Sandhiya S fail on exam using chatgpt but chatgpt as fraud 420
1. ATTRIBUTE BASED PROXY RE-ENCRYPTION WITH DIRECT
REVOCATION MECHANISM FOR DATA SHARING IN CLOUDS
PUNITHA A
MCA (2023-25)
612723622024
GUIDED BY
MR S.A CHENNAKESAVAN HOD
2. ABSTRACT
Provable data possession (PDP) is a technique for ensuring the integrity of data
in storage outsourcing. In this paper, we address the construction of an efficient PDP
scheme for distributed cloud storage to support the scalability of service and data
migration, in which we consider the existence of multiple cloud service providers to
cooperatively store and maintain the clients’ data. We present a cooperative PDP
(CPDP) scheme based on homomorphic verifiable response and hash index hierarchy.
We prove the security of our scheme based on multi-prover zero-knowledge proof
system, which can satisfy completeness, knowledge soundness, and zero-knowledge
properties. In addition, we articulate performance optimization mechanisms for our
scheme, and in particular present an efficient method for selecting optimal parameter
values to minimize the computation costs of clients and storage service providers. Our
experiments show that our solution introduces lower computation and
communication overheads in comparison with non-cooperative approaches.
3. Introduction
The venture of cloud computing provides a significant Progress in the field of IT industry. It
is one of the most promising technologies out in the world today which gives numerous
benefits to any organization or an individual. It comes with more appealing data storage, on
demand services, ubiquitous network access and convenient data exchange for the users.
Cloud computing offers solutions for data storage irrespective of local infrastructure
limitations as well as equips the users with a platform to process their information. The
main focus of this technology is to widen the efficacy of shared resources available in the
cloud and also to reallocate them dynamically if needed. Even though the technology
provides endless benefits, it lacks tight security capabilities and creates privacy issues for
the data owners. Traditional security measures primarily relate to authentication of users to
apprehend that the users access their own data fields. Along with the issues regarding
security, there arose other issues when the cloud users need to share and access each other’s
authorized information to bring about tremendous benefits. An example is considered
where a group of supplier, carrier and retailer takes part in the system. Each group has its
own set of authorized information and has access permission to access their data. In
accessing data from different group privacy is revealed during the access request itself
which becomes a security issue here. So, anonymous request matching mechanism is used to
protect the privacy of the users. Different access control for different group of users is
provided by a trusted third party auditor.
4. There exist various tools and technologies for multi-cloud, such as Platform
VM Orchestrator, VM warevSphere, and Ovirt. These tools help cloud providers construct a
distributed cloud storage platform for managing clients’ data. However, if such an important
platform is vulnerable to security attacks, it would bring irretrievable losses to the clients. For
example, the confidential data in an enterprise may be illegally accessed through a remote
interface provided by a multi-cloud, or relevant data and archives may be lost or tampered with
when they are stored into an∙ uncertain storage pool outside the enterprise. Therefore, it is
indispensable for cloud service providers to provide security techniques for managing their
storage services.
EXISTING SYSTEM
5. PROPOSED SYSTEM
To check the availability and integrity of outsourced data in cloud
storages, researchers have proposed two basic approaches called Provable Data
Possession and Proofs of Retrievability .Ateniese et al. first proposed the PDP model for
ensuring possession of files on untrusted storages and provided an RSA-based scheme
for a static case that achieves the communication cost. They also proposed a publicly
verifiable version, which allows anyone, not just the owner, to challenge the server for
data possession..They proposed a lightweight PDP scheme based on cryptographic hash
function and symmetric key encryption, but the servers can deceive the owners by
using previous metadata or responses due to the lack of randomness in the challenges.
The numbers of updates and challenges are limited and fixed in advance and users
cannot perform block insertions anywhere.
7. SOFTWARE REQUIREMENT SPECIFICATION
• System Architecture : Java
• Core Language : Jsp , Servlet
• Operating System : Windows Xp
• Database : My Sql
• Server : Apache Tomcat
8. BIBLIOGRAPHY
William Grosso, “JAVA”, O'Reilly Media, Inc.; 1 edition, 2001
John Zukowski, “Definitive Guide to Swing for Java 2”,1999
Roger S.Pressman, “SOFTWARE ENGINEERING –A PRACTIONERS APPROACH “, Tata McGraw Hill Publishing Company,
1997.
JAVA 2 Platform, standard Edition, V 1.3.1 API Specification
Java RMI: Remote method Invocation(Paperback) Troy Bryan Downing
Patrick Naughton “The Java Hand Book” Tata McGraw Hill, 2006
Mark Grand and Jonathan Knudsen, “Java Fundamental Classes Reference”, Tata McGraw-Hill Publishing Company
Limited, 1st Edition, May 1997.
Dietel & Deitel, Java How To Program, BPB Publishers, New Delhi, 2000.
O’reilly, Java Swings, Tata McGrawHill, Fifth Edition, 2002.