SlideShare a Scribd company logo
#13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, Vellore – 6.
Off: 0416-2247353 / 6066663 Mo: +91 9500218218
Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com
FLEXIBLE AND FINE-GRAINED ATTRIBUTE-BASED DATA STORAGE IN CLOUD
COMPUTING
ABSTRACT:
With the development of cloud computing, outsourcing data to cloud server attracts lots
of attentions. To guarantee the security and achieve flexibly fine-grained file access control,
attribute based encryption (ABE) was proposed and used in cloud storage system. However, user
revocation is the primary issue in ABE schemes. In this article, we provide a ciphertext-policy
attribute based encryption (CP-ABE) scheme with efficient user revocation for cloud storage
system. The issue of user revocation can be solved efficiently by introducing the concept of user
group. When any user leaves, the group manager will update users’ private keys except for those
who have been revoked. Additionally, CP-ABE scheme has heavy computation cost, as it grows
linearly with the complexity for the access structure. To reduce the computation cost, we
outsource high computation load to cloud service providers without leaking file content and
secret keys. Notbaly, our scheme can withstand collusion attack performed by revoked users
cooperating with existing users. We prove the security of our scheme under the divisible
computation Diffie-Hellman (DCDH) assumption. The result of our experiment shows
computation cost for local devices is relatively low and can be constant. Our scheme is suitable
for resource constrained devices.
EXISTING SYSTEM:
 Boldyreva et al. presented an IBE scheme with efficient revocation, which is also suitable
for KP-ABE. Nevertheless, it is not clear whether their scheme is suitable for CP-ABE.
 Yu et al. provided an attribute based data sharing scheme with attribute revocation
ability. This scheme was proved to be secure against chosen plaintext attacks (CPA)
based on DBDH assumption. However, the length of cipher text and user’s private key
are proportional to the number of attributes in the attribute universe.
#13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, Vellore – 6.
Off: 0416-2247353 / 6066663 Mo: +91 9500218218
Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com
 Yu et al. designed a KP-ABE scheme with fine-grained data access control. This scheme
requires that the root node in the access tree is an AND gate and one child isa leaf node
which is associated with the dummy attribute.
 In the existing scheme, when a user leaves from a user group, the group manager only
revokes his group secret key which implies that the user’s private key associated with
attributes is still valid. If someone in the group intentionally exposes the group secret key
to the revoked user, he can perform decryption operations through his private key. To
clarify this attack, a concrete instance is given. Assume that the data is encrypted under
the policy “professor AND cryptography” and the group public key. Suppose that there
are two users: user1and user2 whose private keys are associated with the attribute sets
{male, professor, cryptography} and {male, student, cryptography} respectively. If both
of them are in the group and hold the group secret key, then user1can decrypt the data but
user2can’t. When user1is revoked from the group, he can’t decrypt alone because he does
not have the updated group secret key. However, the attributes of user1are not revoked
and user2 has the updated group secret key. So, user1can collude with user2 to perform
the decryption operation. Furthermore, security model and proof were not provided in
their scheme.
DISADVANTAGES OF EXISTING SYSTEM:
 It is expensive in communication and computation cost for users.
 Unfortunately, ABE scheme requires high computation overhead during performing
encryption and decryption operations. This defect becomes more severe for lightweight
devices due to their constrained computing resources.
 There is a major limitation to single-authority ABE as in IBE. Namely, each user
authenticates him to the authority, proves that he has a certain attribute set, and then
receives secret key associated with each of those attributes. Thus, the authority must be
trusted to monitor all the attributes. It is unreasonable in practice and cumbersome for
authority.
PROPOSED SYSTEM:
#13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, Vellore – 6.
Off: 0416-2247353 / 6066663 Mo: +91 9500218218
Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com
 In this system, we focus on designing a CP-ABE scheme with efficient user revocation
for cloud storage system.
 We aim to model collusion attack performed by revoked users cooperating with existing
users.
 Furthermore, we construct an efficient user revocation CP-ABE scheme through
improving the existing scheme and prove our scheme is CPA secure under the selective
model.
 To solve existing security issue, we embed a certificate into each user’s private key. In
this way, each user’s group secret key is different from others and bound together with
his private key associated with attributes.
 To reduce users’ computation burdens, we introduce two cloud service providers named
encryption-cloud service provider (E-CSP) and decryption-cloud service provider (D-
CSP).
 The duty of E-CSP is to perform outsourced encryption operation and D-CSP is to
perform outsourced decryption operation.
 In the encryption phase, the operation associated with the dummy attribute is performed
locally while the operation associated with the sub-tree is outsourced to E-CSP. T
ADVANTAGES OF PROPOSED SYSTEM:
 Reduce the heavy computation burden on users.
 We outsource most of computation load to E-CSP and D-CSP and leave very small
computation cost to local devices.
 Our scheme is efficient for resource constrained devices such as mobile phones.
 Our scheme can be used in cloud storage system that requires the abilities of user
revocation and fine-grained access control.
#13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, Vellore – 6.
Off: 0416-2247353 / 6066663 Mo: +91 9500218218
Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com
SYSTEM ARCHITECTURE:
#13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, Vellore – 6.
Off: 0416-2247353 / 6066663 Mo: +91 9500218218
Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com
SYSTEM REQUIREMENTS:
HARDWARE REQUIREMENTS:
 System : Pentium Dual Core.
 Hard Disk : 120 GB.
 Monitor : 15’’ LED
 Input Devices : Keyboard, Mouse
 Ram : 1GB.
SOFTWARE REQUIREMENTS:
 Operating system : Windows 7.
 Coding Language : JAVA/J2EE
 Tool : Netbeans 7.2.1
 Database : MYSQL

