SlideShare a Scribd company logo
P R E S E N T A T I O N O N
ACHIEVING SECURE, SCALABLE,
AND FINE-GRAINED DATA ACCESS
CONTROL IN CLOUD COMPUTING
P.S.G.V.P.M’s
D.N.Patel C.O.E. Shahada
Department Of Computer & IT
GUIDED BY:
PROF.V.T.PATIL
PRESENTED BY:
GIRASE KIRAN V.
RAJPUT NILESH D.
{COMPUTER SCIENCE}
Contents
INTRODUCTION
LITERATURE SURVEY
ARCHITECTURE
WORKING
MODULE DESCRIPTION
UML DIAGRAMS
ADVANTAGES
DISADVANTAGES
CONCLUSION
REFERENCES
2
DEPARTMENT OF COMPUTER & IT 2014-15
INTRODUCTION
 Cloud computing is a promising computing paradigm which
recently has drawn extensive attention from both academia and
industry. By combining a set of existing and new techniques
from research areas such as Service-Oriented Architectures
(SOA) and virtualization, cloud computing is regarded as such
a computing paradigm in which resources in the computing
infrastructure are provided as services over the Internet.
 The proposed scheme enables the data owner to delegate tasks
of data file re-encryption and user secret key update to cloud
servers without disclosing data contents or user access
privilege information.
3
DEPARTMENT OF COMPUTER & IT
2014-15
DEPARTMENT OF COMPUTER & IT
2014-15
4
 Data security, as it exists in many other applications, is among
these challenges that would raise great concerns from users
when they store sensitive information on cloud servers. These
concerns originate from the fact that cloud servers are usually
operated by commercial providers which are very likely to be
outside of the trusted domain of the users.
 The owner enjoy fine-grained access control of data stored on
cloud servers, a feasible solution would be encrypting data
through certain cryptographic primitive(s), and disclosing
decryption keys only to authorized users.
LITERATURE SURVEY
 This paper addresses this challenging open issue by, on one
hand, defining and enforcing access policies based on data
attributes, and, on the other hand, allowing the data owner to
delegate most of the computation tasks involved in fine-
grained data access control to cloud servers without disclosing
the underlying data contents. We achieve this goal by
exploiting and uniquely combining techniques of attribute-
based encryption (ABE), proxy re-encryption, and lazy re-
encryption. Our proposed scheme also has salient properties of
user access privilege confidentiality and user secret key
accountability. This Paper presents more sensitive data is
shared and stored by third-party sites on the Internet, there will
be a need to encrypt data stored at these sites.
5
DEPARTMENT OF COMPUTER & IT
2014-15
ARCHITECTURE OF CLOUD COMPUTING
DEPARTMENT OF COMPUTER & IT
2014-15
6
WORKING
DEPARTMENT OF COMPUTER & IT
2014-15
7
 we consider a cloud data system consisting of data owners,
data users, Cloud Servers, and a third Party Auditor. A data
owner stores his sensitive data on Cloud Servers.
 Users are issued attributes. To access the remote stored data
files shared by the data owner, users need to download the data
files from the Cloud Servers. For simplicity, we assume that
the only access privilege for users is data file reading.
 Cloud Servers are always online and operated by Cloud
Service Provider (CSP). The Third Party Auditor is also an
always online party which audits every file access event. In
addition, we also assume that the data owner can store data
files besides running his own code on Cloud Servers to
manage his data files.
MODULE DESCRIPTION
DEPARTMENT OF COMPUTER & IT
2014-15
8
 KP-ABE(Key Policy-Attribute Based Encryption):-It is a
