SlideShare a Scribd company logo
Expressive, Efficient, and Revocable Data Access Control for Multi Authority Cloud Storage 
Expressive, Efficient, and Revocable Data Access Control for Multi 
Authority Cloud Storage 
Data access control is an effective way to ensure the data security in the cloud. Due to data 
outsourcing and untrusted cloud servers, the data access control becomes a challenging issue in 
cloud storage systems. Ciphertext-Policy Attributebased Encryption (CP-ABE) is regarded as 
one of the most suitable technologies for data access control in cloud storage, because it gives 
data owners more direct control on access policies. However, it is difficult to directly apply 
existing CP-ABE schemes to data access control for cloud storage systems because of the 
attribute revocation problem. In this paper, we design an expressive, efficient and revocable data 
access control scheme for multi-authority cloud storage systems, where there are multiple 
authorities co-exist and each authority is able to issue attributes independently. Specifically, we 
propose a revocable multi-authority CP-ABE scheme, and apply it as the underlying techniques 
to design the data access control scheme. Our attribute revocation method can efficiently achieve 
both forward security and backward security. The analysis and simulation results show that our 
proposed data access control scheme is secure in the random oracle model and is more efficient 
than previous works. 
This new paradigm of data hosting and data access services introduces a great challenge to 
dataaccess control. Because the cloud server cannot be fully trusted by data owners, they can no 
longer rely on servers to do access control. Ciphertext-Policy Attribute-based Encryption (CP-ABE) 
is regarded as one of the most suitabletechnologies for data access control in cloud storage 
systems,because it gives the data owner more direct control on access policies. In CP-ABE 
scheme, there is an authority that is responsible for attribute management and key distribution. 
DISADVANTAGES OF EXISTING SYSTEM: 
 Chase’s multi-authority CP-ABE protocol allows the central authority to decrypt 
allthe ciphertexts, since it holds the master key of the system. 
Contact: 9703109334, 9533694296 
ABSTRACT: 
EXISTING SYSTEM: 
Email id: academicliveprojects@gmail.com, www.logicsystems.org.in
Expressive, Efficient, and Revocable Data Access Control for Multi Authority Cloud Storage 
 Chase’s protocol does not support sattribute revocation. 
In this paper, we first propose a revocable multiauthority CP-ABE scheme, where an efficient 
and secure revocation method is proposed to solve the attribute revocation problem in the 
system. Our attribute revocation method is efficient in the sense that it incurs less 
communication cost and computation cost, and is secure in the sense that it can achieve both 
backward security (The revoked user cannot decrypt any new ciphertext that requires the 
revoked attribute to decrypt)and forward security (The newly joined user can also decrypt the 
previously published ciphertexts1, if it has sufficient.attributes). Our scheme does not require the 
server to be fully trusted, because the key update is enforced by each attribute authority not the 
server. Even if the server is not semitrusted in some scenarios, our scheme can still guarantee the 
backward security. Then, we apply our proposed revocable multi-authority CP-ABE scheme as 
the underlying techniques to construct the expressive and secure data access control scheme for 
multi-authority cloud storage systems. 
ADVANTAGES OF PROPOSED SYSTEM: 
 We modify the framework of the scheme and make it more practical to cloud storage 
systems, in which data owners are not involved in the key generation. 
 We greatly improve the efficiency of the attribute revocation method. 
 We also highly improve the expressiveness of our access control scheme, where we 
remove the limitation that each attribute can only appear at most once in a ciphertext. 
Contact: 9703109334, 9533694296 
PROPOSED SYSTEM: 
Email id: academicliveprojects@gmail.com, www.logicsystems.org.in
Expressive, Efficient, and Revocable Data Access Control for Multi Authority Cloud Storage 
SYSTEM ARCHITECTURE: 
SYSTEM REQUIREMENTS: 
HARDWARE REQUIREMENTS: 
 System : Pentium IV 2.4 GHz. 
 Hard Disk : 40 GB. 
 Floppy Drive : 1.44 Mb. 
 Monitor : 15 VGA Colour. 
 Mouse : Logitech. 
 Ram : 512 Mb. 
Contact: 9703109334, 9533694296 
Email id: academicliveprojects@gmail.com, www.logicsystems.org.in
Expressive, Efficient, and Revocable Data Access Control for Multi Authority Cloud Storage 
SOFTWARE REQUIREMENTS: 
 Operating system : Windows XP/7. 
 Coding Language : JAVA/J2EE 
 IDE : Netbeans 7.4 
 Database : MYSQL 
Kan Yang, Student Member, IEEE, and Xiaohua Jia, Fellow, IEEE“Expressive, Efficient, and 
Revocable Data Access Control for Multi-Authority Cloud Storage” IEEE 
TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS,VOL. 25,NO. 7,JULY 
2014. 
Contact: 9703109334, 9533694296 
REFERENCE: 
Email id: academicliveprojects@gmail.com, www.logicsystems.org.in

