LeMeniz Infotech 
36, 100 feet Road, Natesan 
Nagar(Near Indira Gandhi Statue, Next 
to Fish-O-Fish), Pondicherry-605 005 
Call: 0413-4205444, +91 99625 88976, 
95663 55386. 
For More Projects Titles Visits : www.lemenizinfotech.com | Call Us : 9962588976 
/9566355386 
Do Your Projects With Domain Experts 
PRIVACY PRESERVING DELEGATED ACCESS 
CONTROL IN PUBLIC CLOUDS 
ABSTRACT 
Current approaches to enforce fine-grained access control on confidential data 
hosted in the cloud are based on fine-grained encryption of the data. Under such 
approaches, data owners are in charge of encrypting the data before uploading 
them on the cloud and re-encrypting the data whenever user credentials or 
authorization policies change. Data owners thus incur high communication and 
computation costs. A better approach should delegate the enforcement of fine-grained 
access control to the cloud, so to minimize the overhead at the data 
owners, while assuring data confidentiality from the cloud. We propose an 
approach, based on two layers of encryption, that addresses such requirement. 
Under this approach, the data owner performs a coarse-grained encryption, 
whereas the cloud performs a fine-grained encryption on top of the owner 
encrypted data. A challenging issue is how to decompose access control policies 
(ACPs) such that the two layer encryption can be performed. This method utilizes 
an efficient group key management scheme that supports expressive ACPs. This 
system assures the confidentiality of the data and preserves the privacy of users 
from the cloud while delegating most of the access control enforcement to the 
cloud.
LeMeniz Infotech 
36, 100 feet Road, Natesan 
Nagar(Near Indira Gandhi Statue, Next 
to Fish-O-Fish), Pondicherry-605 005 
Call: 0413-4205444, +91 99625 88976, 
95663 55386. 
For More Projects Titles Visits : www.lemenizinfotech.com | Call Us : 9962588976 
/9566355386 
Do Your Projects With Domain Experts 
EXISTING SYSTEM 
Single layer encryption (SLE) approaches 
Single layer encryption (SLE) approaches require the data owner to enforce access 
control through encryption performed at the data owner. 
However, while SLE addresses some limitations of previous approaches, it still 
requires the data owner to enforce all the ACPs by fine-grained encryption, both 
initially and subsequently after users are added/revoked or the ACPs change. All 
these encryption activities have to be performed at the owner that thus incurs high 
communication and computation cost. 
Disadvantages 
 As the data owner does not keep a copy of the data, whenever the user 
dynamics or ACPs change 
 The data owner needs to download and decrypt the data, re-encrypt it with 
the new keys, and upload the encrypted data. Notice also that this process 
must be applied to all the data items encrypted with the same key. This is 
inefficient when the data set to be re-encrypted is large. 
 In order to issue the new keys to the users, the data owner needs to establish 
private communication channels with the users.
LeMeniz Infotech 
36, 100 feet Road, Natesan 
Nagar(Near Indira Gandhi Statue, Next 
to Fish-O-Fish), Pondicherry-605 005 
Call: 0413-4205444, +91 99625 88976, 
95663 55386. 
For More Projects Titles Visits : www.lemenizinfotech.com | Call Us : 9962588976 
/9566355386 
Do Your Projects With Domain Experts 
 The privacy of the identity attributes of the users is not taken into account. 
Therefore the cloud can learn sensitive information about the users and their 
organization. 
 All these encryption activities have to be performed at the owner that thus 
incurs high communication and computation cost. 
PROPOSED SYSTEM 
Two layer encryption (TLE) Scheme 
The approach is based on two layers of encryption applied to each data item 
uploaded to the cloud. 
Two layer encryption (TLE), the data owner performs a coarse grained encryption 
over the data in order to assure the confidentiality of the data from the cloud. Then 
the cloud performs fine grained encryption over the encrypted data provided by the 
data owner based on the ACPs provided by the data owner. 
Advantages 
 When the policy or user dynamics changes, only the outer layer of the 
encryption needs to be updated. 
 Since the outer layer encryption is performed at the cloud, no data 
transmission is required between the data owner and the cloud.
LeMeniz Infotech 
36, 100 feet Road, Natesan 
Nagar(Near Indira Gandhi Statue, Next 
to Fish-O-Fish), Pondicherry-605 005 
Call: 0413-4205444, +91 99625 88976, 
95663 55386. 
For More Projects Titles Visits : www.lemenizinfotech.com | Call Us : 9962588976 
/9566355386 
Do Your Projects With Domain Experts 
 The data owner and the cloud service utilize a broadcast key management 
scheme whereby the actual keys do not need to be distributed to the users. 
Instead, users are given one or more secrets which allow them to derive the 
actual symmetric keys for decrypting the data. 
SYSTEM ARCHITECTURE
LeMeniz Infotech 
36, 100 feet Road, Natesan 
Nagar(Near Indira Gandhi Statue, Next 
to Fish-O-Fish), Pondicherry-605 005 
Call: 0413-4205444, +91 99625 88976, 
95663 55386. 
For More Projects Titles Visits : www.lemenizinfotech.com | Call Us : 9962588976 
/9566355386 
Do Your Projects With Domain Experts 
HARDWARE SPECIFICATION 
Processor : Any Processor above 500 MHz. 
Ram : 128Mb. 
Hard Disk : 10 GB. 
Input device : Standard Keyboard and Mouse. 
Output device : VGA and High Resolution Monitor. 
SOFTWARE SPECIFICATION 
Operating System : Windows Family. 
Pages developed using : Java Server Pages and HTML. 
Techniques : Apache Tomcat Web Server 5.0, JDK 1.5 or higher 
Web Browser : Microsoft Internet Explorer. 
Data Base : MySQL 5.0

