SlideShare a Scribd company logo
1 of 1
Existing system:
Users, who store their sensitive information like financial information, health
records, etc., have a fundamental right of privacy. There are few cryptographic
tools and schemes like anonymous authentication schemes, group signatures, zero
knowledge protocols that can both hide user identity and provide authentication.
The providers of cloud services need to control the authentication process to permit
the access of only valid clients to their services.
Disadvantages of Existing system:
Further, they must be able to revoke malicious clients and reveal their identities. In
practice, hundreds of users can access cloud services at the same time. Hence, the
verification process of user access must be as efficient as possible and the
computational cryptographic overhead must be minimal. These solutions and
provide privacy-preserving public audit but do not offer the anonymous access of
users to cloud services.

More Related Content

What's hot

Blockchain in Healthcare
Blockchain in HealthcareBlockchain in Healthcare
Blockchain in HealthcareBirthVenue
 
Benefits of blockchain in healthcare
Benefits of blockchain in healthcareBenefits of blockchain in healthcare
Benefits of blockchain in healthcareMobiloitte
 
William for citizen2013
William for citizen2013William for citizen2013
William for citizen2013Mydex CIC
 
Open Identity for Open Government Initiative - NIH Pilot
Open Identity for Open Government Initiative - NIH PilotOpen Identity for Open Government Initiative - NIH Pilot
Open Identity for Open Government Initiative - NIH PilotLucas Cioffi
 
oauth-for-credentials-security-in-rest-api-access
oauth-for-credentials-security-in-rest-api-accessoauth-for-credentials-security-in-rest-api-access
oauth-for-credentials-security-in-rest-api-accessidsecconf
 
Microsoft active directory services aliya presentation
Microsoft active directory services   aliya presentationMicrosoft active directory services   aliya presentation
Microsoft active directory services aliya presentationAliya Saldanha
 
Blockchain in Healthcare
Blockchain in HealthcareBlockchain in Healthcare
Blockchain in HealthcareSusan Dart
 
FOCoS Innovations Brochure
FOCoS Innovations BrochureFOCoS Innovations Brochure
FOCoS Innovations BrochureJohn Cartiglia
 
Another top 5 industries that stand to benefit most from blockchain by venk...
Another top 5 industries that stand to benefit most from blockchain   by venk...Another top 5 industries that stand to benefit most from blockchain   by venk...
Another top 5 industries that stand to benefit most from blockchain by venk...venkatvajradhar1
 
Bernard Piccione | How Blockchain is Revolutionizing the Healthcare Industry
Bernard Piccione | How Blockchain is Revolutionizing the Healthcare IndustryBernard Piccione | How Blockchain is Revolutionizing the Healthcare Industry
Bernard Piccione | How Blockchain is Revolutionizing the Healthcare IndustryBernard Piccione
 
Enabling Registration and Personalised Marketing for Health Care Professional...
Enabling Registration and Personalised Marketing for Health Care Professional...Enabling Registration and Personalised Marketing for Health Care Professional...
Enabling Registration and Personalised Marketing for Health Care Professional...Gerry Alden
 
Blockchain Technology for Patients Medical Records
Blockchain Technology for Patients Medical RecordsBlockchain Technology for Patients Medical Records
Blockchain Technology for Patients Medical RecordseHealth Forum
 

What's hot (17)

Blockchain in Healthcare
Blockchain in HealthcareBlockchain in Healthcare
Blockchain in Healthcare
 
Benefits of blockchain in healthcare
Benefits of blockchain in healthcareBenefits of blockchain in healthcare
Benefits of blockchain in healthcare
 
William for citizen2013
William for citizen2013William for citizen2013
William for citizen2013
 
Claim Depot
Claim DepotClaim Depot
Claim Depot
 
Uma webinar 2014 03-20
Uma webinar 2014 03-20Uma webinar 2014 03-20
Uma webinar 2014 03-20
 
Open Identity for Open Government Initiative - NIH Pilot
Open Identity for Open Government Initiative - NIH PilotOpen Identity for Open Government Initiative - NIH Pilot
Open Identity for Open Government Initiative - NIH Pilot
 
Credit checking
Credit checkingCredit checking
Credit checking
 
oauth-for-credentials-security-in-rest-api-access
oauth-for-credentials-security-in-rest-api-accessoauth-for-credentials-security-in-rest-api-access
oauth-for-credentials-security-in-rest-api-access
 
Microsoft active directory services aliya presentation
Microsoft active directory services   aliya presentationMicrosoft active directory services   aliya presentation
Microsoft active directory services aliya presentation
 
Blockchain in Healthcare
Blockchain in HealthcareBlockchain in Healthcare
Blockchain in Healthcare
 
FOCoS Innovations Brochure
FOCoS Innovations BrochureFOCoS Innovations Brochure
FOCoS Innovations Brochure
 
Blockchain in healthcare
Blockchain in healthcareBlockchain in healthcare
Blockchain in healthcare
 
Another top 5 industries that stand to benefit most from blockchain by venk...
Another top 5 industries that stand to benefit most from blockchain   by venk...Another top 5 industries that stand to benefit most from blockchain   by venk...
Another top 5 industries that stand to benefit most from blockchain by venk...
 