More Related Content

What's hot

Authentication on Cloud using Attribute Based Encryption
Authentication on Cloud using Attribute Based EncryptionAuthentication on Cloud using Attribute Based Encryption
Authentication on Cloud using Attribute Based Encryption
Ankit Raj
 
Privacypreservingdelegatedaccesscontrolinpublicclouds
Privacypreservingdelegatedaccesscontrolinpublicclouds Privacypreservingdelegatedaccesscontrolinpublicclouds
Privacypreservingdelegatedaccesscontrolinpublicclouds
Shakas Technologies
 
Privacy preserving delegated access control in public clouds
Privacy preserving delegated access control in public cloudsPrivacy preserving delegated access control in public clouds
Privacy preserving delegated access control in public clouds
IEEEFINALYEARPROJECTS
 
Privacy preserving delegated access control in public cloud
Privacy preserving delegated access control in public cloudPrivacy preserving delegated access control in public cloud
Privacy preserving delegated access control in public cloud
Aswathy Rajan
 
An efficient certificateless encryption for data sharing on public cloud
An efficient certificateless encryption for data sharing on public cloudAn efficient certificateless encryption for data sharing on public cloud
An efficient certificateless encryption for data sharing on public cloud
Abhijeet Patil
 
An efficient certificate less encryption for
An efficient certificate less encryption forAn efficient certificate less encryption for
An efficient certificate less encryption for
Shakas Technologies
 
Final year presentation
Final year presentationFinal year presentation
Final year presentation
Abhishek Jain
 
RAAC: Robust and Auditable Access Control with Multiple Attribute Authorities...
RAAC: Robust and Auditable Access Control with Multiple Attribute Authorities...RAAC: Robust and Auditable Access Control with Multiple Attribute Authorities...
RAAC: Robust and Auditable Access Control with Multiple Attribute Authorities...
Prasadu Peddi
 
Acquisition of Secured Data from Cloud
Acquisition of Secured Data from CloudAcquisition of Secured Data from Cloud
Acquisition of Secured Data from Cloud
IJMTST Journal
 
Audit free cloud storage via deniable attribute based encryption
Audit free cloud storage via  deniable attribute based encryptionAudit free cloud storage via  deniable attribute based encryption
Audit free cloud storage via deniable attribute based encryption
Mano Sriram
 
Ppt 1
Ppt 1Ppt 1
Access policy consolidation for event processing systems
Access policy consolidation for event processing systemsAccess policy consolidation for event processing systems
Access policy consolidation for event processing systems
IEEEFINALYEARPROJECTS
 
Access policy consolidation for event processing systems
Access policy consolidation for event processing systemsAccess policy consolidation for event processing systems
Access policy consolidation for event processing systems
IEEEFINALYEARPROJECTS
 
KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUD
KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUDKEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUD
KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUD
Naseem nisar
 
Privacy preserving delegated access control in public clouds
Privacy preserving delegated access control in public cloudsPrivacy preserving delegated access control in public clouds
Privacy preserving delegated access control in public clouds
LeMeniz Infotech
 
Audit free cloud storage via deniable attribute based encryption
Audit free cloud storage via deniable attribute based encryptionAudit free cloud storage via deniable attribute based encryption
Audit free cloud storage via deniable attribute based encryption
Kamal Spring
 

