Abstract: Cloud computing is a revolutionary computing paradigm which enables flexible, on-demand and low-cost usage of computing resources. Those advantages, ironically, are the causes of security and privacy problems, which emerge because the data owned by different users are stored in some cloud servers instead of under their own control. To deal with security problems, various schemes based on the Attribute-Based Encryption have been proposed recently. Data access control is an effective way to ensure the data security in the cloud. However, due to data outsourcing and untrusted cloud servers, the data access control becomes a challenging issue in cloud storage systems. Data security is the key concern in the distributed system. Various schemes based on the attribute-based encryption have been proposed to secure the cloud storage. However, most work focuses on the data contents privacy and the access control, while less attention is paid to the privilege control and the identity privacy. In this paper, we present a semianonymous privilege control scheme AnonyControl to address not only the data privacy, but also the user identity privacy in existing access control schemes. AnonyControl decentralizes the central authority to limit the identity leakage and thus achieves semianonymity. Besides, it also generalizes the file access control to the privilege control, by which privileges of all operations on the cloud data can be managed in a fine-grained manner. Subsequently, we present the AnonyControl-F, which fully prevents the identity leakage and achieve the full anonymity. Our security analysis shows that both AnonyControl and AnonyControl-F are secure under the decisional bilinear Diffie–Hellman assumption, and our performance evaluation exhibits the feasibility of our schemes.
Accessing secured data in cloud computing environmentIJNSA Journal
Number of businesses using cloud computing has increased dramatically over the last few years due to the attractive features such as scalability, flexibility, fast start-up and low costs. Services provided over the web are ranging from using provider’s software and hardware to managing security and other issues. Some of the biggest challenges at this point are providing privacy and data security to subscribers of public cloud servers. An efficient encryption technique presented in this paper can be used for secure access to and storage of data on public cloud server, moving and searching encrypted data through communication channels while protecting data confidentiality. This method ensures data protection against both external and internal intruders. Data can be decrypted only with the provided by the data owner key, while public cloud server is unable to read encrypted data or queries. Answering a query does not depend on it size and done in a constant time. Data access is managed by the data owner. The proposed schema allows unauthorized modifications detection
A Survey on Access Control Mechanisms using Attribute Based Encryption in cloudijsrd.com
Cloud computing is an emerging computing technology that enables users to distantly store their data into a cloud so as to enjoy scalable services when required. And user can outsource their resources to server (also called cloud) using Internet. Security is one of the major issues which reduces the growth of cloud computing and complications with data privacy and data protection continue to plague the market. Attribute-based encryption (ABE) can be used for log encryption. This survey is more specific to the different security issues on data access in cloud environment.
Messages addressed to specific users can be decrypted by Key Generation Centre (KGC) by generating their private keys. Data owner wants the data to be delivered only to specified user and not to unauthorized person that is the data owner makes their private data accessible only to authorized person. We propose attribute based encryption and escrow problem which means written agreement delivered to a third party to overcome this problem. Attribute based Encryption (ABE) is a type of public-key encryption in which the private key of a user and the cipher text are dependent upon attributes. It is a promising cryptographic approach.
Preserving Privacy Policy- Preserving public auditing for data in the cloudinventionjournals
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
Control Cloud Data Access Privilege and Anonymity with Fully Anonymous Attrib...1crore projects
IEEE PROJECTS 2015
1 crore projects is a leading Guide for ieee Projects and real time projects Works Provider.
It has been provided Lot of Guidance for Thousands of Students & made them more beneficial in all Technology Training.
Dot Net
DOTNET Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
Java Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
ECE IEEE Projects 2015
1. Matlab project
2. Ns2 project
3. Embedded project
4. Robotics project
Eligibility
Final Year students of
1. BSc (C.S)
2. BCA/B.E(C.S)
3. B.Tech IT
4. BE (C.S)
5. MSc (C.S)
6. MSc (IT)
7. MCA
8. MS (IT)
9. ME(ALL)
10. BE(ECE)(EEE)(E&I)
TECHNOLOGY USED AND FOR TRAINING IN
1. DOT NET
2. C sharp
3. ASP
4. VB
5. SQL SERVER
6. JAVA
7. J2EE
8. STRINGS
9. ORACLE
10. VB dotNET
11. EMBEDDED
12. MAT LAB
13. LAB VIEW
14. Multi Sim
CONTACT US
1 CRORE PROJECTS
Door No: 214/215,2nd Floor,
No. 172, Raahat Plaza, (Shopping Mall) ,Arcot Road, Vadapalani, Chennai,
Tamin Nadu, INDIA - 600 026
Email id: 1croreprojects@gmail.com
website:1croreprojects.com
Phone : +91 97518 00789 / +91 72999 51536
Accessing secured data in cloud computing environmentIJNSA Journal
Number of businesses using cloud computing has increased dramatically over the last few years due to the attractive features such as scalability, flexibility, fast start-up and low costs. Services provided over the web are ranging from using provider’s software and hardware to managing security and other issues. Some of the biggest challenges at this point are providing privacy and data security to subscribers of public cloud servers. An efficient encryption technique presented in this paper can be used for secure access to and storage of data on public cloud server, moving and searching encrypted data through communication channels while protecting data confidentiality. This method ensures data protection against both external and internal intruders. Data can be decrypted only with the provided by the data owner key, while public cloud server is unable to read encrypted data or queries. Answering a query does not depend on it size and done in a constant time. Data access is managed by the data owner. The proposed schema allows unauthorized modifications detection
A Survey on Access Control Mechanisms using Attribute Based Encryption in cloudijsrd.com
Cloud computing is an emerging computing technology that enables users to distantly store their data into a cloud so as to enjoy scalable services when required. And user can outsource their resources to server (also called cloud) using Internet. Security is one of the major issues which reduces the growth of cloud computing and complications with data privacy and data protection continue to plague the market. Attribute-based encryption (ABE) can be used for log encryption. This survey is more specific to the different security issues on data access in cloud environment.
Messages addressed to specific users can be decrypted by Key Generation Centre (KGC) by generating their private keys. Data owner wants the data to be delivered only to specified user and not to unauthorized person that is the data owner makes their private data accessible only to authorized person. We propose attribute based encryption and escrow problem which means written agreement delivered to a third party to overcome this problem. Attribute based Encryption (ABE) is a type of public-key encryption in which the private key of a user and the cipher text are dependent upon attributes. It is a promising cryptographic approach.
