SlideShare a Scribd company logo
LeMeniz Infotech 
36, 100 feet Road, Natesan 
Nagar(Near Indira Gandhi Statue, Next 
to Fish-O-Fish), Pondicherry-605 005 
Call: 0413-4205444, +91 99625 88976, 
95663 55386. 
For More Projects Titles Visits : www.lemenizinfotech.com | Call Us : 9962588976 
/9566355386 
Do Your Projects With Domain Experts 
DECENTRALIZED ACCESS CONTROL WITH ANONYMOUS AUTHENTICATION OF 
DATA STORED IN CLOUDS 
ABSTRACT 
A new decentralized access control scheme is proposed for secure data storage in 
clouds that supports anonymous authentication. In the proposed scheme, the 
cloud verifies the authenticity of the series without knowing the user’s identity 
before storing data. Access control is enabled, in which only valid users are able 
to decrypt the stored information. The scheme prevents replay attacks and 
supports creation, modification, and reading data stored in the cloud. 
Authentication and access control scheme is decentralized and robust, unlike 
other access control schemes designed for clouds which are centralized. The 
communication, computation, and storage overheads are comparable to 
centralized approaches. 
AIM 
The problems of access control, authentication, and privacy protection should be 
solved simultaneously.
LeMeniz Infotech 
36, 100 feet Road, Natesan 
Nagar(Near Indira Gandhi Statue, Next 
to Fish-O-Fish), Pondicherry-605 005 
Call: 0413-4205444, +91 99625 88976, 
95663 55386. 
For More Projects Titles Visits : www.lemenizinfotech.com | Call Us : 9962588976 
/9566355386 
Do Your Projects With Domain Experts 
INTRODUCTION 
Research in cloud computing is receiving a lot of attention from both academic 
and industrial worlds. In cloud computing, users can outsource their computation 
and storage to servers (also called clouds) using Internet. This frees users from the 
hassles of maintaining resources on-site. Clouds can provide several types of 
services like applications, infrastructures, and platforms to help developers write 
applications. Much of the data stored in clouds is highly sensitive, for example, 
medical records and social networks. Security and privacy are, thus, very 
important issues in cloud computing. In one hand, the user should authenticate 
itself before initiating any transaction, and on the other hand, it must be ensured 
that the cloud does not tamper with the data that is outsourced. User privacy is 
also required so that the cloud or other users do not know the identity of the 
user. The cloud can hold the user accountable for the data it outsources, and 
likewise, the cloud is itself accountable for the services it provides. The validity of 
the user who stores the data is also verified. Apart from the technical solutions to 
ensure security and privacy, there is also a need for law enforcement.
LeMeniz Infotech 
36, 100 feet Road, Natesan 
Nagar(Near Indira Gandhi Statue, Next 
to Fish-O-Fish), Pondicherry-605 005 
Call: 0413-4205444, +91 99625 88976, 
95663 55386. 
For More Projects Titles Visits : www.lemenizinfotech.com | Call Us : 9962588976 
/9566355386 
Do Your Projects With Domain Experts 
SCOPE OF WORK 
Access control in clouds is gaining attention because it is important that only 
authorized users have access to valid service. A huge amount of information is 
being stored in the cloud, and much of this is sensitive information. Care should 
be taken to ensure access control of this sensitive information which can often be 
related to health, important documents or even personal information. There are 
broadly three types of access control: user-based access control (UBAC), role-based 
access control (RBAC), and attribute-based access control (ABAC). In UBAC, 
the access control list contains the list of users who are authorized to access data. 
This is not feasible in clouds where there are many users. In RBAC, users are 
classified based on their individual roles. Data can be accessed by users who have 
matching roles. The roles are defined by the system. ABAC is more extended in 
scope, in which users are given attributes, and the data has attached access 
policy.
LeMeniz Infotech 
36, 100 feet Road, Natesan 
Nagar(Near Indira Gandhi Statue, Next 
to Fish-O-Fish), Pondicherry-605 005 
Call: 0413-4205444, +91 99625 88976, 
95663 55386. 
