SlideShare a Scribd company logo
Decentralized Access Control with Anonymous
Authentication of Data Stored in Clouds
Abstract
1. Decentralized access control scheme is made for secure data storage in clouds that
supports anonymous authentication.
2. In the proposed scheme, the cloud verifies the authenticity of the series without
knowing the user’s identity before storing data.
3. This scheme also has the added feature of access control in which only valid users
are able to decrypt the stored information.
4. The scheme prevents replay attacks and supports creation, modification, and reading
data stored in the cloud.
Objective
1. Moreover, the authentication and access control scheme is decentralized and
robust, unlike other access control schemes designed for clouds which are
centralized.
2. The communication, computation, and storage overheads are comparable to
centralized approaches
Scope
1. Preserving authorized restrictions on information access
and disclosure. The main threat accomplished when storing
the data with the cloud.
Existing System
1. Existing work on access control in cloud are centralized in nature.
2. Except and , all other schemes use attribute based encryption (ABE).
3. The scheme in uses a symmetric key approach and does not support authentication.
The schemes do not support authentication as well.
4. Earlier work by Zhao et al. Provides privacy preserving authenticated access
control in cloud.
5. However, the authors take a centralized approach where a single key distribution
centre (KDC) distributes secret keys and attributes to all users.
6. Unfortunately, a single KDC is not only a single point of failure but difficult to
maintain because of the large number of users that are supported in a cloud
environment.
1. A single KDC is not only a single point of failure but difficult to maintain
because of the large number of users that are supported in a cloud environment
Disadvantages of Existing system
Proposed System
1. Proposed a decentralized approach, their technique does not authenticate users,
who want to remain anonymous while accessing the cloud.
2. This scheme propose a distributed access control mechanism in clouds.
3. However, the scheme did not provide user authentication. The other drawback was
that a user can create and store a file and other users can only read the file.
4. Write access was not permitted to users other than the creator. This scheme has
added features which enables to authenticate the validity of the message without
revealing the identity of the user who has stored information in the cloud. In this
version there is also address user revocation.
5. It uses attribute based signature scheme to achieve authenticity and privacy.
Advantages of Proposed System
1. This scheme extend the previous work with added features which enables to
authenticate the validity of the message without revealing the identity of the user who
has stored information in the cloud.
Architecture
List of Modules
1. System Initialization.
2. User Registration.
3. KDC setup.
4. Attribute generation.
5. Sign.
6. Verify.
Modules Description
KDC setup.
Public Key: The Public key is a random generated
binarykey, generated and maintained by the Key manager itself.
Particularly used for encryption/ decryption.
Private Key: It is the combination of the username, password
and two security question of user’s choice. The private key is
maintained by client itself. Used for encrypt / decrypt the file.
Access key: It is associated with a policy. Private access key is
maintained by the client. The access key is built on attribute based
encryption. File access is of read or write.
Attribute generation.
We used RSA algorithm for encryption/Decryption.
This algorithm is the proven mechanism for secure
transaction. Here we are using the RSA algorithm with key
size of 2048 bits. The keys are split up and stored in four
different places. If a user wants to access the file he/she
may need to provide the four set of data to produce the
single private key to manage encryption/decryption
Verify.
1. Download all the encrypted renew keys of each file from
the cloud.
2. Send the renew keys to the key manager for decrypt the
renew key with the control key.
3. Get the renew keys from the key manager.
4. Generate new renew keys and encrypts with control key.
5. Send the renew keys to the cloud to make the policy
renewal of each file.
System Configuration:-
H/W System Configuration:-
Processor - Duel Core
Speed - 3.0 GHZ
RAM - 2 GB
Hard Disk - 160 GB
Key Board - Standard Windows Keyboard
Mouse - Two or Three Button Mouse
Monitor - SVGA
S/W System Configuration:-
•Operating System : Windows 7
•Application Server : Tomcat5.0/6.X
•Front End : HTML, Java, Jsp
• Scripts : JavaScript.
•Server side Script : Java Server Pages.
•Database : MySQL
•Database Connectivity : JDBC.
Reference
1. S Sushmita Ruj, Milos Stojmenovic and Amiya Nayak,
“Decentralized Access Control with Anonymous Authentication of
Data Stored in Clouds”, IEEE TRANSACTIONS ON PARALLEL
AND DISTRIBUTED SYSTEMS
2. Yang Tang, Patrick P.C. Lee, John C.S. Lui and Radia Perlman,
“Secure Overlay Cloud Storage with Access Control and Assured
Deletion”, IEEE Transcations on dependable and secure
computing,
3. G. Wang, Q. Liu, and J. Wu, “Hierarchical attribute-based
encryption for fine-grained access control in cloud storage
services,” in ACM CCS, , pp. 735–737, 2010
4. Y. Tang, P.P.C. Lee, J.C.S. Lui, and R. Perlman, “FADE: Secure
Overlay Cloud Storage with File Assured Deletion,” Proc. Sixth
Int’l ICST Conf.Security and Privacy in Comm. Networks
(SecureComm), 2010