Preserving Privacy Policy- Preserving public auditing for data in the cloudinventionjournals
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
Control Cloud Data Access Privilege and Anonymity with Fully Anonymous Attrib...1crore projects
IEEE PROJECTS 2015
1 crore projects is a leading Guide for ieee Projects and real time projects Works Provider.
It has been provided Lot of Guidance for Thousands of Students & made them more beneficial in all Technology Training.
Dot Net
DOTNET Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
Java Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
ECE IEEE Projects 2015
1. Matlab project
2. Ns2 project
3. Embedded project
4. Robotics project
Eligibility
Final Year students of
1. BSc (C.S)
2. BCA/B.E(C.S)
3. B.Tech IT
4. BE (C.S)
5. MSc (C.S)
6. MSc (IT)
7. MCA
8. MS (IT)
9. ME(ALL)
10. BE(ECE)(EEE)(E&I)
TECHNOLOGY USED AND FOR TRAINING IN
1. DOT NET
2. C sharp
3. ASP
4. VB
5. SQL SERVER
6. JAVA
7. J2EE
8. STRINGS
9. ORACLE
10. VB dotNET
11. EMBEDDED
12. MAT LAB
13. LAB VIEW
14. Multi Sim
CONTACT US
1 CRORE PROJECTS
Door No: 214/215,2nd Floor,
No. 172, Raahat Plaza, (Shopping Mall) ,Arcot Road, Vadapalani, Chennai,
Tamin Nadu, INDIA - 600 026
Email id: 1croreprojects@gmail.com
website:1croreprojects.com
Phone : +91 97518 00789 / +91 72999 51536
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...Editor IJCATR
The Data sharing is an important functionality in cloud storage. In this article, we show how to securely, efficiently, and
flexibly share data with others in cloud storage. We describe new public-key cryptosystems which produce constant-size ciphertexts
such that efficient delegation of decryption rights for any set of ciphertexts are possible. The novelty is that one can aggregate any set
of secret keys and make them as compact as a single key, but encompassing the power of all the keys being aggregated. In other
words, the secret key holder can release a constant-size aggregate key for flexible choices of ciphertext set in cloud storage, but the
other encrypted files outside the set remain confidential. This compact aggregate key can be conveniently sent to others or be stored in
a smart card with very limited secure storage. We provide formal security analysis of our schemes in the standard model. We also
describe other application of our schemes. In particular, our schemes give the first public-key patient controlled encryption for flexible
hierarchy, which was yet to be known.
Augmenting Publish/Subscribe System by Identity Based Encryption (IBE) Techni...IJCERT JOURNAL
Security is one of the extensive and complicated requirements that need to be provided in order to achieve few issues like confidentiality, integrity and authentication. In a content-based publish/subscribe system, authentication is difficult to achieve since there exists no strong bonding between the end parties. Similarly, Integrity and confidentiality needs arise in published events and subscription conflicts with content-based routing. The basic tool to support confidentiality, integrity is encryption. In this paper for providing security mechanism in broker-less content-based publish/subscribe system we adapt pairing-based cryptography mechanism. In this mechanism, we use Identity Based Encryption (IBE) technique to achieve the needs of publish/subscribe system. This approach helps in providing fine-grained key management, effective encryption, decryption operations and routing is carried out in the order of subscribed attributes
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09849539085, 09966235788 or mail us - ieeefinalsemprojects@gmail.co¬m-Visit Our Website: www.finalyearprojects.org
A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...cscpconf
One of widely used cryptographic primitives for the cloud application is Attribute Based Encryption (ABE) where users can have their own attributes and a ciphertext encrypted by an access policy. Though ABE provides many benefits, the novelty often only exists in an academic world and it is often difficult to find a practical use of ABE for a real application. In this paper, we discuss the design and implementation of a cloud storage client application which supports the concept of ABE. Our proposed client provides an effective access control mechanism where it allows different types of access policy to be defined thus allowing large datasets to be shared by multiple users. Using different access policy, each user only needs to access only a small part of the big data. The goal of our experiment is to explore the right set of strategies for developing a practical ABE-based system. Through the implementation and evaluation, we have determined the various characteristics and issues associated with developing a practical ABEbased
application.
International Journal of Computational Engineering Research(IJCER) ijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
Secure Redundant Data Avoidance over Multi-Cloud Architecture. IJCERT JOURNAL
Redundant data avoidance systems, the Private Cloud are involved as a proxy to allow data owner/users to securely perform duplicate check with differential privileges. Such architecture is practical and has attracted much attention from researchers. The data owners only outsource their data storage by utilizing public cloud while the data operation is managed in private cloud, in this connection our presented system has follows traditional encryption while providing data confidentiality, is incompatible with redundant data avoidance. Identical data copies of different users will lead to different ciphertexts, making data avoidance impossible. To address above issues convergent encryption technique has been proposed to encrypt the data before outsourcing. To better protect data security, this paper makes the first attempt to formally address the problem of authorized redundant data avoidance. Different from traditional redundant data avoidance systems, the differential privileges of users are further considered in duplicate check besides the data itself. We also present several new redundant data avoidance constructions supporting authorized duplicate check in a multi-cloud architecture. Security analysis demonstrates that our scheme is secure in terms of the definitions specified in the proposed security model. In order to perform secure access controlling scheme user may satisfy fine-grained approach at cloud level towards access restricting from unauthorized users or adversaries.
With the growth of cloud technologies, computing
resources and cloud storage have become the most
demanding online services. There are several companies
desiring to outsource their data storage and resources as
well. While storing private and sensitive data on a third
party data center, it is necessary to consider security and
privacy which become major issues. In this paper, a novel
Double Encryption with Single Decryption (DESD) crypto
technique is proposed to secure the data in cloud storage.
The proposed technique comprises of encryption and
decryption phases where in the encryption phase the data is
randomly partitioned into multiple fragments. Double
encryption is done on each fragment by prime numbers, as
well as Invertible Non-linear Function (INF). These
multiple encrypted data are stored at the multiple cloud
storages with the help of cloud service provider (CSP).
After all verification process the data user collects the key
from the data owner and decrypts the gathered data from
the cloud with the knowledge of inverse INF. The proposed
crypto technique provides more security and privacy to
cloud data and any illegitimate users cannot retrieve the
original data. The performance of the proposed DESD
technique is compared with AES and Triple DES
techniques and the experimental results are plotted which
shows the proposed technique is efficient and faster.
