SlideShare a Scribd company logo
1 of 8
Abstract:
Cloud storage services have become increasingly popular in cloud
computing environment. Because of the importance of privacy on data which are
handled by the cloud data owners, consider a many cloud storage encryption
schemes have been proposed to protect data from those who do not have access.
All such schemes assumed that cloud storage providers are safe and cannot be
hacked; however, in practice, some authorities may force cloud storage providers
to reveal user secrets or confidential data on the cloud, thus altogether
circumventing storage encryption schemes. According to the cloud data privacy
our proposed system to implement the new cloud storage encryption scheme that
enables cloud storage providers to create convincing fake user secrets to protect
user privacy using deniable Cipher text Policy Attribute Based Encryption. Since
coercers cannot tell if obtained secrets are true or not, the cloud storage providers
ensure that user privacy is still securely protected from third party access.
Introduction:
Cloud storage is a model of data storage where the digital data is stored in
logical pools, the physical storage spans multiple servers (and often locations), and
the physical environment is typically owned and managed by
a hosting organization. These cloud storage providers are responsible for keeping
the data available and accessible, and the physical environment protected and
running. People and organizations buy or lease storage capacity from the providers
to store user, organization, or application data.
Cloud storage services may be accessed through a co-located cloud
computer service, a web service application programming interface (API) or by
applications that utilize the API, such as cloud desktop storage, a gateway or Web-
based content management systems.
In the cloud storage environment Users can store their data on the cloud and
access their data anywhere at any time. Because of user privacy, the data stored on
the cloud is typically encrypted and protected from access by other users.
Considering the collaborative property of the cloud data, attribute-based encryption
(ABE) is regarded as one of the most suitable encryption schemes for cloud
storage.
Most of the Encryption schemes assume cloud storage service providers or
trusted third parties handling key management are trusted and cannot be hacked.
Entities of the cloud environment may intercept communications between
users and cloud storage providers and then compel storage providers to release user
secrets by using government power or other means. In this case, encrypted data are
assumed to be known and storage providers are requested to release user secrets.
Our proposed implementation scheme with Cipher Text Policy Attribute
Based encryption offers a cloud storage provider which means to create fake user
secrets. Given such fake user secrets, outside coercers can only obtained forged
data from a user’s stored cipher text.
The coercers think the received secrets are real, they will be satisfied and
more importantly cloud storage providers will not have revealed any real secrets.
Therefore, user privacy is still protected in cloud computing environment.
Existing System:
Sahai and Waters first introduced the concept of ABE in which data owners
can embed how they want to share data in terms of encryption. That is, only those
who match the owner’s conditions can successfully decrypt stored data. We note
here that ABE is encryption for privileges, not for users. This makes ABE a very
useful tool for cloud storage services since data sharing is an important feature for
such services.
Cloud storage users are impractical for data owners to encrypt their data by
pair wise keys. Moreover, it is also impractical to encrypt data many times for
many people. With ABE, data owners decide only which kind of users can access
their encrypted data. Users who satisfy the conditions are able to decrypt the
encrypted data.
The concept of deniable encryption is nothing but it also like normal
encryption schemes, deniable encryption can be divided into a deniable shared key
scheme and a public key scheme. Considering the cloud storage scenario, we focus
our efforts on the deniable public key encryption scheme.
The simulatable public key system provides an oblivious key generation function
and an oblivious cipher text function. When sending an encrypted bit, the sender
will send a set of encrypted data which may be normally encrypted or oblivious.
Therefore, the sender can claim some sent messages are oblivious while
actually they are not. The idea can be applied to the receiver side such that the
scheme is a bi-deniable scheme.
Disadvantages:
 Impossible to encrypt unbounded messages, using one short key in non
committing schemes.
 The non interactive and fully receiver deniable schemes cannot be achieved
simultaneously.
 Data redundancy is Occurat each block of data.
 Decrypted data with missing of contents at such blocks.
 Encryption parameters should be totally different for each encryption
operation. So each coercion will reduce flexibility.
 Computational overhead.
ProposedSystem:
The implementation of a deniable CP-ABE scheme that can make cloud
storage services secure and audit free. In this scenario, cloud storage service
providers are just regarded as receivers in other deniable schemes. Unlike most
previous deniable encryption schemes, we do not use translucent sets or
simulatable public key systems to implement deniability.
Deniable Cipher Text Policy Attribute Based Encryption scheme build with
two encryption environments at the same time, much like the idea proposed in. our
scheme with multiple dimensions while claiming there is only one dimension. This
approach removes obvious redundant parts. an existing ABE scheme by replacing
prime order groups with Composite order groups. Since the base ABE scheme can
encrypt one block each time, our deniable CPABE is certainly a block wise
deniable encryption scheme.
The bilinear operation for the Composite order group is slower than the
prime order group, there are some techniques that can convert an encryption
scheme from Composite order groups to prime order groups for better
computational performance.
Deniable Cipher Text Policy Attribute Based Encryption provides a consistent
environment for our deniable encryption scheme.
Consistent environment which means that one encryption environment can
be used for multiple encryption times without system updates. The opened receiver
proof should look convincing for all cipher texts under this environment3,
regardless of whether a cipher text is normally encrypted or deniably encrypted.
The deniability of our scheme comes from the secret of the subgroup assignment,
which is determined only once in the system setup phase. By the canceling
property and the proper subgroup assignment, we can construct the released fake
key to decrypt normal cipher texts correctly
Deniable Cipher Text Policy Attribute Based Encryption Extends a pairing
ABE, which has a deterministic decryption algorithm, from the prime order group
to the Composite order group. The decryption algorithm in our scheme is still
deterministic; therefore, there is no decryption errors using our scheme.
Advantages:
 There is no data redundancy.
 Deniable Cipher Text Policy Attribute Based Encryption builds at consistent
environment.
 The decryption algorithm in our scheme is still deterministic; therefore, there
is no error in decryption level.
 High Computational performance achieved.
 There is no security violence.
Conclusion:
A deniable CP-ABE scheme is an audit-free cloud storage service. The
deniability feature makes coercion invalid, and the Attribute Based Encryption
property ensures secure cloud data sharing with a fine-grained access control
mechanism. Our proposed scheme provides a possible way to fight against
immoral interference with the right of privacy. Also our schemes can be created to
protect cloud user privacy with high computational performance.

