SlideShare a Scribd company logo
1 of 4
Download to read offline
Attribute-Based Storage Supporting SecureDeduplication of Encrypted Data
in Cloud
Abstract
Attribute-based encryption (ABE) has been widely used in cloud computing where
a data provider outsources his/herencrypted data to a cloud service provider, and
can share the data with users possessing specific credentials (or attributes).
However,the standard ABE system does not support secure de-duplication, which
is crucial for eliminating duplicate copies of identical data inorder to save storage
space and network bandwidth. In this paper, we present an attribute-based storage
system with securede-duplication in a hybrid cloud setting, where a private cloud is
responsible for duplicate detection and a public cloud manages thestorage.
Compared with the prior data de-duplication systems, our system has two
advantages. Firstly, it can be used to confidentiallyshare data with users by
specifying access policies rather than sharing decryption keys. Secondly, it
achieves the standard notion ofsemantic security for data confidentiality while
existing systems only achieve it by defining a weaker security notion. In addition,
we putforth a methodology to modify a ciphertext over one access policy into
ciphertexts of the same plaintext but under other access policieswithout revealing
the underlying plaintext.
Existing System:
In existing system a data provider Bob intends toupload a file M to the cloud, and
share M (file data) with users havingcertain credentials. In order to do so, Bob
encrypts M underan access policy A over a set of attributes, and uploadsthe
corresponding ciphertext to the cloud, such that onlyusers whose sets of attributes
satisfying the access policycan decrypt the ciphertext. Later, another data provider
Alice, uploads a ciphertext for the same underlying file Mbut ascribed to a
different access policy A0. Since the fileis uploaded in an encrypted form, the
cloud is not able todiscern that the plaintext corresponding to Alice’s ciphertextis
the same as that corresponding to Bob’s, and will storeM twice. Obviously, such
duplicated storage wastes storage space and communication bandwidth.
Proposed System:
In this paper, we present an attribute-based storage systemwhich employs
ciphertext-policy attribute-based encryption(CP-ABE) and supports secure
deduplication. In the proposed attributed-based system,the same file could be
encrypted to different ciphertextsassociated with different access policies, storing
only oneciphertext of the file means that users whose attributessatisfy the access
policy of a discarded ciphertext (but notthat of the stored ciphertext) will be denied
to access thedata that they are entitled to. To overcome this problem,we equip the
private cloud with another capability namedciphertext regeneration. For a
ciphertext c of a plaintext Mwith access policy A, the private cloud will be
provided witha trapdoor key which is generated along with the ciphertextc by a
data provider. The private cloud can use the trapdoorkey to convert the ciphertext c
with access policy A to anew ciphertext C with another access policy A0 without
knowing the underlying message M. Thus, if two dataproviders happen to upload
two ciphertexts correspondingto the same file but under different access policies A
andA0, the private cloud can regenerate a ciphertext for thesame underlying file
with an access policy A UA0 usingthe corresponding trapdoor key and then store
the newciphertext instead of the old one in the public cloud.
System Architecture:
Fig.1: System architecture of attribute-based storage withsecure deduplication.
Modules:
Data Provider:
A data provider wants to outsource his/her datato the cloud and share it with users
possessing certaincredentials.
Attribute Authority (AA):
In this system Attribute Authority can generate first Public Key PK and Master
Key MK as well The authority executes the algorithm which inputs a set of
attributes S(S ⊆ A˜) and creates a Secret Key SK and these keys can be send to
authorized User‘s.
Cloud:
The cloud consists of a public cloud which is in charge of data storage and a
private cloud which performs certain computation suchas tag checking.
User:
At the user side, each user can download an item, anddecrypt the ciphertext with
the attribute-based private keygenerated by the AA if this user’s attribute set
satisfies theaccess structure. Each user checks the correctness of thedecrypted
message using the label, and accepts the messageif it is consistent with the label.
SYSTEM CONFIGURATION:
Hardware requirements:
Processer : Any Update Processer
Ram : Min 1 GB
Hard Disk : Min 100 GB
Software requirements:
Operating System : Windows family
Technology : Java (1.7/1.8)
Front-End Technologies : Html, Html-5, JavaScript, CSS.
Web Server : Tomcat 7/8
Database (Back – End) : My SQL5.5
IDE : EditPlus
Implemented by
Development team : Cloud Technologies
Website : http://www.cloudstechnologies.in/
Contact : 8121953811, 040-65511811

