SlideShare a Scribd company logo
1 of 12
Decentralized Access 
Control with 
Anonymous 
Authentication of Data
PRESENTED BY
ABSTRACT 
• We propose a new decentralized access control 
scheme for secure data storage in clouds that 
supports anonymous authentication. 
• In the proposed scheme, the cloud verifies the 
authenticity of the series without knowing the user’s 
identity before storing data. 
• Our scheme also has the added feature of access 
control in which only valid users are able to decrypt 
the stored information.
EXISTING SYSTEM 
• Existing work on access control in cloud are 
centralized in nature. Except and , all other schemes 
use ABE. The scheme in uses a symmetric key 
approach and does not support authentication. The 
schemes do not support authentication as well. 
• It provides privacy preserving authenticated access 
control in cloud. However, the authors take a 
centralized approach where a single key distribution 
center (KDC) distributes secret keys and attributes to 
all users.
DISADVANTAGES OF EXISTING 
SYSTEM 
• The scheme in uses asymmetric key 
approach and does not support 
authentication. 
• Difficult to maintain because of the 
large number of users that are 
supported in a cloud environment.
PROPOSED SYSTEM 
• We propose a new decentralized access control 
scheme for secure data storage in clouds that 
supports anonymous authentication. 
• In the proposed scheme, the cloud verifies the 
authenticity of the series without knowing the 
user’s identity before storing data. 
• Our scheme also has the added feature of access 
control in which only valid users are able to decrypt 
the stored information. 
• The scheme prevents replay attacks and supports 
creation, modification, and reading data stored in 
the cloud.
ADVANTAGES OF PROPOSED 
SYSTEM 
• Distributed access control of data 
stored in cloud so that only authorized 
users with valid attributes can access 
them. 
• Authentication of users who store and 
modify their data on the cloud. 
• The identity of the user is protected 
from the cloud during authentication.
SYSTEM ARCHITECTURE
HARDWARE REQUIREMENTS 
• System : Pentium IV 2.4 
GHz. 
• Hard Disk : 40 GB. 
• Floppy Drive : 1.44 Mb. 
• Monitor : 15 VGA Colour. 
• Mouse : Logitech. 
• Ram : 512 Mb.
SOFTWARE REQUIREMENTS 
• Operating system : Windows XP/7. 
• Coding Language : JAVA/J2EE 
• IDE :Netbeans 7.4 
• Database :MYSQL
REFERENCES 
• Sushmita Ruj,Milos Stojmenovic, 
and Amiya Nayak,“Decentralized 
Access Control with Anonymous 
Authentication of Data Stored in 
Clouds”,VOL. 25, NO. 2, FEBRUARY 
2014.
TO THIS PROJECT CONTACT

More Related Content

Viewers also liked

First fare 2011 website design for frc teams
First fare 2011 website design for frc teamsFirst fare 2011 website design for frc teams
First fare 2011 website design for frc teams
Oregon FIRST Robotics
 
Audience and narrative concept presentation
Audience and narrative concept presentationAudience and narrative concept presentation
Audience and narrative concept presentation
Tafi123
 
First fare 2010 website 101 for frc teams
First fare 2010 website 101 for frc teamsFirst fare 2010 website 101 for frc teams
First fare 2010 website 101 for frc teams
Oregon FIRST Robotics
 
Green droid automated diagnosis of energy inefficiency for smartphone applica...
Green droid automated diagnosis of energy inefficiency for smartphone applica...Green droid automated diagnosis of energy inefficiency for smartphone applica...
Green droid automated diagnosis of energy inefficiency for smartphone applica...
JPINFOTECH JAYAPRAKASH
 
Take off for exploration
Take off for explorationTake off for exploration
Take off for exploration
Sandipan Dhar
 
Should School Lunch Be Regulated? Facts & Infographic
Should School Lunch Be Regulated?  Facts & InfographicShould School Lunch Be Regulated?  Facts & Infographic
Should School Lunch Be Regulated? Facts & Infographic
Maps of World
 

Viewers also liked (16)

Cults, Biker Gangs, Sports Teams
Cults, Biker Gangs, Sports Teams Cults, Biker Gangs, Sports Teams
Cults, Biker Gangs, Sports Teams
 
First fare 2011 website design for frc teams
First fare 2011 website design for frc teamsFirst fare 2011 website design for frc teams
First fare 2011 website design for frc teams
 
Audience and narrative concept presentation
Audience and narrative concept presentationAudience and narrative concept presentation
Audience and narrative concept presentation
 
Is Bullying A Silent Epidemic Among Kids? - Facts & Infographic
Is Bullying A Silent Epidemic Among Kids? - Facts & InfographicIs Bullying A Silent Epidemic Among Kids? - Facts & Infographic
Is Bullying A Silent Epidemic Among Kids? - Facts & Infographic
 
Protecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperProtecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropper
 
Are Pro Sports Fixed?
Are Pro Sports Fixed?Are Pro Sports Fixed?
Are Pro Sports Fixed?
 
