SlideShare a Scribd company logo
#13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, Vellore – 6.
Off: 0416-2247353 / 6066663 Mo: +91 9500218218
Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com
TMACS: A ROBUST AND VERIFIABLE THRESHOLD MULTI-AUTHORITY
ACCESS CONTROL SYSTEM IN PUBLIC CLOUD STORAGE
ABSTRACT
Attribute-based Encryption (ABE) is regarded as a promising cryptographic conducting
tool to guarantee data owners’ direct control over their data in public cloud storage. The earlier
ABE schemes involve only one authority to maintain the whole attribute set, which can bring a
single-point bottleneck on both security and performance. Subsequently, some multi-authority
schemes are proposed, in which multiple authorities separately maintain disjoint attribute
subsets. However, the single-point bottleneck problem remains unsolved. In this paper, from
another perspective, we conduct a threshold multi-authority CP-ABE access control scheme for
public cloud storage, named TMACS, in which multiple authorities jointly manage a uniform
attribute set. In TMACS, taking advantage of (t; n) threshold secret sharing, the master key can
be shared among multiple authorities, and a legal user can generate his/her secret key by
interacting with any t authorities. Security and performance analysis results show that TMACS is
not only verifiable secure when less than t authorities are compromised, but also robust when no
less than t authorities are alive in the system. Furthermore, by efficiently combining the
traditional multi-authority scheme with TMACS, we construct a hybrid one, which satisfies the
scenario of attributes coming from different authorities as well as achieving security and system-
level robustness.
EXISTING SYSTEM
There is only one authority responsible for attribute management and key distribution.
This only-one-authority scenario can bring a single-point bottleneck on both security and
performance. Once the authority is compromised, an adversary can easily obtain the only-one-
authority’s master key, and then he/she can generate private keys of any attribute subsetto
decrypt the specific encrypted data. Crash or offline of a specific authority will make that private
keys of all attributes in attribute subset maintained by this authority cannot be generated and
distributed, which will still influence the whole system’s effective operation.
#13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, Vellore – 6.
Off: 0416-2247353 / 6066663 Mo: +91 9500218218
Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com
DISADVANTAGES OF EXISTING SYSTEM:
1. Crash or offline of a specific authority will make that private keys of all attributes in
attribute subset maintained by this authority cannot be generated and distributed, which
will still influence the whole system’s effective operation.
2. The access structure is not flexible enough to satisfy complex environments.
Subsequently, much effort has been made to deal with the disadvantages in the early
schemes.
PROPOSED SYSTEM
In this paper, we propose a robust and verifiable threshold multi-authority CP-ABE
access control scheme, named TMACS, to deal with the single-point bottleneck on both security
and performance in most existing schemes. In TMACS, multiple authorities jointly manage the
whole attribute set but no one has full control of any specific attribute. Since in CP-ABE
schemes, there is always a secret key (SK) used to generate attribute private keys, we introduce
(t; n) threshold secret sharing into our scheme to share the secret key among authorities. In
TMACS, we redefine the secret key in the traditional CP-ABE schemes as master key. The
introduction of (t; n) threshold secret sharing guarantees that, the master key cannot be obtained
by any authority alone. TMACS is not only verifiable secure when less than t authorities are
compromised, but also robust when no less than t authorities are alive in the system. To the best
of our knowledge, this paper is the first try to address the singlepoint bottleneck on both security
and performance in CPABE access control schemes in public cloud storage.
ADVANTAGES OF PROPOSED SYSTEM:
1. This only-one-authority scenario can bring a single-point bottleneck on both security and
performance.
2. These CP-ABE schemes are still far from being widely used for access control in public
cloud storage.
#13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, Vellore – 6.
Off: 0416-2247353 / 6066663 Mo: +91 9500218218
Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com
SYSTEM ARCHITECTURE
MODULES
1. User module
2. Multi authority Access control
3. Public cloud storage.
#13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, Vellore – 6.
Off: 0416-2247353 / 6066663 Mo: +91 9500218218
Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com
MODULE DESCRIPTION
User Module:
In this module, Users are having authentication and security to access the detail which is
presented in the system. Before accessing or searching the details user should have the account in
that otherwise they should register first.
Multi-authority Access control:
We conduct a threshold multi-authority CP-ABE access control scheme for public cloud
storage, named TMACS, in which multiple authorities jointly manage a uniform attribute set. To
the best of our knowledge, we are the first to design multiauthority access control architecture to
deal with the problem. To satisfy this hybrid scenario, we conduct a hybrid multi-authority
access control scheme, by combining the traditional multi-authority scheme with our proposed
TMACS.
Public Cloud Storage:
Cloud storage is an important service of cloud computing which provides services for
data owners to outsource data to store in cloud via Internet. The cloud server is always online
and managed by the cloud provider. Usually, the cloud server and its provider is assumed
“honest-but-curious”. The cloud server does nothing but provide a platform for owners storing
and sharing their encrypted data. The cloud server doesn’t conduct data access control for
owners.
#13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, Vellore – 6.
Off: 0416-2247353 / 6066663 Mo: +91 9500218218
Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com
SYSTEM CONFIGURATION
HARDWARE CONFIGURATION
 Processor - Pentium –IV
 Speed - 1.1 Ghz
 RAM - 256 MB(min)
 Hard Disk - 20 GB
 Key Board - Standard Windows Keyboard
 Mouse - Two or Three Button Mouse
 Monitor - SVGA
SOFTWARE CONFIGURATION
 Operating System - Windows XP
 Programming Language - JAVA