More Related Content

What's hot

Privacy preservingmulti-keywordrankedsearchoverencryptedclouddata-14090213203...
Privacy preservingmulti-keywordrankedsearchoverencryptedclouddata-14090213203...Privacy preservingmulti-keywordrankedsearchoverencryptedclouddata-14090213203...
Privacy preservingmulti-keywordrankedsearchoverencryptedclouddata-14090213203...sharathdj
 
SECURE AUDITING AND DEDUPLICATING DATA IN CLOUD
SECURE AUDITING AND DEDUPLICATING DATA IN CLOUDSECURE AUDITING AND DEDUPLICATING DATA IN CLOUD
SECURE AUDITING AND DEDUPLICATING DATA IN CLOUDNexgen Technology
 
Audit free cloud storage via deniable attribute based encryption
Audit free cloud storage via  deniable attribute based encryptionAudit free cloud storage via  deniable attribute based encryption
Audit free cloud storage via deniable attribute based encryptionMano Sriram
 
Privacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud dataPrivacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud dataIGEEKS TECHNOLOGIES
 
PUBLIC INTEGRITY AUDITING FOR SHARED DYNAMIC CLOUD DATA WITH GROUP USER REVO...
 PUBLIC INTEGRITY AUDITING FOR SHARED DYNAMIC CLOUD DATA WITH GROUP USER REVO... PUBLIC INTEGRITY AUDITING FOR SHARED DYNAMIC CLOUD DATA WITH GROUP USER REVO...
PUBLIC INTEGRITY AUDITING FOR SHARED DYNAMIC CLOUD DATA WITH GROUP USER REVO...Nexgen Technology
 
privacy preserving multi keyword ranked search over encrypted cloud data
privacy preserving multi keyword ranked search over encrypted cloud dataprivacy preserving multi keyword ranked search over encrypted cloud data
privacy preserving multi keyword ranked search over encrypted cloud dataswathi78
 
Audit free cloud storage via deniable attribute-based encryption
Audit free cloud storage via deniable attribute-based encryptionAudit free cloud storage via deniable attribute-based encryption
Audit free cloud storage via deniable attribute-based encryptionPvrtechnologies Nellore
 
A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD...
 A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD... A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD...
A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD...Nexgen Technology
 
2.achieving practical symmetric searchable encryption with search pattern pri...
2.achieving practical symmetric searchable encryption with search pattern pri...2.achieving practical symmetric searchable encryption with search pattern pri...
2.achieving practical symmetric searchable encryption with search pattern pri...Venkat Projects
 
Accurate and Efficient Secured Dynamic Multi-keyword Ranked Search
Accurate and Efficient Secured Dynamic Multi-keyword Ranked SearchAccurate and Efficient Secured Dynamic Multi-keyword Ranked Search
Accurate and Efficient Secured Dynamic Multi-keyword Ranked SearchDakshineshwar Swain
 
Searchable Symmetric Encryption with Forward Search Privacy
Searchable Symmetric Encryption with Forward Search PrivacySearchable Symmetric Encryption with Forward Search Privacy
Searchable Symmetric Encryption with Forward Search PrivacyJAYAPRAKASH JPINFOTECH
 
Privacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud dataPrivacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud dataIGEEKS TECHNOLOGIES
 
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...Editor IJMTER
 
IEEE paper 2014 abstract
IEEE paper 2014 abstractIEEE paper 2014 abstract
IEEE paper 2014 abstractSenthilvel S
 

What's hot (16)

Privacy preservingmulti-keywordrankedsearchoverencryptedclouddata-14090213203...
Privacy preservingmulti-keywordrankedsearchoverencryptedclouddata-14090213203...Privacy preservingmulti-keywordrankedsearchoverencryptedclouddata-14090213203...
Privacy preservingmulti-keywordrankedsearchoverencryptedclouddata-14090213203...
 