2012-2013 IEEE PROJECT TITLES
2012-2013 IEEE PROJECT TITLES2012-2013 IEEE PROJECT TITLES
2012-2013 IEEE PROJECT TITLES
 
First fare 2010 website 101 for frc teams
First fare 2010 website 101 for frc teamsFirst fare 2010 website 101 for frc teams
First fare 2010 website 101 for frc teams
 
Moses supporting and enforcing security profiles on smartphones
Moses supporting and enforcing security profiles on smartphonesMoses supporting and enforcing security profiles on smartphones
Moses supporting and enforcing security profiles on smartphones
 
Green droid automated diagnosis of energy inefficiency for smartphone applica...
Green droid automated diagnosis of energy inefficiency for smartphone applica...Green droid automated diagnosis of energy inefficiency for smartphone applica...
Green droid automated diagnosis of energy inefficiency for smartphone applica...
 
Wordcamp 2012 riaan knoetze - how to hijack a themeshop
Wordcamp 2012   riaan knoetze - how to hijack a themeshopWordcamp 2012   riaan knoetze - how to hijack a themeshop
Wordcamp 2012 riaan knoetze - how to hijack a themeshop
 
CONSTITUCIÓN 1º y 2º
CONSTITUCIÓN  1º y 2ºCONSTITUCIÓN  1º y 2º
CONSTITUCIÓN 1º y 2º
 
Take off for exploration
Take off for explorationTake off for exploration
Take off for exploration
 
Should School Lunch Be Regulated? Facts & Infographic
Should School Lunch Be Regulated?  Facts & InfographicShould School Lunch Be Regulated?  Facts & Infographic
Should School Lunch Be Regulated? Facts & Infographic
 
Gerardi promo 31 12-2013
Gerardi promo 31 12-2013Gerardi promo 31 12-2013
Gerardi promo 31 12-2013
 
Promo Sistemi di pesatura
 Promo Sistemi di pesatura   Promo Sistemi di pesatura
Promo Sistemi di pesatura
 

Recently uploaded

Industrial Training Report- AKTU Industrial Training Report
Industrial Training Report- AKTU Industrial Training ReportIndustrial Training Report- AKTU Industrial Training Report
Industrial Training Report- AKTU Industrial Training Report
Avinash Rai
 
IATP How-to Foreign Travel May 2024.pdff
IATP How-to Foreign Travel May 2024.pdffIATP How-to Foreign Travel May 2024.pdff
IATP How-to Foreign Travel May 2024.pdff
17thcssbs2
 

Recently uploaded (20)

Industrial Training Report- AKTU Industrial Training Report
Industrial Training Report- AKTU Industrial Training ReportIndustrial Training Report- AKTU Industrial Training Report
Industrial Training Report- AKTU Industrial Training Report
 
The Last Leaf, a short story by O. Henry
The Last Leaf, a short story by O. HenryThe Last Leaf, a short story by O. Henry
The Last Leaf, a short story by O. Henry
 
NCERT Solutions Power Sharing Class 10 Notes pdf
NCERT Solutions Power Sharing Class 10 Notes pdfNCERT Solutions Power Sharing Class 10 Notes pdf
NCERT Solutions Power Sharing Class 10 Notes pdf
 
Incoming and Outgoing Shipments in 2 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 2 STEPS Using Odoo 17Incoming and Outgoing Shipments in 2 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 2 STEPS Using Odoo 17
 
size separation d pharm 1st year pharmaceutics
size separation d pharm 1st year pharmaceuticssize separation d pharm 1st year pharmaceutics
size separation d pharm 1st year pharmaceutics
 
How to Manage Notification Preferences in the Odoo 17
How to Manage Notification Preferences in the Odoo 17How to Manage Notification Preferences in the Odoo 17
How to Manage Notification Preferences in the Odoo 17
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Benefits and Challenges of Using Open Educational Resources
Benefits and Challenges of Using Open Educational ResourcesBenefits and Challenges of Using Open Educational Resources
Benefits and Challenges of Using Open Educational Resources
 
[GDSC YCCE] Build with AI Online Presentation
[GDSC YCCE] Build with AI Online Presentation[GDSC YCCE] Build with AI Online Presentation
[GDSC YCCE] Build with AI Online Presentation
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative Thoughts
 
