SlideShare a Scribd company logo
ATTRIBUTE BASED PROXY RE-ENCRYPTION WITH DIRECT
REVOCATION MECHANISM FOR DATA SHARING IN CLOUDS
PUNITHA A
MCA (2023-25)
612723622024
GUIDED BY
MR S.A CHENNAKESAVAN HOD
ABSTRACT
Provable data possession (PDP) is a technique for ensuring the integrity of data
in storage outsourcing. In this paper, we address the construction of an efficient PDP
scheme for distributed cloud storage to support the scalability of service and data
migration, in which we consider the existence of multiple cloud service providers to
cooperatively store and maintain the clients’ data. We present a cooperative PDP
(CPDP) scheme based on homomorphic verifiable response and hash index hierarchy.
We prove the security of our scheme based on multi-prover zero-knowledge proof
system, which can satisfy completeness, knowledge soundness, and zero-knowledge
properties. In addition, we articulate performance optimization mechanisms for our
scheme, and in particular present an efficient method for selecting optimal parameter
values to minimize the computation costs of clients and storage service providers. Our
experiments show that our solution introduces lower computation and
communication overheads in comparison with non-cooperative approaches.
Introduction
The venture of cloud computing provides a significant Progress in the field of IT industry. It
is one of the most promising technologies out in the world today which gives numerous
benefits to any organization or an individual. It comes with more appealing data storage, on
demand services, ubiquitous network access and convenient data exchange for the users.
Cloud computing offers solutions for data storage irrespective of local infrastructure
limitations as well as equips the users with a platform to process their information. The
main focus of this technology is to widen the efficacy of shared resources available in the
cloud and also to reallocate them dynamically if needed. Even though the technology
provides endless benefits, it lacks tight security capabilities and creates privacy issues for
the data owners. Traditional security measures primarily relate to authentication of users to
apprehend that the users access their own data fields. Along with the issues regarding
security, there arose other issues when the cloud users need to share and access each other’s
authorized information to bring about tremendous benefits. An example is considered
where a group of supplier, carrier and retailer takes part in the system. Each group has its
own set of authorized information and has access permission to access their data. In
accessing data from different group privacy is revealed during the access request itself
which becomes a security issue here. So, anonymous request matching mechanism is used to
protect the privacy of the users. Different access control for different group of users is
provided by a trusted third party auditor.
There exist various tools and technologies for multi-cloud, such as Platform
VM Orchestrator, VM warevSphere, and Ovirt. These tools help cloud providers construct a
distributed cloud storage platform for managing clients’ data. However, if such an important
platform is vulnerable to security attacks, it would bring irretrievable losses to the clients. For
example, the confidential data in an enterprise may be illegally accessed through a remote
interface provided by a multi-cloud, or relevant data and archives may be lost or tampered with
when they are stored into an∙ uncertain storage pool outside the enterprise. Therefore, it is
indispensable for cloud service providers to provide security techniques for managing their
storage services.
EXISTING SYSTEM
PROPOSED SYSTEM
To check the availability and integrity of outsourced data in cloud
storages, researchers have proposed two basic approaches called Provable Data
Possession and Proofs of Retrievability .Ateniese et al. first proposed the PDP model for
ensuring possession of files on untrusted storages and provided an RSA-based scheme
for a static case that achieves the communication cost. They also proposed a publicly
verifiable version, which allows anyone, not just the owner, to challenge the server for
data possession..They proposed a lightweight PDP scheme based on cryptographic hash
function and symmetric key encryption, but the servers can deceive the owners by
using previous metadata or responses due to the lack of randomness in the challenges.
The numbers of updates and challenges are limited and fixed in advance and users
cannot perform block insertions anywhere.
HARDWARE REQUIREMENT SPECIFICATION
• Processor : Intel Pentium IV
• Clock speed : 1.8 GHz
• RAM : 256 MB
• HDD : 80 GB
• FDD : 1.44 MB
• CD Drive : 52x Reader
• Pointing device : Scroll Mouse
• Keyboard : 101 Standard Key-board
SOFTWARE REQUIREMENT SPECIFICATION
• System Architecture : Java
• Core Language : Jsp , Servlet
• Operating System : Windows Xp
• Database : My Sql
• Server : Apache Tomcat
BIBLIOGRAPHY
 William Grosso, “JAVA”, O'Reilly Media, Inc.; 1 edition, 2001
 John Zukowski, “Definitive Guide to Swing for Java 2”,1999
 Roger S.Pressman, “SOFTWARE ENGINEERING –A PRACTIONERS APPROACH “, Tata McGraw Hill Publishing Company,
1997.
 JAVA 2 Platform, standard Edition, V 1.3.1 API Specification
 Java RMI: Remote method Invocation(Paperback) Troy Bryan Downing
 Patrick Naughton “The Java Hand Book” Tata McGraw Hill, 2006
 Mark Grand and Jonathan Knudsen, “Java Fundamental Classes Reference”, Tata McGraw-Hill Publishing Company
Limited, 1st Edition, May 1997.
 Dietel & Deitel, Java How To Program, BPB Publishers, New Delhi, 2000.
 O’reilly, Java Swings, Tata McGrawHill, Fifth Edition, 2002.
Websites
• www.java.sun.com
• www.samba.org
• http://www.db.cs.ucdavis.edu
• www.microsoft.com
• www.smartdraw.com
• www.laynetworks.com
Sandhiya S fail on exam using chatgpt but chatgpt as fraud 420