More Related Content

PDF
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
PDF
Flexible and fine grained attribute-based data storage in cloud computing
PDF
Security and Protection of Enterprise Data in Cloud: Implementation of Deniab...
PDF
Ijcatr04051007
PDF
Application of CP-ABE Scheme in Data Sharing System for confidentiality
PDF
IJSRED-V2I3P52
PDF
Authentic Data Access Scheme for Variant Disruption- Tolerant Networks
PDF
IRJET- Data Centric Access Control Solution with Role baesd Proxy Re-Encryption
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
Flexible and fine grained attribute-based data storage in cloud computing
Security and Protection of Enterprise Data in Cloud: Implementation of Deniab...
Ijcatr04051007
Application of CP-ABE Scheme in Data Sharing System for confidentiality
IJSRED-V2I3P52
Authentic Data Access Scheme for Variant Disruption- Tolerant Networks
IRJET- Data Centric Access Control Solution with Role baesd Proxy Re-Encryption

What's hot (18)

PDF
Volume 2-issue-6-2073-2076
PDF
Attribute Based Encryption with Attribute Hiding in Cloud Storage
PDF
A review on key aggregate cryptosystem for scalable data sharing in cloud sto...
PDF
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
PDF
Two Aspect Validation Control Frameworks for Online Distributed Services
PDF
A Survey on Cross-License Cloud Storage Environment of Revelatory, Proficient...
PDF
B04010610
PDF
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...
PDF
Secure and efficient management of confidential data in the decentralized dis...
DOCX
DOCX
4.authentication and key agreement based on anonymous identity for peer to-pe...
PDF
A Survey on Access Control Mechanisms using Attribute Based Encryption in cloud
PPTX
Secure data retrieval for decentralized disruption tolerant military networks
PDF
J018145862
PDF
Secure Data Sharing Algorithm for Data Retrieval In Military Based Networks
PDF
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
PDF
Identity based encryption with cloud revocation authority and its applications
PDF
Exploiting Service Similarity for Privacy in Location Based Search Queries
Volume 2-issue-6-2073-2076
Attribute Based Encryption with Attribute Hiding in Cloud Storage
A review on key aggregate cryptosystem for scalable data sharing in cloud sto...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
Two Aspect Validation Control Frameworks for Online Distributed Services
A Survey on Cross-License Cloud Storage Environment of Revelatory, Proficient...
B04010610
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...
Secure and efficient management of confidential data in the decentralized dis...
4.authentication and key agreement based on anonymous identity for peer to-pe...
A Survey on Access Control Mechanisms using Attribute Based Encryption in cloud
Secure data retrieval for decentralized disruption tolerant military networks
J018145862
Secure Data Sharing Algorithm for Data Retrieval In Military Based Networks
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
Identity based encryption with cloud revocation authority and its applications
Exploiting Service Similarity for Privacy in Location Based Search Queries
Ad