Secure system based on recombined fingerprints for sharing multimedia files i...eSAT Journals
Abstract In this paper the execution time is less when compared to previous algorithm. And also it provide security between the merchant and buyer The traitor tracing protocol is used to detect the illegal transaction. Here we used fingerprinting solution to avoid illegal redistribution of multimedia contents. Here we convert the multimedia video file into image then encrypting the image after the encrypted image will be transferred from merchant to buyer. The buyer receives the copyright protection from merchant, he decrypts the image then converts it into video. After that, the copyright protection of file is transferred to child buyer. Then tracing traitor protocol is used to checks the fingerprints for merchant to buyer and buyer to child buyer. Traitor tracing protocol is used to detect the illegal transaction of the content. The Blowfish algorithm is used to encrypt and decrypt the multimedia files. Finally we detect the performance of our work based on efficiency, accuracy and we achieve security. Keywords: Fingerprint, Multimedia files, Blowfish algorithm, Merchant, Buyer, Child Buyer, Copyright Protection
Wireless Charging for Multi-Node Using Wireless Charging Vehiclepaperpublications3
Abstract: Wireless energy transfer based on magnetic resonant coupling is a developing technology. Charging one node at a time cause serious scalability problem. Recent advances in magnetic resonant coupling show that multiple nodes can be charged at the same time. Here one wireless sensor network will be created and investigate whether it is a scalable technology or not. Create one Wireless Charging Vehicle (WCV) and that will periodically travelling inside a WSN and charging sensor nodes wirelessly. The two-dimensional plane is divided into hexagonal cellular structure and based on charging range the sensor nodes are charged. Follow a formal optimization framework by jointly optimizing travelling path, flow routing, and charging time. By using discretization and a novel Reformulation-Linearization Technique (RLT), develop a provably near-optimal solution for any desired level of accuracy. Through numerical results, demonstrate that our solution can indeed address the charging scalability problem in a WSN.
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...Editor IJCATR
The Data sharing is an important functionality in cloud storage. In this article, we show how to securely, efficiently, and
flexibly share data with others in cloud storage. We describe new public-key cryptosystems which produce constant-size ciphertexts
such that efficient delegation of decryption rights for any set of ciphertexts are possible. The novelty is that one can aggregate any set
of secret keys and make them as compact as a single key, but encompassing the power of all the keys being aggregated. In other
words, the secret key holder can release a constant-size aggregate key for flexible choices of ciphertext set in cloud storage, but the
other encrypted files outside the set remain confidential. This compact aggregate key can be conveniently sent to others or be stored in
a smart card with very limited secure storage. We provide formal security analysis of our schemes in the standard model. We also
describe other application of our schemes. In particular, our schemes give the first public-key patient controlled encryption for flexible
hierarchy, which was yet to be known.
Augmenting Publish/Subscribe System by Identity Based Encryption (IBE) Techni...IJCERT JOURNAL
Security is one of the extensive and complicated requirements that need to be provided in order to achieve few issues like confidentiality, integrity and authentication. In a content-based publish/subscribe system, authentication is difficult to achieve since there exists no strong bonding between the end parties. Similarly, Integrity and confidentiality needs arise in published events and subscription conflicts with content-based routing. The basic tool to support confidentiality, integrity is encryption. In this paper for providing security mechanism in broker-less content-based publish/subscribe system we adapt pairing-based cryptography mechanism. In this mechanism, we use Identity Based Encryption (IBE) technique to achieve the needs of publish/subscribe system. This approach helps in providing fine-grained key management, effective encryption, decryption operations and routing is carried out in the order of subscribed attributes
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09849539085, 09966235788 or mail us - ieeefinalsemprojects@gmail.co¬m-Visit Our Website: www.finalyearprojects.org
A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...cscpconf
One of widely used cryptographic primitives for the cloud application is Attribute Based Encryption (ABE) where users can have their own attributes and a ciphertext encrypted by an access policy. Though ABE provides many benefits, the novelty often only exists in an academic world and it is often difficult to find a practical use of ABE for a real application. In this paper, we discuss the design and implementation of a cloud storage client application which supports the concept of ABE. Our proposed client provides an effective access control mechanism where it allows different types of access policy to be defined thus allowing large datasets to be shared by multiple users. Using different access policy, each user only needs to access only a small part of the big data. The goal of our experiment is to explore the right set of strategies for developing a practical ABE-based system. Through the implementation and evaluation, we have determined the various characteristics and issues associated with developing a practical ABEbased
application.
International Journal of Computational Engineering Research(IJCER) ijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
Secure Redundant Data Avoidance over Multi-Cloud Architecture. IJCERT JOURNAL
Redundant data avoidance systems, the Private Cloud are involved as a proxy to allow data owner/users to securely perform duplicate check with differential privileges. Such architecture is practical and has attracted much attention from researchers. The data owners only outsource their data storage by utilizing public cloud while the data operation is managed in private cloud, in this connection our presented system has follows traditional encryption while providing data confidentiality, is incompatible with redundant data avoidance. Identical data copies of different users will lead to different ciphertexts, making data avoidance impossible. To address above issues convergent encryption technique has been proposed to encrypt the data before outsourcing. To better protect data security, this paper makes the first attempt to formally address the problem of authorized redundant data avoidance. Different from traditional redundant data avoidance systems, the differential privileges of users are further considered in duplicate check besides the data itself. We also present several new redundant data avoidance constructions supporting authorized duplicate check in a multi-cloud architecture. Security analysis demonstrates that our scheme is secure in terms of the definitions specified in the proposed security model. In order to perform secure access controlling scheme user may satisfy fine-grained approach at cloud level towards access restricting from unauthorized users or adversaries.
With the growth of cloud technologies, computing
resources and cloud storage have become the most
demanding online services. There are several companies
desiring to outsource their data storage and resources as
well. While storing private and sensitive data on a third
party data center, it is necessary to consider security and
privacy which become major issues. In this paper, a novel
Double Encryption with Single Decryption (DESD) crypto
technique is proposed to secure the data in cloud storage.
The proposed technique comprises of encryption and
decryption phases where in the encryption phase the data is
randomly partitioned into multiple fragments. Double
encryption is done on each fragment by prime numbers, as
well as Invertible Non-linear Function (INF). These
multiple encrypted data are stored at the multiple cloud
storages with the help of cloud service provider (CSP).
