SlideShare a Scribd company logo
HYBRID ATTRIBUTE- AND RE-ENCRYPTION-BASED 
KEY MANAGEMENT FOR SECURE AND SCALABLE 
MOBILE APPLICATIONS IN CLOUDS 
Presented by: 
LansA Informatics Pvt Ltd
ABSTRACT 
Outsourcing data to the cloud are beneficial for reasons of economy, 
scalability, and accessibility, but significant technical challenges 
remain. Sensitive data stored in the cloud must be protected from 
being read in the clear by a cloud provider that is honest but curious. 
Additionally, cloud-based data are increasingly being accessed by 
resource-constrained mobile devices for which the processing and 
communication cost must be minimized. 
Novel modifications to attribute-based encryption are proposed to allow 
authorized users access to cloud data based on the satisfaction of 
required attributes such that the higher computational load from 
cryptographic operations is assigned to the cloud provider and the 
total communication cost is lowered for the mobile user.
Abstract cont’d 
• Furthermore, data re-encryption may be optionally performed by the 
cloud provider to reduce the expense of user revocation in a mobile 
user environment while preserving the privacy of user data stored in 
the cloud. 
• The proposed protocol has been realized on commercially popular 
mobile and cloud platforms to demonstrate real-world benchmarks 
that show the efficacy of the scheme. 
• A simulation calibrated with the benchmark results shows the 
scalability potential of the scheme in the context of a realistic 
workload in a mobile cloud computing system
EXISTING SYSTEM 
Data outsourcing to a cloud is appropriate for any class of applications that 
requires data to be kept in storage and disseminated to many users. Clients 
that engage a cloud provider typically only pay for the amount of storage, 
related computation, and amount of network communication actually 
consumed; they do not incur the capital and maintenance costs of an in-house 
solution. 
In addition, the cloud provider offers the advantages of automatic backup and 
replication to ensure the safety, longevity, and high accessibility of the user 
data. A major concern that is typically not sufficiently addressed in practice, 
however, is that data, by default, are stored in the clear; it may be accessed 
and read by a cloud administrator without knowledge of the client. 
A cloud administrator may not be trusted despite the presence of contractual 
security obligations, if data security is not further enforced through technical 
means. An additional risk is that sensitive data carry the persistent risk of being 
intercepted by an unauthorized party despite safeguards promised by the 
provider. Therefore, it is useful to apply software techniques, such as 
encryption key management, to ensure that the confidentiality of cloud data is 
preserved at all times. It is especially crucial to safeguard sensitive user data 
such as e-mails, personal customer information, financial records, and medical 
records
DIS ADVANTAGES 
• It is not secure. 
• There is no confidentiality. 
• It is especially crucial to safeguard sensitive 
user data
PROPOSED SYSTEM 
 A protocol for outsourcing data storage to a cloud provider in secure 
fashion is provided. The provider is unable to read stored data; 
authorized users may do so based on qualification through possession 
of the right attributes without arbitration by the data owner. 
 The protocol is designed to be efficient for resource-constrained 
mobile users by delegating computation and requests to a cloud 
provider or trusted authority, where appropriate, without compromising 
security. An improvement is made over a traditional attribute based 
encryption scheme, such that responsibility over key generation is 
divided between a mobile data owner and a trusted authority; the 
owner is relieved of the highest computational and messaging 
burdens. 
 Additional security is provided through a group keying mechanism; the 
data owner controls access based on the distribution of an additional 
secret key, beyond possession of the required attributes. This 
additional security measure is an optional variant applicable to highly 
sensitive data subject to frequent access. Re-encryption, as a process 
of transforming the stored ciphertext, permits efficient revocation of 
users; it does not require removal of attributes and subsequent key 
regeneration, and may be administered by a trusted authority without 
involvement of the data owner
ADVANTAGES 
• It is more secure. 
• It reduces data traffic. 
• Cost efficient
SYSTEM ARCHITECTURE
SYSTEM CONFIGURATION 
• HARDWARE REQUIREMENTS:- 
• Processor - Pentium –IV 
• Speed - 1.1 Ghz 
• RAM - 512 MB(min) 
• Hard Disk - 40 GB 
• Key Board - Standard Windows Keyboard 
• Mouse - Two or Three Button Mouse 
• Monitor - LCD/LED 
SOFTWARE REQUIREMENTS: 
• Operating system : Windows XP 
• Coding Language : Java 
• Data Base : MySQL 
• Tool : Net Beans IDE
REFERENCE 
Piotr K.Tysowski and M.Anwarul Hasan “Hybrid 
Attribute- and Re-Encryption-Based Key 
Management for Secure and Scalable Mobile 
Applications in Clouds” IEEE TRANSACTIONS 
ON CLOUD COMPUTING, VOL. 1, NO. 2, JULY-DECEMBER 
2013
JOIN US! 
OFFICE ADDRESS: 
LansA Informatics Pvt ltd 
No 165, 5th Street, 
Crosscut Road, Gandhipuram, 
Coimbatore - 641 015 
OTHER MODE OF CONTACT: 
Landline: 0422 – 4204373 
Mobile : +91 90 953 953 33 
+91 91 591 159 69 
Email ID: studentscdc@lansainformatics.com 
web: www.lansainformatics.com 
Blog: www.lansastudentscdc.blogspot.com 
Facebook: 
www.facebook.com/lansainformatics 
Twitter: www.twitter.com/lansainformatic