public key cryptography primitive for one-to-many
communications. In KP-ABE, data are associated with
attributes for each of which a public key component is
defined. it with the corresponding public key components.
Each user is assigned an access structure which is usually
defined as an access tree over data attributes.
DEPARTMENT OF COMPUTER & IT
2014-15
9
 Setup This algorithm takes as input a security parameter κ and the
attribute universe U = {1, 2, . . .,N} of cardinality N. It defines a
bilinear group G1 of prime order p with a generator g, a bilinear
map e : G1 × G1 → G2 which has the properties of bilinearity,
computability, and non-degeneracy.
It returns the public key PK as well as a system master key MK as
follows:
PK = (Y, T1, T2, . . . , TN)
MK = (y, t1, t2, . . . , tN)
where Ti ∈ G1 and ti ∈ Zp are for attribute i, 1 ≤ i ≤ N, and Y ∈ G2
is another public key component. While PK is publicly known to all
the parties in the system, MK is kept as a secret by the authority
party.
DEPARTMENT OF COMPUTER & IT
2014-15
10
 Encryption:
This algorithm takes a message M, the public key PK, and a set of
attributes I as input. It outputs the cipher text E with the following format:
E = (I, ˜ E, {Ei}i )
where ˜E = MY, Ei = Ti.
 Secret key generation:
This algorithm takes as input an access tree T, the master key MK, and the
public key PK. It outputs a user secret key SK as follows.
SK = {ski}
 Decryption:
This algorithm takes as input the cipher text E encrypted under the attribute
set U, the user’s secret key SK for access tree T, and the public key PK. Finally it
output the message M if and only if U satisfies T.
UML Diagrams 1.USE CASE
DEPARTMENT OF COMPUTER & IT
2014-15
11
2.CLASS DIAGRAM
DEPARTMENT OF COMPUTER & IT
2014-15
12
3.SEQUENCE DIAGRAM
DEPARTMENT OF COMPUTER & IT
2014-15
13
ADVANTAGES
DEPARTMENT OF COMPUTER & IT
2014-15
14
 Low initial capital investment
 Shorter start-up time for new services
 Lower maintenance and operation costs
 Higher utilization through virtualization
 Easier disaster recovery
DISADVANTAGES
DEPARTMENT OF COMPUTER & IT
2014-15
15
• Software update could change security settings,
assigning privileges too low
• Security concerns
 Control of your data/system by third-party
Conclusion
DEPARTMENT OF COMPUTER & IT
2014-15
16
 This paper constructs an ABE based cryptography scheme for
implementing fine-grained access control for cloud computing.
The constructed scheme enables user accoutability, which can be
used to prevent illegal key usages.
 we identify the need for fine-grained access control in cloud
computing.
 we achieve user accountability by inserting user specific
information into users’ attribute private keys.
 we perform a comprehensive security analysis with respect to
data confidentiality and finegrained access control.
DEPARTMENT OF COMPUTER & IT
2014-15
17
REFERENCES
DEPARTMENT OF COMPUTER & IT
2014-15
18
 M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. H. Katz, A.
Konwinski,G. Lee, D. A. Patterson, A. Rabkin, I. Stoica, and M.
Zaharia, “Above the clouds: A berkeley view of cloud
computing,” University of California, Berkeley, Tech. Rep. USB-
EECS-2009-28, Feb 2009.
 Q. Wang, C. Wang, J. Li, K. Ren, and W. Lou, “Enabling public
verifiability and data dynamics for storage security in cloud
computing,” in Proc. of ESORICS ’09, 2009.
 L. Youseff, M. Butrico, and D. D. Silva, “Toward a unified
ontology of cloud computing,” in Proc. of GCE’08, 2008.
Any Questions ?
DEPARTMENT OF COMPUTER & IT
2014-15
19