Similar to Flexible and fine grained attribute-based data storage in cloud computing (20)

PPTX
Attribute based encryption in cloud with significant reduction reviw2
PPTX
Final_attribute based encryption in cloud with significant reduction of compu...
DOCX
JPJ1407 Expressive, Efficient, and Revocable Data Access Control for Multi-...
PDF
IRJET- Integrity Verification and Attribute based Encryption for Cloud Storage
DOCX
Audit free cloud storage via deniable attribute-based encryption
DOCX
Audit free cloud storage via deniable attribute-based encryption
DOCX
Audit free cloud storage via deniable attribute-based encryption
PDF
Key aggregate cryptosystem for scalable data sharing in cloud storage
PDF
IRJET- Attribute based Access Control for Cloud Data Storage
PPT
ITDCC01.ppt
DOCX
expressive, efficient, and revocable data access control for multi authority ...
PDF
Acquisition of Secured Data from Cloud
PDF
IRJET- Cipher Text Policy Attribute based Encryption by Deduplication for Tim...
PPTX
Attribute-Based Encryption for Cloud Security
PDF
IRJET- Secure Cloud Data Using Attribute Based Encryption
PDF
C04932125
DOCX
Audit free cloud storage via deniable attribute based encryption
PDF
Investigation on Revocable Fine-grained Access Control Scheme for Multi-Autho...
Attribute based encryption in cloud with significant reduction reviw2
Final_attribute based encryption in cloud with significant reduction of compu...
JPJ1407 Expressive, Efficient, and Revocable Data Access Control for Multi-...
IRJET- Integrity Verification and Attribute based Encryption for Cloud Storage
Audit free cloud storage via deniable attribute-based encryption
Audit free cloud storage via deniable attribute-based encryption
Audit free cloud storage via deniable attribute-based encryption
Key aggregate cryptosystem for scalable data sharing in cloud storage
IRJET- Attribute based Access Control for Cloud Data Storage
ITDCC01.ppt
expressive, efficient, and revocable data access control for multi authority ...
Acquisition of Secured Data from Cloud
IRJET- Cipher Text Policy Attribute based Encryption by Deduplication for Tim...
Attribute-Based Encryption for Cloud Security
IRJET- Secure Cloud Data Using Attribute Based Encryption
C04932125
Audit free cloud storage via deniable attribute based encryption
Investigation on Revocable Fine-grained Access Control Scheme for Multi-Autho...
Ad

More from Shakas Technologies (20)