More Related Content

DOC
Hybrid attribute and re-encryption-based key management for secure and scala...
DOC
Hybrid attribute and re-encryption-based key management for secure and scala...
PDF
1784 1788
PDF
Cloud Auditing
DOCX
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Cloud assisted mobile-access of heal...
PDF
IRJET- Attribute based Access Control for Cloud Data Storage
PPTX
Analysis-of-Security-Algorithms-in-Cloud-Computing [Autosaved]
PDF
A robust and verifiable threshold multi authority access control system in pu...
Hybrid attribute and re-encryption-based key management for secure and scala...
Hybrid attribute and re-encryption-based key management for secure and scala...
1784 1788
Cloud Auditing
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Cloud assisted mobile-access of heal...
IRJET- Attribute based Access Control for Cloud Data Storage
Analysis-of-Security-Algorithms-in-Cloud-Computing [Autosaved]
A robust and verifiable threshold multi authority access control system in pu...

What's hot (14)

PDF
Security issue in Cloud computing
PDF
Module 5-cloud computing-SECURITY IN THE CLOUD
PDF
A Survey on Different Techniques Used in Decentralized Cloud Computing
PPTX
Aspects of data security
PDF
G0314043
PDF
Achieving Secure, sclable and finegrained Cloud computing report
PPTX
Cloud computing 10 cloud security advantages and challenges
DOC
Ensuring distributed accountability for data sharing in the cloud
PPTX
Advanced Data Center Security
PDF
Carestream white paper_cloud-security 2016
PPTX
GTB Data Leakage Prevention Use Cases 2014
PDF
Secure Data Storage in Cloud Using Encryption and Steganography
PDF
GTB IRM - Business Use Cases - 2013
PPTX
Cloud Compliance Auditing - Closer 2011
Security issue in Cloud computing
Module 5-cloud computing-SECURITY IN THE CLOUD
A Survey on Different Techniques Used in Decentralized Cloud Computing
Aspects of data security
G0314043
Achieving Secure, sclable and finegrained Cloud computing report
Cloud computing 10 cloud security advantages and challenges
Ensuring distributed accountability for data sharing in the cloud
Advanced Data Center Security
Carestream white paper_cloud-security 2016
GTB Data Leakage Prevention Use Cases 2014
Secure Data Storage in Cloud Using Encryption and Steganography
GTB IRM - Business Use Cases - 2013
Cloud Compliance Auditing - Closer 2011
Ad

Viewers also liked (11)