More Related Content

What's hot

Towards secure and dependable storage service in cloud
Towards secure and dependable storage service in cloudTowards secure and dependable storage service in cloud
Towards secure and dependable storage service in cloudsibidlegend
 
secure data transfer and deletion from counting bloom filter in cloud computing.
secure data transfer and deletion from counting bloom filter in cloud computing.secure data transfer and deletion from counting bloom filter in cloud computing.
secure data transfer and deletion from counting bloom filter in cloud computing.
Venkat Projects
 
Harnessing the cloud for securely outsourcing large scale systems of linear e...
Harnessing the cloud for securely outsourcing large scale systems of linear e...Harnessing the cloud for securely outsourcing large scale systems of linear e...
Harnessing the cloud for securely outsourcing large scale systems of linear e...
JPINFOTECH JAYAPRAKASH
 
Providing user security guarantees in public infrastructure clouds
Providing user security guarantees in public infrastructure cloudsProviding user security guarantees in public infrastructure clouds
Providing user security guarantees in public infrastructure clouds
Kamal Spring
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
ijceronline
 
Privacy preserving public auditing for regenerating code based cloud storage
Privacy preserving public auditing for regenerating code based cloud storagePrivacy preserving public auditing for regenerating code based cloud storage
Privacy preserving public auditing for regenerating code based cloud storage
kitechsolutions
 
Investigation on Revocable Fine-grained Access Control Scheme for Multi-Autho...
Investigation on Revocable Fine-grained Access Control Scheme for Multi-Autho...Investigation on Revocable Fine-grained Access Control Scheme for Multi-Autho...
Investigation on Revocable Fine-grained Access Control Scheme for Multi-Autho...
IJCERT JOURNAL
 
IRJET- Secure Data Deduplication and Auditing for Cloud Data Storage
IRJET-  	  Secure Data Deduplication and Auditing for Cloud Data StorageIRJET-  	  Secure Data Deduplication and Auditing for Cloud Data Storage
IRJET- Secure Data Deduplication and Auditing for Cloud Data Storage
IRJET Journal
 
Privacy preserving public auditing for regenerating-code-based cloud storage
Privacy preserving public auditing for regenerating-code-based cloud storagePrivacy preserving public auditing for regenerating-code-based cloud storage
Privacy preserving public auditing for regenerating-code-based cloud storage
Nagamalleswararao Tadikonda
 
PUBLIC AUDITING FOR SECURE CLOUD STORAGE ...
PUBLIC AUDITING 	             FOR SECURE CLOUD STORAGE                       ...PUBLIC AUDITING 	             FOR SECURE CLOUD STORAGE                       ...
PUBLIC AUDITING FOR SECURE CLOUD STORAGE ...
Bharath Nair
 
Secure Redundant Data Avoidance over Multi-Cloud Architecture.
Secure Redundant Data Avoidance over Multi-Cloud Architecture. Secure Redundant Data Avoidance over Multi-Cloud Architecture.
Secure Redundant Data Avoidance over Multi-Cloud Architecture.
IJCERT JOURNAL
 
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Key aggregate searchable encryption (kase) for group data sharing via cloud s...Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Pvrtechnologies Nellore
 
Privacy preserving public auditing for regenerating-code-based cloud storage
Privacy preserving public auditing for regenerating-code-based cloud storagePrivacy preserving public auditing for regenerating-code-based cloud storage
Privacy preserving public auditing for regenerating-code-based cloud storage
parry prabhu
 
Privacy preserving public auditing for regenerating-code-based cloud storage
Privacy preserving public auditing for regenerating-code-based cloud storagePrivacy preserving public auditing for regenerating-code-based cloud storage
Privacy preserving public auditing for regenerating-code-based cloud storage
LeMeniz Infotech
 
Cloud Computing Environment using Secured Access Control Technique
Cloud Computing Environment using Secured Access Control TechniqueCloud Computing Environment using Secured Access Control Technique
Cloud Computing Environment using Secured Access Control Technique
IRJET Journal
 
Improved Secure Cloud Transmission Protocol
Improved Secure Cloud Transmission ProtocolImproved Secure Cloud Transmission Protocol
Improved Secure Cloud Transmission Protocol
neirew J
 

What's hot (17)

Towards secure and dependable storage service in cloud
Towards secure and dependable storage service in cloudTowards secure and dependable storage service in cloud
Towards secure and dependable storage service in cloud
 
secure data transfer and deletion from counting bloom filter in cloud computing.
secure data transfer and deletion from counting bloom filter in cloud computing.secure data transfer and deletion from counting bloom filter in cloud computing.
secure data transfer and deletion from counting bloom filter in cloud computing.
 
Harnessing the cloud for securely outsourcing large scale systems of linear e...
Harnessing the cloud for securely outsourcing large scale systems of linear e...Harnessing the cloud for securely outsourcing large scale systems of linear e...
Harnessing the cloud for securely outsourcing large scale systems of linear e...
 
Providing user security guarantees in public infrastructure clouds
Providing user security guarantees in public infrastructure cloudsProviding user security guarantees in public infrastructure clouds
Providing user security guarantees in public infrastructure clouds
 
50620130101004
5062013010100450620130101004
50620130101004
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Privacy preserving public auditing for regenerating code based cloud storage
Privacy preserving public auditing for regenerating code based cloud storagePrivacy preserving public auditing for regenerating code based cloud storage
Privacy preserving public auditing for regenerating code based cloud storage
 
Investigation on Revocable Fine-grained Access Control Scheme for Multi-Autho...
Investigation on Revocable Fine-grained Access Control Scheme for Multi-Autho...Investigation on Revocable Fine-grained Access Control Scheme for Multi-Autho...
Investigation on Revocable Fine-grained Access Control Scheme for Multi-Autho...
 
