SlideShare a Scribd company logo
Identity-Based Secure Distributed Data Storage
Schemes
ABSTRACT:
Secure distributed data storage can shift the burden of maintaining a large number
of files from the owner to proxy servers. Proxy servers can convert encrypted files
for the owner to encrypted files for the receiver without the necessity of knowing
the content of the original files. In practice, the original files will be removed by
the owner for the sake of space efficiency. Hence, the issues on confidentiality and
integrity of the outsourced data must be addressed carefully. In this paper, we
propose two identity-based secure distributed data storage (IBSDDS) schemes. Our
schemes can capture the following properties: (1) The file owner can decide the
access permission independently without the help of the private key generator
(PKG); (2) For one query, a receiver can only access one file, instead of all files of
the owner; (3) Our schemes are secure against the collusion attacks, namely even if
the receiver can compromise the proxy servers, he cannot obtain the owner’s secret
key. Although the first scheme is only secure against the chosen plaintext attacks
(CPA), the second scheme is secure against the chosen cipher text attacks (CCA).
To the best of our knowledge, it is the first IBSDDS schemes where an access
permissions is made by the owner for an exact file and collusion attacks can be
protected in the standard model.
EXISTING SYSTEM:
Cloud computing provides users with a convenient mechanism to manage their
personal files with the notion called database-as-a-service (DAS). In DAS
schemes, a user can outsource his encrypted files to untrusted proxy servers. Proxy
servers can perform some functions on the outsourced ciphertexts without knowing
anything about the original files. Unfortunately, this technique has not been
employed extensively. The main reason lies in that users are especially concerned
on the confidentiality, integrity and query of the outsourced files as cloud
computing is a lot more complicated than the local data storage systems, as the
cloud is managed by an untrusted third party. After outsorcing the files to proxy
servers, the user will remove them from his local machine. Therefore, how to
guarantee the outsoured files are not accessed by the unauthorized users and not
modified by proxy servers is an important problem that has been considered in the
data storage research community. Furthermore, how to guarantee that an
authorized user can query the outsourced files from proxy servers is another
concern as the proxy server only maintains the outsourced ciphertexts.
Consequently, research around these topics grows significantly.
DISADVANTAGES OF EXISTING SYSTEM:
Users are especially concerned on the confidentiality, integrity and query of
the outsourced files as cloud computing is a lot more complicated than the
local data storage systems, as the cloud is managed by an untrusted third
party.
The outsoured files are not accessed by the unauthorized users and not
modified by proxy servers is an important problem that has been considered
in the data storage research community.
PROPOSED SYSTEM:
In this paper, we propose two identity-based secure distributed data storage
(IBSDDS) schemes in standard model where, for one query, the receiver can only
access one of the owner’s files, instead of all files. In other words, an access
permission (re-encryption key) is bound not only to the identity of the receiver but
also the file. The access permission can be decided by the owner, instead of the
trusted party (PKG). Furthermore, our schemes are secure against the collusion
attacks.
ADVANTAGES OF PROPOSED SYSTEM:
 It has two schemes of security,the first scheme is CPA secure, the second
scheme achieves CCA security.
 To the best of our knowledge, it is the first IBSDDS schemes where an
access permission is made by the owner for an exact file and collusion
attacks can be protected in the standard model.
 To achieve a stronger security and implement filebased access control, the
owner must be online to authenticate requesters and also to generate access
permissions for them. Therefore, the owner in our schemes needs do more
computations than that in PRE schemes. Although PRE schemes can provide
the similar functionalities of our schemes when the owner only has one file,
these are not flexible and practical.
SYSTEM ARCHITECTURE:
ALGORITHMS USED:
Identity based secure distributed data storage schemes
Identity based secure distributed data storage schemes
SYSTEM CONFIGURATION:-
HARDWARE CONFIGURATION:-
 Processor - Pentium –IV
 Speed - 1.1 Ghz
 RAM - 256 MB(min)
 Hard Disk - 20 GB
 Key Board - Standard Windows Keyboard
 Mouse - Two or Three Button Mouse
 Monitor - SVGA
SOFTWARE CONFIGURATION:-
 Operating System : Windows XP
 Programming Language : JAVA
 Java Version : JDK 1.6 & above.
REFERENCE:
Jinguang Han, Student Member, IEEE, Willy Susilo, Senior Member, IEEE, and Yi
Mu, Senior Member, IEEE-“Identity-Based Secure Distributed Data Storage
Schemes”-IEEE TRANSACTIONS ON COMPUTERS, 2013.