More Related Content

PDF
Flexible and fine grained attribute-based data storage in cloud computing
DOCX
PPTX
Dyma Burn Xtreme
DOCX
Table of Contents-Ceramic Pieces from 2014-2015
PDF
OMETTO_F_Brussels_20161129_MarieCurie20thAnniversary
PPT
PDF
Reference Letter Kaeser Compressors
Flexible and fine grained attribute-based data storage in cloud computing
Dyma Burn Xtreme
Table of Contents-Ceramic Pieces from 2014-2015
OMETTO_F_Brussels_20161129_MarieCurie20thAnniversary
Reference Letter Kaeser Compressors

Viewers also liked (8)

PDF
Neumonía: preguntas frecuentes y 10 razones para vacunarse
PPT
Severo ochoa ruben 4 eso
PPTX
Presentacion actividad 3
PDF
Presentation Voya360
PDF
Mindfully Active Oak Park (Content)
PPTX
"Para avanzar, hay que pedalear"
PDF
Connect Bulletin
PDF
SDL Innovate 2013 - Don't try this at home
Neumonía: preguntas frecuentes y 10 razones para vacunarse
Severo ochoa ruben 4 eso
Presentacion actividad 3
Presentation Voya360
Mindfully Active Oak Park (Content)
"Para avanzar, hay que pedalear"
Connect Bulletin
SDL Innovate 2013 - Don't try this at home
Ad

Similar to Tmacs a robust and verifiable threshold multi authority access control system in public cloud storage (20)

PDF
A robust and verifiable threshold multi authority access control system in pu...
PPTX
MCA PROJECT PRESENTATION KALAI SELVAN (1).pptx
PDF
Fine grained two-factor access control for web-based cloud computing services
PDF
Fine grained two-factor access control for web-based cloud computing services
DOCX
Decentralized access control with anonymous authentication of data stored in ...
DOCX
Control cloud data access privilege and anonymity with fully
PDF
Decentralized access control with anonymous authentication of data stored in ...
PDF
Investigation on Revocable Fine-grained Access Control Scheme for Multi-Autho...
PPT
Decentralized access control with anonymous authentication of data stored in ...
DOCX
A scalable attribute based access control scheme with flexible delegation cum...
PPTX
Decentralized access control with authentication anonymous of data stored in ...
DOCX
Public integrity auditing for shared dynamic cloud data with group user revoc...
DOCX
Public integrity auditing for shared dynamic cloud data with group user revoc...
PDF
Hierarchal attribute based cryptographic model to handle security services in...
PPT
Shared authority based privacy preserving authentication protocol in cloud co...
DOC
Shared authority based privacy preserving authentication protocol in cloud co...
DOC
Shared authority based privacy preserving authentication protocol in cloud co...
DOCX
decentralized access control with anonymous authentication of data stored in ...
PDF
Enforcing multi user access policies in cloud computing
A robust and verifiable threshold multi authority access control system in pu...
MCA PROJECT PRESENTATION KALAI SELVAN (1).pptx
Fine grained two-factor access control for web-based cloud computing services
Fine grained two-factor access control for web-based cloud computing services
Decentralized access control with anonymous authentication of data stored in ...
Control cloud data access privilege and anonymity with fully
Decentralized access control with anonymous authentication of data stored in ...
Investigation on Revocable Fine-grained Access Control Scheme for Multi-Autho...
Decentralized access control with anonymous authentication of data stored in ...
A scalable attribute based access control scheme with flexible delegation cum...
Decentralized access control with authentication anonymous of data stored in ...
Public integrity auditing for shared dynamic cloud data with group user revoc...
Public integrity auditing for shared dynamic cloud data with group user revoc...
Hierarchal attribute based cryptographic model to handle security services in...
Shared authority based privacy preserving authentication protocol in cloud co...
Shared authority based privacy preserving authentication protocol in cloud co...
Shared authority based privacy preserving authentication protocol in cloud co...
decentralized access control with anonymous authentication of data stored in ...
Enforcing multi user access policies in cloud computing
Ad