For More Projects Titles Visits : www.lemenizinfotech.com | Call Us : 9962588976 
/9566355386 
Do Your Projects With Domain Experts 
EXISTING SYSTEM 
Secure and dependable cloud storage 
 Cloud servers prone to Byzantine failure, where a storage server can fail in 
arbitrary ways. The cloud is also prone to data modification and server 
colluding attacks. 
 In server colluding attack, the adversary can compromise storage servers, 
so that it can modify data files as long as they are internally consistent. 
 To provide secure data storage, the data needs to be encrypted. However, 
the data is often modified and this dynamic property needs to be taken into 
account while designing efficient secure storage techniques. 
Privacy preserving search 
 The clouds should not know the query but should be able to return the 
records that satisfy the query. 
 This is achieved by means of searchable encryption. The keywords are sent 
to the cloud encrypted, and the cloud returns the result without knowing 
the actual keyword for the search. 
 The problem here is that the data records should have keywords associated 
with them to enable the search.
LeMeniz Infotech 
36, 100 feet Road, Natesan 
Nagar(Near Indira Gandhi Statue, Next 
to Fish-O-Fish), Pondicherry-605 005 
Call: 0413-4205444, +91 99625 88976, 
95663 55386. 
For More Projects Titles Visits : www.lemenizinfotech.com | Call Us : 9962588976 
/9566355386 
Do Your Projects With Domain Experts 
Drawbacks 
 The correct records are returned only when searched with the exact 
keywords. 
Storage security 
 Reed-Solomon erasure-correcting codes were used. 
 Many homomorphic encryption techniques have been suggested to ensure 
that the cloud is not able to read the data while performing computations 
on them. Using homomorphic encryption, the cloud receives ciphertext of 
the data and performs computations on the ciphertext and returns the 
encoded value of the result. The user is able to decode the result, but the 
cloud does not know what data it has operated on. 
 In such circumstances, it must be possible for the user to verify that the 
cloud returns correct results. 
Disadvantages 
 Accountability of clouds is a very challenging task and involves technical 
issues and law enforcement. 
 Neither clouds nor users should deny any operations performed or 
requested.
LeMeniz Infotech 
36, 100 feet Road, Natesan 
Nagar(Near Indira Gandhi Statue, Next 
to Fish-O-Fish), Pondicherry-605 005 
Call: 0413-4205444, +91 99625 88976, 
95663 55386. 
For More Projects Titles Visits : www.lemenizinfotech.com | Call Us : 9962588976 
/9566355386 
Do Your Projects With Domain Experts 
Proposed system 
 To propose ABS scheme to achieve authenticity and privacy. 
 This is resistant to replay attacks, in which a user can replace fresh data 
with stale data from a previous write, even if it no longer has valid claim 
policy. 
 This is an important property because a user, revoked of its attributes, 
might no longer be able to write to the cloud. 
 This scheme also allows writing multiple times which was not permitted in 
earlier work. 
Advantages 
 Distributed access control of data stored in cloud so that only authorized 
users with valid attributes can access them. 
 Authentication of users who store and modify their data on the cloud. 
 The identity of the user is protected from the cloud during authentication. 
 The architecture is decentralized, meaning that there can be several KDCs 
for key management.
LeMeniz Infotech 
36, 100 feet Road, Natesan 
Nagar(Near Indira Gandhi Statue, Next 
to Fish-O-Fish), Pondicherry-605 005 
Call: 0413-4205444, +91 99625 88976, 
95663 55386. 
For More Projects Titles Visits : www.lemenizinfotech.com | Call Us : 9962588976 
/9566355386 
Do Your Projects With Domain Experts 
 The access control and authentication are both collusion resistant, meaning 
that no two users can collude and access data or authenticate themselves, 
if they are individually not authorized. 
 Revoked users cannot access data after they have been revoked. 
 The proposed scheme is resilient to replay attacks. A writer whose 
attributes and keys have been revoked cannot write back stale information. 
 The protocol supports multiple read and write on the data stored in the 
cloud. 