More Related Content

PDF
Preserving Privacy Policy- Preserving public auditing for data in the cloud
PDF
A cloud storage system for sharing data securely with privacy preservation an...
PDF
IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...
PDF
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
PDF
IRJET- Security Enhance using Hash and Chaostic Algorithm in Cloud
PDF
IRJET- Security Enhance using Hash and Chaostic Algorithm in Cloud
PDF
Enhanced security framework to ensure data security in cloud using security b...
PDF
Enhanced security framework to ensure data security
Preserving Privacy Policy- Preserving public auditing for data in the cloud
A cloud storage system for sharing data securely with privacy preservation an...
IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
IRJET- Security Enhance using Hash and Chaostic Algorithm in Cloud
IRJET- Security Enhance using Hash and Chaostic Algorithm in Cloud
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security

Similar to Sandhiya S fail on exam using chatgpt but chatgpt as fraud 420 (20)

PDF
Ijarcet vol-2-issue-3-951-956
PDF
V04405122126
PDF
Bio-Cryptography Based Secured Data Replication Management in Cloud Storage
PDF
50120140507005 2
PDF
50120140507005
PDF
Paper id 212014106
PDF
Security Check in Cloud Computing through Third Party Auditor
PDF
To Improve Data Storage Security Levels in the Cloud
PDF
Cooperative Schedule Data Possession for Integrity Verification in Multi-Clou...
PDF
E045026031
PDF
Design and implementation of a privacy preserved off premises cloud storage
PDF
Towards Secure Data Distribution Systems in Mobile Cloud Computing: A Survey
PDF
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
PDF
Dynamic Resource Allocation and Data Security for Cloud
PDF
H1803035056
PDF
Design of access control framework for big data as a service platform
DOC
Privacy Preserving Public Auditing for Data Storage Security in Cloud
DOCX
Provable multicopy dynamic data possession
DOCX
PROVABLE MULTICOPY DYNAMIC DATA POSSESSION IN CLOUD COMPUTING SYSTEMS
DOCX
PROVABLE MULTICOPY DYNAMIC DATA POSSESSION IN CLOUD COMPUTING SYSTEMS
Ijarcet vol-2-issue-3-951-956
V04405122126
Bio-Cryptography Based Secured Data Replication Management in Cloud Storage
50120140507005 2
50120140507005
Paper id 212014106
Security Check in Cloud Computing through Third Party Auditor
To Improve Data Storage Security Levels in the Cloud
Cooperative Schedule Data Possession for Integrity Verification in Multi-Clou...
E045026031
Design and implementation of a privacy preserved off premises cloud storage
Towards Secure Data Distribution Systems in Mobile Cloud Computing: A Survey
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Dynamic Resource Allocation and Data Security for Cloud
H1803035056
Design of access control framework for big data as a service platform
Privacy Preserving Public Auditing for Data Storage Security in Cloud
Provable multicopy dynamic data possession
PROVABLE MULTICOPY DYNAMIC DATA POSSESSION IN CLOUD COMPUTING SYSTEMS
PROVABLE MULTICOPY DYNAMIC DATA POSSESSION IN CLOUD COMPUTING SYSTEMS
Ad