More Related Content

What's hot

International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)inventionjournals
 
15.secure keyword search and data sharing mechanism for cloud computing
15.secure keyword search and data sharing mechanism for cloud computing15.secure keyword search and data sharing mechanism for cloud computing
15.secure keyword search and data sharing mechanism for cloud computingVenkat Projects
 
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Key aggregate searchable encryption (kase) for group data sharing via cloud s...Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Key aggregate searchable encryption (kase) for group data sharing via cloud s...CloudTechnologies
 
KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUD
KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUDKEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUD
KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUDNaseem nisar
 
A Novel Approach for Data Security in Cloud Environment
A Novel Approach for Data Security in  Cloud EnvironmentA Novel Approach for Data Security in  Cloud Environment
A Novel Approach for Data Security in Cloud EnvironmentSHREYASSRINATH94
 
Ieeepro techno solutions 2014 ieee java project -key-aggregate cryptosystem...
Ieeepro techno solutions   2014 ieee java project -key-aggregate cryptosystem...Ieeepro techno solutions   2014 ieee java project -key-aggregate cryptosystem...
Ieeepro techno solutions 2014 ieee java project -key-aggregate cryptosystem...hemanthbbc
 
Ieeepro techno solutions 2014 ieee java project - query services in cost ef...
Ieeepro techno solutions   2014 ieee java project - query services in cost ef...Ieeepro techno solutions   2014 ieee java project - query services in cost ef...
Ieeepro techno solutions 2014 ieee java project - query services in cost ef...hemanthbbc
 
IRJET- Privacy Preserving Encrypted Keyword Search Schemes
IRJET-  	  Privacy Preserving Encrypted Keyword Search SchemesIRJET-  	  Privacy Preserving Encrypted Keyword Search Schemes
IRJET- Privacy Preserving Encrypted Keyword Search SchemesIRJET Journal
 
An efficient certificate less encryption for
An efficient certificate less encryption forAn efficient certificate less encryption for
An efficient certificate less encryption forShakas Technologies
 
