SECURING DATA INGREEN CLOUD COMPUTING
USING ATTRIBUTE BASED ENCRYPTION
Project Report Submitted to
JNT UNIVERSITY, ANANTAPUR
In partial fulfillment of the requirement for
the award of the degree of
MASTER OF COMPUTER APPLICATIONS
Submitted By
MULLA MAHABOOB BASHA
(Reg.No: 23JU1F0053)
(Reg.No: 23JU1F0053)
Under the Guidance of
Ms. B.POOJITHA MCA
MASTER OF COMPUTER APPLICATIONS
PRABHATH INSTITUTE OF COMPUTER SCIENCES
(Affiliated to JNT University, Anantapur)
Parnapalli(V). Nandyal(Mdl), Kurnool(Dt),AP.
2025
2.
Securing Data inGreen Cloud Computing Using Attribute-
Based Encryption: This presentation explores how Attribute-Based
Encryption enhances data security. It focuses on green cloud computing
environments. We'll cover ABE's role, system architecture, and real-world
applications.
Abstract:
3.
Green Cloud Computing:An Overview
Green cloud computing aims to reduce environmental impact. It optimizes resource usage and
energy consumption. This approach promotes sustainability in cloud services.
Energy Efficiency
Optimizing data centers
reduces energy consumption.
Resource Optimization
Virtualization enhances resource
allocation efficiency.
Reduced Carbon Footprint
Lower energy use leads to
less environmental impact.
4.
Data Security Challengesin the Cloud
Cloud environments face unique security challenges. Data
breaches and unauthorized access are major concerns.
Compliance with regulations adds complexity.
1 Data Breaches
Sensitive data at risk
from cyberattacks.
2 Access Control
Ensuring only
authorized users can
access data.
3 Compliance
Meeting industry and government regulations.
5.
Introduction to Attribute-
BasedEncryption (ABE)
ABE is a cryptographic technique. It enables fine-grained access control
based on attributes. Users' keys and data are associated with attributes.
Attribute-Based
Keys
Keys linked to user
attributes.
Access Policies
Data encrypted under
access policies.
Fine-Grained
Control
Granular access
management.
6.
ABE for SecureData Sharing in Green Clouds
ABE ensures secure data sharing. It protects data confidentiality and integrity. ABE minimizes the risk of unauthorized access.
Data Encryption
Encrypt data using ABE policies.
Access Control
Grant access based on attributes.
Secure Sharing
Share data confidently in the cloud.
7.
System Architecture: IntegratingABE with Green
Cloud Infrastructure
ABE integrates with cloud components. It uses key management and policy enforcement. The
architecture ensures efficient and secure data handling.
Cloud Storage 1 ABE Server
2
Key Management
3
Policy Engine
4
8.
Performance Evaluation:
Efficiency andSecurity Analysis
Performance is evaluated regarding efficiency and security. Metrics include
encryption/decryption times. Security analysis confirms ABE's robustness.
99%
Security
Percent of attacks stopped.
2x
Faster
Encryption speed increase
10%
Energy
Energy savings from ABE integration.
9.
EXISTING SYSTEM :
Comparedwith the existing ABE-OD schemes, our total overhead of
the cloud server is independent of the number of the users who satisfy
an access policy and request the outsourcing decryption service. The
main drawback of ABE is that the computational cost grows linearly
with the complexity of the access policy. All the existing ABE
schemes with outsourced decryption ignore the fairness between the
user and the proxy.
Disadvantages:
Wastes computing resources of the
cloud server.
Computational cost is high.
Not secure.
10.
Advantages:
Cloud users/terminalscan save their cost via
outsourcing their data storage.
Reduces the total energy consumption.
Strong computational power
PROPOSED SYSTEM:
We proposed the green cloud computing to reuse the resources and reduce
total energy consumption on the condition of guaranteeing the quality of
service for performing the same task.We propose a new approach to outsource
the decryption of the ABE scheme. Compared with the GHW method, our
method is much more efficient for the cloud server besides reducing the
computation cost of decryption of users if many users require the outsourced
decryption services for the same cipher text.
11.
System Model MODULES:
User:User needs to be register and then login in to the website. After login they search a
file which is needed. If file is available then information about the file will be shown.
After the file is shown a request will be send to the cloud server to see the data in that
particular file. If the request is accepted by the server a key will be sent through a mail to
user that which can open the file and can access the data inside the file by the user.
Data Owner: Here Owner can registered and login once cloud server accepts the
registration in to the website. After login he/she can place the files into the cloud and can
also view the files, delete the unwanted files.The owner can view the file information in the
graphical view.
Cloud Server: Cloud server will login and checks the owner’s registrations and
provides acceptance or rejections and also check for the registered users. Cloud server
can also view the files which were uploaded by owners and view the user’s requests for
acceptance or rejections. Once the request is accepted the data is send to Authority to
generate a key for data decryption.
12.
Authority: Authority willlogin and check for the users, check the files which were
accepted by the cloud server and generates a secret key which will be send to the
user through a mail.
3.2 Software Development Life Cycle :
The Software Development Life Cycle (SDLC) has different phases in designing such
educational technology and assists the end users to benefit from the modern technology.
