policy Y, to prove her authenticity and signs the message under this claim.
The ciphertext C with signature is c, and is sent to the cloud. The cloud verifies the signature and
stores the ciphertext C. When a reader wants to read, the cloud sends C. If the user has attributes
matching with access policy, it can decrypt and get back original message.
6. Verify
The verification process to the cloud, it relieves the individual users from time consuming
verifications. When a reader wants to read some data stored in the cloud, it tries to decrypt it
using the secret keys it receives from the KDCs.
System Configuration:-
H/W System Configuration:-
Processor - Pentium –III
Speed - 1.1 Ghz
RAM - 256 MB (min)
Hard Disk - 20 GB
Floppy Drive - 1.44 MB
Key Board - Standard Windows Keyboard
Mouse - Two or Three Button Mouse
Monitor - SVGA
S/W System Configuration:-
 Operating System :Windows95/98/2000/XP
 Application Server : Tomcat5.0/6.X
 Front End : HTML, Java, Jsp
 Scripts : JavaScript.
 Server side Script : Java Server Pages.
 Database : Mysql
 Database Connectivity : JDBC.
CONCLUSION
We have presented a decentralized access control technique with anonymous
authentication, which provides user revocation and prevents replay attacks. The cloud does not
know the identity of the user who stores information, but only verifies the user’s credentials. Key
distribution is done in a decentralized way. One limitation is that the cloud knows the access
policy for each record stored in the cloud.

More Related Content

DOC
Decentralized access control with anonymous authentication of data stored in ...
DOCX
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
PDF
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
DOC
Key aggregate cryptosystem for scalable data sharing in cloud storage
PPTX
key aggregate cryptosystem for scalable data sharing in cloud storage abstract
PPTX
Secure deduplicaton with efficient and reliable convergent
PPTX
Access control in decentralized online social networks applying a policy hidi...
DOCX
KEY-AGGREGATE SEARCHABLE ENCRYPTION (KASE) FOR GROUP DATA SHARING VIA CLOUD ...
Decentralized access control with anonymous authentication of data stored in ...
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Key aggregate cryptosystem for scalable data sharing in cloud storage
key aggregate cryptosystem for scalable data sharing in cloud storage abstract
Secure deduplicaton with efficient and reliable convergent
Access control in decentralized online social networks applying a policy hidi...
KEY-AGGREGATE SEARCHABLE ENCRYPTION (KASE) FOR GROUP DATA SHARING VIA CLOUD ...

What's hot (17)

PPTX
Key aggregate cryptosystem for scalable data sharing in cloud
PPTX
Key aggregate cryptosystem for scalable data sharing in cloud storage
DOC
A hybrid cloud approach for secure authorized deduplication
PDF
Audit free cloud storage via deniable attribute-based encryption
DOCX
SECURE AUDITING AND DEDUPLICATING DATA IN CLOUD
PPTX
Key aggregate cryptosystem for scalable data sharing in cloud storage
PPTX
Decentralized access control with anonymous authentication of data stored in ...
DOCX
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
DOCX
key-aggregate cryptosystem for scalable data sharing in cloud storage
PDF
International Journal of Engineering and Science Invention (IJESI)
PPTX
key aggregate cryptosystem for scalable data sharing in cloud
DOCX
Secure auditing and deduplicating data in cloud
DOCX
Secure auditing and deduplicating data in cloud
DOCX
A Hybrid Cloud Approach for Secure Authorized Deduplication
PDF
A hybrid cloud approach for secure authorized deduplication
PDF
Doc A hybrid cloud approach for secure authorized deduplication
PDF
KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUD
Key aggregate cryptosystem for scalable data sharing in cloud
Key aggregate cryptosystem for scalable data sharing in cloud storage
A hybrid cloud approach for secure authorized deduplication
Audit free cloud storage via deniable attribute-based encryption
SECURE AUDITING AND DEDUPLICATING DATA IN CLOUD
Key aggregate cryptosystem for scalable data sharing in cloud storage
Decentralized access control with anonymous authentication of data stored in ...
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
key-aggregate cryptosystem for scalable data sharing in cloud storage
International Journal of Engineering and Science Invention (IJESI)
key aggregate cryptosystem for scalable data sharing in cloud
Secure auditing and deduplicating data in cloud
Secure auditing and deduplicating data in cloud
A Hybrid Cloud Approach for Secure Authorized Deduplication
A hybrid cloud approach for secure authorized deduplication
Doc A hybrid cloud approach for secure authorized deduplication
KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUD
Ad