SECURE AUDITING AND DEDUPLICATING DATA IN CLOUD
SECURE AUDITING AND DEDUPLICATING DATA IN CLOUDSECURE AUDITING AND DEDUPLICATING DATA IN CLOUD
SECURE AUDITING AND DEDUPLICATING DATA IN CLOUD
 
Audit free cloud storage via deniable attribute based encryption
Audit free cloud storage via  deniable attribute based encryptionAudit free cloud storage via  deniable attribute based encryption
Audit free cloud storage via deniable attribute based encryption
 
30
3030
30
 
Privacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud dataPrivacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud data
 
PUBLIC INTEGRITY AUDITING FOR SHARED DYNAMIC CLOUD DATA WITH GROUP USER REVO...
 PUBLIC INTEGRITY AUDITING FOR SHARED DYNAMIC CLOUD DATA WITH GROUP USER REVO... PUBLIC INTEGRITY AUDITING FOR SHARED DYNAMIC CLOUD DATA WITH GROUP USER REVO...
PUBLIC INTEGRITY AUDITING FOR SHARED DYNAMIC CLOUD DATA WITH GROUP USER REVO...
 
privacy preserving multi keyword ranked search over encrypted cloud data
privacy preserving multi keyword ranked search over encrypted cloud dataprivacy preserving multi keyword ranked search over encrypted cloud data
privacy preserving multi keyword ranked search over encrypted cloud data
 
Audit free cloud storage via deniable attribute-based encryption
Audit free cloud storage via deniable attribute-based encryptionAudit free cloud storage via deniable attribute-based encryption
Audit free cloud storage via deniable attribute-based encryption
 
A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD...
 A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD... A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD...
A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD...
 
2.achieving practical symmetric searchable encryption with search pattern pri...
2.achieving practical symmetric searchable encryption with search pattern pri...2.achieving practical symmetric searchable encryption with search pattern pri...
2.achieving practical symmetric searchable encryption with search pattern pri...
 
Accurate and Efficient Secured Dynamic Multi-keyword Ranked Search
Accurate and Efficient Secured Dynamic Multi-keyword Ranked SearchAccurate and Efficient Secured Dynamic Multi-keyword Ranked Search
Accurate and Efficient Secured Dynamic Multi-keyword Ranked Search
 
Searchable Symmetric Encryption with Forward Search Privacy
Searchable Symmetric Encryption with Forward Search PrivacySearchable Symmetric Encryption with Forward Search Privacy
Searchable Symmetric Encryption with Forward Search Privacy
 
Privacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud dataPrivacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud data
 
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
 
Final 1st
Final 1stFinal 1st
Final 1st
 
IEEE paper 2014 abstract
IEEE paper 2014 abstractIEEE paper 2014 abstract
IEEE paper 2014 abstract
 

Similar to Attribute-Based Cloud Storage with Secure Data Deduplication

Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Key aggregate searchable encryption (kase) for group data sharing via cloud s...Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Key aggregate searchable encryption (kase) for group data sharing via cloud s...CloudTechnologies
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)inventionjournals
 
Doc A hybrid cloud approach for secure authorized deduplication
 Doc A hybrid cloud approach for secure authorized deduplication Doc A hybrid cloud approach for secure authorized deduplication
Doc A hybrid cloud approach for secure authorized deduplicationShakas Technologie
 
Key aggregate cryptosystem for scalable data sharing in cloud storage
Key aggregate cryptosystem for scalable data sharing in cloud storageKey aggregate cryptosystem for scalable data sharing in cloud storage
Key aggregate cryptosystem for scalable data sharing in cloud storageMugesh Mukkandan
 