KEY-AGGREGATE SEARCHABLE ENCRYPTION (KASE) FOR GROUP DATA SHARING VIA CLOUD ...
 KEY-AGGREGATE SEARCHABLE ENCRYPTION (KASE) FOR GROUP DATA SHARING VIA CLOUD ... KEY-AGGREGATE SEARCHABLE ENCRYPTION (KASE) FOR GROUP DATA SHARING VIA CLOUD ...
KEY-AGGREGATE SEARCHABLE ENCRYPTION (KASE) FOR GROUP DATA SHARING VIA CLOUD ...Nexgen Technology
 
Attribute based encryption with privacy preserving in clouds
Attribute based encryption with privacy preserving in cloudsAttribute based encryption with privacy preserving in clouds
Attribute based encryption with privacy preserving in cloudsSwathi Rampur
 
Key aggregate cryptosystem for scalable data sharing in cloud storage
Key aggregate cryptosystem for scalable data sharing in cloud storage Key aggregate cryptosystem for scalable data sharing in cloud storage
Key aggregate cryptosystem for scalable data sharing in cloud storage Adz91 Digital Ads Pvt Ltd
 
An efficient certificateless encryption for data sharing on public cloud
An efficient certificateless encryption for data sharing on public cloudAn efficient certificateless encryption for data sharing on public cloud
An efficient certificateless encryption for data sharing on public cloudAbhijeet Patil
 
Paper id 312201534
Paper id 312201534Paper id 312201534
Paper id 312201534IJRAT
 
Attribute based encryption with verifiable outsourced decryption
Attribute based encryption with verifiable outsourced decryptionAttribute based encryption with verifiable outsourced decryption
Attribute based encryption with verifiable outsourced decryptionIEEEFINALYEARPROJECTS
 
Key aggregate cryptosystem for scalable data sharing in cloud storage
Key aggregate cryptosystem for scalable data sharing in cloud storageKey aggregate cryptosystem for scalable data sharing in cloud storage
Key aggregate cryptosystem for scalable data sharing in cloud storageShruthi Iyer
 
Attribute-Based Data Sharing
Attribute-Based Data SharingAttribute-Based Data Sharing
Attribute-Based Data SharingIJERA Editor
 

What's hot (20)

International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
 
15.secure keyword search and data sharing mechanism for cloud computing
15.secure keyword search and data sharing mechanism for cloud computing15.secure keyword search and data sharing mechanism for cloud computing
15.secure keyword search and data sharing mechanism for cloud computing
 
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Key aggregate searchable encryption (kase) for group data sharing via cloud s...Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
 
KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUD
KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUDKEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUD
KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUD
 
A Novel Approach for Data Security in Cloud Environment
A Novel Approach for Data Security in  Cloud EnvironmentA Novel Approach for Data Security in  Cloud Environment
A Novel Approach for Data Security in Cloud Environment
 
B381521
B381521B381521
B381521
 
552 556
552 556552 556
552 556
 
Ieeepro techno solutions 2014 ieee java project -key-aggregate cryptosystem...
Ieeepro techno solutions   2014 ieee java project -key-aggregate cryptosystem...Ieeepro techno solutions   2014 ieee java project -key-aggregate cryptosystem...
Ieeepro techno solutions 2014 ieee java project -key-aggregate cryptosystem...
 
Ieeepro techno solutions 2014 ieee java project - query services in cost ef...
Ieeepro techno solutions   2014 ieee java project - query services in cost ef...Ieeepro techno solutions   2014 ieee java project - query services in cost ef...
Ieeepro techno solutions 2014 ieee java project - query services in cost ef...
 
IRJET- Privacy Preserving Encrypted Keyword Search Schemes
IRJET-  	  Privacy Preserving Encrypted Keyword Search SchemesIRJET-  	  Privacy Preserving Encrypted Keyword Search Schemes
IRJET- Privacy Preserving Encrypted Keyword Search Schemes
 
An efficient certificate less encryption for
An efficient certificate less encryption forAn efficient certificate less encryption for
An efficient certificate less encryption for
 
KEY-AGGREGATE SEARCHABLE ENCRYPTION (KASE) FOR GROUP DATA SHARING VIA CLOUD ...
 KEY-AGGREGATE SEARCHABLE ENCRYPTION (KASE) FOR GROUP DATA SHARING VIA CLOUD ... KEY-AGGREGATE SEARCHABLE ENCRYPTION (KASE) FOR GROUP DATA SHARING VIA CLOUD ...
KEY-AGGREGATE SEARCHABLE ENCRYPTION (KASE) FOR GROUP DATA SHARING VIA CLOUD ...
 