 The costs are comparable to the existing centralized approaches, and the 
expensive operations are mostly done by the cloud.
LeMeniz Infotech 
36, 100 feet Road, Natesan 
Nagar(Near Indira Gandhi Statue, Next 
to Fish-O-Fish), Pondicherry-605 005 
Call: 0413-4205444, +91 99625 88976, 
95663 55386. 
For More Projects Titles Visits : www.lemenizinfotech.com | Call Us : 9962588976 
/9566355386 
Do Your Projects With Domain Experts 
LITERATURE SUMMARY 
ABE was proposed by Sahai and Waters. In ABE, a user has a set of attributes in 
addition to its unique ID. 
There are two classes of ABEs. 
 Key-policy ABE (KP-ABE) 
o Sender has an access policy to encrypt data. A writer whose 
attributes and keys have been revoked cannot write back stale 
information. The receiver receives attributes and secret keys from 
the attribute authority and is able to decrypt information if it has 
matching attributes. 
 Ciphertext-policy (CP-ABE) 
o Receiver has the access policy in the form of a tree, with attributes as 
leaves and monotonic access structure with AND, OR and other 
threshold gates. 
 Chase proposed a multiauthority ABE, in which there are several KDC 
authorities which distribute attributes and secret keys to users. 
Multiauthority ABE protocol was studied, which required no trusted 
authority which requires every user to have attributes from at all the KDCs.
LeMeniz Infotech 
36, 100 feet Road, Natesan 
Nagar(Near Indira Gandhi Statue, Next 
to Fish-O-Fish), Pondicherry-605 005 
Call: 0413-4205444, +91 99625 88976, 
95663 55386. 
For More Projects Titles Visits : www.lemenizinfotech.com | Call Us : 9962588976 
/9566355386 
Do Your Projects With Domain Experts 
 Lewko and Waters proposed a fully decentralized ABE where users could 
have zero or more attributes from each authority and did not require a 
trusted server. In all these cases, decryption at user’s end is computation 
intensive. 
 Green et al. proposed to outsource the decryption task to a proxy server, so 
that the user can compute with minimum resources. However, the 
presence of one proxy and one KDC makes it less robust than decentralized 
approaches. Both these approaches had no way to authenticate users, 
anonymously. 
 Yang et al. presented a modification, authenticate users, who want to 
remain anonymous while accessing the cloud. 
 To ensure anonymous user authentication ABSs were introduced by Maji et 
al. This was also a centralized approach. A recent scheme by Maji et al. 
takes a decentralized approach and provides authentication without 
disclosing the identity of the users. However, as mentioned earlier in the 
previous section it is prone to replay attack.
LeMeniz Infotech 
36, 100 feet Road, Natesan 
Nagar(Near Indira Gandhi Statue, Next 
to Fish-O-Fish), Pondicherry-605 005 
Call: 0413-4205444, +91 99625 88976, 
95663 55386. 
For More Projects Titles Visits : www.lemenizinfotech.com | Call Us : 9962588976 
/9566355386 
Do Your Projects With Domain Experts 
Hardware requirements: 
Processor : Any Processor above 500 MHz. 
Ram : 128Mb. 
Hard Disk : 10 Gb. 
Compact Disk : 650 Mb. 
Input device : Standard Keyboard and Mouse. 
Output device : VGA and High Resolution Monitor. 
Software requirements: 
Operating System : Windows Family. 
Language : JDK 1.5 
Database : MySQL 5.0 
Tool : HeidiSQL 3.0

More Related Content

PPTX
Decentralized access control with authentication anonymous of data stored in ...
DOC
Decentralized access control with anonymous authentication of data stored in ...
PPTX
Decentralized access control with anonymous authentication of data stored in ...
DOCX
Decentralized access control with anonymous authentication of data stored in ...
PPTX
Decentralized access control with anonymous authentication of data stored in ...
DOCX
JPJ1405 Decentralized Access Control With Anonymous Authentication of Data ...
PPT
Decentralized access control with anonymous authentication of data stored in ...
DOCX
decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with authentication anonymous of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...