A Hybrid Cloud Approach for Secure Authorized Deduplication
A Hybrid Cloud Approach for Secure Authorized DeduplicationA Hybrid Cloud Approach for Secure Authorized Deduplication
A Hybrid Cloud Approach for Secure Authorized Deduplication1crore projects
 
Audit free cloud storage via deniable attribute based encryption
Audit free cloud storage via deniable attribute based encryptionAudit free cloud storage via deniable attribute based encryption
Audit free cloud storage via deniable attribute based encryptionKamal Spring
 
Ieeepro techno solutions 2014 ieee java project - a hybrid cloud approach f...
Ieeepro techno solutions   2014 ieee java project - a hybrid cloud approach f...Ieeepro techno solutions   2014 ieee java project - a hybrid cloud approach f...
Ieeepro techno solutions 2014 ieee java project - a hybrid cloud approach f...hemanthbbc
 
Ieeepro techno solutions 2014 ieee dotnet project - a hybrid cloud approach...
Ieeepro techno solutions   2014 ieee dotnet project - a hybrid cloud approach...Ieeepro techno solutions   2014 ieee dotnet project - a hybrid cloud approach...
Ieeepro techno solutions 2014 ieee dotnet project - a hybrid cloud approach...ASAITHAMBIRAJAA
 
a hybrid cloud approach for secure authorized
a hybrid cloud approach for secure authorizeda hybrid cloud approach for secure authorized
a hybrid cloud approach for secure authorizedlogicsystemsprojects
 
Privacy Preserving Delegated Access Control in Public Clouds
Privacy Preserving Delegated Access Control in Public CloudsPrivacy Preserving Delegated Access Control in Public Clouds
Privacy Preserving Delegated Access Control in Public CloudsMd Uddin
 
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Privacy preserving delegated access con...
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Privacy preserving delegated access con...JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Privacy preserving delegated access con...
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Privacy preserving delegated access con...IEEEGLOBALSOFTTECHNOLOGIES
 
A Hybrid Cloud Approach for Secure Authorized Deduplication
A Hybrid Cloud Approach for Secure Authorized DeduplicationA Hybrid Cloud Approach for Secure Authorized Deduplication
A Hybrid Cloud Approach for Secure Authorized DeduplicationSWAMI06
 
A hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplicationA hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplicationPvrtechnologies Nellore
 
A hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplicationA hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplicationTmks Infotech
 
Secure and-verifiable-policy-update-outsourcing-for-big-data-access-control-i...
Secure and-verifiable-policy-update-outsourcing-for-big-data-access-control-i...Secure and-verifiable-policy-update-outsourcing-for-big-data-access-control-i...
Secure and-verifiable-policy-update-outsourcing-for-big-data-access-control-i...Kamal Spring
 
Secure and-verifiable-policy-update-outsourcing-for-big-data-access-control-i...
Secure and-verifiable-policy-update-outsourcing-for-big-data-access-control-i...Secure and-verifiable-policy-update-outsourcing-for-big-data-access-control-i...
Secure and-verifiable-policy-update-outsourcing-for-big-data-access-control-i...Kamal Spring
 
Hasbe a hierarchical attribute based solution for flexible and scalable acces...
Hasbe a hierarchical attribute based solution for flexible and scalable acces...Hasbe a hierarchical attribute based solution for flexible and scalable acces...
Hasbe a hierarchical attribute based solution for flexible and scalable acces...JPINFOTECH JAYAPRAKASH
 
Volume 2-issue-6-2073-2076
Volume 2-issue-6-2073-2076Volume 2-issue-6-2073-2076
Volume 2-issue-6-2073-2076Editor IJARCET
 
Volume 2-issue-6-2073-2076
Volume 2-issue-6-2073-2076Volume 2-issue-6-2073-2076
Volume 2-issue-6-2073-2076Editor IJARCET
 
Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud S...
Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud S...Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud S...
Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud S...1crore projects
 

Similar to Attribute-Based Cloud Storage with Secure Data Deduplication (20)

Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Key aggregate searchable encryption (kase) for group data sharing via cloud s...Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
 