PPTX
Attribute based encryption in cloud with significant reduction reviw2
PPTX
Attribute Based Encryption with Privacy Preserving In Clouds
PPTX
Cloud Encryption
PPT
Cloud Computing Security Issues
PDF
Cloud Security - Security Aspects of Cloud Computing
PPTX
Public Key Cryptography
PPT
PUBLIC KEY ENCRYPTION
PPTX
Cloud Computing Security
PPTX
Cloud computing security issues and challenges
PPTX
Cloud security ppt
PPTX
Data security in cloud computing
Attribute based encryption in cloud with significant reduction reviw2
Attribute Based Encryption with Privacy Preserving In Clouds
Cloud Encryption
Cloud Computing Security Issues
Cloud Security - Security Aspects of Cloud Computing
Public Key Cryptography
PUBLIC KEY ENCRYPTION
Cloud Computing Security
Cloud computing security issues and challenges
Cloud security ppt
Data security in cloud computing
Ad

Similar to It pp hybrid attribute- and re-encryption-based key management for secure and scalable mobile applications in clouds (20)

PDF
Ieeepro techno solutions 2011 ieee java project -secure role based data
PDF
Ieeepro techno solutions 2011 ieee dotnet project -secure role based data
PDF
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
PDF
Enhanced security framework to ensure data security
PDF
Enhanced security framework to ensure data security in cloud using security b...
PDF
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
PDF
An Improved Integrated Hash and Attributed based Encryption Model on High Dim...
PDF
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
PDF
R180203114117
PDF
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
PDF
Secure Data Sharing In an Untrusted Cloud
PDF
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
PDF
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
PDF
International Journal of Engineering and Science Invention (IJESI)
PDF
Improving Data Storage Security in Cloud using Hadoop
PDF
Attribute-Based Encryption for Access of Secured Data in Cloud Storage
PDF
AUTHENTICATION SCHEME FOR DATABASE AS A SERVICE(DBAAS)
PDF
AUTHENTICATION SCHEME FOR DATABASE AS A SERVICE(DBAAS)
PDF
AUTHENTICATION SCHEME FOR DATABASE AS A SERVICE(DBAAS)
PDF
AUTHENTICATION SCHEME FOR DATABASE AS A SERVICE (DBAAS)
Ieeepro techno solutions 2011 ieee java project -secure role based data
Ieeepro techno solutions 2011 ieee dotnet project -secure role based data
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
Enhanced security framework to ensure data security
Enhanced security framework to ensure data security in cloud using security b...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
An Improved Integrated Hash and Attributed based Encryption Model on High Dim...
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
R180203114117
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
Secure Data Sharing In an Untrusted Cloud
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
International Journal of Engineering and Science Invention (IJESI)
Improving Data Storage Security in Cloud using Hadoop
Attribute-Based Encryption for Access of Secured Data in Cloud Storage
AUTHENTICATION SCHEME FOR DATABASE AS A SERVICE(DBAAS)
AUTHENTICATION SCHEME FOR DATABASE AS A SERVICE(DBAAS)
AUTHENTICATION SCHEME FOR DATABASE AS A SERVICE(DBAAS)
AUTHENTICATION SCHEME FOR DATABASE AS A SERVICE (DBAAS)

More from Papitha Velumani (20)