After all verification process the data user collects the key
from the data owner and decrypts the gathered data from
the cloud with the knowledge of inverse INF. The proposed
crypto technique provides more security and privacy to
cloud data and any illegitimate users cannot retrieve the
original data. The performance of the proposed DESD
technique is compared with AES and Triple DES
techniques and the experimental results are plotted which
shows the proposed technique is efficient and faster.
Secure system based on recombined fingerprints for sharing multimedia files i...eSAT Journals
Abstract In this paper the execution time is less when compared to previous algorithm. And also it provide security between the merchant and buyer The traitor tracing protocol is used to detect the illegal transaction. Here we used fingerprinting solution to avoid illegal redistribution of multimedia contents. Here we convert the multimedia video file into image then encrypting the image after the encrypted image will be transferred from merchant to buyer. The buyer receives the copyright protection from merchant, he decrypts the image then converts it into video. After that, the copyright protection of file is transferred to child buyer. Then tracing traitor protocol is used to checks the fingerprints for merchant to buyer and buyer to child buyer. Traitor tracing protocol is used to detect the illegal transaction of the content. The Blowfish algorithm is used to encrypt and decrypt the multimedia files. Finally we detect the performance of our work based on efficiency, accuracy and we achieve security. Keywords: Fingerprint, Multimedia files, Blowfish algorithm, Merchant, Buyer, Child Buyer, Copyright Protection
Wireless Charging for Multi-Node Using Wireless Charging Vehiclepaperpublications3
Abstract: Wireless energy transfer based on magnetic resonant coupling is a developing technology. Charging one node at a time cause serious scalability problem. Recent advances in magnetic resonant coupling show that multiple nodes can be charged at the same time. Here one wireless sensor network will be created and investigate whether it is a scalable technology or not. Create one Wireless Charging Vehicle (WCV) and that will periodically travelling inside a WSN and charging sensor nodes wirelessly. The two-dimensional plane is divided into hexagonal cellular structure and based on charging range the sensor nodes are charged. Follow a formal optimization framework by jointly optimizing travelling path, flow routing, and charging time. By using discretization and a novel Reformulation-Linearization Technique (RLT), develop a provably near-optimal solution for any desired level of accuracy. Through numerical results, demonstrate that our solution can indeed address the charging scalability problem in a WSN.
Control Cloud Data Access Privilege and Anonymity with Fully Anonymous Attrib...1crore projects
IEEE PROJECTS 2015
1 crore projects is a leading Guide for ieee Projects and real time projects Works Provider.
It has been provided Lot of Guidance for Thousands of Students & made them more beneficial in all Technology Training.
Dot Net
DOTNET Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
Java Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
ECE IEEE Projects 2015
1. Matlab project
2. Ns2 project
3. Embedded project
4. Robotics project
Eligibility
Final Year students of
1. BSc (C.S)
2. BCA/B.E(C.S)
3. B.Tech IT
4. BE (C.S)
5. MSc (C.S)
6. MSc (IT)
7. MCA
8. MS (IT)
9. ME(ALL)
10. BE(ECE)(EEE)(E&I)
TECHNOLOGY USED AND FOR TRAINING IN
1. DOT NET
2. C sharp
3. ASP
4. VB
5. SQL SERVER
6. JAVA
7. J2EE
8. STRINGS
9. ORACLE
10. VB dotNET
11. EMBEDDED
12. MAT LAB
13. LAB VIEW
14. Multi Sim
CONTACT US
1 CRORE PROJECTS
Door No: 214/215,2nd Floor,
No. 172, Raahat Plaza, (Shopping Mall) ,Arcot Road, Vadapalani, Chennai,
Tamin Nadu, INDIA - 600 026
Email id: 1croreprojects@gmail.com
website:1croreprojects.com
Phone : +91 97518 00789 / +91 72999 51536
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...IJNSA Journal
Cloud computing refers to a type of networked computing whereby an application can be run on connected
servers instead of local servers. Cloud can be used to store data, share resources and also to provide
services. Technically, there is very little difference between public and private cloud architecture. However,
the security and privacy of the data is a very big issue when sensitive data is being entrusted to third party
cloud service providers. Thus encryption with a fine grained access control is inevitable to enforce security
in clouds. Several techniques implementing attribute based encryption for fine grained access control have
been proposed. Under such approaches, the key management overhead is a little bit high in terms of
computational complexity. Also, secret sharing mechanisms have added complexity. Moreover, they lack
mechanisms to handle existence of traitors. Our proposed approach addresses these requirements and
reduces the overhead of the key management as well as secret sharing by using efficient algorithms and
protocols. Also, a traitor tracing technique is introduced into the cloud computing two layer encryption
environment.
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...IJNSA Journal
Cloud computing refers to a type of networked computing whereby an application can be run on connected servers instead of local servers. Cloud can be used to store data, share resources and also to provide services. Technically, there is very little difference between public and private cloud architecture. However, the security and privacy of the data is a very big issue when sensitive data is being entrusted to third party cloud service providers. Thus encryption with a fine grained access control is inevitable to enforce security in clouds. Several techniques implementing attribute based encryption for fine grained access control have been proposed. Under such approaches, the key management overhead is a little bit high in terms of computational complexity. Also, secret sharing mechanisms have added complexity. Moreover, they lack mechanisms to handle existence of traitors. Our proposed approach addresses these requirements and reduces the overhead of the key management as well as secret sharing by using efficient algorithms and protocols. Also, a traitor tracing technique is introduced into the cloud computing two layer encryption environment.
Secure Data Sharing In an Untrusted CloudIJERA Editor
Cloud computing is a huge area which basically provides many services on the basis of pay as you go. One of the fundamental services provided by cloud is data storage. Cloud provides cost efficiency and an efficient solution for sharing resource among cloud users. A secure and efficient data sharing scheme for groups in cloud is not an easy task. On one hand customers are not ready to share their identity but on other hand want to enjoy the cost efficiency provided by the cloud. It needs to provide identity privacy, multiple owner and dynamic data sharing without getting effected by the number of cloud users revoked. In this paper, any member of a group can completely enjoy the data storing and sharing services by the cloud. A secure data sharing scheme for dynamic cloud users is proposed in this paper. For which it uses group signature and dynamic broadcast encryption techniques such that any user in a group can share the information in a secured manner. Additionally the permission option is proposed for the security reasons. This means the file access permissions are generated by the admin and given to the user using Role Based Access Control (RBA) algorithm. The file access permissions are read, write and delete. In this, owner can provide files with options and accepts the users using that option. The revocation of cloud user is a function generated by the Admin for security purpose. The encryption computational cost and storage overhead is not dependent on the number of users revoked. We analyze the security by proofs and produce the cloud efficiency report using cloudsim.