More Related Content

DOCX
Identity based secure distributed data storage
PPT
PPT FOR IDBSDDS SCHEMES
PPT
Identity based secure distributed data storage schemes
PPTX
Privacy preserving public auditing
PPTX
Identity Based Secure Distributed Storage Scheme
DOC
Identity based distributed provable data possession in multi-cloud storage
PPTX
Authentication on Cloud using Attribute Based Encryption
PPSX
Final year presentation
Identity based secure distributed data storage
PPT FOR IDBSDDS SCHEMES
Identity based secure distributed data storage schemes
Privacy preserving public auditing
Identity Based Secure Distributed Storage Scheme
Identity based distributed provable data possession in multi-cloud storage
Authentication on Cloud using Attribute Based Encryption
Final year presentation

What's hot (20)

PPTX
Privacy preserving public auditing for regenerating-code-based cloud storage
DOCX
Privacy preserving delegated access control in public clouds
DOCX
AUTHENTICATED KEY EXCHANGE PROTOCOLS FOR PARALLEL NETWORK FILE SYSTEMS
DOCX
Hybrid Cloud Approach for Secure Authorized Deduplication
DOCX
A Hybrid Cloud Approach for Secure Authorized Deduplication
PDF
Doc A hybrid cloud approach for secure authorized deduplication
DOCX
Privacy preserving delegated access control in public clouds
PDF
Authenticated key exchange protocols for parallel network file system
DOCX
Enabling dynamic data and indirect mutual trust for cloud computing storage s...
DOCX
Enabling dynamic data and indirect mutual trust for cloud computing storage s...
PDF
Asymmetric cryptography
PDF
Attribute based encryption with privacy preserving in clouds
PPTX
Decentralized access control with authentication anonymous of data stored in ...
PPTX
Ensuring Distributed Accountability for Data Sharing in the Cloud
PDF
Privacy preserving delegated access control in public cloud
DOCX
identity-based distributed provable data possession in multi-cloud storage
PPT
Decentralized access control with anonymous authentication of data stored in ...
PPT
Privacy Preserving Public Auditing for Data Storage Security in Cloud.ppt
PPTX
Identity based distributed provable data possession in multi-cloud storage
PPTX
Oruta ppt
Privacy preserving public auditing for regenerating-code-based cloud storage
Privacy preserving delegated access control in public clouds
AUTHENTICATED KEY EXCHANGE PROTOCOLS FOR PARALLEL NETWORK FILE SYSTEMS
Hybrid Cloud Approach for Secure Authorized Deduplication
A Hybrid Cloud Approach for Secure Authorized Deduplication
Doc A hybrid cloud approach for secure authorized deduplication
Privacy preserving delegated access control in public clouds
Authenticated key exchange protocols for parallel network file system
Enabling dynamic data and indirect mutual trust for cloud computing storage s...
Enabling dynamic data and indirect mutual trust for cloud computing storage s...
Asymmetric cryptography
Attribute based encryption with privacy preserving in clouds
Decentralized access control with authentication anonymous of data stored in ...
Ensuring Distributed Accountability for Data Sharing in the Cloud
Privacy preserving delegated access control in public cloud
identity-based distributed provable data possession in multi-cloud storage
Decentralized access control with anonymous authentication of data stored in ...
Privacy Preserving Public Auditing for Data Storage Security in Cloud.ppt
Identity based distributed provable data possession in multi-cloud storage
Oruta ppt
Ad

Viewers also liked (19)

DOCX
Proteus multiflow diversity routing for wireless networks with cooperative tr...
PDF
Twitsper tweeting privately
DOCX
Toward fine grained, unsupervised, scalable performance diagnosis for product...
DOCX
Participatory privacy enabling privacy in participatory sensing
DOCX
Network assisted mobile computing with optimal uplink query processing
DOCX
Privacy preserving delegated access control in public clouds
DOCX
A highly scalable key pre distribution scheme for wireless sensor networks
PDF
2013 14 ieee ece project titles - jp infotech
DOC
IEEE PROJECTS FOR ECE 2013 2014
DOCX
Back pressure-based packet-by-packet adaptive routing in communication networks
DOCX
Efficient algorithms for neighbor discovery in wireless networks
DOCX
Distributed cooperative caching in social wireless networks
PDF
2013 ieee java project titles for cse, it and mca
PDF
final year ieee projects in pondicherry
DOCX
Using fuzzy logic control to provide intelligent traffic management service f...
DOCX
Towards secure multi keyword top-k retrieval over encrypted cloud data
PDF
Facilitating document annotation using content and querying value
DOCX
A rank correlation based detection against distributed reflection do s attacks
DOCX
Secure mining of association rules in horizontally distributed databases
Proteus multiflow diversity routing for wireless networks with cooperative tr...
Twitsper tweeting privately
Toward fine grained, unsupervised, scalable performance diagnosis for product...
Participatory privacy enabling privacy in participatory sensing
Network assisted mobile computing with optimal uplink query processing
Privacy preserving delegated access control in public clouds
A highly scalable key pre distribution scheme for wireless sensor networks
2013 14 ieee ece project titles - jp infotech
IEEE PROJECTS FOR ECE 2013 2014
Back pressure-based packet-by-packet adaptive routing in communication networks
Efficient algorithms for neighbor discovery in wireless networks
Distributed cooperative caching in social wireless networks
2013 ieee java project titles for cse, it and mca
final year ieee projects in pondicherry
Using fuzzy logic control to provide intelligent traffic management service f...
Towards secure multi keyword top-k retrieval over encrypted cloud data
Facilitating document annotation using content and querying value
A rank correlation based detection against distributed reflection do s attacks
Secure mining of association rules in horizontally distributed databases
Ad