More Related Content

PDF
Privacy Preserving Delegated Access Control in Public Clouds
DOCX
Privacy preserving delegated access control in public clouds
PDF
Privacy preserving delegated access control in public cloud
PPSX
Final year presentation
DOCX
Privacy preserving delegated access control in public clouds
PDF
SECURE DATA SHARING IN CLOUD COMPUTING USING REVOCABLE-STORAGE IDENTITY-BASED...
DOCX
Privacy preserving delegated access control in public clouds
PPTX
An efficient certificateless encryption for data sharing on public cloud
Privacy Preserving Delegated Access Control in Public Clouds
Privacy preserving delegated access control in public clouds
Privacy preserving delegated access control in public cloud
Final year presentation
Privacy preserving delegated access control in public clouds
SECURE DATA SHARING IN CLOUD COMPUTING USING REVOCABLE-STORAGE IDENTITY-BASED...
Privacy preserving delegated access control in public clouds
An efficient certificateless encryption for data sharing on public cloud

What's hot (20)

DOC
An efficient certificate less encryption for
PPT
Secure Data Sharing in Cloud (SDSC)
DOCX
Decentralized access control with anonymous authentication of data stored in ...
PPT
PPTX
Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based...
DOC
Decentralized access control with anonymous authentication of data stored in ...
PPTX
Decentralized access control with authentication anonymous of data stored in ...
DOCX
Decentralized access control with anonymous authentication of data stored in ...
PDF
Secure data sharing in cloud computing using revocable storage identity-based...
PPTX
A New Mode to Ensure Security in Cloud Computing Services
DOCX
JPJ1405 Decentralized Access Control With Anonymous Authentication of Data ...
PPTX
Decentralized access control with anonymous authentication of data stored in ...
PPT
Decentralized access control with anonymous authentication of data stored in ...
PPTX
Privacy preserving public auditing for regenerating-code-based cloud storage
PPTX
Oruta ppt
PDF
J018145862
DOC
Oruta privacy preserving public auditing
PDF
Secure Data Sharing in Cloud Computing using Revocable Storage Identity- Base...
DOCX
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
PDF
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
An efficient certificate less encryption for
Secure Data Sharing in Cloud (SDSC)
Decentralized access control with anonymous authentication of data stored in ...
Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based...
Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with authentication anonymous of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...
Secure data sharing in cloud computing using revocable storage identity-based...
A New Mode to Ensure Security in Cloud Computing Services
JPJ1405 Decentralized Access Control With Anonymous Authentication of Data ...
Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...
Privacy preserving public auditing for regenerating-code-based cloud storage
Oruta ppt
J018145862
Oruta privacy preserving public auditing
Secure Data Sharing in Cloud Computing using Revocable Storage Identity- Base...
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
Ad

Viewers also liked (14)