Similar to Decentralized access control with anonymous authentication of data stored in clouds (20)

PPTX
Decentralized access control with anonymous authentication of data stored in ...
DOC
Decentralized access control with anonymous authentication of data stored in ...
PPTX
Access control in decentralized online social networks applying a policy hidi...
DOCX
JPJ1405 Decentralized Access Control With Anonymous Authentication of Data ...
DOCX
decentralized access control with anonymous authentication of data stored in ...
DOCX
Providing user security guarantees in public infrastructure clouds
PPTX
Decentralized access control with authentication anonymous of data stored in ...
DOCX
decentralized access control with anonymous authentication of data stored in ...
PDF
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
DOCX
JPJ1408 Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
PPT
ITDCC05.ppt
PDF
Decentralized access control with anonymous authentication of data stored in ...
PDF
An Improved Integrated Hash and Attributed based Encryption Model on High Dim...
PPTX
Cryptography Final Presentation.pptx
PDF
Privacypreservingdelegatedaccesscontrolinpublicclouds 141112073315-conversion...
PDF
Privacypreservingdelegatedaccesscontrolinpublicclouds
PPT
PDF
A Privacy Preserving Attribute Based Access Control Mechanism In Distributed ...
DOCX
A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD ...
DOCX
Secure auditing and deduplicating data in cloud
Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...
Access control in decentralized online social networks applying a policy hidi...
JPJ1405 Decentralized Access Control With Anonymous Authentication of Data ...
decentralized access control with anonymous authentication of data stored in ...
Providing user security guarantees in public infrastructure clouds
Decentralized access control with authentication anonymous of data stored in ...
decentralized access control with anonymous authentication of data stored in ...
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
JPJ1408 Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
ITDCC05.ppt
Decentralized access control with anonymous authentication of data stored in ...
An Improved Integrated Hash and Attributed based Encryption Model on High Dim...
Cryptography Final Presentation.pptx
Privacypreservingdelegatedaccesscontrolinpublicclouds 141112073315-conversion...
Privacypreservingdelegatedaccesscontrolinpublicclouds
A Privacy Preserving Attribute Based Access Control Mechanism In Distributed ...
A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD ...
Secure auditing and deduplicating data in cloud
Ad

Recently uploaded (20)

PDF
Complications of Minimal Access Surgery at WLH
PPTX
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PDF
RMMM.pdf make it easy to upload and study
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PPTX
202450812 BayCHI UCSC-SV 20250812 v17.pptx
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PDF
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PPTX
Cell Types and Its function , kingdom of life
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PDF
Chinmaya Tiranga quiz Grand Finale.pdf
PPTX
Lesson notes of climatology university.
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
Complications of Minimal Access Surgery at WLH
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
Supply Chain Operations Speaking Notes -ICLT Program
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
RMMM.pdf make it easy to upload and study
Abdominal Access Techniques with Prof. Dr. R K Mishra
202450812 BayCHI UCSC-SV 20250812 v17.pptx
Pharmacology of Heart Failure /Pharmacotherapy of CHF
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
Final Presentation General Medicine 03-08-2024.pptx
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
Cell Types and Its function , kingdom of life
human mycosis Human fungal infections are called human mycosis..pptx
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
2.FourierTransform-ShortQuestionswithAnswers.pdf
Chinmaya Tiranga quiz Grand Finale.pdf
Lesson notes of climatology university.
O5-L3 Freight Transport Ops (International) V1.pdf

Decentralized access control with anonymous authentication of data stored in clouds