IRJET- Secure Data Deduplication and Auditing for Cloud Data Storage
IRJET-  	  Secure Data Deduplication and Auditing for Cloud Data StorageIRJET-  	  Secure Data Deduplication and Auditing for Cloud Data Storage
IRJET- Secure Data Deduplication and Auditing for Cloud Data Storage
 
Privacy preserving public auditing for regenerating-code-based cloud storage
Privacy preserving public auditing for regenerating-code-based cloud storagePrivacy preserving public auditing for regenerating-code-based cloud storage
Privacy preserving public auditing for regenerating-code-based cloud storage
 
PUBLIC AUDITING FOR SECURE CLOUD STORAGE ...
PUBLIC AUDITING 	             FOR SECURE CLOUD STORAGE                       ...PUBLIC AUDITING 	             FOR SECURE CLOUD STORAGE                       ...
PUBLIC AUDITING FOR SECURE CLOUD STORAGE ...
 
Secure Redundant Data Avoidance over Multi-Cloud Architecture.
Secure Redundant Data Avoidance over Multi-Cloud Architecture. Secure Redundant Data Avoidance over Multi-Cloud Architecture.
Secure Redundant Data Avoidance over Multi-Cloud Architecture.
 
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Key aggregate searchable encryption (kase) for group data sharing via cloud s...Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
 
Privacy preserving public auditing for regenerating-code-based cloud storage
Privacy preserving public auditing for regenerating-code-based cloud storagePrivacy preserving public auditing for regenerating-code-based cloud storage
Privacy preserving public auditing for regenerating-code-based cloud storage
 
Privacy preserving public auditing for regenerating-code-based cloud storage
Privacy preserving public auditing for regenerating-code-based cloud storagePrivacy preserving public auditing for regenerating-code-based cloud storage
Privacy preserving public auditing for regenerating-code-based cloud storage
 
Cloud Computing Environment using Secured Access Control Technique
Cloud Computing Environment using Secured Access Control TechniqueCloud Computing Environment using Secured Access Control Technique
Cloud Computing Environment using Secured Access Control Technique
 
Improved Secure Cloud Transmission Protocol
Improved Secure Cloud Transmission ProtocolImproved Secure Cloud Transmission Protocol
Improved Secure Cloud Transmission Protocol
 

Similar to Achieving Secure And Scalable Cloud computing

IRJET- Audit Free Cloud Via Deniable Attribute based Encryption
IRJET- Audit Free Cloud Via Deniable Attribute based EncryptionIRJET- Audit Free Cloud Via Deniable Attribute based Encryption
IRJET- Audit Free Cloud Via Deniable Attribute based Encryption
IRJET Journal
 
A Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud Data
A Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud DataA Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud Data
A Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud Data
IRJET Journal
 
Remote data integrity checking with a third party auditor in public cloud usi...
Remote data integrity checking with a third party auditor in public cloud usi...Remote data integrity checking with a third party auditor in public cloud usi...
Remote data integrity checking with a third party auditor in public cloud usi...
IJSRED
 
Secure cloud storage privacy preserving public auditing for data storage secu...
Secure cloud storage privacy preserving public auditing for data storage secu...Secure cloud storage privacy preserving public auditing for data storage secu...
Secure cloud storage privacy preserving public auditing for data storage secu...
rajender147
 
IRJET- Enhanced Cloud Data Security using Combined Encryption and Steganography
IRJET- Enhanced Cloud Data Security using Combined Encryption and SteganographyIRJET- Enhanced Cloud Data Security using Combined Encryption and Steganography
IRJET- Enhanced Cloud Data Security using Combined Encryption and Steganography
IRJET Journal
 
Ijarcet vol-2-issue-7-2236-2240
Ijarcet vol-2-issue-7-2236-2240Ijarcet vol-2-issue-7-2236-2240
Ijarcet vol-2-issue-7-2236-2240Editor IJARCET
 