DOCX
A Review on Deep-Learning-Based Cyberbullying Detection
DOCX
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
DOCX
A Novel Framework for Credit Card.
DOCX
A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...
DOCX
NS2 Final Year Project Titles 2023- 2024
DOCX
MATLAB Final Year IEEE Project Titles 2023-2024
DOCX
Latest Python IEEE Project Titles 2023-2024
DOCX
EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...
DOCX
CYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSE
DOCX
Detecting Mental Disorders in social Media through Emotional patterns-The cas...
DOCX
COMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTION
DOCX
CO2 EMISSION RATING BY VEHICLES USING DATA SCIENCE
DOCX
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
DOCX
Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...
DOCX
Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...
DOCX
Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...
DOCX
Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...
DOCX
Fighting Money Laundering With Statistics and Machine Learning.docx
DOCX
Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...
DOCX
Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...
A Review on Deep-Learning-Based Cyberbullying Detection
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
A Novel Framework for Credit Card.
A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...
NS2 Final Year Project Titles 2023- 2024
MATLAB Final Year IEEE Project Titles 2023-2024
Latest Python IEEE Project Titles 2023-2024
EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...
CYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSE
Detecting Mental Disorders in social Media through Emotional patterns-The cas...
COMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTION
CO2 EMISSION RATING BY VEHICLES USING DATA SCIENCE
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...
Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...
Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...
Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...
Fighting Money Laundering With Statistics and Machine Learning.docx
Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...
Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...

Recently uploaded (20)

PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PDF
Microbial disease of the cardiovascular and lymphatic systems
PDF
VCE English Exam - Section C Student Revision Booklet
PPTX
Pharma ospi slides which help in ospi learning
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PDF
TR - Agricultural Crops Production NC III.pdf
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PPTX
Cell Types and Its function , kingdom of life
PDF
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
PDF
Business Ethics Teaching Materials for college
PDF
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PDF
Basic Mud Logging Guide for educational purpose
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PDF
RMMM.pdf make it easy to upload and study
PPTX
The Healthy Child – Unit II | Child Health Nursing I | B.Sc Nursing 5th Semester
PDF
Insiders guide to clinical Medicine.pdf
PDF
Mark Klimek Lecture Notes_240423 revision books _173037.pdf
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
Microbial disease of the cardiovascular and lymphatic systems
VCE English Exam - Section C Student Revision Booklet
Pharma ospi slides which help in ospi learning
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
TR - Agricultural Crops Production NC III.pdf
FourierSeries-QuestionsWithAnswers(Part-A).pdf
Cell Types and Its function , kingdom of life
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
Business Ethics Teaching Materials for college
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
Basic Mud Logging Guide for educational purpose
O5-L3 Freight Transport Ops (International) V1.pdf
RMMM.pdf make it easy to upload and study
The Healthy Child – Unit II | Child Health Nursing I | B.Sc Nursing 5th Semester
Insiders guide to clinical Medicine.pdf
Mark Klimek Lecture Notes_240423 revision books _173037.pdf
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student