Thisstudy identifies the various factors to be considered at each phase of the SDLC while
developing educational software. Also, this study proposes some suggestions to be followedin
ESDLC with respect to educational processes perspectives. The core idea of this study is to
identify the various issues in implementing such educational software in day – to – day
teaching and learning processes.
Requirement Gathering and analysis:
All possible requirements of the system to be developed are captured in this phase System.
Design:
The requirement specifications from first phase are studied in this phase and the system design is prepared.This
system design helps in specifying hardware and system requirementsand helps in defining the overall system
architecture.
13.
Implementation: The inputsfrom the system design, the system is first developed in
small programs called units, which are integrated in the next phase. Each unit is developed
and tested for its functionality, which is referred to as Unit Testing.
Integration and Testing: All the units developed in the implementation phase are integrated
into a system after testingof each unit. Post integration the entire system is tested for any
faults and failure.
Deployment of System: Once the functional and non-functional testing is done; the
product is deployed in the customer environment or released into the market.
Maintenance:
There are some issues which come up in the client environment. To fix those issues,
patchesare released. Also, to enhance the product some better versions are released.
Maintenance isdone to deliver these changes in the customer environment.
14.
Economical Feasibility :Thisstudy is carried out to check the economic
impact that the system will have on the organization. The amount of fund that the
company can pour into the research and development of the system is limited. The
expenditures must be justified. Thus the developed system as well within the budget
and this was achieved because most of the technologies used are freely available.
Only the customized products had to be purchased.
Technical Feasibility :This study is carried out to check the technical feasibility,
that is, the technical requirements of the system. Any system developed must not have
a high demand on the available technical resources. This will lead to high demands on
the available technical resources. This will lead to high demands being placed on the
client. The developed system must have a modest requirement, as only minimal or
null changes are required for implementing this system.
15.
UML DIAGRAMS UMLstands for Unified
Modeling Language.
UML is a standardized general-purpose modeling language in the field of
object-oriented software engineering. The standard is managed, and was
created by, the Object Management Group. The goal is for UML to
become a common language for creating models of object oriented
computer software. In its current form UML is comprised of two major
components: a Meta-model and a notation. In the future, some form of
method or process may also be added to; or associated with, UML. The
Unified Modeling Language is a standard language for specifying,
Visualization, Constructing and documenting the artifacts of software
system, as well as for business modeling and other non-software systems.
The UML represents a collection of best engineering practices that have
proven successful in the modeling of large and complex systems. The
UML is a very important part of developing objects oriented software and
the software development process. The UML uses mostly graphical
notations to express the design of software projects.
16.
Goals:
The Primary goalsin the design of the UML are as
follows:
1. Provide users a ready-to-use, expressive visual modeling Language
so that they can develop and exchange meaningful models.
2. Provide extendibility and specialization mechanisms to extend the
core concepts.
3. Be independent of particular programming languages and
development process.
4. Provide a formal basis for understanding the modeling language.
5. Encourage the growth of OO tools market.
6. Support higher level development concepts such as collaborations,
frameworks, patterns and components.
7. Integrate best practices.
17.
USE CASE DIAGRAM:A use case diagram in the Unified
Modeling Language (UML) is a type of behavioral diagram defined by
and created from a Use-case analysis. Its purpose is to present a
graphical overview of the functionality provided by a system in terms of
actors, their goals (represented as use cases), and any dependencies
between those use cases. The main purpose of a use case diagram is to
show what system functions are performed for which actor. Roles of the
actors in the system can be depicted.
CLASS DIAGRAM: In software engineering, a class diagram in the
Unified Modeling Language (UML) is a type of static structure diagram
that describes the structure of a system by showing the system's classes,
their attributes, operations (or methods), and the relationships among the
classes. It explains which class contains information.
18.
EQUENCE DIAGRAM:
A sequencediagram in Unified Modeling Language
(UML) is a kind of interaction diagram that shows how
processes operate with one another and in what order.
It is a construct of a Message Sequence Chart.
Sequence diagrams are sometimes called event diagrams,
event scenarios, and timing diagrams.
COLLABORATION DIAGRAM: In collaboration diagram the method
call sequence is indicated by some numbering technique as shown below.
The number indicates how the methods are called one after another.We
have taken the same order management system to describe the
collaboration diagram.The method calls are similar to that of a sequence
diagram. But the difference is that the sequence diagram does not
describe the object organization whereas the collaboration diagram shows
the object organization.
19.
Case Study: Real-WorldApplication Scenario
Consider a healthcare application scenario. ABE protects patient data in the cloud. Only authorized doctors can access records.
1
Data Upload
Patient records encrypted.
2
Policy Enforcement
Access policies verified.
3
Secure Access
Doctors access with attributes.
20.
Conclusion: Future Directionsand Research
Opportunities
ABE enhances data security in green clouds. Future research includes improving efficiency. Exploring new ABE schemes offers potential.
Efficiency Improvements
Optimize ABE for cloud environments.
New ABE Schemes
Explore advanced cryptographic
techniques.
Integration with Emerging
Technologies
Combine ABE with AI and blockchain.