PPT
Privacy preserving public auditing for secure cloud storage
PDF
A Privacy Preserving Attribute Based Access Control Mechanism In Distributed ...
PDF
Privacy Preserving Access Control for Third Party Data Management Systems
PDF
Privacy preserving and delegated access control for cloud applications
PPTX
cloud computing preservity
DOC
Privacy Preserving Public Auditing for Data Storage Security in Cloud
PPT
SYSTEM ARCHITECTURE / UML DIAGRAMS FOR IDENTITY BASED SECURE DISTRIBUTED DATA...
PDF
BATERIAS ETNA
PDF
Swedish_Technology_Time_Attendance
PDF
Reliability evaluation of conventional and interleaved dc–dc boost converters
DOCX
Kontribusi pemerintah dan masyarakat dalam melestarikan kebudayaan
PDF
A privacy preserving framework for managing mobile ad requests and billing in...
PDF
BATERIAS ETNA
Privacy preserving public auditing for secure cloud storage
A Privacy Preserving Attribute Based Access Control Mechanism In Distributed ...
Privacy Preserving Access Control for Third Party Data Management Systems
Privacy preserving and delegated access control for cloud applications
cloud computing preservity
Privacy Preserving Public Auditing for Data Storage Security in Cloud
SYSTEM ARCHITECTURE / UML DIAGRAMS FOR IDENTITY BASED SECURE DISTRIBUTED DATA...
BATERIAS ETNA
Swedish_Technology_Time_Attendance
Reliability evaluation of conventional and interleaved dc–dc boost converters
Kontribusi pemerintah dan masyarakat dalam melestarikan kebudayaan
A privacy preserving framework for managing mobile ad requests and billing in...
BATERIAS ETNA
Ad

Similar to Privacy preserving delegated access control in public clouds (20)

DOCX
Oruta privacy preserving public auditing for shared data in the cloud
PDF
Privacy preserving ciphertext multi-sharing control for big data storage
PDF
Privacy preserving ciphertext multi-sharing control for big data storage
PDF
Enabling fine grained multi-keyword search supporting classified sub-dictiona...
PDF
Cost effective authentic and anonymous data sharing with forward security
PDF
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...
PDF
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
PDF
Space efficient verifiable secret sharing using polynomial interpolation
DOCX
Traffic pattern based content leakage detection for trusted content delivery ...
PDF
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
PDF
Performing initiative data prefetching in distributed file systems for cloud ...
DOC
Main p roject list for csc it
PDF
Privacy preserving public auditing for regenerating-code-based cloud storage
DOCX
Incentive based data sharing in delay tolerant mobile networks
PDF
A hybrid cloud approach for secure authorized deduplication
DOCX
Hiding in the mobile crowd location privacy through collaboration
PDF
User defined privacy grid system for continuous location-based services
PDF
Lossless and reversible data hiding in encrypted images with public key crypt...
PDF
Privacypreservingdelegatedaccesscontrolinpublicclouds 141112073315-conversion...
PDF
Privacypreservingdelegatedaccesscontrolinpublicclouds
Oruta privacy preserving public auditing for shared data in the cloud
Privacy preserving ciphertext multi-sharing control for big data storage
Privacy preserving ciphertext multi-sharing control for big data storage
Enabling fine grained multi-keyword search supporting classified sub-dictiona...
Cost effective authentic and anonymous data sharing with forward security
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Space efficient verifiable secret sharing using polynomial interpolation
Traffic pattern based content leakage detection for trusted content delivery ...
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
Performing initiative data prefetching in distributed file systems for cloud ...
Main p roject list for csc it
Privacy preserving public auditing for regenerating-code-based cloud storage
Incentive based data sharing in delay tolerant mobile networks
A hybrid cloud approach for secure authorized deduplication
Hiding in the mobile crowd location privacy through collaboration
User defined privacy grid system for continuous location-based services
Lossless and reversible data hiding in encrypted images with public key crypt...
Privacypreservingdelegatedaccesscontrolinpublicclouds 141112073315-conversion...
Privacypreservingdelegatedaccesscontrolinpublicclouds

More from LeMeniz Infotech (20)