More Related Content

DOCX
Decentralized access control with anonymous authentication of data stored in ...
PPTX
Decentralized access control with anonymous authentication of data stored in ...
DOCX
Decentralized access control with anonymous authentication of data stored in ...
PPT
Decentralized access control with anonymous authentication of data stored in ...
PPTX
Decentralized access control with anonymous authentication of data stored in ...
DOC
Decentralized access control with anonymous authentication of data stored in ...
DOCX
JPJ1405 Decentralized Access Control With Anonymous Authentication of Data ...
DOCX
decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...
JPJ1405 Decentralized Access Control With Anonymous Authentication of Data ...
decentralized access control with anonymous authentication of data stored in ...

What's hot (20)

DOCX
decentralized access control with anonymous authentication of data stored in ...
PPT
Secure Data Sharing in Cloud (SDSC)
PDF
A Privacy Preserving Attribute Based Access Control Mechanism In Distributed ...
PDF
Secure Data Sharing in Cloud Computing using Revocable Storage Identity- Base...
PDF
Secure data sharing in cloud computing using revocable storage identity-based...
PPTX
Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based...
PPTX
Secure data sharing for dynamic groups in multi-owner using cloud
PDF
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
DOCX
Privacy preserving delegated access control in public clouds
PDF
Attribute based encryption with privacy preserving in clouds
PPTX
Ensuring Distributed Accountability in the Cloud
PPSX
Final year presentation
DOCX
Privacy preserving delegated access control in public clouds
PDF
SMONA: Secure Multi Owner Data Sharing for Dynamic Groups in the Cloud
PDF
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
PDF
Privacy preserving delegated access control in public cloud
PPT
PPT
PPT FOR IDBSDDS SCHEMES
DOC
Oruta privacy preserving public auditing
PDF
The Recent Trend: Vigorous unidentified validation access control system with...
decentralized access control with anonymous authentication of data stored in ...
Secure Data Sharing in Cloud (SDSC)
A Privacy Preserving Attribute Based Access Control Mechanism In Distributed ...
Secure Data Sharing in Cloud Computing using Revocable Storage Identity- Base...
Secure data sharing in cloud computing using revocable storage identity-based...
Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based...
Secure data sharing for dynamic groups in multi-owner using cloud
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
Privacy preserving delegated access control in public clouds
Attribute based encryption with privacy preserving in clouds
Ensuring Distributed Accountability in the Cloud
Final year presentation
Privacy preserving delegated access control in public clouds
SMONA: Secure Multi Owner Data Sharing for Dynamic Groups in the Cloud
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
Privacy preserving delegated access control in public cloud
PPT FOR IDBSDDS SCHEMES
Oruta privacy preserving public auditing
The Recent Trend: Vigorous unidentified validation access control system with...
Ad

Similar to Decentralized access control with authentication anonymous of data stored in cloud (20)

