SlideShare a Scribd company logo
SHARED AUTHORITY BASED PRIVACY PRESERVING PROTOCOL
C. Pragna Bai1
, K. Kishore Kumar2
1
M.Tech., PG Scholar, Dept of CSE, Korm College of Engineering, Kadapa,Andhra Pradesh.
2
Assistant Professor, Dept of CSE,Korm College of Engineering, Kadapa, Andhra Pradesh.
Abstract- Cloud computing is emerging as a prevalent data
interactive paradigm to realize users’ data remotely stored in
an online cloud server. Cloud services provide great
conveniences for the users to enjoy the on-demand cloud
applications without considering the local infrastructure
limitations. During the data accessing, different users may be
in a collaborative relationship, and thus data sharing becomes
significant to achieve productive benefits. The existing security
solutions generally focus on authentication procedures where
a user’s private knowledge cannot be accessed without proper
authorization, however neglecting the privacy issue. This could
reveal user’s private information regardless of the information
access permissions being granted or not. Therefore, we can use
SAPA protocol in which shared access authority is achieved by
anonymous access request matching mechanism to handle the
privacy issue in cloud. Propose an authentication protocol to
enhance a user’s access request related privacy, and the shared
access authority is achieved by anonymous access request
matching mechanism. Apply cipher text-policy attribute based
access control to realize that a user can reliably access its own
data fields, and adopt the proxy re-encryption to provide temp
authorized data sharing among multiple users.
Keywords: Cloud computing, authorization authentication
protocol, security, privacy preservation, shared authority.
1.INTRODUCTION
Cloud computing is a popular IT architecture in the current trend,
which offers exclusive data storage with ondemand services and
network access round the clock. This architecture can be
witnessed as a service which could be software, infrastructure or
a platform available anytime anywhere for the users. Despite
being popular and powerful cloud computing faces downfall in
areas of privacy and security. Traditional approaches concentrate
on the authentication procedures to witness remote access of data
on demand. But eventually a user may want to access or share
data for better results, which in turn brings security and privacy
concerns in cloud storage. In order to overcome this, Shared
Authority based Privacy preserving Authentication protocol
(SAPA). This protocol is exclusively used for handling the
privacy issues in cloud storage. Shared access authority is
achieved by anonymous access request matching procedure with
four important attributes namely, User privacy, Authentication,
Forward Security and Anonymity [1].
User privacy is achieved when any unrelated user cannot wild
guess a user’s access interests. Only if they both possess a mutual
interest they will be allowed to share by the cloud server.
Authentication is achieved when a legal and registered user can
access his data and any other data cannot deceive him.
Anonymity is achieved when any unrelated entity cannot find out
the data transferred and communication state even by
interception through open communication channel. Forward
security is achieved when any miscreant cannot guess the previous
communications with the currently held data of any two sessions.
Attribute based access control is used to make sure that the users
can access only his data. Thus this protocol is well suited for multi-
user collaborative cloud applications since it does not compromise
the user’s private information.
An example is introduced to identify the main motivation. In the
cloud storage based supply chain management, there are various
interest groups (e.g., supplier, carrier, and retailer) in the system.
Each group owns its users which are permitted to access the
authorized data fields, and different users own relatively
independent access authorities. It means that any two users from
diverse groups should access different data fields of the same file.
There into, a supplier purposely may want to access a carrier’s data
fields, but it is not sure whether the carrier will allow its access
request. If the carrier refuses its request, the supplier’s access
desire will be revealed along with nothing obtained towards the
desired data fields. Actually, the supplier may not send the access
request or withdraw the unaccepted request in advance if it firmly
knows that its request will be refused by the carrier. It is
unreasonable to thoroughly disclose the supplier’s private
information without any privacy considerations. Fig. 1 illustrates
three revised cases to address above imperceptible privacy issue.
Securing Infrastructure as a Service The IaaS model lets users
lease compute, storage, network, and other resources in a
virtualized environment. The user doesn’t manage or control the
underlying cloud infrastructure but has control over the OS,
storage, deployed applications, and possibly certain networking
components. Amazon’s Elastic Compute Cloud (EC2) is a good
example of IaaS. At the cloud infrastructure level, CSPs can
enforce network security with intrusion-detection systems (IDSs),
firewalls, antivirus programs, distributed denial-of-service
(DDoS) defenses, and so on. Securing Platform as a Service
Cloud platforms are built on top of IaaS with system integration
and virtualization middleware support. Such platforms let users
deploy user-built software applications onto the cloud
infrastructure using provider-supported programming languages
and software tools
II LITERATURE SURVEY
Literature survey is the most important step in software
development process. Before developing the tool it is necessary to
determine the time factor, economy n company strength. Once
these things r satisfied, ten next steps are to determine which
operating systemand language can be used for developing the tool.
Once the programmers start building the tool the programmers
ISBN-13: 978-1537584836
www.iaetsd.in
Proceedings of ICAER-2016
©IAETSD 201611
need lot of external support. This support can be obtained from
senior programmers, from book or from websites. Before
building the system the above consideration are taken into
account for developing the proposed system. Implementation:
We have implemented our basic approach on Amazon S3 which
is a popular cloud based storage service. The content
management consists of two tasks. First, the Owner encrypts the
data item sets based on the access control policies and uploads
the encrypted sets along with some meta-data. Then, authorized
users download the encrypted data items sets and meta-data from
the Cloud , and decrypt the data item sets using the secrets they
have. Now we illustrate the interactions of the Owner with
Amazon S3 as the Cloud . In our implementation, we have used
the REST API to communicate with Amazon S3. Figure 2 shows
the overall involvement of the Owner in the user and content
management process when uploading the data item sets to
Amazon S3. While the fine-grained access control is enforced by
encrypting using the keys generated through the AB-GKM
scheme, it is important to limit the access to even the encrypted
data item sets in order to minimize the bandwidth utilization. We
associate a hash-based message authentication code (HMAC)
with each encrypted data item sets such that only the users having
valid identity attributes can produce matching HMACs.Initially
the Owner creates a bucket , which is a logical container in S3, to
store encrypted data item sets as objects . Subsequently, the
Owner executes the following steps:1. The Owner generates the
symmetric keys using the AB-GKM’s KeyGen algorithm and
instantiates an encryption client. Note that the Owner generates a
unique symmetric key for each policy configuration.
