Effective data access control for multi authority cloud stoorage systems
Post on 15-Jan-2017
496 Views
Preview:
Transcript
Effective Data Access Control For Multi-Authority Cloud Storage Systems
ByG.V.SAIBABA(12R91A1220)
DEPT. OF ITTKREC
ABSTRACT• Data access control is an effective way to ensure the data security in the cloud.
• However, due to data outsourcing and un trusted cloud servers, the data access control becomes a challenging issue in cloud storage systems.
ABSTRACT
• In this paper, we propose DAC-MACS (Data Access Control for Multi-Authority Cloud Storage), an effective and secure data access control scheme with efficient decryption and revocation.
• Specifically, we construct a new multi-authority CP-ABE (Cipher text-Policy Attribute-based Encryption) scheme with efficient decryption and also design an efficient attribute revocation method that can achieve both forward security and backward security.
EXISTING SYSTEM
• Data owners depend on data service providers.
Data Owner
Server
Data user
EXISTING SYSTEM
• Data owners encrypt files and outsource to the server.
DISADVANTAGES OF EXISTING SYSTEM
• Data owners cannot rely on service providers.
Data Owner
Server
UnauthorizedData user
DISADVANTAGES OF EXISTING SYSTEM
• Overload on server.
• Does not support Attribute revocation problem.
PROPOSED SYSTEM
• In this paper, we first propose a revocable multi authority CP-ABE scheme, where an efficient and secure revocation method is proposed to solve the attribute revocation problem in the system.
• Our scheme does not require the server to be fully trusted, because the key update is enforced by each attribute authority not the server.
PROPOSED SYSTEM
ADVANTAGES OF PROPOSED SYSTEM
• Data owners are not involved in the key generation.
ADVANTAGES OF PROPOSED SYSTEM
• The revoked user cannot decrypt the new cipher texts that require the revoked attributes to decrypt (Backward Security).
ADVANTAGES OF PROPOSED SYSTEM
• The newly joined user can also decrypt the previously published cipher texts that are encrypted if it has sufficient attributes (Forward Security).
HARDWARE REQUIREMENTS
• Processor : Intel Core (mini) • ROM : 40 GB or above• RAM : 1GB or above
SOFTWARE REQUIREMENTS
• Operating system : Windows XP SP3 or latest versions
• Coding Language : J2SE & J2EE• UI Design Languages : HTML5, CSS , JavaScript• Database : MySQL• IDE : Net beans 7.4• SoftwareDevelopmentKit : JDK 7• UML Design Tool : Rational Rose 98 EE• Browser : Any Browser that supports
HTML5
top related