PDF
2015 - 2016 IEEE Project Titles and abstracts in Java
PDF
2015 - 2016 IEEE Project Titles and abstracts in Android
PDF
2015 - 2016 IEEE Project Titles and abstracts in Dotnet
DOC
Trajectory improves data delivery in urban vehicular networks
DOC
Tracon interference aware scheduling for data-intensive applications in virtu...
DOC
Supporting privacy protection in personalized web search
DOC
Stochastic bandwidth estimation in networks with random service
DOC
Sos a distributed mobile q&a system based on social networks
DOC
Security evaluation of pattern classifiers under attack
DOC
Real time misbehavior detection in ieee 802.11-based wireless networks an ana...
DOC
Probabilistic consolidation of virtual machines in self organizing cloud data...
DOC
Privacy preserving multi-keyword ranked search over encrypted cloud data
DOC
Privacy preserving and content-protecting location based queries
DOC
Pack prediction based cloud bandwidth and cost reduction system
DOC
Occt a one class clustering tree for implementing one-to-man data linkage
DOC
Leveraging social networks for p2p content based file sharing in disconnected...
DOC
LDBP: localized boundary detection and parametrization for 3 d sensor networks
DOC
Integrity for join queries in the cloud
DOC
Improving fairness, efficiency, and stability in http based adaptive video st...
DOC
Friendbook a semantic based friend recommendation system for social networks
2015 - 2016 IEEE Project Titles and abstracts in Java
2015 - 2016 IEEE Project Titles and abstracts in Android
2015 - 2016 IEEE Project Titles and abstracts in Dotnet
Trajectory improves data delivery in urban vehicular networks
Tracon interference aware scheduling for data-intensive applications in virtu...
Supporting privacy protection in personalized web search
Stochastic bandwidth estimation in networks with random service
Sos a distributed mobile q&a system based on social networks
Security evaluation of pattern classifiers under attack
Real time misbehavior detection in ieee 802.11-based wireless networks an ana...
Probabilistic consolidation of virtual machines in self organizing cloud data...
Privacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving and content-protecting location based queries
Pack prediction based cloud bandwidth and cost reduction system
Occt a one class clustering tree for implementing one-to-man data linkage
Leveraging social networks for p2p content based file sharing in disconnected...
LDBP: localized boundary detection and parametrization for 3 d sensor networks
Integrity for join queries in the cloud
Improving fairness, efficiency, and stability in http based adaptive video st...
Friendbook a semantic based friend recommendation system for social networks

Recently uploaded (20)

PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PPTX
PPH.pptx obstetrics and gynecology in nursing
PPTX
master seminar digital applications in india
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PDF
Computing-Curriculum for Schools in Ghana
PPTX
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
PDF
Pre independence Education in Inndia.pdf
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PDF
Insiders guide to clinical Medicine.pdf
PDF
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
PPTX
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
PDF
Microbial disease of the cardiovascular and lymphatic systems
PDF
102 student loan defaulters named and shamed – Is someone you know on the list?
PPTX
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PPTX
Microbial diseases, their pathogenesis and prophylaxis
human mycosis Human fungal infections are called human mycosis..pptx
PPH.pptx obstetrics and gynecology in nursing
master seminar digital applications in india
Pharmacology of Heart Failure /Pharmacotherapy of CHF
O5-L3 Freight Transport Ops (International) V1.pdf
Computing-Curriculum for Schools in Ghana
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
Pre independence Education in Inndia.pdf
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
Insiders guide to clinical Medicine.pdf
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
Microbial disease of the cardiovascular and lymphatic systems
102 student loan defaulters named and shamed – Is someone you know on the list?
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
FourierSeries-QuestionsWithAnswers(Part-A).pdf
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
Microbial diseases, their pathogenesis and prophylaxis

It pp hybrid attribute- and re-encryption-based key management for secure and scalable mobile applications in clouds