IRJET- Anchoring of Cloud Information under Key Presentation
IRJET- Anchoring of Cloud Information under Key PresentationIRJET- Anchoring of Cloud Information under Key Presentation
IRJET- Anchoring of Cloud Information under Key Presentation
IRJET Journal
 
Data Security in Cloud Computing Using Linear Programming
Data Security in Cloud Computing Using Linear ProgrammingData Security in Cloud Computing Using Linear Programming
Data Security in Cloud Computing Using Linear Programming
IOSR Journals
 
SECURITY IN COULD DATA STORAGE USING SOFT COMPUTING TECHNIQUES AND ELGAMAL CR...
SECURITY IN COULD DATA STORAGE USING SOFT COMPUTING TECHNIQUES AND ELGAMAL CR...SECURITY IN COULD DATA STORAGE USING SOFT COMPUTING TECHNIQUES AND ELGAMAL CR...
SECURITY IN COULD DATA STORAGE USING SOFT COMPUTING TECHNIQUES AND ELGAMAL CR...
IRJET Journal
 
Iaetsd storage privacy protection against data
Iaetsd storage privacy protection against dataIaetsd storage privacy protection against data
Iaetsd storage privacy protection against data
Iaetsd Iaetsd
 
Privacy protection domain-user integra tag deduplication in cloud data server
Privacy protection domain-user integra tag deduplication in  cloud data serverPrivacy protection domain-user integra tag deduplication in  cloud data server
Privacy protection domain-user integra tag deduplication in cloud data server
IJECEIAES
 
Ijarcet vol-2-issue-7-2232-2235
Ijarcet vol-2-issue-7-2232-2235Ijarcet vol-2-issue-7-2232-2235
Ijarcet vol-2-issue-7-2232-2235Editor IJARCET
 
Ijarcet vol-2-issue-7-2232-2235
Ijarcet vol-2-issue-7-2232-2235Ijarcet vol-2-issue-7-2232-2235
Ijarcet vol-2-issue-7-2232-2235Editor IJARCET
 
Improving Efficiency of Security in Multi-Cloud
Improving Efficiency of Security in Multi-CloudImproving Efficiency of Security in Multi-Cloud
Improving Efficiency of Security in Multi-Cloud
IJTET Journal
 
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...
eSAT Journals
 
Ijmer 41025357
Ijmer 41025357Ijmer 41025357
Ijmer 41025357IJMER
 
Ijmer 41025357
Ijmer 41025357Ijmer 41025357
Ijmer 41025357IJMER
 
Secure Multi-Owner Group Signature Based Secure M-Health Records in Cloud
Secure Multi-Owner Group Signature Based Secure M-Health  Records in Cloud Secure Multi-Owner Group Signature Based Secure M-Health  Records in Cloud
Secure Multi-Owner Group Signature Based Secure M-Health Records in Cloud
IJMER
 
Ijmer 41025357
Ijmer 41025357Ijmer 41025357
Ijmer 41025357IJMER
 
Lm2519942003
Lm2519942003Lm2519942003
Lm2519942003
IJERA Editor
 

Similar to Achieving Secure And Scalable Cloud computing (20)

IRJET- Audit Free Cloud Via Deniable Attribute based Encryption
IRJET- Audit Free Cloud Via Deniable Attribute based EncryptionIRJET- Audit Free Cloud Via Deniable Attribute based Encryption
IRJET- Audit Free Cloud Via Deniable Attribute based Encryption
 
A Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud Data
A Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud DataA Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud Data
A Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud Data
 
Remote data integrity checking with a third party auditor in public cloud usi...
Remote data integrity checking with a third party auditor in public cloud usi...Remote data integrity checking with a third party auditor in public cloud usi...
Remote data integrity checking with a third party auditor in public cloud usi...
 
Secure cloud storage privacy preserving public auditing for data storage secu...
Secure cloud storage privacy preserving public auditing for data storage secu...Secure cloud storage privacy preserving public auditing for data storage secu...
Secure cloud storage privacy preserving public auditing for data storage secu...
 