Trust and security have prevented businesses from fully
accepting cloud platforms. To protect clouds, providers must first
secure virtualized data center resources, uphold user privacy, and
preserve data integrity. The authors suggest using a trust-overlay
network over multiple data centers to implement a reputation
system for establishing trust between service providers and data
owners. Data coloring and software watermarking techniques
protect shared data objects and massively distributed software
modules. These techniques safeguard multi-way authentications,
enable single sign-on in the cloud, and tighten access control for
sensitive data in both public and private clouds.
III. RELATED WORK
In [2] ENISA has proposed that “Complexity of risk
evaluation” is one of the major privacy challenges in cloud
computing. The complexity of the services gives rise to a
number of unidentified parameters. Service consumers and
providers are careful while providing and consuming services.
The real challenge encountered in this scenario is checking the
lifecycle of data processing and its conformity with officially
authorized frameworks. Some of the following questions are
needed to be answered in order to find the risks to privacy:
Who are the stakeholders involved?, Where the data is
stored?, How data is duplicated?, What are the stakeholder
roles and responsibilities?, What are the rules for data
processing?, How the service provider will reach the desired
level of privacy and security? They have suggested that every
user can have an apparent policy as how to the personal data
is to be processed and the stakeholders have to specify the
needs for cloud that meet the desired level of privacy. ENISA
in Europe suggest understanding the shift in balance in terms
of accountability and responsibility in key functions and
conformity with the laws [2]. In [3] authors suggest that
developing and implementing proactive strategies or measures
to promote better compliance with the laws of privacy
regarding the personal data processing. This can be done
through procedures that detect and prevent breaches in systems.
Literally, there is no accepted definition for PETs, but in
general we can consider technologies with the following
qualities are PETs, reduce privacy risks, data held about the
users are minimal, allow the users to have control over their
information. Therefore, by implementing the PETs the
requirements of the proactive measures could be met. And they
can protect the privacy over the personal data and prevent from
undesired processing. These PETs include tools like
anonymisation, encryption, pseudonymisation, transparency
enhancing tools. In [4] authors have proposed that “Client
Based Privacy Manager” helps in reducing the data leakage and
loss of privacy of the sensitive data. Some the major
characteristics of the privacy managers are:
Data Access: The Manager contains a separate module for
accessing personal information by the users in the cloud. This
is an auditing procedure that checks accuracy and privacy
violations.
Obfuscation: This is done by the users on the required fields
before being sent to the cloud using a user chosen key that the
service providers are not known of. Feedback: This module
keeps track of the data being transferred and data usage.
Preference Setting: Allows the users to set preferences over
their data thereby giving greater control. The major advantage
is that it solves automation and end user problems. The
disadvantages are, it requires full co-operation of the service
provider and sufficient computing resources for obfuscation. In
[5] authors have proposed that for Anonymous data sharing
between the parties an algorithm is developed to generate ID
numbers ranging from 1 to N. And the assignment of these ID’s
is anonymous so that the members do not know about it and
maximum care is taken to avoid collisions. These procedures
are carried out without a trusted third party. Newton’s identities
and strum theorem to develop secure sum. Usage of finite
polynomials enhances scalability and Markov chain finds the
required number of iterations. In [6] authors have proposed that
in recent years, the number of mobile users in the society has
risen dramatically. The privacy aware authentication scheme
provides security and flexibility to the users to make use of
various cloud services from various providers using a single
private key. A bilinear pairing cryptosystem and nonce
generation is used to enhance the security strength of the
scheme. In addition to it, it also provides user intractability,
mutual authentication, exchange of keys, anonymity and so on.
This scheme reduces the memory space usage on the respective
cloud service providers. The Smart card Generator serves as the
key distributor for providers and mobile clients or users. Also,
the scheme does not involve the SCG service in the user
authentication procedure. It also reduces the processing time of
the authentication process in terms of computation between
providers and TTP. Formal Performance analysis tasks are
conducted and the scheme is found to be efficient and secure.
In [7] authors have suggested that du e to the growing Security
needs in the world the mentioned security algorithms have been
surveyed and it is found that each has its own pros and cons.
But, out of them AES algorithm is found to be efficient. Some
of the Advantages are more secure, supports larger key size,
faster in terms of hardware and software, 128-bit key size
makes it less prone to attacks, suitable for cloud. Some of the
ISBN-13: 978-1537584836
www.iaetsd.in
Proceedings of ICAER-2016
©IAETSD 201612
Disadvantages of other algorithms are less secure, slow in
terms of speed, small and medium key size. In [8] authors
have suggested that due to the growth of cloud, security has
become a vital part of cloud computing. Malicious activities
and vulnerabilities are inevitable. The key purpose is to verify
if AES provides better security than other
algorithms. By implementing it, it is witnessed that it provides
less memory consumption and computation time. Some of the
Advantages are high performance, speedy key setup, key
agility, less memory, instruction level parallelism, no
cryptanalysis attacks have been proved. On comparing with
other algorithms, AES eliminates weak keys, which is found
is DES. During performance analysis it is found that AES has
an advantage over other algorithms in terms of execution time
[9]. Also over RC2, RC6 and blowfish with time consumption
[10].
IV.PROPOSEDWORK
The existing security solutions generally concentrates over the
authentication procedures which implies a user’s private
information cannot be accessed without proper authorization,
while neglecting privacy issue during the data sharing. During
the information accessing, different users can be in a mutual
relationship which stresses on the importance of knowledge
sharing in order to attain better performance. Due to
mentioned privacy issue, the user’s private information could
be revealed regardless the access permission being granted or
not. In a cloud storage based supply chain management, there
will be various interest groups in the system.
Each group has its own users who are permitted to access the
authorized data fields, and different users own relatively
independent access authorities. It means that any two users
from diverse groups should access different data fields of the
same file. For instance, consider two groups G1 and G2, if a
user from G1 requests data from the user in G2, and if his
request is rejected, the user’s access desire will be revealed
along with nothing obtained towards the desired data fields. A
user may not send the access request or withdraw the
unaccepted request in advance if he firmly knows that his
request will be rejected. Therefore, it is unreasonable to
thoroughly disclose a user’s private information without any
privacy considerations. In order to overcome the privacy issue
“shared authority based privacy preserving authentication”
protocol (SAPA) can be used for the cloud data storage, which
realizes authentication and authorization
without compromising a user’s private information.