Abstract-The current trend in the application space towards systems of loosely coupled and dynamically bound components that enables just-in-time integration jeopardizes the security of information that is shared between the broker, the requester, and the provider at runtime. In particular, new advances in data mining and knowledge discovery that allow for the extraction of hidden knowledge in an enormous amount of data impose new threats on the seamless integration of information. We consider the problem of building privacy preserving algorithms for one category of data mining techniques, association rule mining.Suppose Alice owns a k-anonymous database and needs to determine whether her database, when inserted with a tuple owned by Bob, is still k-anonymous. Also, suppose that access to the database is strictly controlled, because for example data are used for certain experiments that need to be maintained confidential. Clearly, allowing Alice to directly read the contents of the tuple breaks the privacy of Bob (e.g., a patient’s medical record); on the other hand, the confidentiality of the database managed by Alice is violated once Bob has access to the contents of the database. Thus, the problem is to check whether the database inserted with the tuple is still k-anonymous, without letting Alice and Bob know the contents of the tuple and the database, respectively. In this paper, we propose two protocols solving this problem on suppression-based and generalization-based k-anonymous and confidential databases. The protocols rely on well-known cryptographic assumptions, and we provide theoretical analyses to proof their soundness and experimental results to illustrate their efficiency.We have presented two secure protocols for privately checking whether a k-anonymous database retains its anonymity once a new tuple is being inserted to it. Since the proposed protocols ensure the updated database remains K-anonymous, the results returned from a user’s (or a medical researcher’s) query are also k-anonymous. Thus, the patient or the data provider’s privacy cannot be violated from any query. As long as the database is updated properly using the proposed protocols, the user queries under our application domain are always privacy-preserving.
Privacy-Preserving Updates to Anonymous and Confidential Databaseijdmtaiir
The current trend in the application space towards
systems of loosely coupled and dynamically bound
components that enables just-in-time integration jeopardizes
the security of information that is shared between the broker,
the requester, and the provider at runtime. In particular, new
advances in data mining and knowledge discovery that allow
for the extraction of hidden knowledge in an enormous amount
of data impose new threats on the seamless integration of
information. We consider the problem of building privacy
preserving algorithms for one category of data mining
techniques, association rule mining.Suppose Alice owns a kanonymous database and needs to determine whether her
database, when inserted with a tuple owned by Bob, is still kanonymous. Also, suppose that access to the database is strictly
controlled, because for example data are used for certain
experiments that need to be maintained confidential. Clearly,
allowing Alice to directly read the contents of the tuple breaks
the privacy of Bob (e.g., a patient’s medical record); on the
other hand, the confidentiality of the database managed by
Alice is violated once Bob has access to the contents of the
database. Thus, the problem is to check whether the database
inserted with the tuple is still k-anonymous, without letting
Alice and Bob know the contents of the tuple and the database,
respectively. In this paper, we propose two protocols solving
this problem on suppression-based and generalization-based kanonymous and confidential databases. The protocols rely on
well-known cryptographic assumptions, and we provide
theoretical analyses to proof their soundness and experimental
results to illustrate their efficiency.We have presented two
secure protocols for privately checking whether a kanonymous database retains its anonymity once a new tuple is
being inserted to it. Since the proposed protocols ensure the
updated database remains K-anonymous, the results returned
from a user’s (or a medical researcher’s) query are also kanonymous. Thus, the patient or the data provider’s privacy
cannot be violated from any query. As long as the database is
updated properly using the proposed protocols, the user queries
under our application domain are always privacy-preserving
Security Check in Cloud Computing through Third Party Auditorijsrd.com
In cloud computing, data owners crowd their data on cloud servers and users (data consumers) can access the data from cloud servers. Due to the data outsourcing, however, it requires an independent auditing service to check the data integrity in the cloud. Some existing remote integrity checking method scan only serve for static records data. Thus, cannot be used in the auditing service since the data in the cloud can be animatedly updated. Thus, an efficient and secure dynamic auditing protocol is required to convince data owners that the data are correctly stored in the cloud. In this paper, we first design an auditing framework for cloud storage systems for privacy-preserving auditing protocol. Then, we extend our auditing protocol to support the data dynamic operations, which is efficient to secure the random model.
The body area network (BAN) technology is one of the core technologies of IOT developments in
healthcare system, where a patient can be monitored using a collection of tiny-powered and lightweight
sensor nodes. However, the development of this new technology in healthcare applications without
considering security makes patient privacy vulnerable. In this paper, at first, we highlight the major
security requirements in BSN-based modern healthcare system. Subsequently, we propose a secure IoTbased
healthcare system using BSN, called BSN-Care, which can efficiently accomplish those Requirements.
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud. IJCERT JOURNAL
In cloud computing outsourcing group resource among cloud users is a major challenge, so cloud computing provides a low-cost and well-organized solution. Due to frequent change of membership, sharing data in a multi-owner manner to an untrusted cloud is still its challenging issue. In this paper we proposed a secure multi-owner data sharing scheme for dynamic group in public cloud. By providing AES encryption with convergent key while uploading the data, any cloud user can securely share data with others. Meanwhile, the storage overhead and encryption computation cost of the scheme are independent with the number of revoked users. In addition, I analyze the security of this scheme with rigorous proofs. One-Time Password is one of the easiest and most popular forms of authentication that can be used for securing access to accounts. One-Time Passwords are often referred to as secure and stronger forms of authentication in multi-owner manner. Extensive security and performance analysis shows that our proposed scheme is highly efficient and satisfies the security requirements for public cloud based secure group sharing.