Recently uploaded (20)

PPT
2- CELL INJURY L1 Medical (2) gggggggggg
PDF
MCQ Practice CBT OL Official Language 1.pptx.pdf
PDF
Why Today’s Brands Need ORM & SEO Specialists More Than Ever.pdf
PDF
Understanding the Rhetorical Situation Presentation in Blue Orange Muted Il_2...
PDF
esg-supply-chain-webinar-nov2018hkhkkh.pdf
PPTX
OnePlus 13R – ⚡ All-Rounder King Performance: Snapdragon 8 Gen 3 – same as iQ...
PDF
Manager Resume for R, CL & Applying Online.pdf
PDF
Biography of Mohammad Anamul Haque Nayan
PPT
APPROACH TO DEVELOPMENTALlllllllllllllllll
PDF
APNCET2025RESULT Result Result 2025 2025
PPTX
Overview Planner of Soft Skills in a single ppt
PPTX
DPT-MAY24.pptx for review and ucploading
PPTX
1751884730-Visual Basic -Unitj CS B.pptx
DOC
field study for teachers graduating samplr
DOCX
mcsp232projectguidelinesjan2023 (1).docx
PPTX
PMP (Project Management Professional) course prepares individuals
PPTX
Principles of Inheritance and variation class 12.pptx
PDF
313302 DBMS UNIT 1 PPT for diploma Computer Eng Unit 2
PPTX
Your Guide to a Winning Interview Aug 2025.
PPTX
A slide for students with the advantagea
2- CELL INJURY L1 Medical (2) gggggggggg
MCQ Practice CBT OL Official Language 1.pptx.pdf
Why Today’s Brands Need ORM & SEO Specialists More Than Ever.pdf
Understanding the Rhetorical Situation Presentation in Blue Orange Muted Il_2...
esg-supply-chain-webinar-nov2018hkhkkh.pdf
OnePlus 13R – ⚡ All-Rounder King Performance: Snapdragon 8 Gen 3 – same as iQ...
Manager Resume for R, CL & Applying Online.pdf
Biography of Mohammad Anamul Haque Nayan
APPROACH TO DEVELOPMENTALlllllllllllllllll
APNCET2025RESULT Result Result 2025 2025
Overview Planner of Soft Skills in a single ppt
DPT-MAY24.pptx for review and ucploading
1751884730-Visual Basic -Unitj CS B.pptx
field study for teachers graduating samplr
mcsp232projectguidelinesjan2023 (1).docx
PMP (Project Management Professional) course prepares individuals
Principles of Inheritance and variation class 12.pptx
313302 DBMS UNIT 1 PPT for diploma Computer Eng Unit 2
Your Guide to a Winning Interview Aug 2025.
A slide for students with the advantagea
Ad