PPTX
Final PPT after cla after class (1).pptx
PDF
PPTX
Mona final review
PDF
IJSRED-V2I2P10
PDF
Psdot 12 a secure erasure code-based cloud storage
PPTX
Presentation (6).pptx
PPTX
A secure anti collision data sharing scheme in dynamic groups in the cloud
PPT
Identity based secure distributed data storage schemes
PPT
PDF
Achieving Secure, sclable and finegrained Cloud computing report
PDF
Sensitive Data Protection in DBaaS
PPTX
PPTX
PPTX
Dont look at this
PDF
IJSRED-V2I3P52
PPTX
Key aggregate cryptosystem for scalable data sharing in cloud storage
PPT
82ugszwcqn29itkwai2q 140424034504-phpapp01
Final PPT after cla after class (1).pptx
Mona final review
IJSRED-V2I2P10
Psdot 12 a secure erasure code-based cloud storage
Presentation (6).pptx
A secure anti collision data sharing scheme in dynamic groups in the cloud
Identity based secure distributed data storage schemes
Achieving Secure, sclable and finegrained Cloud computing report
Sensitive Data Protection in DBaaS
Dont look at this
IJSRED-V2I3P52
Key aggregate cryptosystem for scalable data sharing in cloud storage
82ugszwcqn29itkwai2q 140424034504-phpapp01
Ad

Recently uploaded (20)

PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Machine learning based COVID-19 study performance prediction
PDF
Empathic Computing: Creating Shared Understanding
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PPTX
SOPHOS-XG Firewall Administrator PPT.pptx
PPTX
Machine Learning_overview_presentation.pptx
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PPTX
cloud_computing_Infrastucture_as_cloud_p
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PPTX
A Presentation on Artificial Intelligence
PDF
August Patch Tuesday
PDF
Heart disease approach using modified random forest and particle swarm optimi...
PPTX
OMC Textile Division Presentation 2021.pptx
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PPTX
1. Introduction to Computer Programming.pptx
PDF
Encapsulation theory and applications.pdf
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
NewMind AI Weekly Chronicles - August'25-Week II
Unlocking AI with Model Context Protocol (MCP)
Machine learning based COVID-19 study performance prediction
Empathic Computing: Creating Shared Understanding
Programs and apps: productivity, graphics, security and other tools
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
SOPHOS-XG Firewall Administrator PPT.pptx
Machine Learning_overview_presentation.pptx
MIND Revenue Release Quarter 2 2025 Press Release
cloud_computing_Infrastucture_as_cloud_p
Encapsulation_ Review paper, used for researhc scholars
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
A Presentation on Artificial Intelligence
August Patch Tuesday
Heart disease approach using modified random forest and particle swarm optimi...
OMC Textile Division Presentation 2021.pptx
gpt5_lecture_notes_comprehensive_20250812015547.pdf
1. Introduction to Computer Programming.pptx
Encapsulation theory and applications.pdf
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
NewMind AI Weekly Chronicles - August'25-Week II

Decentralized access control with authentication anonymous of data stored in cloud