Similar to Identity based secure distributed data storage schemes (20)

DOC
documentation for identity based secure distrbuted data storage schemes
PDF
Ieeepro techno solutions 2011 ieee java project -secure role based data
PDF
Ieeepro techno solutions 2011 ieee dotnet project -secure role based data
DOC
Srs document for identity based secure distributed data storage schemes
PDF
THE SURVEY ON REFERENCE MODEL FOR OPEN STORAGE SYSTEMS INTERCONNECTION MASS S...
PDF
Achieving Secure, sclable and finegrained Cloud computing report
PDF
Secure Access to Outsourced Databases
PDF
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
PDF
Control Cloud Data Access Privilege and Anonymity with Fully Anonymous Attrib...
PDF
Control Cloud Data Access Privilege and Anonymity with Fully Anonymous Attrib...
PDF
Volume 2-issue-6-2073-2076
PDF
Volume 2-issue-6-2073-2076
PDF
Towards Secure Data Distribution Systems in Mobile Cloud Computing: A Survey
PDF
A cloud storage system for sharing data securely with privacy preservation an...
PDF
IRJET- Integrity Verification and Attribute based Encryption for Cloud Storage
PDF
Psdot 12 a secure erasure code-based cloud storage
PDF
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
PDF
Mutual query data sharing protocol for public key encryption through chosen-c...
PDF
Bio-Cryptography Based Secured Data Replication Management in Cloud Storage
PDF
A secure anti collusion data sharing scheme for dynamic groups in the cloud
documentation for identity based secure distrbuted data storage schemes
Ieeepro techno solutions 2011 ieee java project -secure role based data
Ieeepro techno solutions 2011 ieee dotnet project -secure role based data
Srs document for identity based secure distributed data storage schemes
THE SURVEY ON REFERENCE MODEL FOR OPEN STORAGE SYSTEMS INTERCONNECTION MASS S...
Achieving Secure, sclable and finegrained Cloud computing report
Secure Access to Outsourced Databases
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
Control Cloud Data Access Privilege and Anonymity with Fully Anonymous Attrib...
Control Cloud Data Access Privilege and Anonymity with Fully Anonymous Attrib...
Volume 2-issue-6-2073-2076
Volume 2-issue-6-2073-2076
Towards Secure Data Distribution Systems in Mobile Cloud Computing: A Survey
A cloud storage system for sharing data securely with privacy preservation an...
IRJET- Integrity Verification and Attribute based Encryption for Cloud Storage
Psdot 12 a secure erasure code-based cloud storage
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
Mutual query data sharing protocol for public key encryption through chosen-c...
Bio-Cryptography Based Secured Data Replication Management in Cloud Storage
A secure anti collusion data sharing scheme for dynamic groups in the cloud

Recently uploaded (20)

PPTX
GDM (1) (1).pptx small presentation for students
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PDF
Microbial disease of the cardiovascular and lymphatic systems
PPTX
Pharma ospi slides which help in ospi learning
PDF
O7-L3 Supply Chain Operations - ICLT Program
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PDF
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
PDF
Sports Quiz easy sports quiz sports quiz
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
Insiders guide to clinical Medicine.pdf
PDF
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PPTX
master seminar digital applications in india
PDF
Pre independence Education in Inndia.pdf
PDF
VCE English Exam - Section C Student Revision Booklet
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PDF
Anesthesia in Laparoscopic Surgery in India
GDM (1) (1).pptx small presentation for students
human mycosis Human fungal infections are called human mycosis..pptx
Microbial disease of the cardiovascular and lymphatic systems
Pharma ospi slides which help in ospi learning
O7-L3 Supply Chain Operations - ICLT Program
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
STATICS OF THE RIGID BODIES Hibbelers.pdf
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
Sports Quiz easy sports quiz sports quiz
Final Presentation General Medicine 03-08-2024.pptx
Insiders guide to clinical Medicine.pdf
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
master seminar digital applications in india
Pre independence Education in Inndia.pdf
VCE English Exam - Section C Student Revision Booklet
O5-L3 Freight Transport Ops (International) V1.pdf
Anesthesia in Laparoscopic Surgery in India