User-Centric Privacy Control in Identity Management and Access Control within...IJCI JOURNAL
The ability to effectively implement user-centric privacy controls in cloud-based identity access management (IAM) systems is crucial in today's age of rapidly rising data and increased privacy concerns. The study tackles the scalability issue inside cloud-based IAM systems, where user-centric privacy controls are paramount. The study aims to guarantee effective system performance despite growing numbers of users and data items by following a carefully crafted approach that uses user-centric privacy algorithms. The findings are expected to increase scalability while maintaining security and user privacy, significantly improving current cloud security and IAM techniques. This study provides significant findings for businesses adapting to the changing environment of cloud-based access and identity management, enhancing the security and privacy aspects of the online environment.
A Privacy Preserving Attribute Based Access Control Mechanism In Distributed ...Editor IJCATR
We propose a new decentralized access control scheme for secure data storage in clouds that supports anonymous
authentication. In the proposed scheme, the cloud verifies the authenticity of the series without knowing the user’s identity before
storing data. Our scheme also has the added feature of access control in which only valid users are able to decrypt the stored
information. The scheme prevents replay attacks and supports creation, modification, and reading data stored in the cloud. We also
address user revocation. Moreover, our authentication and access control scheme is decentralized and robust, unlike other access
control schemes designed for clouds which are centralized. The communication, computation, and storage overheads are comparable
to centralized approaches.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Similar to Control Cloud Data Access Using Attribute-Based Encryption (20)
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesChristina Lin
Traditionally, dealing with real-time data pipelines has involved significant overhead, even for straightforward tasks like data transformation or masking. However, in this talk, we’ll venture into the dynamic realm of WebAssembly (WASM) and discover how it can revolutionize the creation of stateless streaming pipelines within a Kafka (Redpanda) broker. These pipelines are adept at managing low-latency, high-data-volume scenarios.
HEAP SORT ILLUSTRATED WITH HEAPIFY, BUILD HEAP FOR DYNAMIC ARRAYS.
Heap sort is a comparison-based sorting technique based on Binary Heap data structure. It is similar to the selection sort where we first find the minimum element and place the minimum element at the beginning. Repeat the same process for the remaining elements.
Water billing management system project report.pdfKamal Acharya
Our project entitled “Water Billing Management System” aims is to generate Water bill with all the charges and penalty. Manual system that is employed is extremely laborious and quite inadequate. It only makes the process more difficult and hard.
The aim of our project is to develop a system that is meant to partially computerize the work performed in the Water Board like generating monthly Water bill, record of consuming unit of water, store record of the customer and previous unpaid record.
We used HTML/PHP as front end and MYSQL as back end for developing our project. HTML is primarily a visual design environment. We can create a android application by designing the form and that make up the user interface. Adding android application code to the form and the objects such as buttons and text boxes on them and adding any required support code in additional modular.
MySQL is free open source database that facilitates the effective management of the databases by connecting them to the software. It is a stable ,reliable and the powerful solution with the advanced features and advantages which are as follows: Data Security.MySQL is free open source database that facilitates the effective management of the databases by connecting them to the software.
Understanding Inductive Bias in Machine LearningSUTEJAS
This presentation explores the concept of inductive bias in machine learning. It explains how algorithms come with built-in assumptions and preferences that guide the learning process. You'll learn about the different types of inductive bias and how they can impact the performance and generalizability of machine learning models.
The presentation also covers the positive and negative aspects of inductive bias, along with strategies for mitigating potential drawbacks. We'll explore examples of how bias manifests in algorithms like neural networks and decision trees.
By understanding inductive bias, you can gain valuable insights into how machine learning models work and make informed decisions when building and deploying them.
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...Amil Baba Dawood bangali
Contact with Dawood Bhai Just call on +92322-6382012 and we'll help you. We'll solve all your problems within 12 to 24 hours and with 101% guarantee and with astrology systematic. If you want to take any personal or professional advice then also you can call us on +92322-6382012 , ONLINE LOVE PROBLEM & Other all types of Daily Life Problem's.Then CALL or WHATSAPP us on +92322-6382012 and Get all these problems solutions here by Amil Baba DAWOOD BANGALI
#vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore#blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #blackmagicforlove #blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #Amilbabainuk #amilbabainspain #amilbabaindubai #Amilbabainnorway #amilbabainkrachi #amilbabainlahore #amilbabaingujranwalan #amilbabainislamabad
Welcome to WIPAC Monthly the magazine brought to you by the LinkedIn Group Water Industry Process Automation & Control.
In this month's edition, along with this month's industry news to celebrate the 13 years since the group was created we have articles including
A case study of the used of Advanced Process Control at the Wastewater Treatment works at Lleida in Spain
A look back on an article on smart wastewater networks in order to see how the industry has measured up in the interim around the adoption of Digital Transformation in the Water Industry.
Hierarchical Digital Twin of a Naval Power SystemKerry Sado
A hierarchical digital twin of a Naval DC power system has been developed and experimentally verified. Similar to other state-of-the-art digital twins, this technology creates a digital replica of the physical system executed in real-time or faster, which can modify hardware controls. However, its advantage stems from distributing computational efforts by utilizing a hierarchical structure composed of lower-level digital twin blocks and a higher-level system digital twin. Each digital twin block is associated with a physical subsystem of the hardware and communicates with a singular system digital twin, which creates a system-level response. By extracting information from each level of the hierarchy, power system controls of the hardware were reconfigured autonomously. This hierarchical digital twin development offers several advantages over other digital twins, particularly in the field of naval power systems. The hierarchical structure allows for greater computational efficiency and scalability while the ability to autonomously reconfigure hardware controls offers increased flexibility and responsiveness. The hierarchical decomposition and models utilized were well aligned with the physical twin, as indicated by the maximum deviations between the developed digital twin hierarchy and the hardware.
6th International Conference on Machine Learning & Applications (CMLA 2024)ClaraZara1
6th International Conference on Machine Learning & Applications (CMLA 2024) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of on Machine Learning & Applications.
6th International Conference on Machine Learning & Applications (CMLA 2024)
Control Cloud Data Access Using Attribute-Based Encryption
1. ISSN 2350-1022
International Journal of Recent Research in Mathematics Computer Science and Information Technology
Vol. 2, Issue 2, pp: (44-47), Month: October 2015 – March 2016, Available at: www.paperpublications.org
Page | 44
Paper Publications
Control Cloud Data Access Using Attribute-
Based Encryption
1
Shinde Rupali R, 2
Mane Manisha B, 3
Malkhede Pallavi D, 4
Karavade Rupali M,
5
Prof. Sahane Prema B
1,2,3,4
BE Computer Engineering, Pune.