Bernard Piccione | How Blockchain is Revolutionizing the Healthcare Industry
Bernard Piccione | How Blockchain is Revolutionizing the Healthcare IndustryBernard Piccione | How Blockchain is Revolutionizing the Healthcare Industry
Bernard Piccione | How Blockchain is Revolutionizing the Healthcare Industry
 
Enabling Registration and Personalised Marketing for Health Care Professional...
Enabling Registration and Personalised Marketing for Health Care Professional...Enabling Registration and Personalised Marketing for Health Care Professional...
Enabling Registration and Personalised Marketing for Health Care Professional...
 
referer spoof
referer spoofreferer spoof
referer spoof
 
Blockchain Technology for Patients Medical Records
Blockchain Technology for Patients Medical RecordsBlockchain Technology for Patients Medical Records
Blockchain Technology for Patients Medical Records
 

Similar to Existing system

Access Control System_ An Overview - Bahaa Abdul Hadi.pdf
Access Control System_ An Overview - Bahaa Abdul Hadi.pdfAccess Control System_ An Overview - Bahaa Abdul Hadi.pdf
Access Control System_ An Overview - Bahaa Abdul Hadi.pdfBahaa Abdulhadi
 
Remote Access Policy Is A Normal Thing
Remote Access Policy Is A Normal ThingRemote Access Policy Is A Normal Thing
Remote Access Policy Is A Normal ThingKaren Oliver
 
[WSO2 Integration Summit Johannesburg 2019] Security in a Distributed Computi...
[WSO2 Integration Summit Johannesburg 2019] Security in a Distributed Computi...[WSO2 Integration Summit Johannesburg 2019] Security in a Distributed Computi...
[WSO2 Integration Summit Johannesburg 2019] Security in a Distributed Computi...WSO2
 
CIS 2015- User-centric Privacy of Identity- Jenn Behrens
CIS 2015- User-centric Privacy of Identity- Jenn BehrensCIS 2015- User-centric Privacy of Identity- Jenn Behrens
CIS 2015- User-centric Privacy of Identity- Jenn BehrensCloudIDSummit
 
Investigation of Blockchain Based Identity System for Privacy Preserving Univ...
Investigation of Blockchain Based Identity System for Privacy Preserving Univ...Investigation of Blockchain Based Identity System for Privacy Preserving Univ...
Investigation of Blockchain Based Identity System for Privacy Preserving Univ...ijtsrd
 
Blockchain in Identity Management - An Overview.pdf
Blockchain in Identity Management - An Overview.pdfBlockchain in Identity Management - An Overview.pdf
Blockchain in Identity Management - An Overview.pdfJamieDornan2
 
Advanced mechanism for single sign on for distributed computer networks
Advanced mechanism for single sign on for distributed computer networksAdvanced mechanism for single sign on for distributed computer networks
Advanced mechanism for single sign on for distributed computer networkseSAT Journals
 
IRJET-An Economical and Secured Approach for Continuous and Transparent User ...
IRJET-An Economical and Secured Approach for Continuous and Transparent User ...IRJET-An Economical and Secured Approach for Continuous and Transparent User ...
IRJET-An Economical and Secured Approach for Continuous and Transparent User ...IRJET Journal
 
Product Case Competition.pdf
Product Case Competition.pdfProduct Case Competition.pdf
Product Case Competition.pdfhimanshu102850
 
A Simplified Guide to the Evolution of Authentication!
A Simplified Guide to the Evolution of Authentication!A Simplified Guide to the Evolution of Authentication!
A Simplified Guide to the Evolution of Authentication!Caroline Johnson
 
blockchain ppt for research puropse in the university
blockchain ppt for research puropse in the universityblockchain ppt for research puropse in the university
blockchain ppt for research puropse in the universitygugan7097
 
5 ways on how will blockchain impact healthcare
5 ways on how will blockchain impact healthcare5 ways on how will blockchain impact healthcare
5 ways on how will blockchain impact healthcareBlockchain Council
 
Blockchains Impact on Identity Management.pdf
Blockchains Impact on Identity Management.pdfBlockchains Impact on Identity Management.pdf
Blockchains Impact on Identity Management.pdfniahiggins21
 
How Does Blockchain Identity Management Revolutionise Financial Sectors.pdf
How Does Blockchain Identity Management Revolutionise Financial Sectors.pdfHow Does Blockchain Identity Management Revolutionise Financial Sectors.pdf
How Does Blockchain Identity Management Revolutionise Financial Sectors.pdfJamieDornan2
 
Identity and access management
Identity and access managementIdentity and access management
Identity and access managementPiyush Jain
 

Similar to Existing system (20)