Doc A hybrid cloud approach for secure authorized deduplication
 Doc A hybrid cloud approach for secure authorized deduplication Doc A hybrid cloud approach for secure authorized deduplication
Doc A hybrid cloud approach for secure authorized deduplication
 
Key aggregate cryptosystem for scalable data sharing in cloud storage
Key aggregate cryptosystem for scalable data sharing in cloud storageKey aggregate cryptosystem for scalable data sharing in cloud storage
Key aggregate cryptosystem for scalable data sharing in cloud storage
 
A Hybrid Cloud Approach for Secure Authorized Deduplication
A Hybrid Cloud Approach for Secure Authorized DeduplicationA Hybrid Cloud Approach for Secure Authorized Deduplication
A Hybrid Cloud Approach for Secure Authorized Deduplication
 
Audit free cloud storage via deniable attribute based encryption
Audit free cloud storage via deniable attribute based encryptionAudit free cloud storage via deniable attribute based encryption
Audit free cloud storage via deniable attribute based encryption
 
Ieeepro techno solutions 2014 ieee java project - a hybrid cloud approach f...
Ieeepro techno solutions   2014 ieee java project - a hybrid cloud approach f...Ieeepro techno solutions   2014 ieee java project - a hybrid cloud approach f...
Ieeepro techno solutions 2014 ieee java project - a hybrid cloud approach f...
 
Ieeepro techno solutions 2014 ieee dotnet project - a hybrid cloud approach...
Ieeepro techno solutions   2014 ieee dotnet project - a hybrid cloud approach...Ieeepro techno solutions   2014 ieee dotnet project - a hybrid cloud approach...
Ieeepro techno solutions 2014 ieee dotnet project - a hybrid cloud approach...
 
a hybrid cloud approach for secure authorized
a hybrid cloud approach for secure authorizeda hybrid cloud approach for secure authorized
a hybrid cloud approach for secure authorized
 
Privacy Preserving Delegated Access Control in Public Clouds
Privacy Preserving Delegated Access Control in Public CloudsPrivacy Preserving Delegated Access Control in Public Clouds
Privacy Preserving Delegated Access Control in Public Clouds
 
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Privacy preserving delegated access con...
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Privacy preserving delegated access con...JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Privacy preserving delegated access con...
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Privacy preserving delegated access con...
 
A Hybrid Cloud Approach for Secure Authorized Deduplication
A Hybrid Cloud Approach for Secure Authorized DeduplicationA Hybrid Cloud Approach for Secure Authorized Deduplication
A Hybrid Cloud Approach for Secure Authorized Deduplication
 
A hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplicationA hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplication
 
A hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplicationA hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplication
 
Secure and-verifiable-policy-update-outsourcing-for-big-data-access-control-i...
Secure and-verifiable-policy-update-outsourcing-for-big-data-access-control-i...Secure and-verifiable-policy-update-outsourcing-for-big-data-access-control-i...
Secure and-verifiable-policy-update-outsourcing-for-big-data-access-control-i...
 
Secure and-verifiable-policy-update-outsourcing-for-big-data-access-control-i...
Secure and-verifiable-policy-update-outsourcing-for-big-data-access-control-i...Secure and-verifiable-policy-update-outsourcing-for-big-data-access-control-i...
Secure and-verifiable-policy-update-outsourcing-for-big-data-access-control-i...
 
Hasbe a hierarchical attribute based solution for flexible and scalable acces...
Hasbe a hierarchical attribute based solution for flexible and scalable acces...Hasbe a hierarchical attribute based solution for flexible and scalable acces...
Hasbe a hierarchical attribute based solution for flexible and scalable acces...
 
Volume 2-issue-6-2073-2076
Volume 2-issue-6-2073-2076Volume 2-issue-6-2073-2076
Volume 2-issue-6-2073-2076
 
Volume 2-issue-6-2073-2076
Volume 2-issue-6-2073-2076Volume 2-issue-6-2073-2076
Volume 2-issue-6-2073-2076
 
Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud S...
Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud S...Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud S...
Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud S...
 