Flexible and fine grained attribute-based data storage in cloud computing

  • 1. #13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, Vellore – 6. Off: 0416-2247353 / 6066663 Mo: +91 9500218218 Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com FLEXIBLE AND FINE-GRAINED ATTRIBUTE-BASED DATA STORAGE IN CLOUD COMPUTING ABSTRACT: With the development of cloud computing, outsourcing data to cloud server attracts lots of attentions. To guarantee the security and achieve flexibly fine-grained file access control, attribute based encryption (ABE) was proposed and used in cloud storage system. However, user revocation is the primary issue in ABE schemes. In this article, we provide a ciphertext-policy attribute based encryption (CP-ABE) scheme with efficient user revocation for cloud storage system. The issue of user revocation can be solved efficiently by introducing the concept of user group. When any user leaves, the group manager will update users’ private keys except for those who have been revoked. Additionally, CP-ABE scheme has heavy computation cost, as it grows linearly with the complexity for the access structure. To reduce the computation cost, we outsource high computation load to cloud service providers without leaking file content and secret keys. Notbaly, our scheme can withstand collusion attack performed by revoked users cooperating with existing users. We prove the security of our scheme under the divisible computation Diffie-Hellman (DCDH) assumption. The result of our experiment shows computation cost for local devices is relatively low and can be constant. Our scheme is suitable for resource constrained devices. EXISTING SYSTEM:  Boldyreva et al. presented an IBE scheme with efficient revocation, which is also suitable for KP-ABE. Nevertheless, it is not clear whether their scheme is suitable for CP-ABE.  Yu et al. provided an attribute based data sharing scheme with attribute revocation ability. This scheme was proved to be secure against chosen plaintext attacks (CPA) based on DBDH assumption. However, the length of cipher text and user’s private key are proportional to the number of attributes in the attribute universe.
  • 2. #13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, Vellore – 6. Off: 0416-2247353 / 6066663 Mo: +91 9500218218 Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com  Yu et al. designed a KP-ABE scheme with fine-grained data access control. This scheme requires that the root node in the access tree is an AND gate and one child isa leaf node which is associated with the dummy attribute.  In the existing scheme, when a user leaves from a user group, the group manager only revokes his group secret key which implies that the user’s private key associated with attributes is still valid. If someone in the group intentionally exposes the group secret key to the revoked user, he can perform decryption operations through his private key. To clarify this attack, a concrete instance is given. Assume that the data is encrypted under the policy “professor AND cryptography” and the group public key. Suppose that there are two users: user1and user2 whose private keys are associated with the attribute sets {male, professor, cryptography} and {male, student, cryptography} respectively. If both of them are in the group and hold the group secret key, then user1can decrypt the data but user2can’t. When user1is revoked from the group, he can’t decrypt alone because he does not have the updated group secret key. However, the attributes of user1are not revoked and user2 has the updated group secret key. So, user1can collude with user2 to perform the decryption operation. Furthermore, security model and proof were not provided in their scheme. DISADVANTAGES OF EXISTING SYSTEM:  It is expensive in communication and computation cost for users.  Unfortunately, ABE scheme requires high computation overhead during performing encryption and decryption operations. This defect becomes more severe for lightweight devices due to their constrained computing resources.  There is a major limitation to single-authority ABE as in IBE. Namely, each user authenticates him to the authority, proves that he has a certain attribute set, and then receives secret key associated with each of those attributes. Thus, the authority must be trusted to monitor all the attributes. It is unreasonable in practice and cumbersome for authority. PROPOSED SYSTEM:
  • 3. #13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, Vellore – 6. Off: 0416-2247353 / 6066663 Mo: +91 9500218218 Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com  In this system, we focus on designing a CP-ABE scheme with efficient user revocation for cloud storage system.  We aim to model collusion attack performed by revoked users cooperating with existing users.  Furthermore, we construct an efficient user revocation CP-ABE scheme through improving the existing scheme and prove our scheme is CPA secure under the selective model.  To solve existing security issue, we embed a certificate into each user’s private key. In this way, each user’s group secret key is different from others and bound together with his private key associated with attributes.  To reduce users’ computation burdens, we introduce two cloud service providers named encryption-cloud service provider (E-CSP) and decryption-cloud service provider (D- CSP).  The duty of E-CSP is to perform outsourced encryption operation and D-CSP is to perform outsourced decryption operation.  In the encryption phase, the operation associated with the dummy attribute is performed locally while the operation associated with the sub-tree is outsourced to E-CSP. T ADVANTAGES OF PROPOSED SYSTEM:  Reduce the heavy computation burden on users.  We outsource most of computation load to E-CSP and D-CSP and leave very small computation cost to local devices.  Our scheme is efficient for resource constrained devices such as mobile phones.  Our scheme can be used in cloud storage system that requires the abilities of user revocation and fine-grained access control.
  • 4. #13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, Vellore – 6. Off: 0416-2247353 / 6066663 Mo: +91 9500218218 Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com SYSTEM ARCHITECTURE:
  • 5. #13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, Vellore – 6. Off: 0416-2247353 / 6066663 Mo: +91 9500218218 Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com SYSTEM REQUIREMENTS: HARDWARE REQUIREMENTS:  System : Pentium Dual Core.  Hard Disk : 120 GB.  Monitor : 15’’ LED  Input Devices : Keyboard, Mouse  Ram : 1GB. SOFTWARE REQUIREMENTS:  Operating system : Windows 7.  Coding Language : JAVA/J2EE  Tool : Netbeans 7.2.1  Database : MYSQL