Post Exam Fun(da) Intra UEM General Quiz - Finals.pdf
Post Exam Fun(da) Intra UEM General Quiz - Finals.pdfPost Exam Fun(da) Intra UEM General Quiz - Finals.pdf
Post Exam Fun(da) Intra UEM General Quiz - Finals.pdf
 
Features of Video Calls in the Discuss Module in Odoo 17
Features of Video Calls in the Discuss Module in Odoo 17Features of Video Calls in the Discuss Module in Odoo 17
Features of Video Calls in the Discuss Module in Odoo 17
 
The impact of social media on mental health and well-being has been a topic o...
The impact of social media on mental health and well-being has been a topic o...The impact of social media on mental health and well-being has been a topic o...
The impact of social media on mental health and well-being has been a topic o...
 
Word Stress rules esl .pptx
Word Stress rules esl               .pptxWord Stress rules esl               .pptx
Word Stress rules esl .pptx
 
IATP How-to Foreign Travel May 2024.pdff
IATP How-to Foreign Travel May 2024.pdffIATP How-to Foreign Travel May 2024.pdff
IATP How-to Foreign Travel May 2024.pdff
 
Basic_QTL_Marker-assisted_Selection_Sourabh.ppt
Basic_QTL_Marker-assisted_Selection_Sourabh.pptBasic_QTL_Marker-assisted_Selection_Sourabh.ppt
Basic_QTL_Marker-assisted_Selection_Sourabh.ppt
 
Gyanartha SciBizTech Quiz slideshare.pptx
Gyanartha SciBizTech Quiz slideshare.pptxGyanartha SciBizTech Quiz slideshare.pptx
Gyanartha SciBizTech Quiz slideshare.pptx
 
“O BEIJO” EM ARTE .
“O BEIJO” EM ARTE                       .“O BEIJO” EM ARTE                       .
“O BEIJO” EM ARTE .
 
How to the fix Attribute Error in odoo 17
How to the fix Attribute Error in odoo 17How to the fix Attribute Error in odoo 17
How to the fix Attribute Error in odoo 17
 
Advances in production technology of Grapes.pdf
Advances in production technology of Grapes.pdfAdvances in production technology of Grapes.pdf
Advances in production technology of Grapes.pdf
 

Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds

  • 1. Decentralized Access Control with Anonymous Authentication of Data
  • 3. ABSTRACT • We propose a new decentralized access control scheme for secure data storage in clouds that supports anonymous authentication. • In the proposed scheme, the cloud verifies the authenticity of the series without knowing the user’s identity before storing data. • Our scheme also has the added feature of access control in which only valid users are able to decrypt the stored information.
  • 4. EXISTING SYSTEM • Existing work on access control in cloud are centralized in nature. Except and , all other schemes use ABE. The scheme in uses a symmetric key approach and does not support authentication. The schemes do not support authentication as well. • It provides privacy preserving authenticated access control in cloud. However, the authors take a centralized approach where a single key distribution center (KDC) distributes secret keys and attributes to all users.
  • 5. DISADVANTAGES OF EXISTING SYSTEM • The scheme in uses asymmetric key approach and does not support authentication. • Difficult to maintain because of the large number of users that are supported in a cloud environment.
  • 6. PROPOSED SYSTEM • We propose a new decentralized access control scheme for secure data storage in clouds that supports anonymous authentication. • In the proposed scheme, the cloud verifies the authenticity of the series without knowing the user’s identity before storing data. • Our scheme also has the added feature of access control in which only valid users are able to decrypt the stored information. • The scheme prevents replay attacks and supports creation, modification, and reading data stored in the cloud.
  • 7. ADVANTAGES OF PROPOSED SYSTEM • Distributed access control of data stored in cloud so that only authorized users with valid attributes can access them. • Authentication of users who store and modify their data on the cloud. • The identity of the user is protected from the cloud during authentication.
  • 9. HARDWARE REQUIREMENTS • System : Pentium IV 2.4 GHz. • Hard Disk : 40 GB. • Floppy Drive : 1.44 Mb. • Monitor : 15 VGA Colour. • Mouse : Logitech. • Ram : 512 Mb.
  • 10. SOFTWARE REQUIREMENTS • Operating system : Windows XP/7. • Coding Language : JAVA/J2EE • IDE :Netbeans 7.4 • Database :MYSQL
  • 11. REFERENCES • Sushmita Ruj,Milos Stojmenovic, and Amiya Nayak,“Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds”,VOL. 25, NO. 2, FEBRUARY 2014.
  • 12. TO THIS PROJECT CONTACT