SlideShare a Scribd company logo
Time and Attribute Factors
Combined Access Control on Time-
Sensitive Data in Public Cloud
INTRODCUTION
• The new paradigm of outsourcing data to the
cloud is a double-edged sword.
• On one side, it frees up data owners from the
technical management, and is easier for the
data owners to share their data with intended
recipients when data are stored in the cloud.
• On the other side, it brings about new
challenges about privacy and security
protection.
Abstract
• To protect data confidentiality against the honest-but-
curious cloud service provider, numerous works have
been proposed to support fine-grained data access
control.
• However, till now, no efficient schemes can provide the
scenario of fine-grained access control together with
the capacity of time-sensitive data publishing.
• In this paper, by embedding the mechanism of timed-
release encryption into CP-ABE
• we propose TAFC: a new time and attribute factors
combined access control on time sensitive data stored
in cloud.
EXISTING SYSTEM
• The conventional approach to address privacy in this
context is to encrypt sensitive data before outsourcing it
and run all computations on the client side.
• However this imposes unacceptable client-overhead, as
data must continuously be downloaded, decrypted,
processed, and securely re-uploaded.
• Many applications cannot cope with this overhead,
particularly online and mobile applications operating over
very large datasets such as image repositories with CBIR
services.
• Existing proposals in this domain remain largely unpractical,
namely those requiring fully homomorphism encryption,
which is still computationally too expensive.
PROPOSED SYSTEM
• Cloud storage service has significant advantages
on both convenient data sharing and cost
reduction.
• However, this new paradigm of data storage
brings about new challenges about data
confidentiality protection.
• Data are no longer in data owner’s trusted
domain, and he/she cannot trust the cloud server
to conduct secure data access control.
• Therefore, the secure access control problem has
become a challenging issue in cloud storage.
Hardware Requirements
• System : Pentium IV 3.4 GHz
(Min)or Later versions.
• Hard Disk : 40 GB.
• Ram : 1 GB.(Min)
Software Requirements
• Operating system : Windows Family.
• Coding Language : J2EE (JSP,Servlet,Java
Bean)
• Data Base : MY Sql Server.
• IDE : Eclipse Juno
• Web Server : Tomcat 6.0

More Related Content

PPTX
Identity-Based Remote Data Integrity Checking With Perfect Data Privacy Prese...
PPTX
RAAC: Robust and Auditable Access Control with Multiple Attribute Authorities...
PPTX
cloud computing encrypted
PPTX
Ensuring data integrity on cloud data storage
PPTX
Data Governance and Management in Cloud pak nam
PPTX
Data Integrity proofs in cloud storage
PDF
Azure IoT Hub: what is it and why we select other solution (production projec...
PPTX
Advanced Cryptography for Cloud Security
Identity-Based Remote Data Integrity Checking With Perfect Data Privacy Prese...
RAAC: Robust and Auditable Access Control with Multiple Attribute Authorities...
cloud computing encrypted
Ensuring data integrity on cloud data storage
Data Governance and Management in Cloud pak nam
Data Integrity proofs in cloud storage
Azure IoT Hub: what is it and why we select other solution (production projec...
Advanced Cryptography for Cloud Security

What's hot (20)

PDF
WWW19: SGX-PySpark: Secure Distributed Data Analytics
PDF
Elastic at KPN
PPT
Privacy preserving public auditing for regenerating-code-based
PDF
Keeping your Enterprise’s Big Data Secure by Owen O’Malley at Big Data Spain ...
PDF
Privacy preserving public auditing for regenerating-code-based cloud storage
PPT
Privacy Preserving Public Auditing for Data Storage Security in Cloud.ppt
DOCX
Privacy preserving public auditing for regenerating-code-based cloud storage
PPSX
Final year presentation
PDF
Flexible DataSync: Fuel for new business opportunities
PPTX
Privacy preserving public auditing
PPTX
Big data lab as a service
PPTX
Data Security Essentials for Cloud Computing - JavaOne 2013
PDF
Big Data security: Facing the challenge by Carlos Gómez at Big Data Spain 2017
PPTX
Endpoint Protection as a Service (EPaaS)
PPTX
2nd Anniversary Datacomm Cloud Business- Azure Stack
PDF
The Elastic Evolution of CenturyLink’s Network Management System
PDF
Privacy preserving public auditing for regenerating code based cloud storage
PPTX
Cloudciti Enterprise File Share (EFS)
PPTX
Security of IoT Data: Implementing Data-Centric Security and User Access Stra...
PPTX
Managing the Dewey Decimal System
WWW19: SGX-PySpark: Secure Distributed Data Analytics
Elastic at KPN
Privacy preserving public auditing for regenerating-code-based
Keeping your Enterprise’s Big Data Secure by Owen O’Malley at Big Data Spain ...
Privacy preserving public auditing for regenerating-code-based cloud storage
Privacy Preserving Public Auditing for Data Storage Security in Cloud.ppt
Privacy preserving public auditing for regenerating-code-based cloud storage
Final year presentation
Flexible DataSync: Fuel for new business opportunities
Privacy preserving public auditing
Big data lab as a service
Data Security Essentials for Cloud Computing - JavaOne 2013
Big Data security: Facing the challenge by Carlos Gómez at Big Data Spain 2017
Endpoint Protection as a Service (EPaaS)
2nd Anniversary Datacomm Cloud Business- Azure Stack
The Elastic Evolution of CenturyLink’s Network Management System
Privacy preserving public auditing for regenerating code based cloud storage
Cloudciti Enterprise File Share (EFS)
Security of IoT Data: Implementing Data-Centric Security and User Access Stra...
Managing the Dewey Decimal System
Ad