IRJET- Enhanced Cloud Data Security using Combined Encryption and Steganography
IRJET- Enhanced Cloud Data Security using Combined Encryption and SteganographyIRJET- Enhanced Cloud Data Security using Combined Encryption and Steganography
IRJET- Enhanced Cloud Data Security using Combined Encryption and Steganography
 
Ijarcet vol-2-issue-7-2236-2240
Ijarcet vol-2-issue-7-2236-2240Ijarcet vol-2-issue-7-2236-2240
Ijarcet vol-2-issue-7-2236-2240
 
IRJET- Anchoring of Cloud Information under Key Presentation
IRJET- Anchoring of Cloud Information under Key PresentationIRJET- Anchoring of Cloud Information under Key Presentation
IRJET- Anchoring of Cloud Information under Key Presentation
 
Data Security in Cloud Computing Using Linear Programming
Data Security in Cloud Computing Using Linear ProgrammingData Security in Cloud Computing Using Linear Programming
Data Security in Cloud Computing Using Linear Programming
 
SECURITY IN COULD DATA STORAGE USING SOFT COMPUTING TECHNIQUES AND ELGAMAL CR...
SECURITY IN COULD DATA STORAGE USING SOFT COMPUTING TECHNIQUES AND ELGAMAL CR...SECURITY IN COULD DATA STORAGE USING SOFT COMPUTING TECHNIQUES AND ELGAMAL CR...
SECURITY IN COULD DATA STORAGE USING SOFT COMPUTING TECHNIQUES AND ELGAMAL CR...
 
Iaetsd storage privacy protection against data
Iaetsd storage privacy protection against dataIaetsd storage privacy protection against data
Iaetsd storage privacy protection against data
 
Privacy protection domain-user integra tag deduplication in cloud data server
Privacy protection domain-user integra tag deduplication in  cloud data serverPrivacy protection domain-user integra tag deduplication in  cloud data server
Privacy protection domain-user integra tag deduplication in cloud data server
 
Ijarcet vol-2-issue-7-2232-2235
Ijarcet vol-2-issue-7-2232-2235Ijarcet vol-2-issue-7-2232-2235
Ijarcet vol-2-issue-7-2232-2235
 
Ijarcet vol-2-issue-7-2232-2235
Ijarcet vol-2-issue-7-2232-2235Ijarcet vol-2-issue-7-2232-2235
Ijarcet vol-2-issue-7-2232-2235
 
Improving Efficiency of Security in Multi-Cloud
Improving Efficiency of Security in Multi-CloudImproving Efficiency of Security in Multi-Cloud
Improving Efficiency of Security in Multi-Cloud
 
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...
 
Ijmer 41025357
Ijmer 41025357Ijmer 41025357
Ijmer 41025357
 
Ijmer 41025357
Ijmer 41025357Ijmer 41025357
Ijmer 41025357
 
Secure Multi-Owner Group Signature Based Secure M-Health Records in Cloud
Secure Multi-Owner Group Signature Based Secure M-Health  Records in Cloud Secure Multi-Owner Group Signature Based Secure M-Health  Records in Cloud
Secure Multi-Owner Group Signature Based Secure M-Health Records in Cloud
 
Ijmer 41025357
Ijmer 41025357Ijmer 41025357
Ijmer 41025357
 
Lm2519942003
Lm2519942003Lm2519942003
Lm2519942003
 

Recently uploaded

Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
Kerry Sado
 
DfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributionsDfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributions
gestioneergodomus
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
TeeVichai
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
SamSarthak3
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
fxintegritypublishin
 
Steel & Timber Design according to British Standard
Steel & Timber Design according to British StandardSteel & Timber Design according to British Standard
Steel & Timber Design according to British Standard
AkolbilaEmmanuel1
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
Kamal Acharya
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
Kamal Acharya
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Dr.Costas Sachpazis
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation & Control
 
PPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testingPPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testing
anoopmanoharan2
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
zwunae
 
Water billing management system project report.pdf
Water billing management system project report.pdfWater billing management system project report.pdf
Water billing management system project report.pdf
Kamal Acharya
 
Forklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella PartsForklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella Parts
Intella Parts
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
bakpo1
 
Fundamentals of Induction Motor Drives.pptx
Fundamentals of Induction Motor Drives.pptxFundamentals of Induction Motor Drives.pptx
Fundamentals of Induction Motor Drives.pptx
manasideore6
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
Aditya Rajan Patra
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
VENKATESHvenky89705
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
Kamal Acharya
 