Identity based secure distributed data storage schemes

  • 1. Identity-Based Secure Distributed Data Storage Schemes ABSTRACT: Secure distributed data storage can shift the burden of maintaining a large number of files from the owner to proxy servers. Proxy servers can convert encrypted files for the owner to encrypted files for the receiver without the necessity of knowing the content of the original files. In practice, the original files will be removed by the owner for the sake of space efficiency. Hence, the issues on confidentiality and integrity of the outsourced data must be addressed carefully. In this paper, we propose two identity-based secure distributed data storage (IBSDDS) schemes. Our schemes can capture the following properties: (1) The file owner can decide the access permission independently without the help of the private key generator (PKG); (2) For one query, a receiver can only access one file, instead of all files of the owner; (3) Our schemes are secure against the collusion attacks, namely even if the receiver can compromise the proxy servers, he cannot obtain the owner’s secret key. Although the first scheme is only secure against the chosen plaintext attacks (CPA), the second scheme is secure against the chosen cipher text attacks (CCA). To the best of our knowledge, it is the first IBSDDS schemes where an access
  • 2. permissions is made by the owner for an exact file and collusion attacks can be protected in the standard model. EXISTING SYSTEM: Cloud computing provides users with a convenient mechanism to manage their personal files with the notion called database-as-a-service (DAS). In DAS schemes, a user can outsource his encrypted files to untrusted proxy servers. Proxy servers can perform some functions on the outsourced ciphertexts without knowing anything about the original files. Unfortunately, this technique has not been employed extensively. The main reason lies in that users are especially concerned on the confidentiality, integrity and query of the outsourced files as cloud computing is a lot more complicated than the local data storage systems, as the cloud is managed by an untrusted third party. After outsorcing the files to proxy servers, the user will remove them from his local machine. Therefore, how to guarantee the outsoured files are not accessed by the unauthorized users and not modified by proxy servers is an important problem that has been considered in the data storage research community. Furthermore, how to guarantee that an authorized user can query the outsourced files from proxy servers is another concern as the proxy server only maintains the outsourced ciphertexts. Consequently, research around these topics grows significantly.
  • 3. DISADVANTAGES OF EXISTING SYSTEM: Users are especially concerned on the confidentiality, integrity and query of the outsourced files as cloud computing is a lot more complicated than the local data storage systems, as the cloud is managed by an untrusted third party. The outsoured files are not accessed by the unauthorized users and not modified by proxy servers is an important problem that has been considered in the data storage research community. PROPOSED SYSTEM: In this paper, we propose two identity-based secure distributed data storage (IBSDDS) schemes in standard model where, for one query, the receiver can only access one of the owner’s files, instead of all files. In other words, an access permission (re-encryption key) is bound not only to the identity of the receiver but also the file. The access permission can be decided by the owner, instead of the
  • 4. trusted party (PKG). Furthermore, our schemes are secure against the collusion attacks. ADVANTAGES OF PROPOSED SYSTEM:  It has two schemes of security,the first scheme is CPA secure, the second scheme achieves CCA security.  To the best of our knowledge, it is the first IBSDDS schemes where an access permission is made by the owner for an exact file and collusion attacks can be protected in the standard model.  To achieve a stronger security and implement filebased access control, the owner must be online to authenticate requesters and also to generate access permissions for them. Therefore, the owner in our schemes needs do more computations than that in PRE schemes. Although PRE schemes can provide the similar functionalities of our schemes when the owner only has one file, these are not flexible and practical.
  • 9. SYSTEM CONFIGURATION:- HARDWARE CONFIGURATION:-  Processor - Pentium –IV  Speed - 1.1 Ghz  RAM - 256 MB(min)  Hard Disk - 20 GB  Key Board - Standard Windows Keyboard  Mouse - Two or Three Button Mouse  Monitor - SVGA
  • 10. SOFTWARE CONFIGURATION:-  Operating System : Windows XP  Programming Language : JAVA  Java Version : JDK 1.6 & above. REFERENCE: Jinguang Han, Student Member, IEEE, Willy Susilo, Senior Member, IEEE, and Yi Mu, Senior Member, IEEE-“Identity-Based Secure Distributed Data Storage Schemes”-IEEE TRANSACTIONS ON COMPUTERS, 2013.