Similar to Time and Attribute Factors Combined Access Control on Time-Sensitive Data in Public Cloud (20)

PPTX
Final PPT after cla after class (1).pptx
DOCX
An Attribute-based Controlled Collaborative Access Control Scheme for Public ...
PDF
IRJET- Adaptable Wildcard Searchable Encryption System
PPTX
Attribute based encryption in cloud with significant reduction reviw2
PDF
Achieving Secure, sclable and finegrained Cloud computing report
PDF
IRJET- Secure Cloud Data Using Attribute Based Encryption
PDF
Measurable, safe and secure data management for sensitive users in cloud comp...
PDF
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
PDF
Enhancing Security in Dynamic Public Cloud Data Using Encryption
PDF
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
PDF
AN EFFICIENT FILE HIERARCHY ATTRIBUTE-BASED ENCRYPTION SCHEME IN CLOUD COMPUT...
PDF
An Efficient and Safe Data Sharing Scheme for Mobile Cloud Computing
PDF
IRJET- Integrity Verification and Attribute based Encryption for Cloud Storage
PDF
Secure File Sharing on Cloud
PDF
A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...
PDF
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
PDF
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
PPTX
Hasbe a hierarchical attribute based solution for flexible and scalable acces...
PDF
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
PDF
Control Cloud Data Access Using Attribute-Based Encryption
Final PPT after cla after class (1).pptx
An Attribute-based Controlled Collaborative Access Control Scheme for Public ...
IRJET- Adaptable Wildcard Searchable Encryption System
Attribute based encryption in cloud with significant reduction reviw2
Achieving Secure, sclable and finegrained Cloud computing report
IRJET- Secure Cloud Data Using Attribute Based Encryption
Measurable, safe and secure data management for sensitive users in cloud comp...
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
Enhancing Security in Dynamic Public Cloud Data Using Encryption
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
AN EFFICIENT FILE HIERARCHY ATTRIBUTE-BASED ENCRYPTION SCHEME IN CLOUD COMPUT...
An Efficient and Safe Data Sharing Scheme for Mobile Cloud Computing
IRJET- Integrity Verification and Attribute based Encryption for Cloud Storage
Secure File Sharing on Cloud
A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
Hasbe a hierarchical attribute based solution for flexible and scalable acces...
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
Control Cloud Data Access Using Attribute-Based Encryption
Ad

More from Prasadu Peddi (15)

PDF
Pointers
PDF
String notes
DOCX
B.Com 1year Lab programs
DOCX
COMPUTING SEMANTIC SIMILARITY OF CONCEPTS IN KNOWLEDGE GRAPHS
DOCX
Energy-efficient Query Processing in Web Search Engines
DOCX
MINING COMPETITORS FROM LARGE UNSTRUCTURED DATASETS
DOCX
GENERATING QUERY FACETS USING KNOWLEDGE BASES
DOCX
UNDERSTAND SHORTTEXTS BY HARVESTING & ANALYZING SEMANTIKNOWLEDGE
DOCX
SOCIRANK: IDENTIFYING AND RANKING PREVALENT NEWS TOPICS USING SOCIAL MEDIA FA...
DOCX
QUERY EXPANSION WITH ENRICHED USER PROFILES FOR PERSONALIZED SEARCH UTILIZING...
DOCX
COLLABORATIVE FILTERING-BASED RECOMMENDATION OF ONLINE SOCIAL VOTING
DOCX
DYNAMIC FACET ORDERING FOR FACETED PRODUCT SEARCH ENGINES
PPTX
A Cross Tenant Access Control (CTAC) Model for Cloud Computing: Formal Specif...
PPTX
Attribute Based Storage Supporting Secure Deduplication of Encrypted D...
PPTX
Provably Secure Key-Aggregate Cryptosystems with Broadcast Aggregate Keys for...
Pointers
String notes
B.Com 1year Lab programs
COMPUTING SEMANTIC SIMILARITY OF CONCEPTS IN KNOWLEDGE GRAPHS
Energy-efficient Query Processing in Web Search Engines
MINING COMPETITORS FROM LARGE UNSTRUCTURED DATASETS
GENERATING QUERY FACETS USING KNOWLEDGE BASES
UNDERSTAND SHORTTEXTS BY HARVESTING & ANALYZING SEMANTIKNOWLEDGE
SOCIRANK: IDENTIFYING AND RANKING PREVALENT NEWS TOPICS USING SOCIAL MEDIA FA...
QUERY EXPANSION WITH ENRICHED USER PROFILES FOR PERSONALIZED SEARCH UTILIZING...
COLLABORATIVE FILTERING-BASED RECOMMENDATION OF ONLINE SOCIAL VOTING
DYNAMIC FACET ORDERING FOR FACETED PRODUCT SEARCH ENGINES
A Cross Tenant Access Control (CTAC) Model for Cloud Computing: Formal Specif...
Attribute Based Storage Supporting Secure Deduplication of Encrypted D...
Provably Secure Key-Aggregate Cryptosystems with Broadcast Aggregate Keys for...