Identifies a new privacy challenge in cloud storage, and
address a subtle privacy issue during a user challenging the
cloud server for data sharing, in which the challenged request
itself cannot reveal the user’s privacy no matter whether or not
it can obtain the access authority. And proposes an
authentication protocol to enhance a user’s access request
related privacy, and the shared access authority is achieved by
anonymous access request matching mechanism. Encryption
techniques are used to provide authorized data sharing among
multiple users. Shared authority is achieved by anonymous
request matching mechanism without compromising the
privacy. Also, attribute based access is used to allow only
authorized users to request information and proxy
reencryption is applied by the cloud server to allow
knowledge sharing among the multiple users. In order to
witness the SAPA protocol we have developed a simple “e-
library management system”. And we have hosted this system
on to the Azure cloud and have realized the efficient working
of SAPA.
IVMETHODOLOGY
In this paper, we address the aforementioned privacy issue to
propose a shared authority based privacy preserving
authentication protocol (SAPA) for the cloud data storage,
which realizes authentication and authorization without
compromising a user’s private information. The main
contributions are as follows.
 Identify a new privacy challenge in cloud storage, and
address a subtle privacy issue during a user challenging the
cloud server for data sharing, in which the challenged
request itself cannot reveal the user’s privacy no matter
whether or not it can obtain the access authority.
 Propose an authentication protocol to enhance a user’s
access request related privacy, and the shared access
authority is achieved by anonymous access request
matching mechanism.
 Apply cipher text-policy attribute based access control to
realize that a user can reliably access its own data fields,
and adopt the proxy re-encryption to provide temp
authorized data sharing among multiple users.
 Advantages Of Proposed System:
 The scheme allows users to audit the cloud storage with
lightweight communication overloads and computation
cost, and the auditing result ensures strong cloud storage
correctness and fast data error localization.
 During cloud data accessing, the user autonomously
interacts with the cloud server without external
interferences and is assigned with the full and independent
authority on its own data fields.
Identify a new privacy challenge in cloud storage, and address
a subtle privacy issue during a user challenging the cloud
server for data sharing, in which the challenged request itself
cannot reveal the user’s privacy no matter whether or not it
can obtain the access authority. Propose an authentication
protocol to enhance a user’s access request related privacy,
and the shared access authority is achieved by anonymous
access request matching mechanism. Apply cipher text-policy
attribute based access control to realize that a user can reliably
access its own data fields, and adopt the proxy re-encryption
to provide temp authorized data sharing among multiple users.
Fig 1: System Architecture
Implementation is the stage of the project when the theoretical
design is turned out into a working system. Thus it can be
considered to be the most critical stage in achieving a
successful new system and in giving the user, confidence that
ISBN-13: 978-1537584836
www.iaetsd.in
Proceedings of ICAER-2016
©IAETSD 201613
the new system will work and be effective. The
implementation stage involves careful planning,
investigation of the existing system and it’s constraints on
implementation, designing of methods to achieve
changeover and evaluation of changeover methods.
Implementation is the process of converting a new system
design into operation. It is the phase that focuses on user
training, site preparation and file conversion for installing a
candidate system. The important factor that should be
considered here is that the conversion should not disrupt the
functioning of the organization.
IV. CONCLUSION
In this work, we have identified a new privacy challenge
during data accessing in the cloud computing to achieve
privacy-preserving access authority sharing. Authentication is
established to guarantee data confidentiality and data
integrity. Data anonymity is achieved since the wrapped
values are exchanged during transmission. User privacy is
enhanced by anonymous access requests to privately inform
the cloud server about the users’ access desires. Forward
security is realized by the session identifiers to prevent the
session correlation. It indicates that the proposed scheme is
possibly applied for enhanced privacy preservation in cloud
applications.
REFERENCE
[1] J. Bethencourt, A. Sahai, and B. Waters. Ciphertext-policy
attribute-based encryption. In SP 2007: Proceedings of the
28th IEEE Symposium on Security and Privacy, pages 321–
334, 2007.
[2] J. Camenisch, M. Dubovitskaya, R. R. Enderlein, and G.
Neven. Oblivious transfer with hidden access control from
attribute-based encryption. In SCN 2012: Proceedings of the
8th International Conference on Security and Cryptography
for Networks, pages 559–579, 2012.
[3] D. Halevy and A. Shamir. The LSD broadcast encryption
scheme. In CRYPTO 2001: Proceedings of the 22nd Annual
International Cryptology Conference on Advances in
Cryptology, pages 47–60, 2002.
[4] J. Li and N. Li. OACerts: Oblivious attribute certificates.
IEEE Transactions on Dependable and Secure Computing,
3(4):340–352, 2006.
[5] M. Nabeel and E. Bertino. Towards attribute based group
key management. In CCS 2011: Proceedings of the 18th ACM
conference on Computer and communications security, 2011.
[6] M. Nabeel, N. Shang, and E. Bertino. Privacy preserving
policy based content sharing in public clouds. IEEE
Transactions on Knowledge and Data Engineering, 99, 2012.
[7] OpenID. http://openid.net/ [Last accessed: Oct. 14, 2012].
[8] T. Pedersen. Non-interactive and information-theoretic
secure verifiable secret sharing. In CRYPTO 1991:
Proceedings of the 11th Annual International Cryptology
Conference on Advances in Cryptology, pages 129–140,
1992.
[9] N. Shang, M. Nabeel, F. Paci, and E. Bertino. A privacy-
preserving approach to policy-based content dissemination. In
ICDE 2010: Proceedings of the 2010 IEEE 26th International
Conference on Data Engineering, 2010.
[10] S. Yu, C. Wang, K. Ren, and W. Lou. Attribute based data
sharing with attribute revocation. In ASIACCS 2010:
Proceedings of the 5th ACM Symposium on Information,
Computer and Communications Security, pages 261–270,
2010.
[11] S. Yu, C. Wang, K. Ren, and W. Lou. Achieving secure,
scalable, and fine-grained data access control in cloud
computing. In INFOCOM 2010: Proceedings of the 29th
conference on Information communications, pages 534–542,
2010.