Access Control System_ An Overview - Bahaa Abdul Hadi.pdf
Access Control System_ An Overview - Bahaa Abdul Hadi.pdfAccess Control System_ An Overview - Bahaa Abdul Hadi.pdf
Access Control System_ An Overview - Bahaa Abdul Hadi.pdf
 
Remote Access Policy Is A Normal Thing
Remote Access Policy Is A Normal ThingRemote Access Policy Is A Normal Thing
Remote Access Policy Is A Normal Thing
 
[WSO2 Integration Summit Johannesburg 2019] Security in a Distributed Computi...
[WSO2 Integration Summit Johannesburg 2019] Security in a Distributed Computi...[WSO2 Integration Summit Johannesburg 2019] Security in a Distributed Computi...
[WSO2 Integration Summit Johannesburg 2019] Security in a Distributed Computi...
 
unit4.pptx
unit4.pptxunit4.pptx
unit4.pptx
 
CIS 2015- User-centric Privacy of Identity- Jenn Behrens
CIS 2015- User-centric Privacy of Identity- Jenn BehrensCIS 2015- User-centric Privacy of Identity- Jenn Behrens
CIS 2015- User-centric Privacy of Identity- Jenn Behrens
 
Investigation of Blockchain Based Identity System for Privacy Preserving Univ...
Investigation of Blockchain Based Identity System for Privacy Preserving Univ...Investigation of Blockchain Based Identity System for Privacy Preserving Univ...
Investigation of Blockchain Based Identity System for Privacy Preserving Univ...
 
Blockchain in Identity Management - An Overview.pdf
Blockchain in Identity Management - An Overview.pdfBlockchain in Identity Management - An Overview.pdf
Blockchain in Identity Management - An Overview.pdf
 
Advanced mechanism for single sign on for distributed computer networks
Advanced mechanism for single sign on for distributed computer networksAdvanced mechanism for single sign on for distributed computer networks
Advanced mechanism for single sign on for distributed computer networks
 
IRJET-An Economical and Secured Approach for Continuous and Transparent User ...
IRJET-An Economical and Secured Approach for Continuous and Transparent User ...IRJET-An Economical and Secured Approach for Continuous and Transparent User ...
IRJET-An Economical and Secured Approach for Continuous and Transparent User ...
 
Product Case Competition.pdf
Product Case Competition.pdfProduct Case Competition.pdf
Product Case Competition.pdf
 
A Simplified Guide to the Evolution of Authentication!
A Simplified Guide to the Evolution of Authentication!A Simplified Guide to the Evolution of Authentication!
A Simplified Guide to the Evolution of Authentication!
 
main project doument
main project doumentmain project doument
main project doument
 
Audit Controls Paper
Audit Controls PaperAudit Controls Paper
Audit Controls Paper
 
blockchain ppt for research puropse in the university
blockchain ppt for research puropse in the universityblockchain ppt for research puropse in the university
blockchain ppt for research puropse in the university
 
Complete document
Complete documentComplete document
Complete document
 
5 ways on how will blockchain impact healthcare
5 ways on how will blockchain impact healthcare5 ways on how will blockchain impact healthcare
5 ways on how will blockchain impact healthcare
 
Blockchains Impact on Identity Management.pdf
Blockchains Impact on Identity Management.pdfBlockchains Impact on Identity Management.pdf
Blockchains Impact on Identity Management.pdf
 
How Does Blockchain Identity Management Revolutionise Financial Sectors.pdf
How Does Blockchain Identity Management Revolutionise Financial Sectors.pdfHow Does Blockchain Identity Management Revolutionise Financial Sectors.pdf
How Does Blockchain Identity Management Revolutionise Financial Sectors.pdf
 
Identity and access management
Identity and access managementIdentity and access management
Identity and access management
 
Identity Managment
Identity ManagmentIdentity Managment
Identity Managment
 

More from madhukarreddy007

More from madhukarreddy007 (8)

System configuration
System configurationSystem configuration
System configuration
 
Software requirement
Software requirementSoftware requirement
Software requirement
 
Screen short
Screen shortScreen short
Screen short
 
Proposed system
Proposed systemProposed system
Proposed system
 
Organization profile
Organization profileOrganization profile
Organization profile
 
Input and output design
Input and output designInput and output design
Input and output design
 
Implementation modules
Implementation modulesImplementation modules
Implementation modules
 
Abstract
AbstractAbstract
Abstract
 

Existing system

  • 1. Existing system: Users, who store their sensitive information like financial information, health records, etc., have a fundamental right of privacy. There are few cryptographic tools and schemes like anonymous authentication schemes, group signatures, zero knowledge protocols that can both hide user identity and provide authentication. The providers of cloud services need to control the authentication process to permit the access of only valid clients to their services. Disadvantages of Existing system: Further, they must be able to revoke malicious clients and reveal their identities. In practice, hundreds of users can access cloud services at the same time. Hence, the verification process of user access must be as efficient as possible and the computational cryptographic overhead must be minimal. These solutions and provide privacy-preserving public audit but do not offer the anonymous access of users to cloud services.