JPJ1405 Decentralized Access Control With Anonymous Authentication of Data ...
Decentralized access control with anonymous authentication of data stored in ...
decentralized access control with anonymous authentication of data stored in ...

What's hot (20)

PDF
A Privacy Preserving Attribute Based Access Control Mechanism In Distributed ...
DOCX
decentralized access control with anonymous authentication of data stored in ...
PPT
Secure Data Sharing in Cloud (SDSC)
PDF
Secure data sharing in cloud computing using revocable storage identity-based...
PDF
Secure Data Sharing in Cloud Computing using Revocable Storage Identity- Base...
DOCX
Privacy preserving delegated access control in public clouds
PDF
The Recent Trend: Vigorous unidentified validation access control system with...
PPTX
Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based...
PDF
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
PDF
Attribute based encryption with privacy preserving in clouds
DOCX
Privacy preserving delegated access control in public clouds
PPSX
Final year presentation
PDF
Privacy preserving delegated access control in public cloud
PDF
Privacy Preserving Delegated Access Control in Public Clouds
PPTX
Attribute Based Encryption with Privacy Preserving In Clouds
PDF
J018145862
PDF
An Improved Integrated Hash and Attributed based Encryption Model on High Dim...
PPT
PPT FOR IDBSDDS SCHEMES
PPTX
Secure data sharing for dynamic groups in multi-owner using cloud
PDF
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
A Privacy Preserving Attribute Based Access Control Mechanism In Distributed ...
decentralized access control with anonymous authentication of data stored in ...
Secure Data Sharing in Cloud (SDSC)
Secure data sharing in cloud computing using revocable storage identity-based...
Secure Data Sharing in Cloud Computing using Revocable Storage Identity- Base...
Privacy preserving delegated access control in public clouds
The Recent Trend: Vigorous unidentified validation access control system with...
Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based...
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
Attribute based encryption with privacy preserving in clouds
Privacy preserving delegated access control in public clouds
Final year presentation
Privacy preserving delegated access control in public cloud
Privacy Preserving Delegated Access Control in Public Clouds
Attribute Based Encryption with Privacy Preserving In Clouds
J018145862
An Improved Integrated Hash and Attributed based Encryption Model on High Dim...
PPT FOR IDBSDDS SCHEMES
Secure data sharing for dynamic groups in multi-owner using cloud
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
Ad

Viewers also liked (14)

PDF
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...
PDF
A fast fault tolerant architecture for sauvola local image thresholding algor...
PPTX
Google glass
PDF
Консультант по карьере
PPTX
Blogger did you know!
PDF
the problem with Unions
PDF
BATERIAS ETNA
PDF
Vr haggadah
PPTX
As media studies evaluation
PDF
Sete hábitos inteligentes cultivados por grandes inovadores
PPTX
презентация повышение эффективности мышления
PPTX
Gay Berlin
PPTX
интеллект карта
PDF
Cát Vạn Lợi - Nhà cung cấp vật tư thiết bị điện hàng đầu cho mọi công trình M...
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...
A fast fault tolerant architecture for sauvola local image thresholding algor...
Google glass
Консультант по карьере
Blogger did you know!
the problem with Unions
BATERIAS ETNA
Vr haggadah
As media studies evaluation
Sete hábitos inteligentes cultivados por grandes inovadores
презентация повышение эффективности мышления
Gay Berlin
интеллект карта
Cát Vạn Lợi - Nhà cung cấp vật tư thiết bị điện hàng đầu cho mọi công trình M...
Ad

Similar to Decentralized access control with anonymous authentication of data stored in clouds (20)

DOCX
Oruta privacy preserving public auditing for shared data in the cloud
PDF
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
PDF
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
PDF
Privacy preserving public auditing for regenerating-code-based cloud storage
PDF
Enabling fine grained multi-keyword search supporting classified sub-dictiona...
PDF
Cost effective authentic and anonymous data sharing with forward security
PDF
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...
PDF
Privacy preserving ciphertext multi-sharing control for big data storage
PDF
A robust and verifiable threshold multi authority access control system in pu...