[12] C. Collberg and C. Thomborson, ―Watermarking,
Tamper-Proofing, and Obfuscation-Tools for Software
Protection,‖ IEEE Trans. Software Eng., vol. 28, 2002, pp.
735–746.
[13] D. Li, C. Liu, and W. Gan, ―A New Cognitive Model:
Cloud Model,‖ Int’l J. Intelligent Systems, Mar. 2009, pp. 357–
375.
[14] D. Li and Y. Du, Artificial Intelligence with Uncertainty,
Chapman & Hall, 2008.
ISBN-13: 978-1537584836
www.iaetsd.in
Proceedings of ICAER-2016
©IAETSD 201614

More Related Content

PDF
Achieving Secure, sclable and finegrained Cloud computing report
DOCX
4.authentication and key agreement based on anonymous identity for peer to-pe...
PDF
Ieeepro techno solutions 2011 ieee java project -secure role based data
PPTX
Shared aythority ppt design [autosaved]
PDF
Enhanced security framework to ensure data security
PDF
Enhanced security framework to ensure data security in cloud using security b...
PDF
Shared authority based privacy preserving authentication protocol in cloud co...
DOC
Shared authority based privacy preserving authentication protocol in cloud co...
Achieving Secure, sclable and finegrained Cloud computing report
4.authentication and key agreement based on anonymous identity for peer to-pe...
Ieeepro techno solutions 2011 ieee java project -secure role based data
Shared aythority ppt design [autosaved]
Enhanced security framework to ensure data security
Enhanced security framework to ensure data security in cloud using security b...
Shared authority based privacy preserving authentication protocol in cloud co...
Shared authority based privacy preserving authentication protocol in cloud co...

What's hot (19)

PPTX
A study on security issues in cloud based e learning
PDF
Augmenting Publish/Subscribe System by Identity Based Encryption (IBE) Techni...
PDF
Shared authority based privacy preserving authentication protocol in cloud co...
DOCX
SHARED AUTHORITY BASED PRIVACY-PRESERVING AUTHENTICATION PROTOCOL IN CLOUD CO...
PDF
5.[40 44]enhancing security in cloud computing
PDF
A Survey on Different Techniques Used in Decentralized Cloud Computing
PDF
Attribute-Based Data Sharing
PDF
Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Co...
PDF
A Novel Information Accountability Framework for Cloud Computing
PDF
IRJET- Security Enhancement for Sharing Data within Group Members in Cloud
PDF
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
PPT
Shared authority based privacy preserving authentication protocol in cloud co...
PDF
Cloud Security and Data Integrity with Client Accountability Framework
DOCX
Public integrity auditing for shared dynamic cloud data with group user revoc...
PDF
International Journal of Engineering Research and Development
PDF
Carrying out safe exploration short of the actual data of codes and trapdoors
PPTX
Cloud Security Mechanisms
PDF
I42024349
PDF
J018145862
A study on security issues in cloud based e learning
Augmenting Publish/Subscribe System by Identity Based Encryption (IBE) Techni...
Shared authority based privacy preserving authentication protocol in cloud co...
SHARED AUTHORITY BASED PRIVACY-PRESERVING AUTHENTICATION PROTOCOL IN CLOUD CO...
5.[40 44]enhancing security in cloud computing
A Survey on Different Techniques Used in Decentralized Cloud Computing
Attribute-Based Data Sharing
Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Co...
A Novel Information Accountability Framework for Cloud Computing
IRJET- Security Enhancement for Sharing Data within Group Members in Cloud
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
Shared authority based privacy preserving authentication protocol in cloud co...
Cloud Security and Data Integrity with Client Accountability Framework
Public integrity auditing for shared dynamic cloud data with group user revoc...
International Journal of Engineering Research and Development
Carrying out safe exploration short of the actual data of codes and trapdoors
Cloud Security Mechanisms
I42024349
J018145862
Ad

Viewers also liked (19)

PDF
High efficient carry skip adder in various multiplier structures
PDF
Iaetsd finger print recognition by cordic algorithm and pipelined fft
PDF
Iirdem experimental investigation on self compacting fiber reinforced concret...
PDF
iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...
PDF
Iirdem design and analysis of a smart helmet gsm based system against drunken...
PDF
Improving thrpoughput and energy efficiency by pctar protocol in wireless
PDF
iirdem Surveillance aided robotic bird
PDF
iirdem Growing India Time Monopoly – The Key to Initiate Long Term Rapid Growth
PDF
iaetsdv Blue eyes a revolution
PDF
iaetsd Controlling data deuplication in cloud storage
PDF
Iaetsd low power flip flops for vlsi applications
PDF
Iaetsd study on optimum utilization of sludge from sewage treatment plants
PDF
Proximate and ultimate analysis of cotton pod used in the updraft gasifier
PDF
Iaetsd modelling and controller design of cart inverted pendulum system using...
PDF
Iirdem performance enhancement of vapour compression refrigeration system by ...
PDF
Iaetsd wireless electronic notice board using gsm
PDF
Iaetsd extending sensor networks into the cloud using tpss and lbss
PDF
Iaetsd io t of bridges
PDF
Iaetsd vlsi architecture of fm0 manchester encoding using sols technique for ...
High efficient carry skip adder in various multiplier structures
Iaetsd finger print recognition by cordic algorithm and pipelined fft
Iirdem experimental investigation on self compacting fiber reinforced concret...
iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...
Iirdem design and analysis of a smart helmet gsm based system against drunken...
Improving thrpoughput and energy efficiency by pctar protocol in wireless
iirdem Surveillance aided robotic bird
iirdem Growing India Time Monopoly – The Key to Initiate Long Term Rapid Growth
iaetsdv Blue eyes a revolution
iaetsd Controlling data deuplication in cloud storage
Iaetsd low power flip flops for vlsi applications
Iaetsd study on optimum utilization of sludge from sewage treatment plants
Proximate and ultimate analysis of cotton pod used in the updraft gasifier
Iaetsd modelling and controller design of cart inverted pendulum system using...
Iirdem performance enhancement of vapour compression refrigeration system by ...