More from CloudTechnologies

Machine Learning Classification to predict water purity based on Viruses and ...
Machine Learning Classification to predict water purity based on Viruses and ...Machine Learning Classification to predict water purity based on Viruses and ...
Machine Learning Classification to predict water purity based on Viruses and ...CloudTechnologies
 
iot based safety and health monitoring for construction workers
iot based safety and health monitoring for construction workersiot based safety and health monitoring for construction workers
iot based safety and health monitoring for construction workersCloudTechnologies
 
Intelligent neonatal monitoring system based on android application using mul...
Intelligent neonatal monitoring system based on android application using mul...Intelligent neonatal monitoring system based on android application using mul...
Intelligent neonatal monitoring system based on android application using mul...CloudTechnologies
 
An iot based smart garden with weather station system
An iot based smart garden with weather station systemAn iot based smart garden with weather station system
An iot based smart garden with weather station systemCloudTechnologies
 
A deep learning facial expression recognition based scoring system for restau...
A deep learning facial expression recognition based scoring system for restau...A deep learning facial expression recognition based scoring system for restau...
A deep learning facial expression recognition based scoring system for restau...CloudTechnologies
 
Diabetes prediction using different machine learning approaches
Diabetes prediction using different machine learning approachesDiabetes prediction using different machine learning approaches
Diabetes prediction using different machine learning approachesCloudTechnologies
 
machine learning based predictive analytics of student academic performance i...
machine learning based predictive analytics of student academic performance i...machine learning based predictive analytics of student academic performance i...
machine learning based predictive analytics of student academic performance i...CloudTechnologies
 
Image based estimation of real food size for accurate food calorie estimation
Image based estimation of real food size for accurate food calorie estimationImage based estimation of real food size for accurate food calorie estimation
Image based estimation of real food size for accurate food calorie estimationCloudTechnologies
 
Network intrusion detection using supervised machine learning technique with ...
Network intrusion detection using supervised machine learning technique with ...Network intrusion detection using supervised machine learning technique with ...
Network intrusion detection using supervised machine learning technique with ...CloudTechnologies
 
Python IEEE 2019 Projects List
Python IEEE 2019 Projects List Python IEEE 2019 Projects List
Python IEEE 2019 Projects List CloudTechnologies
 
Raspberry Pi based voice-operated personal assistant (Neobot)
Raspberry Pi based voice-operated personal assistant (Neobot)Raspberry Pi based voice-operated personal assistant (Neobot)
Raspberry Pi based voice-operated personal assistant (Neobot)CloudTechnologies
 
Automation in Agriculture and IoT
Automation in Agriculture and IoTAutomation in Agriculture and IoT
Automation in Agriculture and IoTCloudTechnologies
 
Gas Leakage Detection Based on IOT
Gas Leakage Detection Based on IOTGas Leakage Detection Based on IOT
Gas Leakage Detection Based on IOTCloudTechnologies
 
The Internet-of-Things based hand gestures using wearable sensors for human m...
The Internet-of-Things based hand gestures using wearable sensors for human m...The Internet-of-Things based hand gestures using wearable sensors for human m...
The Internet-of-Things based hand gestures using wearable sensors for human m...CloudTechnologies
 
MULTIVIEW GARBAGE COLLECTION ESTIMATION USING IOT
MULTIVIEW GARBAGE COLLECTION ESTIMATION USING IOTMULTIVIEW GARBAGE COLLECTION ESTIMATION USING IOT
MULTIVIEW GARBAGE COLLECTION ESTIMATION USING IOTCloudTechnologies
 
IoT Based Safety and Health Monitoring for Construction Workers
IoT Based Safety and Health Monitoring for Construction WorkersIoT Based Safety and Health Monitoring for Construction Workers
IoT Based Safety and Health Monitoring for Construction WorkersCloudTechnologies
 

More from CloudTechnologies (20)

Machine Learning Classification to predict water purity based on Viruses and ...
Machine Learning Classification to predict water purity based on Viruses and ...Machine Learning Classification to predict water purity based on Viruses and ...
Machine Learning Classification to predict water purity based on Viruses and ...
 
iot based safety and health monitoring for construction workers
iot based safety and health monitoring for construction workersiot based safety and health monitoring for construction workers
iot based safety and health monitoring for construction workers
 
Intelligent neonatal monitoring system based on android application using mul...
Intelligent neonatal monitoring system based on android application using mul...Intelligent neonatal monitoring system based on android application using mul...
Intelligent neonatal monitoring system based on android application using mul...
 