PDF
1784 1788
PDF
1784 1788
PDF
A Survey on Different Techniques Used in Decentralized Cloud Computing
PDF
Space efficient verifiable secret sharing using polynomial interpolation
PDF
Privacy preserving ciphertext multi-sharing control for big data storage
PDF
Performing initiative data prefetching in distributed file systems for cloud ...
PDF
Secure Data Sharing In an Untrusted Cloud
PDF
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
DOCX
Audit free cloud storage via deniable attribute-based encryption
DOCX
Audit free cloud storage via deniable attribute-based encryption
PDF
A hybrid cloud approach for secure authorized deduplication
Oruta privacy preserving public auditing for shared data in the cloud
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
Privacy preserving public auditing for regenerating-code-based cloud storage
Enabling fine grained multi-keyword search supporting classified sub-dictiona...
Cost effective authentic and anonymous data sharing with forward security
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...
Privacy preserving ciphertext multi-sharing control for big data storage
A robust and verifiable threshold multi authority access control system in pu...
1784 1788
1784 1788
A Survey on Different Techniques Used in Decentralized Cloud Computing
Space efficient verifiable secret sharing using polynomial interpolation
Privacy preserving ciphertext multi-sharing control for big data storage
Performing initiative data prefetching in distributed file systems for cloud ...
Secure Data Sharing In an Untrusted Cloud
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
Audit free cloud storage via deniable attribute-based encryption
Audit free cloud storage via deniable attribute-based encryption
A hybrid cloud approach for secure authorized deduplication

More from LeMeniz Infotech (20)

PDF
A fast acquisition all-digital delay-locked loop using a starting-bit predict...
PDF
A dynamically reconfigurable multi asip architecture for multistandard and mu...
PDF
Interleaved digital power factor correction based on the sliding mode approach
PDF
Bumpless control for reduced thd in power factor correction circuits
PDF
A bidirectional single stage three phase rectifier with high-frequency isolat...
PDF
A bidirectional three level llc resonant converter with pwam control
PDF
Efficient single phase transformerless inverter for grid tied pvg system with...
PDF
Highly reliable transformerless photovoltaic inverters with leakage current a...
PDF
Grid current-feedback active damping for lcl resonance in grid-connected volt...
PDF
Delay dependent stability of single-loop controlled grid-connected inverters ...
PDF
Connection of converters to a low and medium power dc network using an induct...
PDF
Stamp enabling privacy preserving location proofs for mobile users
PDF
Sbvlc secure barcode based visible light communication for smartphones
PDF
Read2 me a cloud based reading aid for the visually impaired
PDF
Privacy preserving location sharing services for social networks
PDF
Pass byo bring your own picture for securing graphical passwords
PDF
Eplq efficient privacy preserving location-based query over outsourced encryp...
PDF
Analyzing ad library updates in android apps
PDF
An exploration of geographic authentication scheme
PDF
Dotnet IEEE Projects 2016-2017 | Dotnet IEEE Projects Titles 2016-2017
A fast acquisition all-digital delay-locked loop using a starting-bit predict...
A dynamically reconfigurable multi asip architecture for multistandard and mu...
Interleaved digital power factor correction based on the sliding mode approach
Bumpless control for reduced thd in power factor correction circuits
A bidirectional single stage three phase rectifier with high-frequency isolat...
A bidirectional three level llc resonant converter with pwam control
Efficient single phase transformerless inverter for grid tied pvg system with...
Highly reliable transformerless photovoltaic inverters with leakage current a...
Grid current-feedback active damping for lcl resonance in grid-connected volt...
Delay dependent stability of single-loop controlled grid-connected inverters ...
Connection of converters to a low and medium power dc network using an induct...
Stamp enabling privacy preserving location proofs for mobile users
Sbvlc secure barcode based visible light communication for smartphones
Read2 me a cloud based reading aid for the visually impaired
Privacy preserving location sharing services for social networks
Pass byo bring your own picture for securing graphical passwords
Eplq efficient privacy preserving location-based query over outsourced encryp...