Iaetsd wireless electronic notice board using gsm
Iaetsd extending sensor networks into the cloud using tpss and lbss
Iaetsd io t of bridges
Iaetsd vlsi architecture of fm0 manchester encoding using sols technique for ...
Ad

Similar to iaetsd Shared authority based privacy preserving protocol (20)

PDF
Secure Data Sharing In an Untrusted Cloud
PDF
A cloud storage system for sharing data securely with privacy preservation an...
PDF
Security for Effective Data Storage in Multi Clouds
PDF
Security Check in Cloud Computing through Third Party Auditor
PDF
Paper id 212014106
DOC
Security threats in cloud computing
PDF
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
PDF
Insuring Security for Outsourced Data Stored in Cloud Environment
PDF
Ieeepro techno solutions 2011 ieee dotnet project -secure role based data
PDF
An efficient and secure data storage in cloud computing using modified RSA pu...
PDF
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
PDF
Data Stream Controller for Enterprise Cloud Application
PDF
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...
PDF
1784 1788
PDF
1784 1788
PDF
ENHANCING SECURITY IN CLOUD COMPUTING BY COMBINING DYNAMIC BROADCAST ENCRYPTI...
PDF
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
PDF
International Journal of Computational Engineering Research(IJCER)
PDF
Preserving Privacy Policy- Preserving public auditing for data in the cloud
PDF
Accountability in Distributed Environment For Data Sharing in the Cloud
Secure Data Sharing In an Untrusted Cloud
A cloud storage system for sharing data securely with privacy preservation an...
Security for Effective Data Storage in Multi Clouds
Security Check in Cloud Computing through Third Party Auditor
Paper id 212014106
Security threats in cloud computing
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Insuring Security for Outsourced Data Stored in Cloud Environment
Ieeepro techno solutions 2011 ieee dotnet project -secure role based data
An efficient and secure data storage in cloud computing using modified RSA pu...
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
Data Stream Controller for Enterprise Cloud Application
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...
1784 1788
1784 1788
ENHANCING SECURITY IN CLOUD COMPUTING BY COMBINING DYNAMIC BROADCAST ENCRYPTI...
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
International Journal of Computational Engineering Research(IJCER)
Preserving Privacy Policy- Preserving public auditing for data in the cloud
Accountability in Distributed Environment For Data Sharing in the Cloud

More from Iaetsd Iaetsd (20)

PDF
iaetsd Survey on cooperative relay based data transmission
PDF
iaetsd Software defined am transmitter using vhdl
PDF
iaetsd Health monitoring system with wireless alarm
PDF
iaetsd Equalizing channel and power based on cognitive radio system over mult...
PDF
iaetsd Economic analysis and re design of driver’s car seat
PDF
iaetsd Design of slotted microstrip patch antenna for wlan application
PDF
REVIEW PAPER- ON ENHANCEMENT OF HEAT TRANSFER USING RIBS
PDF
A HYBRID AC/DC SOLAR POWERED STANDALONE SYSTEM WITHOUT INVERTER BASED ON LOAD...
PDF
Fabrication of dual power bike
PDF
Blue brain technology
PDF
iirdem The Livable Planet – A Revolutionary Concept through Innovative Street...
PDF
iirdem Design of Efficient Solar Energy Collector using MPPT Algorithm
PDF
iirdem CRASH IMPACT ATTENUATOR (CIA) FOR AUTOMOBILES WITH THE ADVOCATION OF M...
PDF
iaetsd Secured multiple keyword ranked search over encrypted databases
PDF
iaetsd Robots in oil and gas refineries
PDF
iaetsd Modeling of solar steam engine system using parabolic
PDF
iaetsd Isolation of cellulose from non conventional source and its chemical m...
PDF
iaetsd Effect of superconducting fault current limiter (sfcl) on triumphant i...
PDF
iaetsd Co extracting opinion targets and opinion words from online reviews ba...
PDF
iaetsd Automation of batching plant using plc and scada
iaetsd Survey on cooperative relay based data transmission
iaetsd Software defined am transmitter using vhdl
iaetsd Health monitoring system with wireless alarm
iaetsd Equalizing channel and power based on cognitive radio system over mult...
iaetsd Economic analysis and re design of driver’s car seat
iaetsd Design of slotted microstrip patch antenna for wlan application
REVIEW PAPER- ON ENHANCEMENT OF HEAT TRANSFER USING RIBS
A HYBRID AC/DC SOLAR POWERED STANDALONE SYSTEM WITHOUT INVERTER BASED ON LOAD...
Fabrication of dual power bike
Blue brain technology
iirdem The Livable Planet – A Revolutionary Concept through Innovative Street...
iirdem Design of Efficient Solar Energy Collector using MPPT Algorithm
iirdem CRASH IMPACT ATTENUATOR (CIA) FOR AUTOMOBILES WITH THE ADVOCATION OF M...
iaetsd Secured multiple keyword ranked search over encrypted databases
iaetsd Robots in oil and gas refineries
iaetsd Modeling of solar steam engine system using parabolic
iaetsd Isolation of cellulose from non conventional source and its chemical m...
iaetsd Effect of superconducting fault current limiter (sfcl) on triumphant i...
iaetsd Co extracting opinion targets and opinion words from online reviews ba...
iaetsd Automation of batching plant using plc and scada

Recently uploaded (20)

DOCX
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
PDF
ETO & MEO Certificate of Competency Questions and Answers
PDF
Well-logging-methods_new................
PPTX
Sustainable Sites - Green Building Construction
PPTX
CYBER-CRIMES AND SECURITY A guide to understanding
PPTX
Welding lecture in detail for understanding
PPTX
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
PPT
Project quality management in manufacturing
PPTX
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
PPTX
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
PDF
Structs to JSON How Go Powers REST APIs.pdf
PDF
composite construction of structures.pdf
PPTX
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
PDF
Embodied AI: Ushering in the Next Era of Intelligent Systems
PPTX
web development for engineering and engineering
PPTX
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
PPTX
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
PPTX
Construction Project Organization Group 2.pptx
PPT
Mechanical Engineering MATERIALS Selection
PPTX
CH1 Production IntroductoryConcepts.pptx
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
ETO & MEO Certificate of Competency Questions and Answers
Well-logging-methods_new................