The Role of Electrical and Electronics Engineers in IOT Technology.pdf
The Role of Electrical and Electronics Engineers in IOT Technology.pdfThe Role of Electrical and Electronics Engineers in IOT Technology.pdf
The Role of Electrical and Electronics Engineers in IOT Technology.pdf
Nettur Technical Training Foundation
 

Recently uploaded (20)

Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
 
DfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributionsDfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributions
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
 
Steel & Timber Design according to British Standard
Steel & Timber Design according to British StandardSteel & Timber Design according to British Standard
Steel & Timber Design according to British Standard
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
 
PPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testingPPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testing
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
 
Water billing management system project report.pdf
Water billing management system project report.pdfWater billing management system project report.pdf
Water billing management system project report.pdf
 
Forklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella PartsForklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella Parts
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
 
Fundamentals of Induction Motor Drives.pptx
Fundamentals of Induction Motor Drives.pptxFundamentals of Induction Motor Drives.pptx
Fundamentals of Induction Motor Drives.pptx
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
 
The Role of Electrical and Electronics Engineers in IOT Technology.pdf
The Role of Electrical and Electronics Engineers in IOT Technology.pdfThe Role of Electrical and Electronics Engineers in IOT Technology.pdf
The Role of Electrical and Electronics Engineers in IOT Technology.pdf
 