Analyzing ad library updates in android apps
An exploration of geographic authentication scheme
Dotnet IEEE Projects 2016-2017 | Dotnet IEEE Projects Titles 2016-2017

Recently uploaded (20)

PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Empathic Computing: Creating Shared Understanding
PDF
Approach and Philosophy of On baking technology
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
Electronic commerce courselecture one. Pdf
PPTX
Spectroscopy.pptx food analysis technology
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PPTX
Cloud computing and distributed systems.
PPTX
Big Data Technologies - Introduction.pptx
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PPTX
sap open course for s4hana steps from ECC to s4
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Unlocking AI with Model Context Protocol (MCP)
Building Integrated photovoltaic BIPV_UPV.pdf
Understanding_Digital_Forensics_Presentation.pptx
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Encapsulation_ Review paper, used for researhc scholars
Empathic Computing: Creating Shared Understanding
Approach and Philosophy of On baking technology
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Electronic commerce courselecture one. Pdf
Spectroscopy.pptx food analysis technology
NewMind AI Weekly Chronicles - August'25 Week I
Mobile App Security Testing_ A Comprehensive Guide.pdf
“AI and Expert System Decision Support & Business Intelligence Systems”
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Cloud computing and distributed systems.
Big Data Technologies - Introduction.pptx
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
sap open course for s4hana steps from ECC to s4
Chapter 3 Spatial Domain Image Processing.pdf
Unlocking AI with Model Context Protocol (MCP)

Decentralized access control with anonymous authentication of data stored in clouds

  • 1. LeMeniz Infotech 36, 100 feet Road, Natesan Nagar(Near Indira Gandhi Statue, Next to Fish-O-Fish), Pondicherry-605 005 Call: 0413-4205444, +91 99625 88976, 95663 55386. For More Projects Titles Visits : www.lemenizinfotech.com | Call Us : 9962588976 /9566355386 Do Your Projects With Domain Experts DECENTRALIZED ACCESS CONTROL WITH ANONYMOUS AUTHENTICATION OF DATA STORED IN CLOUDS ABSTRACT A new decentralized access control scheme is proposed for secure data storage in clouds that supports anonymous authentication. In the proposed scheme, the cloud verifies the authenticity of the series without knowing the user’s identity before storing data. Access control is enabled, in which only valid users are able to decrypt the stored information. The scheme prevents replay attacks and supports creation, modification, and reading data stored in the cloud. Authentication and access control scheme is decentralized and robust, unlike other access control schemes designed for clouds which are centralized. The communication, computation, and storage overheads are comparable to centralized approaches. AIM The problems of access control, authentication, and privacy protection should be solved simultaneously.
  • 2. LeMeniz Infotech 36, 100 feet Road, Natesan Nagar(Near Indira Gandhi Statue, Next to Fish-O-Fish), Pondicherry-605 005 Call: 0413-4205444, +91 99625 88976, 95663 55386. For More Projects Titles Visits : www.lemenizinfotech.com | Call Us : 9962588976 /9566355386 Do Your Projects With Domain Experts INTRODUCTION Research in cloud computing is receiving a lot of attention from both academic and industrial worlds. In cloud computing, users can outsource their computation and storage to servers (also called clouds) using Internet. This frees users from the hassles of maintaining resources on-site. Clouds can provide several types of services like applications, infrastructures, and platforms to help developers write applications. Much of the data stored in clouds is highly sensitive, for example, medical records and social networks. Security and privacy are, thus, very important issues in cloud computing. In one hand, the user should authenticate itself before initiating any transaction, and on the other hand, it must be ensured that the cloud does not tamper with the data that is outsourced. User privacy is also required so that the cloud or other users do not know the identity of the user. The cloud can hold the user accountable for the data it outsources, and likewise, the cloud is itself accountable for the services it provides. The validity of the user who stores the data is also verified. Apart from the technical solutions to ensure security and privacy, there is also a need for law enforcement.