Sustainable Sites - Green Building Construction
CYBER-CRIMES AND SECURITY A guide to understanding
Welding lecture in detail for understanding
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
Project quality management in manufacturing
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
Structs to JSON How Go Powers REST APIs.pdf
composite construction of structures.pdf
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
Embodied AI: Ushering in the Next Era of Intelligent Systems
web development for engineering and engineering
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
Construction Project Organization Group 2.pptx
Mechanical Engineering MATERIALS Selection
CH1 Production IntroductoryConcepts.pptx

iaetsd Shared authority based privacy preserving protocol

  • 1. SHARED AUTHORITY BASED PRIVACY PRESERVING PROTOCOL C. Pragna Bai1 , K. Kishore Kumar2 1 M.Tech., PG Scholar, Dept of CSE, Korm College of Engineering, Kadapa,Andhra Pradesh. 2 Assistant Professor, Dept of CSE,Korm College of Engineering, Kadapa, Andhra Pradesh. Abstract- Cloud computing is emerging as a prevalent data interactive paradigm to realize users’ data remotely stored in an online cloud server. Cloud services provide great conveniences for the users to enjoy the on-demand cloud applications without considering the local infrastructure limitations. During the data accessing, different users may be in a collaborative relationship, and thus data sharing becomes significant to achieve productive benefits. The existing security solutions generally focus on authentication procedures where a user’s private knowledge cannot be accessed without proper authorization, however neglecting the privacy issue. This could reveal user’s private information regardless of the information access permissions being granted or not. Therefore, we can use SAPA protocol in which shared access authority is achieved by anonymous access request matching mechanism to handle the privacy issue in cloud. Propose an authentication protocol to enhance a user’s access request related privacy, and the shared access authority is achieved by anonymous access request matching mechanism. Apply cipher text-policy attribute based access control to realize that a user can reliably access its own data fields, and adopt the proxy re-encryption to provide temp authorized data sharing among multiple users. Keywords: Cloud computing, authorization authentication protocol, security, privacy preservation, shared authority. 1.INTRODUCTION Cloud computing is a popular IT architecture in the current trend, which offers exclusive data storage with ondemand services and network access round the clock. This architecture can be witnessed as a service which could be software, infrastructure or a platform available anytime anywhere for the users. Despite being popular and powerful cloud computing faces downfall in areas of privacy and security. Traditional approaches concentrate on the authentication procedures to witness remote access of data on demand. But eventually a user may want to access or share data for better results, which in turn brings security and privacy concerns in cloud storage. In order to overcome this, Shared Authority based Privacy preserving Authentication protocol (SAPA). This protocol is exclusively used for handling the privacy issues in cloud storage. Shared access authority is achieved by anonymous access request matching procedure with four important attributes namely, User privacy, Authentication, Forward Security and Anonymity [1]. User privacy is achieved when any unrelated user cannot wild guess a user’s access interests. Only if they both possess a mutual interest they will be allowed to share by the cloud server. Authentication is achieved when a legal and registered user can access his data and any other data cannot deceive him. Anonymity is achieved when any unrelated entity cannot find out the data transferred and communication state even by interception through open communication channel. Forward security is achieved when any miscreant cannot guess the previous communications with the currently held data of any two sessions. Attribute based access control is used to make sure that the users can access only his data. Thus this protocol is well suited for multi- user collaborative cloud applications since it does not compromise the user’s private information. An example is introduced to identify the main motivation. In the cloud storage based supply chain management, there are various interest groups (e.g., supplier, carrier, and retailer) in the system. Each group owns its users which are permitted to access the authorized data fields, and different users own relatively independent access authorities. It means that any two users from diverse groups should access different data fields of the same file. There into, a supplier purposely may want to access a carrier’s data fields, but it is not sure whether the carrier will allow its access request. If the carrier refuses its request, the supplier’s access desire will be revealed along with nothing obtained towards the desired data fields. Actually, the supplier may not send the access request or withdraw the unaccepted request in advance if it firmly knows that its request will be refused by the carrier. It is unreasonable to thoroughly disclose the supplier’s private information without any privacy considerations. Fig. 1 illustrates three revised cases to address above imperceptible privacy issue. Securing Infrastructure as a Service The IaaS model lets users lease compute, storage, network, and other resources in a virtualized environment. The user doesn’t manage or control the underlying cloud infrastructure but has control over the OS, storage, deployed applications, and possibly certain networking components. Amazon’s Elastic Compute Cloud (EC2) is a good example of IaaS. At the cloud infrastructure level, CSPs can enforce network security with intrusion-detection systems (IDSs), firewalls, antivirus programs, distributed denial-of-service (DDoS) defenses, and so on. Securing Platform as a Service Cloud platforms are built on top of IaaS with system integration and virtualization middleware support. Such platforms let users deploy user-built software applications onto the cloud infrastructure using provider-supported programming languages and software tools II LITERATURE SURVEY Literature survey is the most important step in software development process. Before developing the tool it is necessary to determine the time factor, economy n company strength. Once these things r satisfied, ten next steps are to determine which operating systemand language can be used for developing the tool. Once the programmers start building the tool the programmers ISBN-13: 978-1537584836 www.iaetsd.in Proceedings of ICAER-2016 ©IAETSD 201611