Recently uploaded (20)

PDF
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
PPTX
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
PPTX
UNIT 4 Total Quality Management .pptx
PDF
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
DOCX
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
PDF
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
PDF
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
PPTX
UNIT-1 - COAL BASED THERMAL POWER PLANTS
PDF
Digital Logic Computer Design lecture notes
PPTX
bas. eng. economics group 4 presentation 1.pptx
PPTX
Sustainable Sites - Green Building Construction
PPT
Project quality management in manufacturing
PPTX
OOP with Java - Java Introduction (Basics)
PPTX
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
PPTX
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
PPTX
CYBER-CRIMES AND SECURITY A guide to understanding
PDF
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
DOCX
573137875-Attendance-Management-System-original
PPTX
Foundation to blockchain - A guide to Blockchain Tech
PPTX
CH1 Production IntroductoryConcepts.pptx
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
UNIT 4 Total Quality Management .pptx
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
UNIT-1 - COAL BASED THERMAL POWER PLANTS
Digital Logic Computer Design lecture notes
bas. eng. economics group 4 presentation 1.pptx
Sustainable Sites - Green Building Construction
Project quality management in manufacturing
OOP with Java - Java Introduction (Basics)
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
CYBER-CRIMES AND SECURITY A guide to understanding
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
573137875-Attendance-Management-System-original
Foundation to blockchain - A guide to Blockchain Tech
CH1 Production IntroductoryConcepts.pptx

Time and Attribute Factors Combined Access Control on Time-Sensitive Data in Public Cloud

  • 1. Time and Attribute Factors Combined Access Control on Time- Sensitive Data in Public Cloud
  • 2. INTRODCUTION • The new paradigm of outsourcing data to the cloud is a double-edged sword. • On one side, it frees up data owners from the technical management, and is easier for the data owners to share their data with intended recipients when data are stored in the cloud. • On the other side, it brings about new challenges about privacy and security protection.
  • 3. Abstract • To protect data confidentiality against the honest-but- curious cloud service provider, numerous works have been proposed to support fine-grained data access control. • However, till now, no efficient schemes can provide the scenario of fine-grained access control together with the capacity of time-sensitive data publishing. • In this paper, by embedding the mechanism of timed- release encryption into CP-ABE • we propose TAFC: a new time and attribute factors combined access control on time sensitive data stored in cloud.
  • 4. EXISTING SYSTEM • The conventional approach to address privacy in this context is to encrypt sensitive data before outsourcing it and run all computations on the client side. • However this imposes unacceptable client-overhead, as data must continuously be downloaded, decrypted, processed, and securely re-uploaded. • Many applications cannot cope with this overhead, particularly online and mobile applications operating over very large datasets such as image repositories with CBIR services. • Existing proposals in this domain remain largely unpractical, namely those requiring fully homomorphism encryption, which is still computationally too expensive.
  • 5. PROPOSED SYSTEM • Cloud storage service has significant advantages on both convenient data sharing and cost reduction. • However, this new paradigm of data storage brings about new challenges about data confidentiality protection. • Data are no longer in data owner’s trusted domain, and he/she cannot trust the cloud server to conduct secure data access control. • Therefore, the secure access control problem has become a challenging issue in cloud storage.
  • 6. Hardware Requirements • System : Pentium IV 3.4 GHz (Min)or Later versions. • Hard Disk : 40 GB. • Ram : 1 GB.(Min)
  • 7. Software Requirements • Operating system : Windows Family. • Coding Language : J2EE (JSP,Servlet,Java Bean) • Data Base : MY Sql Server. • IDE : Eclipse Juno • Web Server : Tomcat 6.0