5
Assistant Professor in PKTC, Chakan
Abstract: Cloud computing is a revolutionary computing paradigm which enables flexible, on-demand and low-cost
usage of computing resources. Those advantages, ironically, are the causes of security and privacy problems,
which emerge because the data owned by different users are stored in some cloud servers instead of under their
own control. To deal with security problems, various schemes based on the Attribute-Based Encryption have been
proposed recently. Data access control is an effective way to ensure the data security in the cloud. However, due to
data outsourcing and untrusted cloud servers, the data access control becomes a challenging issue in cloud storage
systems. Data security is the key concern in the distributed system. Various schemes based on the attribute-based
encryption have been proposed to secure the cloud storage. However, most work focuses on the data contents
privacy and the access control, while less attention is paid to the privilege control and the identity privacy. In this
paper, we present a semianonymous privilege control scheme AnonyControl to address not only the data privacy,
but also the user identity privacy in existing access control schemes. AnonyControl decentralizes the central
authority to limit the identity leakage and thus achieves semianonymity. Besides, it also generalizes the file access
control to the privilege control, by which privileges of all operations on the cloud data can be managed in a fine-
grained manner. Subsequently, we present the AnonyControl-F, which fully prevents the identity leakage and
achieve the full anonymity. Our security analysis shows that both AnonyControl and AnonyControl-F are secure
under the decisional bilinear Diffie–Hellman assumption, and our performance evaluation exhibits the feasibility
of our schemes.
Keywords: Anonymity, multi-authority, attribute-based encryption.
I. INTRODUCTION
CLOUD computing is a revolutionary computing technique, by which computing resources are provided dynamically via
Internet and the data storage and computation are outsourced to someone or some party in a „cloud‟. It greatly attracts
attention and interest from both academia and industry due to the profitability, but it also has at least three challenges that
must be handled before coming to our real life to the best of our knowledge. First of all, data confidentiality should be
guaranteed. The data privacy is not only about the data contents. Since the most attractive part of the cloud computing is
the computation outsourcing, it is far beyond enough to just conduct an access control. More likely, users want to control
the privileges of data manipulation over other users or cloud servers. This is because when sensitive information or
computation is outsourced to the cloud servers or another user, which is out of users‟ control in most cases, privacy risks
would rise dramatically because the servers might illegally inspect users‟ data and access sensitive information, or other
users might be able to infer sensitive information from the outsourced computation. Therefore, not only the access but
also the operation should be controlled. Secondly, personal information (defined by each user‟s attributes set) is at risk
because one‟s identity is authenticated based on his information for the purpose of access control (or privilege control in
this paper). As people are becoming more concerned about their identity privacy these days, the identity privacy also
needs to be protected before the cloud enters our life. Preferably, any authority or server alone should not know any
client‟s personal information. Last but not least, the cloud computing system should be resilient in the case of security
breach in which some part of the system is compromised by attackers.
2. ISSN 2350-1022
International Journal of Recent Research in Mathematics Computer Science and Information Technology
Vol. 2, Issue 2, pp: (44-47), Month: October 2015 – March 2016, Available at: www.paperpublications.org
Page | 45
Paper Publications
They are counterparts to each other in the sense that the decision of encryption policy (who can or cannot decrypt the
message) is made by different parties.
In the KP-ABE, a cipher text is associated with a set of attributes, and a private key is associated with a monotonic access
structure like a tree, which describes this user‟s identity (e.g. IIT AND (Ph.D. OR Master)). A user can decrypt the cipher
text if and only if the access tree in his private key is satisfied by the attributes in the cipher text. However, the encryption
policy is described in the keys, so the encrypted does not have entire control over the encryption policy. He has to trust
that the key generators issue keys with correct structures to correct users. Furthermore, when are-encryption occurs, all of
the users in the same system must have their private keys re-issued so as to gain access to there-encrypted files, and this
process causes considerable problems in implementation. On the other hand, those problems and overhead are all solved
in the CP-ABE [. In the CP-ABE, cipher texts are created with an access structure, which specifies the encryption policy,
and private keys are generated according to users‟ attributes. A user can decrypt the cipher text if and only if his attributes
in the private key satisfy the access tree specified in the cipher text. By doing so, the encrypted holds the ultimate
authority about the encryption policy. Also, the already issued private keys will never be modified unless the whole
system reboots.
II. LITERATURE SURVEY
K. Yang, X. Jia, K. Ren, and B. Zhang[4] This paper describes Data access control is an effective way to ensure the data
security in the cloud. However, due to data outsourcing and untrusted cloud servers, the data access control becomes a
challenging issue in cloud storage systems.
W.-G. Tzeng [5], This paper describes propose efficient and secure (string) oblivious transfer (OT1n ) schemes for any n
_ 2. We build our OT1 n scheme from fundamental cryptographic techniques directly. The receiver‟s choice is
unconditionally secure and the secrecy of the unchosen secrets is based on the hardness of the decisional Diffie-Hellman
problem.
S. Yu, C. Wang, K. Ren, and W. Lou[5] This paper describes Personal health record (PHR) is an emerging patient-centric
model of health information exchange, which is often outsourced to be stored at a third party, such as cloud providers.
However, there have been wide privacy concerns as personal health information could be exposed to those third party
servers and to unauthorized parties.
A. Shamir, [1] This paper introduce a novel type of cryptographic scheme, which enables any pair of users to
communicate securely and to verify each other 's signatures without exchanging private or public keys, without keeping
key directories , and without using the services of a third party. The scheme assumes t h e existence of trusted key
generation centers, whose sole purpose is t o give each user a personalized smart card v when he first join st he network.
A. Sahai and B. Waters,[2] This paper introduce a new type of Identity-Based Encryption (IBE) scheme that we call
Fuzzy Identity-Based Encryption. In Fuzzy IBE we view an identity as set of descriptive attributes. A Fuzzy IBE scheme
allows for a private key for an identity, ω, to decrypt a ciphertext encrypted with an identity, ω_ , if and only if the
identities ω and ω are close to each other as measured by the “set overlap” distance metric.
V. Goyal, O. Pandey, A. Sahai, and B. Waters,[3] This paper describes As more sensitive data is shared and stored by
third-party sites on the Internet, there will be a need to encrypt data stored at these sites. One drawback of encrypting data,
is that it can be selectively shared only at a coarse-grained level(i.e., giving another party your private key). We develop a
new cryptosystem for fine-grained sharing of encrypted data that we call Key-Policy Attribute-Based Encryption
(KPABE).