An iot based smart garden with weather station system
An iot based smart garden with weather station systemAn iot based smart garden with weather station system
An iot based smart garden with weather station system
 
A deep learning facial expression recognition based scoring system for restau...
A deep learning facial expression recognition based scoring system for restau...A deep learning facial expression recognition based scoring system for restau...
A deep learning facial expression recognition based scoring system for restau...
 
Diabetes prediction using different machine learning approaches
Diabetes prediction using different machine learning approachesDiabetes prediction using different machine learning approaches
Diabetes prediction using different machine learning approaches
 
machine learning based predictive analytics of student academic performance i...
machine learning based predictive analytics of student academic performance i...machine learning based predictive analytics of student academic performance i...
machine learning based predictive analytics of student academic performance i...
 
Image based estimation of real food size for accurate food calorie estimation
Image based estimation of real food size for accurate food calorie estimationImage based estimation of real food size for accurate food calorie estimation
Image based estimation of real food size for accurate food calorie estimation
 
Network intrusion detection using supervised machine learning technique with ...
Network intrusion detection using supervised machine learning technique with ...Network intrusion detection using supervised machine learning technique with ...
Network intrusion detection using supervised machine learning technique with ...
 
Io t projects
Io t projectsIo t projects
Io t projects
 
Cloud computing projects
Cloud computing projects Cloud computing projects
Cloud computing projects
 
Data mining projects
Data mining projectsData mining projects
Data mining projects
 
Python IEEE 2019 Projects List
Python IEEE 2019 Projects List Python IEEE 2019 Projects List
Python IEEE 2019 Projects List
 
Machine learning projects
Machine learning projectsMachine learning projects
Machine learning projects
 
Raspberry Pi based voice-operated personal assistant (Neobot)
Raspberry Pi based voice-operated personal assistant (Neobot)Raspberry Pi based voice-operated personal assistant (Neobot)
Raspberry Pi based voice-operated personal assistant (Neobot)
 
Automation in Agriculture and IoT
Automation in Agriculture and IoTAutomation in Agriculture and IoT
Automation in Agriculture and IoT
 
Gas Leakage Detection Based on IOT
Gas Leakage Detection Based on IOTGas Leakage Detection Based on IOT
Gas Leakage Detection Based on IOT
 
The Internet-of-Things based hand gestures using wearable sensors for human m...
The Internet-of-Things based hand gestures using wearable sensors for human m...The Internet-of-Things based hand gestures using wearable sensors for human m...
The Internet-of-Things based hand gestures using wearable sensors for human m...
 
MULTIVIEW GARBAGE COLLECTION ESTIMATION USING IOT
MULTIVIEW GARBAGE COLLECTION ESTIMATION USING IOTMULTIVIEW GARBAGE COLLECTION ESTIMATION USING IOT
MULTIVIEW GARBAGE COLLECTION ESTIMATION USING IOT
 
IoT Based Safety and Health Monitoring for Construction Workers
IoT Based Safety and Health Monitoring for Construction WorkersIoT Based Safety and Health Monitoring for Construction Workers
IoT Based Safety and Health Monitoring for Construction Workers
 

Recently uploaded

Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...RKavithamani
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 

Recently uploaded (20)

Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 

Attribute-Based Cloud Storage with Secure Data Deduplication

  • 1. Attribute-Based Storage Supporting SecureDeduplication of Encrypted Data in Cloud Abstract Attribute-based encryption (ABE) has been widely used in cloud computing where a data provider outsources his/herencrypted data to a cloud service provider, and can share the data with users possessing specific credentials (or attributes). However,the standard ABE system does not support secure de-duplication, which is crucial for eliminating duplicate copies of identical data inorder to save storage space and network bandwidth. In this paper, we present an attribute-based storage system with securede-duplication in a hybrid cloud setting, where a private cloud is responsible for duplicate detection and a public cloud manages thestorage. Compared with the prior data de-duplication systems, our system has two advantages. Firstly, it can be used to confidentiallyshare data with users by specifying access policies rather than sharing decryption keys. Secondly, it achieves the standard notion ofsemantic security for data confidentiality while existing systems only achieve it by defining a weaker security notion. In addition, we putforth a methodology to modify a ciphertext over one access policy into ciphertexts of the same plaintext but under other access policieswithout revealing the underlying plaintext. Existing System: In existing system a data provider Bob intends toupload a file M to the cloud, and share M (file data) with users havingcertain credentials. In order to do so, Bob encrypts M underan access policy A over a set of attributes, and uploadsthe corresponding ciphertext to the cloud, such that onlyusers whose sets of attributes satisfying the access policycan decrypt the ciphertext. Later, another data provider Alice, uploads a ciphertext for the same underlying file Mbut ascribed to a
  • 2. different access policy A0. Since the fileis uploaded in an encrypted form, the cloud is not able todiscern that the plaintext corresponding to Alice’s ciphertextis the same as that corresponding to Bob’s, and will storeM twice. Obviously, such duplicated storage wastes storage space and communication bandwidth. Proposed System: In this paper, we present an attribute-based storage systemwhich employs ciphertext-policy attribute-based encryption(CP-ABE) and supports secure deduplication. In the proposed attributed-based system,the same file could be encrypted to different ciphertextsassociated with different access policies, storing only oneciphertext of the file means that users whose attributessatisfy the access policy of a discarded ciphertext (but notthat of the stored ciphertext) will be denied to access thedata that they are entitled to. To overcome this problem,we equip the private cloud with another capability namedciphertext regeneration. For a ciphertext c of a plaintext Mwith access policy A, the private cloud will be provided witha trapdoor key which is generated along with the ciphertextc by a data provider. The private cloud can use the trapdoorkey to convert the ciphertext c with access policy A to anew ciphertext C with another access policy A0 without knowing the underlying message M. Thus, if two dataproviders happen to upload two ciphertexts correspondingto the same file but under different access policies A andA0, the private cloud can regenerate a ciphertext for thesame underlying file with an access policy A UA0 usingthe corresponding trapdoor key and then store the newciphertext instead of the old one in the public cloud.
  • 3. System Architecture: Fig.1: System architecture of attribute-based storage withsecure deduplication. Modules: Data Provider: A data provider wants to outsource his/her datato the cloud and share it with users possessing certaincredentials. Attribute Authority (AA): In this system Attribute Authority can generate first Public Key PK and Master Key MK as well The authority executes the algorithm which inputs a set of attributes S(S ⊆ A˜) and creates a Secret Key SK and these keys can be send to authorized User‘s. Cloud: The cloud consists of a public cloud which is in charge of data storage and a private cloud which performs certain computation suchas tag checking.
  • 4. User: At the user side, each user can download an item, anddecrypt the ciphertext with the attribute-based private keygenerated by the AA if this user’s attribute set satisfies theaccess structure. Each user checks the correctness of thedecrypted message using the label, and accepts the messageif it is consistent with the label. SYSTEM CONFIGURATION: Hardware requirements: Processer : Any Update Processer Ram : Min 1 GB Hard Disk : Min 100 GB Software requirements: Operating System : Windows family Technology : Java (1.7/1.8) Front-End Technologies : Html, Html-5, JavaScript, CSS. Web Server : Tomcat 7/8 Database (Back – End) : My SQL5.5 IDE : EditPlus Implemented by Development team : Cloud Technologies Website : http://www.cloudstechnologies.in/ Contact : 8121953811, 040-65511811