  • 3. LeMeniz Infotech 36, 100 feet Road, Natesan Nagar(Near Indira Gandhi Statue, Next to Fish-O-Fish), Pondicherry-605 005 Call: 0413-4205444, +91 99625 88976, 95663 55386. For More Projects Titles Visits : www.lemenizinfotech.com | Call Us : 9962588976 /9566355386 Do Your Projects With Domain Experts SCOPE OF WORK Access control in clouds is gaining attention because it is important that only authorized users have access to valid service. A huge amount of information is being stored in the cloud, and much of this is sensitive information. Care should be taken to ensure access control of this sensitive information which can often be related to health, important documents or even personal information. There are broadly three types of access control: user-based access control (UBAC), role-based access control (RBAC), and attribute-based access control (ABAC). In UBAC, the access control list contains the list of users who are authorized to access data. This is not feasible in clouds where there are many users. In RBAC, users are classified based on their individual roles. Data can be accessed by users who have matching roles. The roles are defined by the system. ABAC is more extended in scope, in which users are given attributes, and the data has attached access policy.
  • 4. LeMeniz Infotech 36, 100 feet Road, Natesan Nagar(Near Indira Gandhi Statue, Next to Fish-O-Fish), Pondicherry-605 005 Call: 0413-4205444, +91 99625 88976, 95663 55386. For More Projects Titles Visits : www.lemenizinfotech.com | Call Us : 9962588976 /9566355386 Do Your Projects With Domain Experts EXISTING SYSTEM Secure and dependable cloud storage  Cloud servers prone to Byzantine failure, where a storage server can fail in arbitrary ways. The cloud is also prone to data modification and server colluding attacks.  In server colluding attack, the adversary can compromise storage servers, so that it can modify data files as long as they are internally consistent.  To provide secure data storage, the data needs to be encrypted. However, the data is often modified and this dynamic property needs to be taken into account while designing efficient secure storage techniques. Privacy preserving search  The clouds should not know the query but should be able to return the records that satisfy the query.  This is achieved by means of searchable encryption. The keywords are sent to the cloud encrypted, and the cloud returns the result without knowing the actual keyword for the search.  The problem here is that the data records should have keywords associated with them to enable the search.
  • 5. LeMeniz Infotech 36, 100 feet Road, Natesan Nagar(Near Indira Gandhi Statue, Next to Fish-O-Fish), Pondicherry-605 005 Call: 0413-4205444, +91 99625 88976, 95663 55386. For More Projects Titles Visits : www.lemenizinfotech.com | Call Us : 9962588976 /9566355386 Do Your Projects With Domain Experts Drawbacks  The correct records are returned only when searched with the exact keywords. Storage security  Reed-Solomon erasure-correcting codes were used.  Many homomorphic encryption techniques have been suggested to ensure that the cloud is not able to read the data while performing computations on them. Using homomorphic encryption, the cloud receives ciphertext of the data and performs computations on the ciphertext and returns the encoded value of the result. The user is able to decode the result, but the cloud does not know what data it has operated on.  In such circumstances, it must be possible for the user to verify that the cloud returns correct results. Disadvantages  Accountability of clouds is a very challenging task and involves technical issues and law enforcement.  Neither clouds nor users should deny any operations performed or requested.
  • 6. LeMeniz Infotech 36, 100 feet Road, Natesan Nagar(Near Indira Gandhi Statue, Next to Fish-O-Fish), Pondicherry-605 005 Call: 0413-4205444, +91 99625 88976, 95663 55386. For More Projects Titles Visits : www.lemenizinfotech.com | Call Us : 9962588976 /9566355386 Do Your Projects With Domain Experts Proposed system  To propose ABS scheme to achieve authenticity and privacy.  This is resistant to replay attacks, in which a user can replace fresh data with stale data from a previous write, even if it no longer has valid claim policy.  This is an important property because a user, revoked of its attributes, might no longer be able to write to the cloud.  This scheme also allows writing multiple times which was not permitted in earlier work. Advantages  Distributed access control of data stored in cloud so that only authorized users with valid attributes can access them.  Authentication of users who store and modify their data on the cloud.  The identity of the user is protected from the cloud during authentication.  The architecture is decentralized, meaning that there can be several KDCs for key management.