III. PROPOSED WORK
In this scheme Various schemes based on the attribute-based encryption have been proposed to secure the cloud storage.
Various techniques have been proposed to protect the data contents privacy via access control. we propose AnonyControl
and AnonyControl-F (Fig. 1) to allow cloud servers to control users‟ access privileges without knowing their identity
information.
3. ISSN 2350-1022
International Journal of Recent Research in Mathematics Computer Science and Information Technology
Vol. 2, Issue 2, pp: (44-47), Month: October 2015 – March 2016, Available at: www.paperpublications.org
Page | 46
Paper Publications
They will follow our proposed protocol in general, but try to find out as much information as possible individually .The
proposed schemes are able to protect user‟s privacy against each single authority. Partial information is disclosed in
AnonyControl and no information is disclosed in AnonyControl-F. We firstly implement the real toolkit of a
multiauthority based encryption scheme AnonyControl and AnonyControl-F.
Fig 1.1: architecture of system
Implementation:
Implementation is the stage of the project when the theoretical design is turned out into a working system. Thus it can be
considered to be the most critical stage in achieving a successful new system and in giving the user, confidence that the
new system will work and be effective. The implementation stage involves careful planning, investigation of the existing
system and it‟s constraints on implementation, designing of methods to achieve changeover and evaluation of changeover
methods.
Module description:
Number of Modules
After careful analysis the system has been identified to have the following modules:
1. Registration based Social Authentication Module
2. Security Module Attribute-based encryption module.
3. Multi-authority module.
1. Registration -Based Social Authentication Module:
The system prepares trustees for a user Alice in this phase. Specifically, Alice is first authenticated with her main
authenticator (i.e., password),and then a few(e.g., 5) friends, who also have accounts in the system, are selected by either
Alice herself or the service provider from Alice‟s friend list and are appointed as Alice‟s Registration.
2. Security Module:
Authentication is essential for securing your account and preventing spoofed messages from damaging your online
reputation. Imagine a phishing email being sent from your mail because someone had forged your information. Angry
recipients and spam complaints resulting from it become your mess to clean up, in order to repair your reputation. trustee-
based social authentication systems ask users to select their own trustees without any constraint. In our experiments (i.e.,
Section VII), we show that the service provider can constrain trustee selections via imposing that no users are selected as
trustees by too many other users, which can achieve better security guarantees.
4. ISSN 2350-1022
International Journal of Recent Research in Mathematics Computer Science and Information Technology
Vol. 2, Issue 2, pp: (44-47), Month: October 2015 – March 2016, Available at: www.paperpublications.org
Page | 47
Paper Publications
3. Attribute-based encryption module:
Attribute-based encryption module is using for each and every node encrypt data store. After encrypted data and again the
re-encrypted the same data is using for fine-grain concept using user data uploaded. the attribute-based encryption have
been proposed to secure the cloud storage. Attribute-Based Encryption (ABE). In such encryption scheme, an identity is
viewed as a set of descriptive attributes, and decryption is possible if a decrypter‟s identity has some overlaps with the one
specified in the ciphertext.
4. Multi-authority module:
A multi-authority system is presented in which each user has an id and they can interact with each key generator
(authority) using different pseudonyms. Our goal is to achieve a multi-authority CP-ABE which achieves the security
defined above; guarantees the confidentiality of Data Consumers‟ identity information; and tolerates compromise attacks
on the authorities or the collusion attacks by the authorities. This is the first implementation of a multi-authority attribute
based encryption scheme.
III. CONCLUSIONS AND FUTURE WORK
This paper proposes a semi-anonymous attribute-based privilege control scheme AnonyControl and a fully-anonymous
attribute-based privilege control scheme AnonyControl-F to address the user privacy problem in a cloud storage
server.We also conducted detailed security and performance analysis which shows that Anony- Control both secure and
efficient for cloud storage system.
The AnonyControl-F directly inherits the security of the AnonyControl and thus is equivalently secure as it, but extra
communication overhead is incurred during the 1-out-of-n oblivious transfer. One of the promising future works is to
introduce the efficient user revocation mechanism on top of our anonymous ABE. Supporting user revocation is an
important issue in the real application, and this is a great challenge in the application of ABE schemes
ACKNOWLEDGMENT
The satisfaction that accompanies the successful completion of any task would be in-complete without mentioning the
people who make it possible. I am grateful to number of individuals, faculty members, whose professional guidance along
their encouragement have made it very pleasant endeavor to undertake this project. I have a great pleasure in presenting
the dissertation Control Cloud Data Access Using Attribute-Based Encryption under the guidance of Prof. Sahane
Prema B. for giving us the opportunity to work on this topic and their support and also all the teaching and non-teaching
staff of Computer Engineering Department for their encouragement, support and untiring cooperation. Finally I express
my sincere thanks to our parents, friends and all those who helped us directly or indirectly in many ways in completion of
this dissertation work.
REFERENCES
[1] Shamir, “Identity-based cryptosystems and signature schemes,”in Advances in Cryptology. Berlin, Germany:
Springer-Verlag, 1985, pp. 47–53.
[2] Sahai and B. Waters, “Fuzzy identity-based encryption,” in Advances in Cryptology. Berlin, Germany: Springer-
Verlag, 2005, pp. 457–473.
[3] V. Goyal, O. Pandey, A. Sahai, and B. Waters, “Attribute-based encryption for fine-grained access control of
encrypted data,” in Proc. 13thCCS, 2006, pp. 89–98.
[4] K. Yang, X. Jia, K. Ren, and B. Zhang, “DAC-MACS: Effective data access control for multi-authority cloud
storage systems,” in Proc. IEEE INFOCOM, Apr. 2013, pp. 2895–2903.
[5] W.-G. Tzeng, “Efficient 1-out-of-n oblivious transfer schemes with universally usable parameters,” IEEE Trans.
Comput., vol. 53, no. 2, pp. 232–240, Feb. 2004.
[6] M. Li, S. Yu, Y. Zheng, K. Ren, and W. Lou, “Scalable and secure sharing of personal health records in cloud
computing using attribute based encryption,” IEEE Trans. Parallel Distrib. Syst., vol. 24, no. 1, pp. 131–143, Jan.
2013.