More from Shakas Technologies (20)

DOCX
A Review on Deep-Learning-Based Cyberbullying Detection
DOCX
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
DOCX
A Novel Framework for Credit Card.
DOCX
A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...
DOCX
NS2 Final Year Project Titles 2023- 2024
DOCX
MATLAB Final Year IEEE Project Titles 2023-2024
DOCX
Latest Python IEEE Project Titles 2023-2024
DOCX
EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...
DOCX
CYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSE
DOCX
Detecting Mental Disorders in social Media through Emotional patterns-The cas...
DOCX
COMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTION
DOCX
CO2 EMISSION RATING BY VEHICLES USING DATA SCIENCE
DOCX
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
DOCX
Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...
DOCX
Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...
DOCX
Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...
DOCX
Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...
DOCX
Fighting Money Laundering With Statistics and Machine Learning.docx
DOCX
Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...
DOCX
Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...
A Review on Deep-Learning-Based Cyberbullying Detection
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
A Novel Framework for Credit Card.
A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...
NS2 Final Year Project Titles 2023- 2024
MATLAB Final Year IEEE Project Titles 2023-2024
Latest Python IEEE Project Titles 2023-2024
EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...
CYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSE
Detecting Mental Disorders in social Media through Emotional patterns-The cas...
COMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTION
CO2 EMISSION RATING BY VEHICLES USING DATA SCIENCE
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...
Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...
Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...
Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...
Fighting Money Laundering With Statistics and Machine Learning.docx
Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...
Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...

Recently uploaded (20)

PDF
Vision Prelims GS PYQ Analysis 2011-2022 www.upscpdf.com.pdf
PDF
Paper A Mock Exam 9_ Attempt review.pdf.
PDF
Hazard Identification & Risk Assessment .pdf
PDF
1_English_Language_Set_2.pdf probationary
PPTX
Virtual and Augmented Reality in Current Scenario
PDF
RTP_AR_KS1_Tutor's Guide_English [FOR REPRODUCTION].pdf
PDF
AI-driven educational solutions for real-life interventions in the Philippine...
PDF
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PPTX
CHAPTER IV. MAN AND BIOSPHERE AND ITS TOTALITY.pptx
PDF
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
PDF
My India Quiz Book_20210205121199924.pdf
PPTX
202450812 BayCHI UCSC-SV 20250812 v17.pptx
PDF
Chinmaya Tiranga quiz Grand Finale.pdf
PDF
HVAC Specification 2024 according to central public works department
PPTX
ELIAS-SEZIURE AND EPilepsy semmioan session.pptx
PPTX
History, Philosophy and sociology of education (1).pptx
PDF
medical_surgical_nursing_10th_edition_ignatavicius_TEST_BANK_pdf.pdf
PPTX
Onco Emergencies - Spinal cord compression Superior vena cava syndrome Febr...
PPTX
Unit 4 Computer Architecture Multicore Processor.pptx
Vision Prelims GS PYQ Analysis 2011-2022 www.upscpdf.com.pdf
Paper A Mock Exam 9_ Attempt review.pdf.
Hazard Identification & Risk Assessment .pdf
1_English_Language_Set_2.pdf probationary
Virtual and Augmented Reality in Current Scenario
RTP_AR_KS1_Tutor's Guide_English [FOR REPRODUCTION].pdf
AI-driven educational solutions for real-life interventions in the Philippine...
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
CHAPTER IV. MAN AND BIOSPHERE AND ITS TOTALITY.pptx
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
My India Quiz Book_20210205121199924.pdf
202450812 BayCHI UCSC-SV 20250812 v17.pptx
Chinmaya Tiranga quiz Grand Finale.pdf
HVAC Specification 2024 according to central public works department
ELIAS-SEZIURE AND EPilepsy semmioan session.pptx
History, Philosophy and sociology of education (1).pptx
medical_surgical_nursing_10th_edition_ignatavicius_TEST_BANK_pdf.pdf
Onco Emergencies - Spinal cord compression Superior vena cava syndrome Febr...
Unit 4 Computer Architecture Multicore Processor.pptx

Tmacs a robust and verifiable threshold multi authority access control system in public cloud storage

