SlideShare a Scribd company logo
RAAC: Robust and Auditable
Access Control with Multiple
Attribute Authorities for Public
Cloud Storage
ABSTRACT
• Data access control is a challenging issue in public cloud
storage systems. Ciphertext-policy attribute-based
encryption (CP-ABE) has been adopted as a promising
technique to provide flexible, fine-grained, and secure
data access control for cloud storage with honest-but-
curious cloud servers.
• However, in the existing CP-ABE schemes, the single
attribute authority must execute the time-consuming
user legitimacy verification and secret key distribution,
and hence, it results in a single-point performance
bottleneck when a CP-ABE scheme is adopted in a large-
scale cloud storage system.
CONTI..
• Users may be stuck in the waiting queue for a
long period to obtain their secret keys, thereby
resulting in low efficiency of the system.
• Although multi-authority access control schemes
have been proposed, these schemes still cannot
overcome the drawbacks of single-point
bottleneck and low efficiency, due to the fact that
each of the authorities still independently
manages a disjoint attribute set
EXISTING SYSTEM
• To address the issue of data access control in cloud storage,
there have been quite a few schemes proposed, among which
Ciphertext-Policy Attribute-Based Encryption (CP-ABE) is re-
garded as one of the most promising techniques.
• A salient feature of CP-ABE is that it grants data owners direct
control power based on access policies, to provide flexible,
fine-grained and secure access control for cloud storage
systems.
• In CP-ABE schemes, the access control is achieved by using
cryptography, where an owner’s data is encrypted with an ac-
cess structure over attributes, and a user’s secret key is labelled
with his/her own attributes.
CONTI..
• Only if the attributes associated with the user’s
secret key satisfy the access structure, can the
user decrypt the corresponding ciphertext to
obtain the plaintext.
PROPOSED SYSTEM
• In this paper, we propose a novel heterogeneous
framework to remove the problem of single-point
performance bottleneck and provide a more efficient
access control scheme with an auditing mechanism.
Our framework employs multiple attribute authorities
to share the load of user legitimacy verification.
• Meanwhile, in our scheme, a central authority is
introduced to generate secret keys for legitimacy
verified users.
CONTI..
• Unlike other multi-authority access control
schemes, each of the authorities in our scheme
manages the whole attribute set individually.
• To enhance security, we also propose an
auditing mechanism to detect which attribute
authority has incorrectly or maliciously
performed the legitimacy verification
procedure.
SYSTEM REQUIREMNTS
• HARDWARE REQUIREMENS
• System : Pentium IV 2.4 GHz.
• Hard Disk : 40 GB.
• Ram : 512 Mb.
• SOFTWARE REQURIEMENTS
• Operating system : Windows XP/7.
• Coding Language: : JAVA/J2EE
• IDE : Netbeans 7.4
• Database : MYSQL

More Related Content

PPTX
Attribute Based Storage Supporting Secure Deduplication of Encrypted D...
PPTX
Time and Attribute Factors Combined Access Control on Time-Sensitive Data in ...
PPTX
A Cross Tenant Access Control (CTAC) Model for Cloud Computing: Formal Specif...
PPTX
Identity-Based Remote Data Integrity Checking With Perfect Data Privacy Prese...
PPT
Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases
PPTX
Ensuring data integrity on cloud data storage
PPTX
Data Integrity proofs in cloud storage
DOC
Hasbe a hierarchical attribute based solution for flexible and scalable acces...
Attribute Based Storage Supporting Secure Deduplication of Encrypted D...
Time and Attribute Factors Combined Access Control on Time-Sensitive Data in ...
A Cross Tenant Access Control (CTAC) Model for Cloud Computing: Formal Specif...
Identity-Based Remote Data Integrity Checking With Perfect Data Privacy Prese...
Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases
Ensuring data integrity on cloud data storage
Data Integrity proofs in cloud storage
Hasbe a hierarchical attribute based solution for flexible and scalable acces...