Achieving Secure And Scalable Cloud computing

  • 1. P R E S E N T A T I O N O N ACHIEVING SECURE, SCALABLE, AND FINE-GRAINED DATA ACCESS CONTROL IN CLOUD COMPUTING P.S.G.V.P.M’s D.N.Patel C.O.E. Shahada Department Of Computer & IT GUIDED BY: PROF.V.T.PATIL PRESENTED BY: GIRASE KIRAN V. RAJPUT NILESH D. {COMPUTER SCIENCE}
  • 2. Contents INTRODUCTION LITERATURE SURVEY ARCHITECTURE WORKING MODULE DESCRIPTION UML DIAGRAMS ADVANTAGES DISADVANTAGES CONCLUSION REFERENCES 2 DEPARTMENT OF COMPUTER & IT 2014-15
  • 3. INTRODUCTION  Cloud computing is a promising computing paradigm which recently has drawn extensive attention from both academia and industry. By combining a set of existing and new techniques from research areas such as Service-Oriented Architectures (SOA) and virtualization, cloud computing is regarded as such a computing paradigm in which resources in the computing infrastructure are provided as services over the Internet.  The proposed scheme enables the data owner to delegate tasks of data file re-encryption and user secret key update to cloud servers without disclosing data contents or user access privilege information. 3 DEPARTMENT OF COMPUTER & IT 2014-15
  • 4. DEPARTMENT OF COMPUTER & IT 2014-15 4  Data security, as it exists in many other applications, is among these challenges that would raise great concerns from users when they store sensitive information on cloud servers. These concerns originate from the fact that cloud servers are usually operated by commercial providers which are very likely to be outside of the trusted domain of the users.  The owner enjoy fine-grained access control of data stored on cloud servers, a feasible solution would be encrypting data through certain cryptographic primitive(s), and disclosing decryption keys only to authorized users.
  • 5. LITERATURE SURVEY  This paper addresses this challenging open issue by, on one hand, defining and enforcing access policies based on data attributes, and, on the other hand, allowing the data owner to delegate most of the computation tasks involved in fine- grained data access control to cloud servers without disclosing the underlying data contents. We achieve this goal by exploiting and uniquely combining techniques of attribute- based encryption (ABE), proxy re-encryption, and lazy re- encryption. Our proposed scheme also has salient properties of user access privilege confidentiality and user secret key accountability. This Paper presents more sensitive data is shared and stored by third-party sites on the Internet, there will be a need to encrypt data stored at these sites. 5 DEPARTMENT OF COMPUTER & IT 2014-15
  • 6. ARCHITECTURE OF CLOUD COMPUTING DEPARTMENT OF COMPUTER & IT 2014-15 6
  • 7. WORKING DEPARTMENT OF COMPUTER & IT 2014-15 7  we consider a cloud data system consisting of data owners, data users, Cloud Servers, and a third Party Auditor. A data owner stores his sensitive data on Cloud Servers.  Users are issued attributes. To access the remote stored data files shared by the data owner, users need to download the data files from the Cloud Servers. For simplicity, we assume that the only access privilege for users is data file reading.  Cloud Servers are always online and operated by Cloud Service Provider (CSP). The Third Party Auditor is also an always online party which audits every file access event. In addition, we also assume that the data owner can store data files besides running his own code on Cloud Servers to manage his data files.
  • 8. MODULE DESCRIPTION DEPARTMENT OF COMPUTER & IT 2014-15 8  KP-ABE(Key Policy-Attribute Based Encryption):-It is a public key cryptography primitive for one-to-many communications. In KP-ABE, data are associated with attributes for each of which a public key component is defined. it with the corresponding public key components. Each user is assigned an access structure which is usually defined as an access tree over data attributes.
  • 9. DEPARTMENT OF COMPUTER & IT 2014-15 9  Setup This algorithm takes as input a security parameter κ and the attribute universe U = {1, 2, . . .,N} of cardinality N. It defines a bilinear group G1 of prime order p with a generator g, a bilinear map e : G1 × G1 → G2 which has the properties of bilinearity, computability, and non-degeneracy. It returns the public key PK as well as a system master key MK as follows: PK = (Y, T1, T2, . . . , TN) MK = (y, t1, t2, . . . , tN) where Ti ∈ G1 and ti ∈ Zp are for attribute i, 1 ≤ i ≤ N, and Y ∈ G2 is another public key component. While PK is publicly known to all the parties in the system, MK is kept as a secret by the authority party.
  • 10. DEPARTMENT OF COMPUTER & IT 2014-15 10  Encryption: This algorithm takes a message M, the public key PK, and a set of attributes I as input. It outputs the cipher text E with the following format: E = (I, ˜ E, {Ei}i ) where ˜E = MY, Ei = Ti.  Secret key generation: This algorithm takes as input an access tree T, the master key MK, and the public key PK. It outputs a user secret key SK as follows. SK = {ski}  Decryption: This algorithm takes as input the cipher text E encrypted under the attribute set U, the user’s secret key SK for access tree T, and the public key PK. Finally it output the message M if and only if U satisfies T.
  • 11. UML Diagrams 1.USE CASE DEPARTMENT OF COMPUTER & IT 2014-15 11
  • 12. 2.CLASS DIAGRAM DEPARTMENT OF COMPUTER & IT 2014-15 12
  • 13. 3.SEQUENCE DIAGRAM DEPARTMENT OF COMPUTER & IT 2014-15 13
  • 14. ADVANTAGES DEPARTMENT OF COMPUTER & IT 2014-15 14  Low initial capital investment  Shorter start-up time for new services  Lower maintenance and operation costs  Higher utilization through virtualization  Easier disaster recovery
  • 15. DISADVANTAGES DEPARTMENT OF COMPUTER & IT 2014-15 15 • Software update could change security settings, assigning privileges too low • Security concerns  Control of your data/system by third-party
  • 16. Conclusion DEPARTMENT OF COMPUTER & IT 2014-15 16  This paper constructs an ABE based cryptography scheme for implementing fine-grained access control for cloud computing. The constructed scheme enables user accoutability, which can be used to prevent illegal key usages.  we identify the need for fine-grained access control in cloud computing.  we achieve user accountability by inserting user specific information into users’ attribute private keys.  we perform a comprehensive security analysis with respect to data confidentiality and finegrained access control.
  • 17. DEPARTMENT OF COMPUTER & IT 2014-15 17
  • 18. REFERENCES DEPARTMENT OF COMPUTER & IT 2014-15 18  M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. H. Katz, A. Konwinski,G. Lee, D. A. Patterson, A. Rabkin, I. Stoica, and M. Zaharia, “Above the clouds: A berkeley view of cloud computing,” University of California, Berkeley, Tech. Rep. USB- EECS-2009-28, Feb 2009.  Q. Wang, C. Wang, J. Li, K. Ren, and W. Lou, “Enabling public verifiability and data dynamics for storage security in cloud computing,” in Proc. of ESORICS ’09, 2009.  L. Youseff, M. Butrico, and D. D. Silva, “Toward a unified ontology of cloud computing,” in Proc. of GCE’08, 2008.
  • 19. Any Questions ? DEPARTMENT OF COMPUTER & IT 2014-15 19

Editor's Notes

  1. CE