  • 1. #13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, Vellore – 6. Off: 0416-2247353 / 6066663 Mo: +91 9500218218 Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com TMACS: A ROBUST AND VERIFIABLE THRESHOLD MULTI-AUTHORITY ACCESS CONTROL SYSTEM IN PUBLIC CLOUD STORAGE ABSTRACT Attribute-based Encryption (ABE) is regarded as a promising cryptographic conducting tool to guarantee data owners’ direct control over their data in public cloud storage. The earlier ABE schemes involve only one authority to maintain the whole attribute set, which can bring a single-point bottleneck on both security and performance. Subsequently, some multi-authority schemes are proposed, in which multiple authorities separately maintain disjoint attribute subsets. However, the single-point bottleneck problem remains unsolved. In this paper, from another perspective, we conduct a threshold multi-authority CP-ABE access control scheme for public cloud storage, named TMACS, in which multiple authorities jointly manage a uniform attribute set. In TMACS, taking advantage of (t; n) threshold secret sharing, the master key can be shared among multiple authorities, and a legal user can generate his/her secret key by interacting with any t authorities. Security and performance analysis results show that TMACS is not only verifiable secure when less than t authorities are compromised, but also robust when no less than t authorities are alive in the system. Furthermore, by efficiently combining the traditional multi-authority scheme with TMACS, we construct a hybrid one, which satisfies the scenario of attributes coming from different authorities as well as achieving security and system- level robustness. EXISTING SYSTEM There is only one authority responsible for attribute management and key distribution. This only-one-authority scenario can bring a single-point bottleneck on both security and performance. Once the authority is compromised, an adversary can easily obtain the only-one- authority’s master key, and then he/she can generate private keys of any attribute subsetto decrypt the specific encrypted data. Crash or offline of a specific authority will make that private keys of all attributes in attribute subset maintained by this authority cannot be generated and distributed, which will still influence the whole system’s effective operation.
  • 2. #13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, Vellore – 6. Off: 0416-2247353 / 6066663 Mo: +91 9500218218 Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com DISADVANTAGES OF EXISTING SYSTEM: 1. Crash or offline of a specific authority will make that private keys of all attributes in attribute subset maintained by this authority cannot be generated and distributed, which will still influence the whole system’s effective operation. 2. The access structure is not flexible enough to satisfy complex environments. Subsequently, much effort has been made to deal with the disadvantages in the early schemes. PROPOSED SYSTEM In this paper, we propose a robust and verifiable threshold multi-authority CP-ABE access control scheme, named TMACS, to deal with the single-point bottleneck on both security and performance in most existing schemes. In TMACS, multiple authorities jointly manage the whole attribute set but no one has full control of any specific attribute. Since in CP-ABE schemes, there is always a secret key (SK) used to generate attribute private keys, we introduce (t; n) threshold secret sharing into our scheme to share the secret key among authorities. In TMACS, we redefine the secret key in the traditional CP-ABE schemes as master key. The introduction of (t; n) threshold secret sharing guarantees that, the master key cannot be obtained by any authority alone. TMACS is not only verifiable secure when less than t authorities are compromised, but also robust when no less than t authorities are alive in the system. To the best of our knowledge, this paper is the first try to address the singlepoint bottleneck on both security and performance in CPABE access control schemes in public cloud storage. ADVANTAGES OF PROPOSED SYSTEM: 1. This only-one-authority scenario can bring a single-point bottleneck on both security and performance. 2. These CP-ABE schemes are still far from being widely used for access control in public cloud storage.
  • 3. #13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, Vellore – 6. Off: 0416-2247353 / 6066663 Mo: +91 9500218218 Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com SYSTEM ARCHITECTURE MODULES 1. User module 2. Multi authority Access control 3. Public cloud storage.
  • 4. #13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, Vellore – 6. Off: 0416-2247353 / 6066663 Mo: +91 9500218218 Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com MODULE DESCRIPTION User Module: In this module, Users are having authentication and security to access the detail which is presented in the system. Before accessing or searching the details user should have the account in that otherwise they should register first. Multi-authority Access control: We conduct a threshold multi-authority CP-ABE access control scheme for public cloud storage, named TMACS, in which multiple authorities jointly manage a uniform attribute set. To the best of our knowledge, we are the first to design multiauthority access control architecture to deal with the problem. To satisfy this hybrid scenario, we conduct a hybrid multi-authority access control scheme, by combining the traditional multi-authority scheme with our proposed TMACS. Public Cloud Storage: Cloud storage is an important service of cloud computing which provides services for data owners to outsource data to store in cloud via Internet. The cloud server is always online and managed by the cloud provider. Usually, the cloud server and its provider is assumed “honest-but-curious”. The cloud server does nothing but provide a platform for owners storing and sharing their encrypted data. The cloud server doesn’t conduct data access control for owners.
  • 5. #13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, Vellore – 6. Off: 0416-2247353 / 6066663 Mo: +91 9500218218 Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com SYSTEM CONFIGURATION HARDWARE CONFIGURATION  Processor - Pentium –IV  Speed - 1.1 Ghz  RAM - 256 MB(min)  Hard Disk - 20 GB  Key Board - Standard Windows Keyboard  Mouse - Two or Three Button Mouse  Monitor - SVGA SOFTWARE CONFIGURATION  Operating System - Windows XP  Programming Language - JAVA