What's hot (20)

PPTX
Hasbe a hierarchical attribute based solution for flexible and scalable acces...
PPTX
cloud computing encrypted
PPTX
Cloud Computing PPT
PDF
Azure IoT Hub: what is it and why we select other solution (production projec...
PPSX
Final year presentation
PPSX
Multi-tenancy in Private Clouds
PPTX
Data Security Essentials for Cloud Computing - JavaOne 2013
PDF
Keeping your Enterprise’s Big Data Secure by Owen O’Malley at Big Data Spain ...
DOCX
JPJ1407 Expressive, Efficient, and Revocable Data Access Control for Multi-...
PPTX
Data Governance and Management in Cloud pak nam
PPTX
An efficient certificateless encryption for data sharing on public cloud
DOCX
expressive, efficient, and revocable data access control for multi authority ...
PPTX
Analysis-of-Security-Algorithms-in-Cloud-Computing [Autosaved]
PDF
tcp cloud - Advanced Cloud Computing
PDF
Elastic at KPN
PPTX
Advanced Cryptography for Cloud Security
PDF
ATTRIBUTE-BASED DATA SHARING SCHEME REVISITED IN CLOUD COMPUTING,bulk ieee pr...
PDF
The Elastic Evolution of CenturyLink’s Network Management System
PPTX
Integrity for join queries
PPTX
Managing the Dewey Decimal System
Hasbe a hierarchical attribute based solution for flexible and scalable acces...
cloud computing encrypted
Cloud Computing PPT
Azure IoT Hub: what is it and why we select other solution (production projec...
Final year presentation
Multi-tenancy in Private Clouds
Data Security Essentials for Cloud Computing - JavaOne 2013
Keeping your Enterprise’s Big Data Secure by Owen O’Malley at Big Data Spain ...
JPJ1407 Expressive, Efficient, and Revocable Data Access Control for Multi-...
Data Governance and Management in Cloud pak nam
An efficient certificateless encryption for data sharing on public cloud
expressive, efficient, and revocable data access control for multi authority ...
Analysis-of-Security-Algorithms-in-Cloud-Computing [Autosaved]
tcp cloud - Advanced Cloud Computing
Elastic at KPN
Advanced Cryptography for Cloud Security
ATTRIBUTE-BASED DATA SHARING SCHEME REVISITED IN CLOUD COMPUTING,bulk ieee pr...
The Elastic Evolution of CenturyLink’s Network Management System
Integrity for join queries
Managing the Dewey Decimal System
Ad

Similar to RAAC: Robust and Auditable Access Control with Multiple Attribute Authorities for Public Cloud Storage (20)

PDF
Investigation on Revocable Fine-grained Access Control Scheme for Multi-Autho...
PDF
Acquisition of Secured Data from Cloud
DOCX
An Attribute-based Controlled Collaborative Access Control Scheme for Public ...
PDF
C04932125
PDF
Access Control and Revocation for Digital Assets on Cloud with Consideration ...
PDF
IRJET- Integrity Verification and Attribute based Encryption for Cloud Storage
PPTX
Attribute based encryption in cloud with significant reduction reviw2
PDF
IRJET- A Novel and Secure Approach to Control and Access Data in Cloud St...
PDF
IRJET- Securing Cloud Data Under Key Exposure
DOCX
Expressive, efficient, and revocable data access control for multi authority ...
PDF
Hierarchical attribute based solution for flexible access control in cloud co...
PPTX
Final_attribute based encryption in cloud with significant reduction of compu...
PDF
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
PDF
A Survey on Cross-License Cloud Storage Environment of Revelatory, Proficient...
PDF
IRJET- Secure Cloud Data Using Attribute Based Encryption
PPTX
Attribute-Based Encryption for Cloud Security
PDF
AN EFFICIENT FILE HIERARCHY ATTRIBUTE-BASED ENCRYPTION SCHEME IN CLOUD COMPUT...
PDF
IRJET- A Review Paper on an Efficient File Hierarchy Attribute Based Encr...
PDF
A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...
Investigation on Revocable Fine-grained Access Control Scheme for Multi-Autho...
Acquisition of Secured Data from Cloud
An Attribute-based Controlled Collaborative Access Control Scheme for Public ...
C04932125
Access Control and Revocation for Digital Assets on Cloud with Consideration ...
IRJET- Integrity Verification and Attribute based Encryption for Cloud Storage
Attribute based encryption in cloud with significant reduction reviw2
IRJET- A Novel and Secure Approach to Control and Access Data in Cloud St...
IRJET- Securing Cloud Data Under Key Exposure
Expressive, efficient, and revocable data access control for multi authority ...
Hierarchical attribute based solution for flexible access control in cloud co...
Final_attribute based encryption in cloud with significant reduction of compu...
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
A Survey on Cross-License Cloud Storage Environment of Revelatory, Proficient...
IRJET- Secure Cloud Data Using Attribute Based Encryption
Attribute-Based Encryption for Cloud Security
AN EFFICIENT FILE HIERARCHY ATTRIBUTE-BASED ENCRYPTION SCHEME IN CLOUD COMPUT...
IRJET- A Review Paper on an Efficient File Hierarchy Attribute Based Encr...
A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...
Ad

