Top Banner
Attribute Based Encryption with Privacy Preserving In Clouds Presented By: Shrihari C S 1CG11IS080
17
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Attribute Based Encryption with Privacy Preserving In Clouds

Attribute Based Encryption with Privacy Preserving In Clouds

Presented By:

Shrihari C S1CG11IS080

Page 2: Attribute Based Encryption with Privacy Preserving In Clouds

IntroductionExisting SystemSecure cloud storage modelProposed workSecure Hash AlgorithmPaillier AlgorithmConclusion

OVERVIEW

Page 3: Attribute Based Encryption with Privacy Preserving In Clouds

INTRODUCTIONA new decentralized access control schema.

Distributed access control so that only users with valid attributes can access them.

Support the creation, modification and reading the data stored in the cloud

Page 4: Attribute Based Encryption with Privacy Preserving In Clouds

EXISTING SYSTEMThe existing access control in cloud are

centralized in nature.

This scheme uses a symmetric key approach.

This approach does not support the authentication.

Page 5: Attribute Based Encryption with Privacy Preserving In Clouds

SECURE CLOUD STORAGE MODEL

Page 6: Attribute Based Encryption with Privacy Preserving In Clouds

PROPOSED WORK A. Creation of KDC

Create KDC

KDC Password

KDC Password

Add User

Page 7: Attribute Based Encryption with Privacy Preserving In Clouds

B. KDC AuthenticationKDC User

User Registration process

Data Stored in Database

Page 8: Attribute Based Encryption with Privacy Preserving In Clouds

C. Trustee and User Accessibility

Database

Request Token

User id

Trustee Verifying

Provide Token

Page 9: Attribute Based Encryption with Privacy Preserving In Clouds

D. Creation of access policy

Access policies

KDC

Cloud

Token

Creation of access policy

C

C

Page 10: Attribute Based Encryption with Privacy Preserving In Clouds

KDC

User Token

Public keyPrivate key

File Download

G. File Accessing

Page 11: Attribute Based Encryption with Privacy Preserving In Clouds

File Recovery Technique

Recovery File

Corrupted File

F. File Restoration

Page 12: Attribute Based Encryption with Privacy Preserving In Clouds

F. Secure Hash Algorithm

Page 13: Attribute Based Encryption with Privacy Preserving In Clouds

H. Paillier Algorithm

Key generationStep 1: Choose two large prime numbers p and q randomly and independently of each other such that  gcd (pq, (p-1)(q-1))=1. This property is assured if both primes are of equal length.

Step 2: Compute n=pq and λ=lcm(p-1,q-1).

Step 3: Select random integer g where gZ*n2.

Step 4: Ensure n divides the order of g by checking the existence of the following modular multiplicative inverse μ= (L(gλ mod n2))-1mod n. where function L is defined as L(u)= (u-1)/n.

Page 14: Attribute Based Encryption with Privacy Preserving In Clouds

Encryption

• Let m be a message to be encrypted where m Zn.• Select random r where r Z*n. • Compute cipher text as: c= ek (x; r ) = gm.rn mod n2

Decryption

• Cipher text: cZ*n2.• Compute message: m=dk(y)= (L(yλ mod n2 ))/((L(gλ

mod n2 )) mod n.

Contd …

Page 15: Attribute Based Encryption with Privacy Preserving In Clouds

CONCLUSION

• A decentralized access control technique with anonymous authentication.

• Provides user revocation.

• The cloud does not know the identity of the user who stores information, but only verifies the user’s credentials.

• One limitation is that the cloud knows the access policy for each record stored in the cloud.

Page 16: Attribute Based Encryption with Privacy Preserving In Clouds

Future WorkIn future, using SQL queries for hide the

attributes and access policy of a user.

Files stored in cloud can be corrupted. So for this issue using the file recovery technique to recover the corrupted file successfully and to hide the access policy and the user attributes

Page 17: Attribute Based Encryption with Privacy Preserving In Clouds

THANK YOU