PDF
A fast acquisition all-digital delay-locked loop using a starting-bit predict...
PDF
A fast fault tolerant architecture for sauvola local image thresholding algor...
PDF
A dynamically reconfigurable multi asip architecture for multistandard and mu...
PDF
Interleaved digital power factor correction based on the sliding mode approach
PDF
Bumpless control for reduced thd in power factor correction circuits
PDF
A bidirectional single stage three phase rectifier with high-frequency isolat...
PDF
A bidirectional three level llc resonant converter with pwam control
PDF
Efficient single phase transformerless inverter for grid tied pvg system with...
PDF
Highly reliable transformerless photovoltaic inverters with leakage current a...
PDF
Grid current-feedback active damping for lcl resonance in grid-connected volt...
PDF
Delay dependent stability of single-loop controlled grid-connected inverters ...
PDF
Connection of converters to a low and medium power dc network using an induct...
PDF
Stamp enabling privacy preserving location proofs for mobile users
PDF
Sbvlc secure barcode based visible light communication for smartphones
PDF
Read2 me a cloud based reading aid for the visually impaired
PDF
Privacy preserving location sharing services for social networks
PDF
Pass byo bring your own picture for securing graphical passwords
PDF
Eplq efficient privacy preserving location-based query over outsourced encryp...
PDF
Analyzing ad library updates in android apps
PDF
An exploration of geographic authentication scheme
A fast acquisition all-digital delay-locked loop using a starting-bit predict...
A fast fault tolerant architecture for sauvola local image thresholding algor...
A dynamically reconfigurable multi asip architecture for multistandard and mu...
Interleaved digital power factor correction based on the sliding mode approach
Bumpless control for reduced thd in power factor correction circuits
A bidirectional single stage three phase rectifier with high-frequency isolat...
A bidirectional three level llc resonant converter with pwam control
Efficient single phase transformerless inverter for grid tied pvg system with...
Highly reliable transformerless photovoltaic inverters with leakage current a...
Grid current-feedback active damping for lcl resonance in grid-connected volt...
Delay dependent stability of single-loop controlled grid-connected inverters ...
Connection of converters to a low and medium power dc network using an induct...
Stamp enabling privacy preserving location proofs for mobile users
Sbvlc secure barcode based visible light communication for smartphones
Read2 me a cloud based reading aid for the visually impaired
Privacy preserving location sharing services for social networks
Pass byo bring your own picture for securing graphical passwords
Eplq efficient privacy preserving location-based query over outsourced encryp...
Analyzing ad library updates in android apps
An exploration of geographic authentication scheme

Recently uploaded (20)

PDF
August Patch Tuesday
PDF
DP Operators-handbook-extract for the Mautical Institute
PDF
A contest of sentiment analysis: k-nearest neighbor versus neural network
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PDF
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
PDF
A Late Bloomer's Guide to GenAI: Ethics, Bias, and Effective Prompting - Boha...
PPTX
Benefits of Physical activity for teenagers.pptx
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PDF
A comparative study of natural language inference in Swahili using monolingua...
PPTX
Final SEM Unit 1 for mit wpu at pune .pptx
PPTX
Modernising the Digital Integration Hub
PDF
Taming the Chaos: How to Turn Unstructured Data into Decisions
PDF
NewMind AI Weekly Chronicles – August ’25 Week III
PDF
Architecture types and enterprise applications.pdf
PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
PDF
Getting Started with Data Integration: FME Form 101
PPTX
Chapter 5: Probability Theory and Statistics
PPT
What is a Computer? Input Devices /output devices
PDF
Getting started with AI Agents and Multi-Agent Systems
August Patch Tuesday
DP Operators-handbook-extract for the Mautical Institute
A contest of sentiment analysis: k-nearest neighbor versus neural network
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
A Late Bloomer's Guide to GenAI: Ethics, Bias, and Effective Prompting - Boha...
Benefits of Physical activity for teenagers.pptx
Assigned Numbers - 2025 - Bluetooth® Document
A comparative study of natural language inference in Swahili using monolingua...
Final SEM Unit 1 for mit wpu at pune .pptx
Modernising the Digital Integration Hub
Taming the Chaos: How to Turn Unstructured Data into Decisions
NewMind AI Weekly Chronicles – August ’25 Week III
Architecture types and enterprise applications.pdf
Univ-Connecticut-ChatGPT-Presentaion.pdf
Getting Started with Data Integration: FME Form 101
Chapter 5: Probability Theory and Statistics
What is a Computer? Input Devices /output devices
Getting started with AI Agents and Multi-Agent Systems