  • 7. LeMeniz Infotech 36, 100 feet Road, Natesan Nagar(Near Indira Gandhi Statue, Next to Fish-O-Fish), Pondicherry-605 005 Call: 0413-4205444, +91 99625 88976, 95663 55386. For More Projects Titles Visits : www.lemenizinfotech.com | Call Us : 9962588976 /9566355386 Do Your Projects With Domain Experts  The access control and authentication are both collusion resistant, meaning that no two users can collude and access data or authenticate themselves, if they are individually not authorized.  Revoked users cannot access data after they have been revoked.  The proposed scheme is resilient to replay attacks. A writer whose attributes and keys have been revoked cannot write back stale information.  The protocol supports multiple read and write on the data stored in the cloud.  The costs are comparable to the existing centralized approaches, and the expensive operations are mostly done by the cloud.
  • 8. LeMeniz Infotech 36, 100 feet Road, Natesan Nagar(Near Indira Gandhi Statue, Next to Fish-O-Fish), Pondicherry-605 005 Call: 0413-4205444, +91 99625 88976, 95663 55386. For More Projects Titles Visits : www.lemenizinfotech.com | Call Us : 9962588976 /9566355386 Do Your Projects With Domain Experts LITERATURE SUMMARY ABE was proposed by Sahai and Waters. In ABE, a user has a set of attributes in addition to its unique ID. There are two classes of ABEs.  Key-policy ABE (KP-ABE) o Sender has an access policy to encrypt data. A writer whose attributes and keys have been revoked cannot write back stale information. The receiver receives attributes and secret keys from the attribute authority and is able to decrypt information if it has matching attributes.  Ciphertext-policy (CP-ABE) o Receiver has the access policy in the form of a tree, with attributes as leaves and monotonic access structure with AND, OR and other threshold gates.  Chase proposed a multiauthority ABE, in which there are several KDC authorities which distribute attributes and secret keys to users. Multiauthority ABE protocol was studied, which required no trusted authority which requires every user to have attributes from at all the KDCs.
  • 9. LeMeniz Infotech 36, 100 feet Road, Natesan Nagar(Near Indira Gandhi Statue, Next to Fish-O-Fish), Pondicherry-605 005 Call: 0413-4205444, +91 99625 88976, 95663 55386. For More Projects Titles Visits : www.lemenizinfotech.com | Call Us : 9962588976 /9566355386 Do Your Projects With Domain Experts  Lewko and Waters proposed a fully decentralized ABE where users could have zero or more attributes from each authority and did not require a trusted server. In all these cases, decryption at user’s end is computation intensive.  Green et al. proposed to outsource the decryption task to a proxy server, so that the user can compute with minimum resources. However, the presence of one proxy and one KDC makes it less robust than decentralized approaches. Both these approaches had no way to authenticate users, anonymously.  Yang et al. presented a modification, authenticate users, who want to remain anonymous while accessing the cloud.  To ensure anonymous user authentication ABSs were introduced by Maji et al. This was also a centralized approach. A recent scheme by Maji et al. takes a decentralized approach and provides authentication without disclosing the identity of the users. However, as mentioned earlier in the previous section it is prone to replay attack.
  • 10. LeMeniz Infotech 36, 100 feet Road, Natesan Nagar(Near Indira Gandhi Statue, Next to Fish-O-Fish), Pondicherry-605 005 Call: 0413-4205444, +91 99625 88976, 95663 55386. For More Projects Titles Visits : www.lemenizinfotech.com | Call Us : 9962588976 /9566355386 Do Your Projects With Domain Experts Hardware requirements: Processor : Any Processor above 500 MHz. Ram : 128Mb. Hard Disk : 10 Gb. Compact Disk : 650 Mb. Input device : Standard Keyboard and Mouse. Output device : VGA and High Resolution Monitor. Software requirements: Operating System : Windows Family. Language : JDK 1.5 Database : MySQL 5.0 Tool : HeidiSQL 3.0