  • 1. Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds ABSTRACT We propose a new decentralized access control scheme for secure data storage in clouds, that supports anonymous authentication. In the proposed scheme, the cloud verifies the authenticity of the ser without knowing the user’s identity before storing data. Our scheme also has the added feature of access control in which only valid users are able to decrypt the stored information. The scheme prevents replay attacks and supports creation, modification, and reading data stored in the cloud. We also address user revocation. Moreover, our authentication and access control scheme is decentralized and robust, unlike other access control schemes designed for clouds which are centralized. The communication, computation, and storage overheads are comparable to centralized approaches. Existing System
  • 2. Existing work on access control in cloud are centralized in nature. Except and , all other schemes use attribute based encryption (ABE). The scheme in uses a symmetric key approach and does not support authentication. The schemes do not support authentication as well. Earlier work by Zhao et al. provides privacy preserving authenticated access control in cloud. However, the authors take a centralized approach where a single key distribution center (KDC) distributes secret keys and attributes to all users. Unfortunately, a single KDC is not only a single point of failure but difficult to maintain because of the large number of users that are supported in a cloud environment. We, therefore, emphasize that clouds should take a decentralized approach while distributing secret keys and attributes to users. It is also quite natural for clouds to have many KDCs in different locations in the world. Disadvantage: A single KDC is not only a single point of failure but difficult to maintain because of the large number of users that are supported in a cloud environment Proposed System: proposed a decentralized approach, their technique does not authenticate users, who want to remain anonymous while accessing the cloud. In an earlier work, Ruj et al. proposed a distributed access control mechanism in clouds. However, the scheme did not provide user authentication. The other drawback was that a user can create and store a file and other users can only read the file. Write access was not permitted to users other than the creator. In the preliminary version of this paper, we extend our previous work with added features which enables to authenticate the validity of the message without revealing the identity of the user who has stored information in the cloud. In this version we also address user revocation. We use attribute based signature scheme to achieve authenticity and privacy. Advantages:
  • 3. we extend our previous work with added features which enables to authenticate the validity of the message without revealing the identity of the user who has stored information in the cloud. Architecture: MODULES”
  • 4. 1. System Initialization. 2. User Registration. 3. KDC setup. 4. Attribute generation. 5. Sign. 6. Verify. Modules Description 1. System Initialization Select a prime q, and groups G1 and G2, which are of order q. We define the mapping ˆe : G1 ×G1 → G2. Let g1, g2 be generators of G1 and hj be generators of G2, for j ∈ [tmax], for arbitrary tmax. Let H be a hash function. Let A0 = ha0 0 , where a0 ∈ Z∗ q is chosen at random. (TSig,TV er) mean TSig is the private key with which a message is signed and TV er is the public key used for verification. The secret key for the trustee is TSK = (a0, TSig) and public key is TPK = (G1,G2,H, g1,A0, h0, h1, . . . , htmax, g2, TV er). 2. User Registration For a user with identity Uu the KDC draws at random Kbase ∈ G. Let K0 = K1/a0 base . The following token γ is output γ = (u,Kbase,K0, ρ), where ρ is signature on u||Kbase using the signing key TSig. 3. KDC setup
  • 5. We emphasize that clouds should take a decentralized approach while distributing secret keys and attributes to users. It is also quite natural for clouds to have many KDCs in different locations in the world. The architecture is decentralized, meaning that there can be several KDCs for key management. 4. Attribute generation The token verification algorithm verifies the signature contained in γ using the signature verification key TV er in TPK. This algorithm extracts Kbase from γ using (a, b) from ASK[i] and computes Kx = K1/(a+bx) base , x ∈ J[i, u]. The key Kx can be checked for consistency using algorithm ABS.KeyCheck(TPK,APK[i], γ,Kx), which checks ˆe(Kx,AijBx ij) = ˆe(Kbase, hj), for all x ∈ J[i, u] and j ∈ [tmax]. 5. Sign The access policy decides who can access the data stored in the cloud. The creator decides on a claim policy Y, to prove her authenticity and signs the message under this claim. The ciphertext C with signature is c, and is sent to the cloud. The cloud verifies the signature and stores the ciphertext C. When a reader wants to read, the cloud sends C. If the user has attributes matching with access policy, it can decrypt and get back original message. 6. Verify The verification process to the cloud, it relieves the individual users from time consuming verifications. When a reader wants to read some data stored in the cloud, it tries to decrypt it using the secret keys it receives from the KDCs. System Configuration:-
  • 6. H/W System Configuration:- Processor - Pentium –III Speed - 1.1 Ghz RAM - 256 MB (min) Hard Disk - 20 GB Floppy Drive - 1.44 MB Key Board - Standard Windows Keyboard Mouse - Two or Three Button Mouse Monitor - SVGA S/W System Configuration:-  Operating System :Windows95/98/2000/XP  Application Server : Tomcat5.0/6.X  Front End : HTML, Java, Jsp  Scripts : JavaScript.  Server side Script : Java Server Pages.  Database : Mysql  Database Connectivity : JDBC.
  • 7. CONCLUSION We have presented a decentralized access control technique with anonymous authentication, which provides user revocation and prevents replay attacks. The cloud does not know the identity of the user who stores information, but only verifies the user’s credentials. Key distribution is done in a decentralized way. One limitation is that the cloud knows the access policy for each record stored in the cloud.