More from Prasadu Peddi (13)

PDF
Pointers
PDF
String notes
DOCX
B.Com 1year Lab programs
DOCX
COMPUTING SEMANTIC SIMILARITY OF CONCEPTS IN KNOWLEDGE GRAPHS
DOCX
Energy-efficient Query Processing in Web Search Engines
DOCX
MINING COMPETITORS FROM LARGE UNSTRUCTURED DATASETS
DOCX
GENERATING QUERY FACETS USING KNOWLEDGE BASES
DOCX
UNDERSTAND SHORTTEXTS BY HARVESTING & ANALYZING SEMANTIKNOWLEDGE
DOCX
SOCIRANK: IDENTIFYING AND RANKING PREVALENT NEWS TOPICS USING SOCIAL MEDIA FA...
DOCX
QUERY EXPANSION WITH ENRICHED USER PROFILES FOR PERSONALIZED SEARCH UTILIZING...
DOCX
COLLABORATIVE FILTERING-BASED RECOMMENDATION OF ONLINE SOCIAL VOTING
DOCX
DYNAMIC FACET ORDERING FOR FACETED PRODUCT SEARCH ENGINES
PPTX
Provably Secure Key-Aggregate Cryptosystems with Broadcast Aggregate Keys for...
Pointers
String notes
B.Com 1year Lab programs
COMPUTING SEMANTIC SIMILARITY OF CONCEPTS IN KNOWLEDGE GRAPHS
Energy-efficient Query Processing in Web Search Engines
MINING COMPETITORS FROM LARGE UNSTRUCTURED DATASETS
GENERATING QUERY FACETS USING KNOWLEDGE BASES
UNDERSTAND SHORTTEXTS BY HARVESTING & ANALYZING SEMANTIKNOWLEDGE
SOCIRANK: IDENTIFYING AND RANKING PREVALENT NEWS TOPICS USING SOCIAL MEDIA FA...
QUERY EXPANSION WITH ENRICHED USER PROFILES FOR PERSONALIZED SEARCH UTILIZING...
COLLABORATIVE FILTERING-BASED RECOMMENDATION OF ONLINE SOCIAL VOTING
DYNAMIC FACET ORDERING FOR FACETED PRODUCT SEARCH ENGINES
Provably Secure Key-Aggregate Cryptosystems with Broadcast Aggregate Keys for...