Sandhiya S fail on exam using chatgpt but chatgpt as fraud 420

  • 1. ATTRIBUTE BASED PROXY RE-ENCRYPTION WITH DIRECT REVOCATION MECHANISM FOR DATA SHARING IN CLOUDS PUNITHA A MCA (2023-25) 612723622024 GUIDED BY MR S.A CHENNAKESAVAN HOD
  • 2. ABSTRACT Provable data possession (PDP) is a technique for ensuring the integrity of data in storage outsourcing. In this paper, we address the construction of an efficient PDP scheme for distributed cloud storage to support the scalability of service and data migration, in which we consider the existence of multiple cloud service providers to cooperatively store and maintain the clients’ data. We present a cooperative PDP (CPDP) scheme based on homomorphic verifiable response and hash index hierarchy. We prove the security of our scheme based on multi-prover zero-knowledge proof system, which can satisfy completeness, knowledge soundness, and zero-knowledge properties. In addition, we articulate performance optimization mechanisms for our scheme, and in particular present an efficient method for selecting optimal parameter values to minimize the computation costs of clients and storage service providers. Our experiments show that our solution introduces lower computation and communication overheads in comparison with non-cooperative approaches.
  • 3. Introduction The venture of cloud computing provides a significant Progress in the field of IT industry. It is one of the most promising technologies out in the world today which gives numerous benefits to any organization or an individual. It comes with more appealing data storage, on demand services, ubiquitous network access and convenient data exchange for the users. Cloud computing offers solutions for data storage irrespective of local infrastructure limitations as well as equips the users with a platform to process their information. The main focus of this technology is to widen the efficacy of shared resources available in the cloud and also to reallocate them dynamically if needed. Even though the technology provides endless benefits, it lacks tight security capabilities and creates privacy issues for the data owners. Traditional security measures primarily relate to authentication of users to apprehend that the users access their own data fields. Along with the issues regarding security, there arose other issues when the cloud users need to share and access each other’s authorized information to bring about tremendous benefits. An example is considered where a group of supplier, carrier and retailer takes part in the system. Each group has its own set of authorized information and has access permission to access their data. In accessing data from different group privacy is revealed during the access request itself which becomes a security issue here. So, anonymous request matching mechanism is used to protect the privacy of the users. Different access control for different group of users is provided by a trusted third party auditor.
  • 4. There exist various tools and technologies for multi-cloud, such as Platform VM Orchestrator, VM warevSphere, and Ovirt. These tools help cloud providers construct a distributed cloud storage platform for managing clients’ data. However, if such an important platform is vulnerable to security attacks, it would bring irretrievable losses to the clients. For example, the confidential data in an enterprise may be illegally accessed through a remote interface provided by a multi-cloud, or relevant data and archives may be lost or tampered with when they are stored into an∙ uncertain storage pool outside the enterprise. Therefore, it is indispensable for cloud service providers to provide security techniques for managing their storage services. EXISTING SYSTEM
  • 5. PROPOSED SYSTEM To check the availability and integrity of outsourced data in cloud storages, researchers have proposed two basic approaches called Provable Data Possession and Proofs of Retrievability .Ateniese et al. first proposed the PDP model for ensuring possession of files on untrusted storages and provided an RSA-based scheme for a static case that achieves the communication cost. They also proposed a publicly verifiable version, which allows anyone, not just the owner, to challenge the server for data possession..They proposed a lightweight PDP scheme based on cryptographic hash function and symmetric key encryption, but the servers can deceive the owners by using previous metadata or responses due to the lack of randomness in the challenges. The numbers of updates and challenges are limited and fixed in advance and users cannot perform block insertions anywhere.
  • 6. HARDWARE REQUIREMENT SPECIFICATION • Processor : Intel Pentium IV • Clock speed : 1.8 GHz • RAM : 256 MB • HDD : 80 GB • FDD : 1.44 MB • CD Drive : 52x Reader • Pointing device : Scroll Mouse • Keyboard : 101 Standard Key-board
  • 7. SOFTWARE REQUIREMENT SPECIFICATION • System Architecture : Java • Core Language : Jsp , Servlet • Operating System : Windows Xp • Database : My Sql • Server : Apache Tomcat
  • 8. BIBLIOGRAPHY  William Grosso, “JAVA”, O'Reilly Media, Inc.; 1 edition, 2001  John Zukowski, “Definitive Guide to Swing for Java 2”,1999  Roger S.Pressman, “SOFTWARE ENGINEERING –A PRACTIONERS APPROACH “, Tata McGraw Hill Publishing Company, 1997.  JAVA 2 Platform, standard Edition, V 1.3.1 API Specification  Java RMI: Remote method Invocation(Paperback) Troy Bryan Downing  Patrick Naughton “The Java Hand Book” Tata McGraw Hill, 2006  Mark Grand and Jonathan Knudsen, “Java Fundamental Classes Reference”, Tata McGraw-Hill Publishing Company Limited, 1st Edition, May 1997.  Dietel & Deitel, Java How To Program, BPB Publishers, New Delhi, 2000.  O’reilly, Java Swings, Tata McGrawHill, Fifth Edition, 2002.
  • 9. Websites • www.java.sun.com • www.samba.org • http://www.db.cs.ucdavis.edu • www.microsoft.com • www.smartdraw.com • www.laynetworks.com