Attribute based encryption with privacy preserving in clouds
Attribute based encryption with privacy preserving in cloudsAttribute based encryption with privacy preserving in clouds
Attribute based encryption with privacy preserving in clouds
 
Key aggregate cryptosystem for scalable data sharing in cloud storage
Key aggregate cryptosystem for scalable data sharing in cloud storage Key aggregate cryptosystem for scalable data sharing in cloud storage
Key aggregate cryptosystem for scalable data sharing in cloud storage
 
An efficient certificateless encryption for data sharing on public cloud
An efficient certificateless encryption for data sharing on public cloudAn efficient certificateless encryption for data sharing on public cloud
An efficient certificateless encryption for data sharing on public cloud
 
Paper id 312201534
Paper id 312201534Paper id 312201534
Paper id 312201534
 
Attribute based encryption with verifiable outsourced decryption
Attribute based encryption with verifiable outsourced decryptionAttribute based encryption with verifiable outsourced decryption
Attribute based encryption with verifiable outsourced decryption
 
Key aggregate cryptosystem for scalable data sharing in cloud storage
Key aggregate cryptosystem for scalable data sharing in cloud storageKey aggregate cryptosystem for scalable data sharing in cloud storage
Key aggregate cryptosystem for scalable data sharing in cloud storage
 
Attribute-Based Data Sharing
Attribute-Based Data SharingAttribute-Based Data Sharing
Attribute-Based Data Sharing
 
Ijcatr04051002
Ijcatr04051002Ijcatr04051002
Ijcatr04051002
 

Viewers also liked

Geometric range search on encrypted spatial data
Geometric range search on encrypted spatial dataGeometric range search on encrypted spatial data
Geometric range search on encrypted spatial dataShakas Technologies
 
Fast nearest neighbor search with keywords
Fast nearest neighbor search with keywordsFast nearest neighbor search with keywords
Fast nearest neighbor search with keywordsIEEEFINALYEARPROJECTS
 
Providing user security guarantees in public infrastructure clouds
Providing user security guarantees in public infrastructure cloudsProviding user security guarantees in public infrastructure clouds
Providing user security guarantees in public infrastructure cloudsShakas Technologies
 
cloud computing- service operator aware trust scheme
cloud computing- service operator aware trust schemecloud computing- service operator aware trust scheme
cloud computing- service operator aware trust schemejisa joy
 
Geometric range search on encrypted spatial data
Geometric range search on encrypted spatial dataGeometric range search on encrypted spatial data
Geometric range search on encrypted spatial dataieeepondy
 
Emotion based music player
Emotion based music playerEmotion based music player
Emotion based music playerNizam Muhammed
 
A secure-anti-collusion-data-sharing-scheme-for-dynamic-groups-in-the-cloud
A secure-anti-collusion-data-sharing-scheme-for-dynamic-groups-in-the-cloudA secure-anti-collusion-data-sharing-scheme-for-dynamic-groups-in-the-cloud
A secure-anti-collusion-data-sharing-scheme-for-dynamic-groups-in-the-cloudPvrtechnologies Nellore
 
Ip traceback seminar full report
Ip traceback seminar full reportIp traceback seminar full report
Ip traceback seminar full reportdeepakmarndi
 
Progressive duplicate detection
Progressive duplicate detectionProgressive duplicate detection
Progressive duplicate detectionieeepondy
 
Emotion based music player
Emotion based music playerEmotion based music player
Emotion based music playerNizam Muhammed
 
Data Flow Diagram and USe Case Diagram
Data Flow Diagram and USe Case DiagramData Flow Diagram and USe Case Diagram
Data Flow Diagram and USe Case DiagramKumar
 
Blood donor managment system
Blood donor managment systemBlood donor managment system
Blood donor managment systemAfsarah Jahin
 

Viewers also liked (15)

Geometric range search on encrypted spatial data
Geometric range search on encrypted spatial dataGeometric range search on encrypted spatial data
Geometric range search on encrypted spatial data
 
Fast nearest neighbor search with keywords
Fast nearest neighbor search with keywordsFast nearest neighbor search with keywords
Fast nearest neighbor search with keywords
 