What's hot (16)

Authentication on Cloud using Attribute Based Encryption
Authentication on Cloud using Attribute Based EncryptionAuthentication on Cloud using Attribute Based Encryption
Authentication on Cloud using Attribute Based Encryption
 
Privacypreservingdelegatedaccesscontrolinpublicclouds
Privacypreservingdelegatedaccesscontrolinpublicclouds Privacypreservingdelegatedaccesscontrolinpublicclouds
Privacypreservingdelegatedaccesscontrolinpublicclouds
 
Privacy preserving delegated access control in public clouds
Privacy preserving delegated access control in public cloudsPrivacy preserving delegated access control in public clouds
Privacy preserving delegated access control in public clouds
 
Privacy preserving delegated access control in public cloud
Privacy preserving delegated access control in public cloudPrivacy preserving delegated access control in public cloud
Privacy preserving delegated access control in public cloud
 
An efficient certificateless encryption for data sharing on public cloud
An efficient certificateless encryption for data sharing on public cloudAn efficient certificateless encryption for data sharing on public cloud
An efficient certificateless encryption for data sharing on public cloud
 
An efficient certificate less encryption for
An efficient certificate less encryption forAn efficient certificate less encryption for
An efficient certificate less encryption for
 
Final year presentation
Final year presentationFinal year presentation
Final year presentation
 
RAAC: Robust and Auditable Access Control with Multiple Attribute Authorities...
RAAC: Robust and Auditable Access Control with Multiple Attribute Authorities...RAAC: Robust and Auditable Access Control with Multiple Attribute Authorities...
RAAC: Robust and Auditable Access Control with Multiple Attribute Authorities...
 
Acquisition of Secured Data from Cloud
Acquisition of Secured Data from CloudAcquisition of Secured Data from Cloud
Acquisition of Secured Data from Cloud
 
Audit free cloud storage via deniable attribute based encryption
Audit free cloud storage via  deniable attribute based encryptionAudit free cloud storage via  deniable attribute based encryption
Audit free cloud storage via deniable attribute based encryption
 
Ppt 1
Ppt 1Ppt 1
Ppt 1
 
Access policy consolidation for event processing systems
Access policy consolidation for event processing systemsAccess policy consolidation for event processing systems
Access policy consolidation for event processing systems
 
Access policy consolidation for event processing systems
Access policy consolidation for event processing systemsAccess policy consolidation for event processing systems
Access policy consolidation for event processing systems
 
KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUD
KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUDKEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUD
KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUD
 
Privacy preserving delegated access control in public clouds
Privacy preserving delegated access control in public cloudsPrivacy preserving delegated access control in public clouds
Privacy preserving delegated access control in public clouds
 
Audit free cloud storage via deniable attribute based encryption
Audit free cloud storage via deniable attribute based encryptionAudit free cloud storage via deniable attribute based encryption
Audit free cloud storage via deniable attribute based encryption
 

Similar to expressive, efficient, and revocable data access control for multi authority cloud storage

JPJ1407 Expressive, Efficient, and Revocable Data Access Control for Multi-...
JPJ1407   Expressive, Efficient, and Revocable Data Access Control for Multi-...JPJ1407   Expressive, Efficient, and Revocable Data Access Control for Multi-...
JPJ1407 Expressive, Efficient, and Revocable Data Access Control for Multi-...
chennaijp
 
Hasbe a hierarchical attribute based solution
Hasbe a hierarchical attribute based solutionHasbe a hierarchical attribute based solution
Hasbe a hierarchical attribute based solution
IMPULSE_TECHNOLOGY
 
Hierarchical attribute based solution for flexible access control in cloud co...
Hierarchical attribute based solution for flexible access control in cloud co...Hierarchical attribute based solution for flexible access control in cloud co...
Hierarchical attribute based solution for flexible access control in cloud co...
IJARIIT
 
survey paper on cp abe cloud computing
survey paper on cp abe cloud computingsurvey paper on cp abe cloud computing
survey paper on cp abe cloud computing
INFOGAIN PUBLICATION
 