  • 2. need lot of external support. This support can be obtained from senior programmers, from book or from websites. Before building the system the above consideration are taken into account for developing the proposed system. Implementation: We have implemented our basic approach on Amazon S3 which is a popular cloud based storage service. The content management consists of two tasks. First, the Owner encrypts the data item sets based on the access control policies and uploads the encrypted sets along with some meta-data. Then, authorized users download the encrypted data items sets and meta-data from the Cloud , and decrypt the data item sets using the secrets they have. Now we illustrate the interactions of the Owner with Amazon S3 as the Cloud . In our implementation, we have used the REST API to communicate with Amazon S3. Figure 2 shows the overall involvement of the Owner in the user and content management process when uploading the data item sets to Amazon S3. While the fine-grained access control is enforced by encrypting using the keys generated through the AB-GKM scheme, it is important to limit the access to even the encrypted data item sets in order to minimize the bandwidth utilization. We associate a hash-based message authentication code (HMAC) with each encrypted data item sets such that only the users having valid identity attributes can produce matching HMACs.Initially the Owner creates a bucket , which is a logical container in S3, to store encrypted data item sets as objects . Subsequently, the Owner executes the following steps:1. The Owner generates the symmetric keys using the AB-GKM’s KeyGen algorithm and instantiates an encryption client. Note that the Owner generates a unique symmetric key for each policy configuration. Trust and security have prevented businesses from fully accepting cloud platforms. To protect clouds, providers must first secure virtualized data center resources, uphold user privacy, and preserve data integrity. The authors suggest using a trust-overlay network over multiple data centers to implement a reputation system for establishing trust between service providers and data owners. Data coloring and software watermarking techniques protect shared data objects and massively distributed software modules. These techniques safeguard multi-way authentications, enable single sign-on in the cloud, and tighten access control for sensitive data in both public and private clouds. III. RELATED WORK In [2] ENISA has proposed that “Complexity of risk evaluation” is one of the major privacy challenges in cloud computing. The complexity of the services gives rise to a number of unidentified parameters. Service consumers and providers are careful while providing and consuming services. The real challenge encountered in this scenario is checking the lifecycle of data processing and its conformity with officially authorized frameworks. Some of the following questions are needed to be answered in order to find the risks to privacy: Who are the stakeholders involved?, Where the data is stored?, How data is duplicated?, What are the stakeholder roles and responsibilities?, What are the rules for data processing?, How the service provider will reach the desired level of privacy and security? They have suggested that every user can have an apparent policy as how to the personal data is to be processed and the stakeholders have to specify the needs for cloud that meet the desired level of privacy. ENISA in Europe suggest understanding the shift in balance in terms of accountability and responsibility in key functions and conformity with the laws [2]. In [3] authors suggest that developing and implementing proactive strategies or measures to promote better compliance with the laws of privacy regarding the personal data processing. This can be done through procedures that detect and prevent breaches in systems. Literally, there is no accepted definition for PETs, but in general we can consider technologies with the following qualities are PETs, reduce privacy risks, data held about the users are minimal, allow the users to have control over their information. Therefore, by implementing the PETs the requirements of the proactive measures could be met. And they can protect the privacy over the personal data and prevent from undesired processing. These PETs include tools like anonymisation, encryption, pseudonymisation, transparency enhancing tools. In [4] authors have proposed that “Client Based Privacy Manager” helps in reducing the data leakage and loss of privacy of the sensitive data. Some the major characteristics of the privacy managers are: Data Access: The Manager contains a separate module for accessing personal information by the users in the cloud. This is an auditing procedure that checks accuracy and privacy violations. Obfuscation: This is done by the users on the required fields before being sent to the cloud using a user chosen key that the service providers are not known of. Feedback: This module keeps track of the data being transferred and data usage. Preference Setting: Allows the users to set preferences over their data thereby giving greater control. The major advantage is that it solves automation and end user problems. The disadvantages are, it requires full co-operation of the service provider and sufficient computing resources for obfuscation. In [5] authors have proposed that for Anonymous data sharing between the parties an algorithm is developed to generate ID numbers ranging from 1 to N. And the assignment of these ID’s is anonymous so that the members do not know about it and maximum care is taken to avoid collisions. These procedures are carried out without a trusted third party. Newton’s identities and strum theorem to develop secure sum. Usage of finite polynomials enhances scalability and Markov chain finds the required number of iterations. In [6] authors have proposed that in recent years, the number of mobile users in the society has risen dramatically. The privacy aware authentication scheme provides security and flexibility to the users to make use of various cloud services from various providers using a single private key. A bilinear pairing cryptosystem and nonce generation is used to enhance the security strength of the scheme. In addition to it, it also provides user intractability, mutual authentication, exchange of keys, anonymity and so on. This scheme reduces the memory space usage on the respective cloud service providers. The Smart card Generator serves as the key distributor for providers and mobile clients or users. Also, the scheme does not involve the SCG service in the user authentication procedure. It also reduces the processing time of the authentication process in terms of computation between providers and TTP. Formal Performance analysis tasks are conducted and the scheme is found to be efficient and secure. In [7] authors have suggested that du e to the growing Security needs in the world the mentioned security algorithms have been surveyed and it is found that each has its own pros and cons. But, out of them AES algorithm is found to be efficient. Some of the Advantages are more secure, supports larger key size, faster in terms of hardware and software, 128-bit key size makes it less prone to attacks, suitable for cloud. Some of the ISBN-13: 978-1537584836 www.iaetsd.in Proceedings of ICAER-2016 ©IAETSD 201612
  • 3. Disadvantages of other algorithms are less secure, slow in terms of speed, small and medium key size. In [8] authors have suggested that due to the growth of cloud, security has become a vital part of cloud computing. Malicious activities and vulnerabilities are inevitable. The key purpose is to verify if AES provides better security than other algorithms. By implementing it, it is witnessed that it provides less memory consumption and computation time. Some of the Advantages are high performance, speedy key setup, key agility, less memory, instruction level parallelism, no cryptanalysis attacks have been proved. On comparing with other algorithms, AES eliminates weak keys, which is found is DES. During performance analysis it is found that AES has an advantage over other algorithms in terms of execution time [9]. Also over RC2, RC6 and blowfish with time consumption [10]. IV.PROPOSEDWORK The existing security solutions generally concentrates over the authentication procedures which implies a user’s private information cannot be accessed without proper authorization, while neglecting privacy issue during the data sharing. During the information accessing, different users can be in a mutual relationship which stresses on the importance of knowledge sharing in order to attain better performance. Due to mentioned privacy issue, the user’s private information could be revealed regardless the access permission being granted or not. In a cloud storage based supply chain management, there will be various interest groups in the system. Each group has its own users who are permitted to access the authorized data fields, and different users own relatively independent access authorities. It means that any two users from diverse groups should