Providing user security guarantees in public infrastructure clouds
Providing user security guarantees in public infrastructure cloudsProviding user security guarantees in public infrastructure clouds
Providing user security guarantees in public infrastructure clouds
 
cloud computing- service operator aware trust scheme
cloud computing- service operator aware trust schemecloud computing- service operator aware trust scheme
cloud computing- service operator aware trust scheme
 
Geometric range search on encrypted spatial data
Geometric range search on encrypted spatial dataGeometric range search on encrypted spatial data
Geometric range search on encrypted spatial data
 
Emotion based music player
Emotion based music playerEmotion based music player
Emotion based music player
 
A secure-anti-collusion-data-sharing-scheme-for-dynamic-groups-in-the-cloud
A secure-anti-collusion-data-sharing-scheme-for-dynamic-groups-in-the-cloudA secure-anti-collusion-data-sharing-scheme-for-dynamic-groups-in-the-cloud
A secure-anti-collusion-data-sharing-scheme-for-dynamic-groups-in-the-cloud
 
Ip traceback seminar full report
Ip traceback seminar full reportIp traceback seminar full report
Ip traceback seminar full report
 
Progressive duplicate detection
Progressive duplicate detectionProgressive duplicate detection
Progressive duplicate detection
 
Emotion based music player
Emotion based music playerEmotion based music player
Emotion based music player
 
Ieee 2015 2016
Ieee 2015 2016Ieee 2015 2016
Ieee 2015 2016
 
Data Flow Diagram and USe Case Diagram
Data Flow Diagram and USe Case DiagramData Flow Diagram and USe Case Diagram
Data Flow Diagram and USe Case Diagram
 
Blood donor managment system
Blood donor managment systemBlood donor managment system
Blood donor managment system
 
Courier services
Courier servicesCourier services
Courier services
 
Slideshare ppt
Slideshare pptSlideshare ppt
Slideshare ppt
 

Similar to Audit free cloud storage via deniable attribute based encryption

A secure erasure code based cloud storage system with secure data forwarding
A secure erasure code based cloud storage system with secure data forwardingA secure erasure code based cloud storage system with secure data forwarding
A secure erasure code based cloud storage system with secure data forwardingJPINFOTECH JAYAPRAKASH
 
SECURE CLOUD STORAGE USING DENIABLE ATTRIBUTE BASED ENCRYPTION
SECURE CLOUD STORAGE USING DENIABLE ATTRIBUTE BASED ENCRYPTIONSECURE CLOUD STORAGE USING DENIABLE ATTRIBUTE BASED ENCRYPTION
SECURE CLOUD STORAGE USING DENIABLE ATTRIBUTE BASED ENCRYPTIONadeij1
 
Attribute based data sharing scheme revisited in cloud computing
Attribute based data sharing scheme revisited in cloud computingAttribute based data sharing scheme revisited in cloud computing
Attribute based data sharing scheme revisited in cloud computingieeepondy
 
A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...
A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...
A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...cscpconf
 
Audit free cloud storage via deniable attribute-based encryption
Audit free cloud storage via deniable attribute-based encryptionAudit free cloud storage via deniable attribute-based encryption
Audit free cloud storage via deniable attribute-based encryptionShakas Technologies
 
Audit free cloud storage via deniable attribute-based encryption
Audit free cloud storage via deniable attribute-based encryptionAudit free cloud storage via deniable attribute-based encryption
Audit free cloud storage via deniable attribute-based encryptionShakas Technologies
 
Audit free cloud storage via deniable attribute-based encryption
Audit free cloud storage via deniable attribute-based encryptionAudit free cloud storage via deniable attribute-based encryption
Audit free cloud storage via deniable attribute-based encryptionShakas Technologies
 
Mona secure multi owner data sharing for dynamic groups in the cloud
Mona secure multi owner data sharing for dynamic groups in the cloudMona secure multi owner data sharing for dynamic groups in the cloud
Mona secure multi owner data sharing for dynamic groups in the cloudJPINFOTECH JAYAPRAKASH
 
Providing user security guarantees in public infrastructure clouds
Providing user security guarantees in public infrastructure cloudsProviding user security guarantees in public infrastructure clouds
Providing user security guarantees in public infrastructure cloudsKamal Spring
 
A secure erasure code based cloud storage
A secure erasure code based cloud storageA secure erasure code based cloud storage
A secure erasure code based cloud storageIMPULSE_TECHNOLOGY
 
