YOU ARE DOWNLOADING DOCUMENT

Please tick the box to continue:

Transcript
Page 1: Effective data access control for multi authority cloud stoorage systems

Effective Data Access Control For Multi-Authority Cloud Storage Systems

ByG.V.SAIBABA(12R91A1220)

DEPT. OF ITTKREC

Page 2: Effective data access control for multi authority cloud stoorage systems

ABSTRACT• Data access control is an effective way to ensure the data security in the cloud.

• However, due to data outsourcing and un trusted cloud servers, the data access control becomes a challenging issue in cloud storage systems.

Page 3: Effective data access control for multi authority cloud stoorage systems

ABSTRACT

• In this paper, we propose DAC-MACS (Data Access Control for Multi-Authority Cloud Storage), an effective and secure data access control scheme with efficient decryption and revocation.

• Specifically, we construct a new multi-authority CP-ABE (Cipher text-Policy Attribute-based Encryption) scheme with efficient decryption and also design an efficient attribute revocation method that can achieve both forward security and backward security.

Page 4: Effective data access control for multi authority cloud stoorage systems

EXISTING SYSTEM

• Data owners depend on data service providers.

Data Owner

Server

Data user

Page 5: Effective data access control for multi authority cloud stoorage systems

EXISTING SYSTEM

• Data owners encrypt files and outsource to the server.

Page 6: Effective data access control for multi authority cloud stoorage systems

DISADVANTAGES OF EXISTING SYSTEM

• Data owners cannot rely on service providers.

Data Owner

Server

UnauthorizedData user

Page 7: Effective data access control for multi authority cloud stoorage systems

DISADVANTAGES OF EXISTING SYSTEM

• Overload on server.

• Does not support Attribute revocation problem.

Page 8: Effective data access control for multi authority cloud stoorage systems

PROPOSED SYSTEM

• In this paper, we first propose a revocable multi authority CP-ABE scheme, where an efficient and secure revocation method is proposed to solve the attribute revocation problem in the system.

• Our scheme does not require the server to be fully trusted, because the key update is enforced by each attribute authority not the server.

Page 9: Effective data access control for multi authority cloud stoorage systems

PROPOSED SYSTEM

Page 10: Effective data access control for multi authority cloud stoorage systems

ADVANTAGES OF PROPOSED SYSTEM

• Data owners are not involved in the key generation.

Page 11: Effective data access control for multi authority cloud stoorage systems

ADVANTAGES OF PROPOSED SYSTEM

• The revoked user cannot decrypt the new cipher texts that require the revoked attributes to decrypt (Backward Security).

Page 12: Effective data access control for multi authority cloud stoorage systems

ADVANTAGES OF PROPOSED SYSTEM

• The newly joined user can also decrypt the previously published cipher texts that are encrypted if it has sufficient attributes (Forward Security).

Page 13: Effective data access control for multi authority cloud stoorage systems

HARDWARE REQUIREMENTS

• Processor : Intel Core (mini) • ROM : 40 GB or above• RAM : 1GB or above

Page 14: Effective data access control for multi authority cloud stoorage systems

SOFTWARE REQUIREMENTS

• Operating system : Windows XP SP3 or latest versions

• Coding Language : J2SE & J2EE• UI Design Languages : HTML5, CSS , JavaScript• Database : MySQL• IDE : Net beans 7.4• SoftwareDevelopmentKit : JDK 7• UML Design Tool : Rational Rose 98 EE• Browser : Any Browser that supports

HTML5

Page 15: Effective data access control for multi authority cloud stoorage systems

Related Documents