Recently uploaded (20)

PDF
Anesthesia in Laparoscopic Surgery in India
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PDF
RMMM.pdf make it easy to upload and study
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PDF
Microbial disease of the cardiovascular and lymphatic systems
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PPTX
Institutional Correction lecture only . . .
PDF
Pre independence Education in Inndia.pdf
PDF
Computing-Curriculum for Schools in Ghana
PDF
01-Introduction-to-Information-Management.pdf
PPTX
PPH.pptx obstetrics and gynecology in nursing
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PDF
TR - Agricultural Crops Production NC III.pdf
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PDF
Classroom Observation Tools for Teachers
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PDF
102 student loan defaulters named and shamed – Is someone you know on the list?
Anesthesia in Laparoscopic Surgery in India
Microbial diseases, their pathogenesis and prophylaxis
Abdominal Access Techniques with Prof. Dr. R K Mishra
RMMM.pdf make it easy to upload and study
human mycosis Human fungal infections are called human mycosis..pptx
Supply Chain Operations Speaking Notes -ICLT Program
Pharmacology of Heart Failure /Pharmacotherapy of CHF
Microbial disease of the cardiovascular and lymphatic systems
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
Institutional Correction lecture only . . .
Pre independence Education in Inndia.pdf
Computing-Curriculum for Schools in Ghana
01-Introduction-to-Information-Management.pdf
PPH.pptx obstetrics and gynecology in nursing
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
TR - Agricultural Crops Production NC III.pdf
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
Classroom Observation Tools for Teachers
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
102 student loan defaulters named and shamed – Is someone you know on the list?

RAAC: Robust and Auditable Access Control with Multiple Attribute Authorities for Public Cloud Storage

  • 1. RAAC: Robust and Auditable Access Control with Multiple Attribute Authorities for Public Cloud Storage
  • 2. ABSTRACT • Data access control is a challenging issue in public cloud storage systems. Ciphertext-policy attribute-based encryption (CP-ABE) has been adopted as a promising technique to provide flexible, fine-grained, and secure data access control for cloud storage with honest-but- curious cloud servers. • However, in the existing CP-ABE schemes, the single attribute authority must execute the time-consuming user legitimacy verification and secret key distribution, and hence, it results in a single-point performance bottleneck when a CP-ABE scheme is adopted in a large- scale cloud storage system.
  • 3. CONTI.. • Users may be stuck in the waiting queue for a long period to obtain their secret keys, thereby resulting in low efficiency of the system. • Although multi-authority access control schemes have been proposed, these schemes still cannot overcome the drawbacks of single-point bottleneck and low efficiency, due to the fact that each of the authorities still independently manages a disjoint attribute set
  • 4. EXISTING SYSTEM • To address the issue of data access control in cloud storage, there have been quite a few schemes proposed, among which Ciphertext-Policy Attribute-Based Encryption (CP-ABE) is re- garded as one of the most promising techniques. • A salient feature of CP-ABE is that it grants data owners direct control power based on access policies, to provide flexible, fine-grained and secure access control for cloud storage systems. • In CP-ABE schemes, the access control is achieved by using cryptography, where an owner’s data is encrypted with an ac- cess structure over attributes, and a user’s secret key is labelled with his/her own attributes.
  • 5. CONTI.. • Only if the attributes associated with the user’s secret key satisfy the access structure, can the user decrypt the corresponding ciphertext to obtain the plaintext.
  • 6. PROPOSED SYSTEM • In this paper, we propose a novel heterogeneous framework to remove the problem of single-point performance bottleneck and provide a more efficient access control scheme with an auditing mechanism. Our framework employs multiple attribute authorities to share the load of user legitimacy verification. • Meanwhile, in our scheme, a central authority is introduced to generate secret keys for legitimacy verified users.
  • 7. CONTI.. • Unlike other multi-authority access control schemes, each of the authorities in our scheme manages the whole attribute set individually. • To enhance security, we also propose an auditing mechanism to detect which attribute authority has incorrectly or maliciously performed the legitimacy verification procedure.
  • 8. SYSTEM REQUIREMNTS • HARDWARE REQUIREMENS • System : Pentium IV 2.4 GHz. • Hard Disk : 40 GB. • Ram : 512 Mb. • SOFTWARE REQURIEMENTS • Operating system : Windows XP/7. • Coding Language: : JAVA/J2EE • IDE : Netbeans 7.4 • Database : MYSQL