A robust and verifiable threshold multi authority access control system in pu...
A robust and verifiable threshold multi authority access control system in pu...A robust and verifiable threshold multi authority access control system in pu...
A robust and verifiable threshold multi authority access control system in pu...IJARIIT
 
efficient io t management with resilience to unauthorized access to cloud sto...
efficient io t management with resilience to unauthorized access to cloud sto...efficient io t management with resilience to unauthorized access to cloud sto...
efficient io t management with resilience to unauthorized access to cloud sto...Venkat Projects
 
Attribute-Based Encryption for Cloud Security
Attribute-Based Encryption for Cloud SecurityAttribute-Based Encryption for Cloud Security
Attribute-Based Encryption for Cloud SecurityMphasis
 
2014 IEEE DOTNET CLOUD COMPUTING PROJECT Fuzzy keyword search over
2014 IEEE DOTNET CLOUD COMPUTING PROJECT Fuzzy keyword search over2014 IEEE DOTNET CLOUD COMPUTING PROJECT Fuzzy keyword search over
2014 IEEE DOTNET CLOUD COMPUTING PROJECT Fuzzy keyword search overIEEEFINALSEMSTUDENTPROJECTS
 
Key aggregate cryptosystem for scalable data sharing in cloud storage
Key aggregate cryptosystem for scalable data sharing in cloud storageKey aggregate cryptosystem for scalable data sharing in cloud storage
Key aggregate cryptosystem for scalable data sharing in cloud storageMugesh Mukkandan
 
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Fuzzy keyword search over
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Fuzzy keyword search overIEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Fuzzy keyword search over
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Fuzzy keyword search overIEEEMEMTECHSTUDENTPROJECTS
 
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...IRJET Journal
 
Bio-Cryptography Based Secured Data Replication Management in Cloud Storage
Bio-Cryptography Based Secured Data Replication Management in Cloud StorageBio-Cryptography Based Secured Data Replication Management in Cloud Storage
Bio-Cryptography Based Secured Data Replication Management in Cloud StorageIJERA Editor
 

Similar to Audit free cloud storage via deniable attribute based encryption (20)

A secure erasure code based cloud storage system with secure data forwarding
A secure erasure code based cloud storage system with secure data forwardingA secure erasure code based cloud storage system with secure data forwarding
A secure erasure code based cloud storage system with secure data forwarding
 
SECURE CLOUD STORAGE USING DENIABLE ATTRIBUTE BASED ENCRYPTION
SECURE CLOUD STORAGE USING DENIABLE ATTRIBUTE BASED ENCRYPTIONSECURE CLOUD STORAGE USING DENIABLE ATTRIBUTE BASED ENCRYPTION
SECURE CLOUD STORAGE USING DENIABLE ATTRIBUTE BASED ENCRYPTION
 
Attribute based data sharing scheme revisited in cloud computing
Attribute based data sharing scheme revisited in cloud computingAttribute based data sharing scheme revisited in cloud computing
Attribute based data sharing scheme revisited in cloud computing
 
A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...
A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...
A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...
 
Audit free cloud storage via deniable attribute-based encryption
Audit free cloud storage via deniable attribute-based encryptionAudit free cloud storage via deniable attribute-based encryption
Audit free cloud storage via deniable attribute-based encryption
 
Audit free cloud storage via deniable attribute-based encryption
Audit free cloud storage via deniable attribute-based encryptionAudit free cloud storage via deniable attribute-based encryption
Audit free cloud storage via deniable attribute-based encryption
 
Audit free cloud storage via deniable attribute-based encryption
Audit free cloud storage via deniable attribute-based encryptionAudit free cloud storage via deniable attribute-based encryption
Audit free cloud storage via deniable attribute-based encryption
 
Mona secure multi owner data sharing for dynamic groups in the cloud
Mona secure multi owner data sharing for dynamic groups in the cloudMona secure multi owner data sharing for dynamic groups in the cloud
Mona secure multi owner data sharing for dynamic groups in the cloud
 
C04932125
C04932125C04932125
C04932125
 
Providing user security guarantees in public infrastructure clouds
Providing user security guarantees in public infrastructure cloudsProviding user security guarantees in public infrastructure clouds
Providing user security guarantees in public infrastructure clouds
 
A secure erasure code based cloud storage
A secure erasure code based cloud storageA secure erasure code based cloud storage
A secure erasure code based cloud storage
 
A robust and verifiable threshold multi authority access control system in pu...
A robust and verifiable threshold multi authority access control system in pu...A robust and verifiable threshold multi authority access control system in pu...
A robust and verifiable threshold multi authority access control system in pu...
 