Privacy preserving delegated access control in public clouds

  • 1. LeMeniz Infotech 36, 100 feet Road, Natesan Nagar(Near Indira Gandhi Statue, Next to Fish-O-Fish), Pondicherry-605 005 Call: 0413-4205444, +91 99625 88976, 95663 55386. For More Projects Titles Visits : www.lemenizinfotech.com | Call Us : 9962588976 /9566355386 Do Your Projects With Domain Experts PRIVACY PRESERVING DELEGATED ACCESS CONTROL IN PUBLIC CLOUDS ABSTRACT Current approaches to enforce fine-grained access control on confidential data hosted in the cloud are based on fine-grained encryption of the data. Under such approaches, data owners are in charge of encrypting the data before uploading them on the cloud and re-encrypting the data whenever user credentials or authorization policies change. Data owners thus incur high communication and computation costs. A better approach should delegate the enforcement of fine-grained access control to the cloud, so to minimize the overhead at the data owners, while assuring data confidentiality from the cloud. We propose an approach, based on two layers of encryption, that addresses such requirement. Under this approach, the data owner performs a coarse-grained encryption, whereas the cloud performs a fine-grained encryption on top of the owner encrypted data. A challenging issue is how to decompose access control policies (ACPs) such that the two layer encryption can be performed. This method utilizes an efficient group key management scheme that supports expressive ACPs. This system assures the confidentiality of the data and preserves the privacy of users from the cloud while delegating most of the access control enforcement to the cloud.
  • 2. LeMeniz Infotech 36, 100 feet Road, Natesan Nagar(Near Indira Gandhi Statue, Next to Fish-O-Fish), Pondicherry-605 005 Call: 0413-4205444, +91 99625 88976, 95663 55386. For More Projects Titles Visits : www.lemenizinfotech.com | Call Us : 9962588976 /9566355386 Do Your Projects With Domain Experts EXISTING SYSTEM Single layer encryption (SLE) approaches Single layer encryption (SLE) approaches require the data owner to enforce access control through encryption performed at the data owner. However, while SLE addresses some limitations of previous approaches, it still requires the data owner to enforce all the ACPs by fine-grained encryption, both initially and subsequently after users are added/revoked or the ACPs change. All these encryption activities have to be performed at the owner that thus incurs high communication and computation cost. Disadvantages  As the data owner does not keep a copy of the data, whenever the user dynamics or ACPs change  The data owner needs to download and decrypt the data, re-encrypt it with the new keys, and upload the encrypted data. Notice also that this process must be applied to all the data items encrypted with the same key. This is inefficient when the data set to be re-encrypted is large.  In order to issue the new keys to the users, the data owner needs to establish private communication channels with the users.
  • 3. LeMeniz Infotech 36, 100 feet Road, Natesan Nagar(Near Indira Gandhi Statue, Next to Fish-O-Fish), Pondicherry-605 005 Call: 0413-4205444, +91 99625 88976, 95663 55386. For More Projects Titles Visits : www.lemenizinfotech.com | Call Us : 9962588976 /9566355386 Do Your Projects With Domain Experts  The privacy of the identity attributes of the users is not taken into account. Therefore the cloud can learn sensitive information about the users and their organization.  All these encryption activities have to be performed at the owner that thus incurs high communication and computation cost. PROPOSED SYSTEM Two layer encryption (TLE) Scheme The approach is based on two layers of encryption applied to each data item uploaded to the cloud. Two layer encryption (TLE), the data owner performs a coarse grained encryption over the data in order to assure the confidentiality of the data from the cloud. Then the cloud performs fine grained encryption over the encrypted data provided by the data owner based on the ACPs provided by the data owner. Advantages  When the policy or user dynamics changes, only the outer layer of the encryption needs to be updated.  Since the outer layer encryption is performed at the cloud, no data transmission is required between the data owner and the cloud.
  • 4. LeMeniz Infotech 36, 100 feet Road, Natesan Nagar(Near Indira Gandhi Statue, Next to Fish-O-Fish), Pondicherry-605 005 Call: 0413-4205444, +91 99625 88976, 95663 55386. For More Projects Titles Visits : www.lemenizinfotech.com | Call Us : 9962588976 /9566355386 Do Your Projects With Domain Experts  The data owner and the cloud service utilize a broadcast key management scheme whereby the actual keys do not need to be distributed to the users. Instead, users are given one or more secrets which allow them to derive the actual symmetric keys for decrypting the data. SYSTEM ARCHITECTURE
  • 5. LeMeniz Infotech 36, 100 feet Road, Natesan Nagar(Near Indira Gandhi Statue, Next to Fish-O-Fish), Pondicherry-605 005 Call: 0413-4205444, +91 99625 88976, 95663 55386. For More Projects Titles Visits : www.lemenizinfotech.com | Call Us : 9962588976 /9566355386 Do Your Projects With Domain Experts HARDWARE SPECIFICATION Processor : Any Processor above 500 MHz. Ram : 128Mb. Hard Disk : 10 GB. Input device : Standard Keyboard and Mouse. Output device : VGA and High Resolution Monitor. SOFTWARE SPECIFICATION Operating System : Windows Family. Pages developed using : Java Server Pages and HTML. Techniques : Apache Tomcat Web Server 5.0, JDK 1.5 or higher Web Browser : Microsoft Internet Explorer. Data Base : MySQL 5.0