access different data fields of the same file. For instance, consider two groups G1 and G2, if a user from G1 requests data from the user in G2, and if his request is rejected, the user’s access desire will be revealed along with nothing obtained towards the desired data fields. A user may not send the access request or withdraw the unaccepted request in advance if he firmly knows that his request will be rejected. Therefore, it is unreasonable to thoroughly disclose a user’s private information without any privacy considerations. In order to overcome the privacy issue “shared authority based privacy preserving authentication” protocol (SAPA) can be used for the cloud data storage, which realizes authentication and authorization without compromising a user’s private information. Identifies a new privacy challenge in cloud storage, and address a subtle privacy issue during a user challenging the cloud server for data sharing, in which the challenged request itself cannot reveal the user’s privacy no matter whether or not it can obtain the access authority. And proposes an authentication protocol to enhance a user’s access request related privacy, and the shared access authority is achieved by anonymous access request matching mechanism. Encryption techniques are used to provide authorized data sharing among multiple users. Shared authority is achieved by anonymous request matching mechanism without compromising the privacy. Also, attribute based access is used to allow only authorized users to request information and proxy reencryption is applied by the cloud server to allow knowledge sharing among the multiple users. In order to witness the SAPA protocol we have developed a simple “e- library management system”. And we have hosted this system on to the Azure cloud and have realized the efficient working of SAPA. IVMETHODOLOGY In this paper, we address the aforementioned privacy issue to propose a shared authority based privacy preserving authentication protocol (SAPA) for the cloud data storage, which realizes authentication and authorization without compromising a user’s private information. The main contributions are as follows.  Identify a new privacy challenge in cloud storage, and address a subtle privacy issue during a user challenging the cloud server for data sharing, in which the challenged request itself cannot reveal the user’s privacy no matter whether or not it can obtain the access authority.  Propose an authentication protocol to enhance a user’s access request related privacy, and the shared access authority is achieved by anonymous access request matching mechanism.  Apply cipher text-policy attribute based access control to realize that a user can reliably access its own data fields, and adopt the proxy re-encryption to provide temp authorized data sharing among multiple users.  Advantages Of Proposed System:  The scheme allows users to audit the cloud storage with lightweight communication overloads and computation cost, and the auditing result ensures strong cloud storage correctness and fast data error localization.  During cloud data accessing, the user autonomously interacts with the cloud server without external interferences and is assigned with the full and independent authority on its own data fields. Identify a new privacy challenge in cloud storage, and address a subtle privacy issue during a user challenging the cloud server for data sharing, in which the challenged request itself cannot reveal the user’s privacy no matter whether or not it can obtain the access authority. Propose an authentication protocol to enhance a user’s access request related privacy, and the shared access authority is achieved by anonymous access request matching mechanism. Apply cipher text-policy attribute based access control to realize that a user can reliably access its own data fields, and adopt the proxy re-encryption to provide temp authorized data sharing among multiple users. Fig 1: System Architecture Implementation is the stage of the project when the theoretical design is turned out into a working system. Thus it can be considered to be the most critical stage in achieving a successful new system and in giving the user, confidence that ISBN-13: 978-1537584836 www.iaetsd.in Proceedings of ICAER-2016 ©IAETSD 201613
  • 4. the new system will work and be effective. The implementation stage involves careful planning, investigation of the existing system and it’s constraints on implementation, designing of methods to achieve changeover and evaluation of changeover methods. Implementation is the process of converting a new system design into operation. It is the phase that focuses on user training, site preparation and file conversion for installing a candidate system. The important factor that should be considered here is that the conversion should not disrupt the functioning of the organization. IV. CONCLUSION In this work, we have identified a new privacy challenge during data accessing in the cloud computing to achieve privacy-preserving access authority sharing. Authentication is established to guarantee data confidentiality and data integrity. Data anonymity is achieved since the wrapped values are exchanged during transmission. User privacy is enhanced by anonymous access requests to privately inform the cloud server about the users’ access desires. Forward security is realized by the session identifiers to prevent the session correlation. It indicates that the proposed scheme is possibly applied for enhanced privacy preservation in cloud applications. REFERENCE [1] J. Bethencourt, A. Sahai, and B. Waters. Ciphertext-policy attribute-based encryption. In SP 2007: Proceedings of the 28th IEEE Symposium on Security and Privacy, pages 321– 334, 2007. [2] J. Camenisch, M. Dubovitskaya, R. R. Enderlein, and G. Neven. Oblivious transfer with hidden access control from attribute-based encryption. In SCN 2012: Proceedings of the 8th International Conference on Security and Cryptography for Networks, pages 559–579, 2012. [3] D. Halevy and A. Shamir. The LSD broadcast encryption scheme. In CRYPTO 2001: Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology, pages 47–60, 2002. [4] J. Li and N. Li. OACerts: Oblivious attribute certificates. IEEE Transactions on Dependable and Secure Computing, 3(4):340–352, 2006. [5] M. Nabeel and E. Bertino. Towards attribute based group key management. In CCS 2011: Proceedings of the 18th ACM conference on Computer and communications security, 2011. [6] M. Nabeel, N. Shang, and E. Bertino. Privacy preserving policy based content sharing in public clouds. IEEE Transactions on Knowledge and Data Engineering, 99, 2012. [7] OpenID. http://openid.net/ [Last accessed: Oct. 14, 2012]. [8] T. Pedersen. Non-interactive and information-theoretic secure verifiable secret sharing. In CRYPTO 1991: Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology, pages 129–140, 1992. [9] N. Shang, M. Nabeel, F. Paci, and E. Bertino. A privacy- preserving approach to policy-based content dissemination. In ICDE 2010: Proceedings of the 2010 IEEE 26th International Conference on Data Engineering, 2010. [10] S. Yu, C. Wang, K. Ren, and W. Lou. Attribute based data sharing with attribute revocation. In ASIACCS 2010: Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, pages 261–270, 2010. [11] S. Yu, C. Wang, K. Ren, and W. Lou. Achieving secure, scalable, and fine-grained data access control in cloud computing. In INFOCOM 2010: Proceedings of the 29th conference on Information communications, pages 534–542, 2010. [12] C. Collberg and C. Thomborson, ―Watermarking, Tamper-Proofing, and Obfuscation-Tools for Software Protection,‖ IEEE Trans. Software Eng., vol. 28, 2002, pp. 735–746. [13] D. Li, C. Liu, and W. Gan, ―A New Cognitive Model: Cloud Model,‖ Int’l J. Intelligent Systems, Mar. 2009, pp. 357– 375. [14] D. Li and Y. Du, Artificial Intelligence with Uncertainty, Chapman & Hall, 2008. ISBN-13: 978-1537584836 www.iaetsd.in Proceedings of ICAER-2016 ©IAETSD 201614