ITDCC01.ppt
ITDCC01.pptITDCC01.ppt
ITDCC01.ppt
 
efficient io t management with resilience to unauthorized access to cloud sto...
efficient io t management with resilience to unauthorized access to cloud sto...efficient io t management with resilience to unauthorized access to cloud sto...
efficient io t management with resilience to unauthorized access to cloud sto...
 
Attribute-Based Encryption for Cloud Security
Attribute-Based Encryption for Cloud SecurityAttribute-Based Encryption for Cloud Security
Attribute-Based Encryption for Cloud Security
 
2014 IEEE DOTNET CLOUD COMPUTING PROJECT Fuzzy keyword search over
2014 IEEE DOTNET CLOUD COMPUTING PROJECT Fuzzy keyword search over2014 IEEE DOTNET CLOUD COMPUTING PROJECT Fuzzy keyword search over
2014 IEEE DOTNET CLOUD COMPUTING PROJECT Fuzzy keyword search over
 
Key aggregate cryptosystem for scalable data sharing in cloud storage
Key aggregate cryptosystem for scalable data sharing in cloud storageKey aggregate cryptosystem for scalable data sharing in cloud storage
Key aggregate cryptosystem for scalable data sharing in cloud storage
 
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Fuzzy keyword search over
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Fuzzy keyword search overIEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Fuzzy keyword search over
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Fuzzy keyword search over
 
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
 
Bio-Cryptography Based Secured Data Replication Management in Cloud Storage
Bio-Cryptography Based Secured Data Replication Management in Cloud StorageBio-Cryptography Based Secured Data Replication Management in Cloud Storage
Bio-Cryptography Based Secured Data Replication Management in Cloud Storage
 

Recently uploaded

How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - Englishneillewis46
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxEsquimalt MFRC
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptxMaritesTamaniVerdade
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024Elizabeth Walsh
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseAnaAcapella
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfNirmal Dwivedi
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the ClassroomPooky Knightsmith
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin ClassesCeline George
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxVishalSingh1417
 

Recently uploaded (20)