  • 1. Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds
  • 2. Abstract 1. Decentralized access control scheme is made for secure data storage in clouds that supports anonymous authentication. 2. In the proposed scheme, the cloud verifies the authenticity of the series without knowing the user’s identity before storing data. 3. This scheme also has the added feature of access control in which only valid users are able to decrypt the stored information. 4. The scheme prevents replay attacks and supports creation, modification, and reading data stored in the cloud.
  • 3. Objective 1. Moreover, the authentication and access control scheme is decentralized and robust, unlike other access control schemes designed for clouds which are centralized. 2. The communication, computation, and storage overheads are comparable to centralized approaches
  • 4. Scope 1. Preserving authorized restrictions on information access and disclosure. The main threat accomplished when storing the data with the cloud.
  • 5. Existing System 1. Existing work on access control in cloud are centralized in nature. 2. Except and , all other schemes use attribute based encryption (ABE). 3. The scheme in uses a symmetric key approach and does not support authentication. The schemes do not support authentication as well. 4. Earlier work by Zhao et al. Provides privacy preserving authenticated access control in cloud. 5. However, the authors take a centralized approach where a single key distribution centre (KDC) distributes secret keys and attributes to all users. 6. Unfortunately, a single KDC is not only a single point of failure but difficult to maintain because of the large number of users that are supported in a cloud environment.
  • 6. 1. A single KDC is not only a single point of failure but difficult to maintain because of the large number of users that are supported in a cloud environment Disadvantages of Existing system
  • 7. Proposed System 1. Proposed a decentralized approach, their technique does not authenticate users, who want to remain anonymous while accessing the cloud. 2. This scheme propose a distributed access control mechanism in clouds. 3. However, the scheme did not provide user authentication. The other drawback was that a user can create and store a file and other users can only read the file. 4. Write access was not permitted to users other than the creator. This scheme has added features which enables to authenticate the validity of the message without revealing the identity of the user who has stored information in the cloud. In this version there is also address user revocation. 5. It uses attribute based signature scheme to achieve authenticity and privacy.
  • 8. Advantages of Proposed System 1. This scheme extend the previous work with added features which enables to authenticate the validity of the message without revealing the identity of the user who has stored information in the cloud.
  • 10. List of Modules 1. System Initialization. 2. User Registration. 3. KDC setup. 4. Attribute generation. 5. Sign. 6. Verify.
  • 11. Modules Description KDC setup. Public Key: The Public key is a random generated binarykey, generated and maintained by the Key manager itself. Particularly used for encryption/ decryption. Private Key: It is the combination of the username, password and two security question of user’s choice. The private key is maintained by client itself. Used for encrypt / decrypt the file. Access key: It is associated with a policy. Private access key is maintained by the client. The access key is built on attribute based encryption. File access is of read or write.
  • 12. Attribute generation. We used RSA algorithm for encryption/Decryption. This algorithm is the proven mechanism for secure transaction. Here we are using the RSA algorithm with key size of 2048 bits. The keys are split up and stored in four different places. If a user wants to access the file he/she may need to provide the four set of data to produce the single private key to manage encryption/decryption
  • 13. Verify. 1. Download all the encrypted renew keys of each file from the cloud. 2. Send the renew keys to the key manager for decrypt the renew key with the control key. 3. Get the renew keys from the key manager. 4. Generate new renew keys and encrypts with control key. 5. Send the renew keys to the cloud to make the policy renewal of each file.
  • 14. System Configuration:- H/W System Configuration:- Processor - Duel Core Speed - 3.0 GHZ RAM - 2 GB Hard Disk - 160 GB Key Board - Standard Windows Keyboard Mouse - Two or Three Button Mouse Monitor - SVGA S/W System Configuration:- •Operating System : Windows 7 •Application Server : Tomcat5.0/6.X •Front End : HTML, Java, Jsp • Scripts : JavaScript. •Server side Script : Java Server Pages. •Database : MySQL •Database Connectivity : JDBC.
  • 15. Reference 1. S Sushmita Ruj, Milos Stojmenovic and Amiya Nayak, “Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds”, IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS 2. Yang Tang, Patrick P.C. Lee, John C.S. Lui and Radia Perlman, “Secure Overlay Cloud Storage with Access Control and Assured Deletion”, IEEE Transcations on dependable and secure computing, 3. G. Wang, Q. Liu, and J. Wu, “Hierarchical attribute-based encryption for fine-grained access control in cloud storage services,” in ACM CCS, , pp. 735–737, 2010 4. Y. Tang, P.P.C. Lee, J.C.S. Lui, and R. Perlman, “FADE: Secure Overlay Cloud Storage with File Assured Deletion,” Proc. Sixth Int’l ICST Conf.Security and Privacy in Comm. Networks (SecureComm), 2010