  • 1. HYBRID ATTRIBUTE- AND RE-ENCRYPTION-BASED KEY MANAGEMENT FOR SECURE AND SCALABLE MOBILE APPLICATIONS IN CLOUDS Presented by: LansA Informatics Pvt Ltd
  • 2. ABSTRACT Outsourcing data to the cloud are beneficial for reasons of economy, scalability, and accessibility, but significant technical challenges remain. Sensitive data stored in the cloud must be protected from being read in the clear by a cloud provider that is honest but curious. Additionally, cloud-based data are increasingly being accessed by resource-constrained mobile devices for which the processing and communication cost must be minimized. Novel modifications to attribute-based encryption are proposed to allow authorized users access to cloud data based on the satisfaction of required attributes such that the higher computational load from cryptographic operations is assigned to the cloud provider and the total communication cost is lowered for the mobile user.
  • 3. Abstract cont’d • Furthermore, data re-encryption may be optionally performed by the cloud provider to reduce the expense of user revocation in a mobile user environment while preserving the privacy of user data stored in the cloud. • The proposed protocol has been realized on commercially popular mobile and cloud platforms to demonstrate real-world benchmarks that show the efficacy of the scheme. • A simulation calibrated with the benchmark results shows the scalability potential of the scheme in the context of a realistic workload in a mobile cloud computing system
  • 4. EXISTING SYSTEM Data outsourcing to a cloud is appropriate for any class of applications that requires data to be kept in storage and disseminated to many users. Clients that engage a cloud provider typically only pay for the amount of storage, related computation, and amount of network communication actually consumed; they do not incur the capital and maintenance costs of an in-house solution. In addition, the cloud provider offers the advantages of automatic backup and replication to ensure the safety, longevity, and high accessibility of the user data. A major concern that is typically not sufficiently addressed in practice, however, is that data, by default, are stored in the clear; it may be accessed and read by a cloud administrator without knowledge of the client. A cloud administrator may not be trusted despite the presence of contractual security obligations, if data security is not further enforced through technical means. An additional risk is that sensitive data carry the persistent risk of being intercepted by an unauthorized party despite safeguards promised by the provider. Therefore, it is useful to apply software techniques, such as encryption key management, to ensure that the confidentiality of cloud data is preserved at all times. It is especially crucial to safeguard sensitive user data such as e-mails, personal customer information, financial records, and medical records
  • 5. DIS ADVANTAGES • It is not secure. • There is no confidentiality. • It is especially crucial to safeguard sensitive user data
  • 6. PROPOSED SYSTEM  A protocol for outsourcing data storage to a cloud provider in secure fashion is provided. The provider is unable to read stored data; authorized users may do so based on qualification through possession of the right attributes without arbitration by the data owner.  The protocol is designed to be efficient for resource-constrained mobile users by delegating computation and requests to a cloud provider or trusted authority, where appropriate, without compromising security. An improvement is made over a traditional attribute based encryption scheme, such that responsibility over key generation is divided between a mobile data owner and a trusted authority; the owner is relieved of the highest computational and messaging burdens.  Additional security is provided through a group keying mechanism; the data owner controls access based on the distribution of an additional secret key, beyond possession of the required attributes. This additional security measure is an optional variant applicable to highly sensitive data subject to frequent access. Re-encryption, as a process of transforming the stored ciphertext, permits efficient revocation of users; it does not require removal of attributes and subsequent key regeneration, and may be administered by a trusted authority without involvement of the data owner
  • 7. ADVANTAGES • It is more secure. • It reduces data traffic. • Cost efficient
  • 9. SYSTEM CONFIGURATION • HARDWARE REQUIREMENTS:- • Processor - Pentium –IV • Speed - 1.1 Ghz • RAM - 512 MB(min) • Hard Disk - 40 GB • Key Board - Standard Windows Keyboard • Mouse - Two or Three Button Mouse • Monitor - LCD/LED SOFTWARE REQUIREMENTS: • Operating system : Windows XP • Coding Language : Java • Data Base : MySQL • Tool : Net Beans IDE
  • 10. REFERENCE Piotr K.Tysowski and M.Anwarul Hasan “Hybrid Attribute- and Re-Encryption-Based Key Management for Secure and Scalable Mobile Applications in Clouds” IEEE TRANSACTIONS ON CLOUD COMPUTING, VOL. 1, NO. 2, JULY-DECEMBER 2013
  • 11. JOIN US! OFFICE ADDRESS: LansA Informatics Pvt ltd No 165, 5th Street, Crosscut Road, Gandhipuram, Coimbatore - 641 015 OTHER MODE OF CONTACT: Landline: 0422 – 4204373 Mobile : +91 90 953 953 33 +91 91 591 159 69 Email ID: studentscdc@lansainformatics.com web: www.lansainformatics.com Blog: www.lansastudentscdc.blogspot.com Facebook: www.facebook.com/lansainformatics Twitter: www.twitter.com/lansainformatic