How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 

Audit free cloud storage via deniable attribute based encryption

  • 1. Abstract: Cloud storage services have become increasingly popular in cloud computing environment. Because of the importance of privacy on data which are handled by the cloud data owners, consider a many cloud storage encryption schemes have been proposed to protect data from those who do not have access. All such schemes assumed that cloud storage providers are safe and cannot be hacked; however, in practice, some authorities may force cloud storage providers to reveal user secrets or confidential data on the cloud, thus altogether circumventing storage encryption schemes. According to the cloud data privacy our proposed system to implement the new cloud storage encryption scheme that enables cloud storage providers to create convincing fake user secrets to protect user privacy using deniable Cipher text Policy Attribute Based Encryption. Since coercers cannot tell if obtained secrets are true or not, the cloud storage providers ensure that user privacy is still securely protected from third party access.
  • 2. Introduction: Cloud storage is a model of data storage where the digital data is stored in logical pools, the physical storage spans multiple servers (and often locations), and the physical environment is typically owned and managed by a hosting organization. These cloud storage providers are responsible for keeping the data available and accessible, and the physical environment protected and running. People and organizations buy or lease storage capacity from the providers to store user, organization, or application data. Cloud storage services may be accessed through a co-located cloud computer service, a web service application programming interface (API) or by applications that utilize the API, such as cloud desktop storage, a gateway or Web- based content management systems. In the cloud storage environment Users can store their data on the cloud and access their data anywhere at any time. Because of user privacy, the data stored on the cloud is typically encrypted and protected from access by other users. Considering the collaborative property of the cloud data, attribute-based encryption (ABE) is regarded as one of the most suitable encryption schemes for cloud storage. Most of the Encryption schemes assume cloud storage service providers or trusted third parties handling key management are trusted and cannot be hacked.
  • 3. Entities of the cloud environment may intercept communications between users and cloud storage providers and then compel storage providers to release user secrets by using government power or other means. In this case, encrypted data are assumed to be known and storage providers are requested to release user secrets. Our proposed implementation scheme with Cipher Text Policy Attribute Based encryption offers a cloud storage provider which means to create fake user secrets. Given such fake user secrets, outside coercers can only obtained forged data from a user’s stored cipher text. The coercers think the received secrets are real, they will be satisfied and more importantly cloud storage providers will not have revealed any real secrets. Therefore, user privacy is still protected in cloud computing environment.
  • 4. Existing System: Sahai and Waters first introduced the concept of ABE in which data owners can embed how they want to share data in terms of encryption. That is, only those who match the owner’s conditions can successfully decrypt stored data. We note here that ABE is encryption for privileges, not for users. This makes ABE a very useful tool for cloud storage services since data sharing is an important feature for such services. Cloud storage users are impractical for data owners to encrypt their data by pair wise keys. Moreover, it is also impractical to encrypt data many times for many people. With ABE, data owners decide only which kind of users can access their encrypted data. Users who satisfy the conditions are able to decrypt the encrypted data. The concept of deniable encryption is nothing but it also like normal encryption schemes, deniable encryption can be divided into a deniable shared key scheme and a public key scheme. Considering the cloud storage scenario, we focus our efforts on the deniable public key encryption scheme. The simulatable public key system provides an oblivious key generation function and an oblivious cipher text function. When sending an encrypted bit, the sender will send a set of encrypted data which may be normally encrypted or oblivious.
  • 5. Therefore, the sender can claim some sent messages are oblivious while actually they are not. The idea can be applied to the receiver side such that the scheme is a bi-deniable scheme. Disadvantages:  Impossible to encrypt unbounded messages, using one short key in non committing schemes.  The non interactive and fully receiver deniable schemes cannot be achieved simultaneously.  Data redundancy is Occurat each block of data.  Decrypted data with missing of contents at such blocks.  Encryption parameters should be totally different for each encryption operation. So each coercion will reduce flexibility.  Computational overhead.
  • 6. ProposedSystem: The implementation of a deniable CP-ABE scheme that can make cloud storage services secure and audit free. In this scenario, cloud storage service providers are just regarded as receivers in other deniable schemes. Unlike most previous deniable encryption schemes, we do not use translucent sets or simulatable public key systems to implement deniability. Deniable Cipher Text Policy Attribute Based Encryption scheme build with two encryption environments at the same time, much like the idea proposed in. our scheme with multiple dimensions while claiming there is only one dimension. This approach removes obvious redundant parts. an existing ABE scheme by replacing prime order groups with Composite order groups. Since the base ABE scheme can encrypt one block each time, our deniable CPABE is certainly a block wise deniable encryption scheme. The bilinear operation for the Composite order group is slower than the prime order group, there are some techniques that can convert an encryption scheme from Composite order groups to prime order groups for better computational performance. Deniable Cipher Text Policy Attribute Based Encryption provides a consistent environment for our deniable encryption scheme.
  • 7. Consistent environment which means that one encryption environment can be used for multiple encryption times without system updates. The opened receiver proof should look convincing for all cipher texts under this environment3, regardless of whether a cipher text is normally encrypted or deniably encrypted. The deniability of our scheme comes from the secret of the subgroup assignment, which is determined only once in the system setup phase. By the canceling property and the proper subgroup assignment, we can construct the released fake key to decrypt normal cipher texts correctly Deniable Cipher Text Policy Attribute Based Encryption Extends a pairing ABE, which has a deterministic decryption algorithm, from the prime order group to the Composite order group. The decryption algorithm in our scheme is still deterministic; therefore, there is no decryption errors using our scheme. Advantages:  There is no data redundancy.  Deniable Cipher Text Policy Attribute Based Encryption builds at consistent environment.  The decryption algorithm in our scheme is still deterministic; therefore, there is no error in decryption level.  High Computational performance achieved.  There is no security violence.
  • 8. Conclusion: A deniable CP-ABE scheme is an audit-free cloud storage service. The deniability feature makes coercion invalid, and the Attribute Based Encryption property ensures secure cloud data sharing with a fine-grained access control mechanism. Our proposed scheme provides a possible way to fight against immoral interference with the right of privacy. Also our schemes can be created to protect cloud user privacy with high computational performance.