A Secure & Scalable Access Method in Cloud Computing
A Secure & Scalable Access Method in Cloud ComputingA Secure & Scalable Access Method in Cloud Computing
A Secure & Scalable Access Method in Cloud Computing
ijsrd.com
 
Investigation on Revocable Fine-grained Access Control Scheme for Multi-Autho...
Investigation on Revocable Fine-grained Access Control Scheme for Multi-Autho...Investigation on Revocable Fine-grained Access Control Scheme for Multi-Autho...
Investigation on Revocable Fine-grained Access Control Scheme for Multi-Autho...
IJCERT JOURNAL
 
Secure and-verifiable-policy-update-outsourcing-for-big-data-access-control-i...
Secure and-verifiable-policy-update-outsourcing-for-big-data-access-control-i...Secure and-verifiable-policy-update-outsourcing-for-big-data-access-control-i...
Secure and-verifiable-policy-update-outsourcing-for-big-data-access-control-i...
Kamal Spring
 
C04932125
C04932125C04932125
C04932125
IOSR-JEN
 
Cloud Computing Environment using Secured Access Control Technique
Cloud Computing Environment using Secured Access Control TechniqueCloud Computing Environment using Secured Access Control Technique
Cloud Computing Environment using Secured Access Control Technique
IRJET Journal
 
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
Shakas Technologies
 
Providing user security guarantees in public infrastructure clouds
Providing user security guarantees in public infrastructure cloudsProviding user security guarantees in public infrastructure clouds
Providing user security guarantees in public infrastructure clouds
Kamal Spring
 
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
Editor IJCATR
 
IRJET- Data Centric Access Control Solution with Role baesd Proxy Re-Encryption
IRJET- Data Centric Access Control Solution with Role baesd Proxy Re-EncryptionIRJET- Data Centric Access Control Solution with Role baesd Proxy Re-Encryption
IRJET- Data Centric Access Control Solution with Role baesd Proxy Re-Encryption
IRJET Journal
 
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Attribute based encryption with verifia...
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Attribute based encryption with verifia...JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Attribute based encryption with verifia...
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Attribute based encryption with verifia...
IEEEGLOBALSOFTTECHNOLOGIES
 
Attribute based encryption with verifiable outsourced decryption
Attribute based encryption with verifiable outsourced decryptionAttribute based encryption with verifiable outsourced decryption
Attribute based encryption with verifiable outsourced decryption
IEEEFINALYEARPROJECTS
 
Attribute based data sharing scheme revisited in cloud computing
Attribute based data sharing scheme revisited in cloud computingAttribute based data sharing scheme revisited in cloud computing
Attribute based data sharing scheme revisited in cloud computing
ieeepondy
 
Enhanced Hybrid Blowfish and ECC Encryption to Secure cloud Data Access and S...
Enhanced Hybrid Blowfish and ECC Encryption to Secure cloud Data Access and S...Enhanced Hybrid Blowfish and ECC Encryption to Secure cloud Data Access and S...
Enhanced Hybrid Blowfish and ECC Encryption to Secure cloud Data Access and S...
JobandeepKaur2
 
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Privacy preserving delegated access con...
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Privacy preserving delegated access con...JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Privacy preserving delegated access con...
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Privacy preserving delegated access con...
IEEEGLOBALSOFTTECHNOLOGIES
 
A robust and verifiable threshold multi authority access control system in pu...
A robust and verifiable threshold multi authority access control system in pu...A robust and verifiable threshold multi authority access control system in pu...
A robust and verifiable threshold multi authority access control system in pu...
IJARIIT
 
Ijcatr04051007
Ijcatr04051007Ijcatr04051007
Ijcatr04051007
Editor IJCATR
 

Similar to expressive, efficient, and revocable data access control for multi authority cloud storage (20)

JPJ1407 Expressive, Efficient, and Revocable Data Access Control for Multi-...
JPJ1407   Expressive, Efficient, and Revocable Data Access Control for Multi-...JPJ1407   Expressive, Efficient, and Revocable Data Access Control for Multi-...
JPJ1407 Expressive, Efficient, and Revocable Data Access Control for Multi-...
 
Hasbe a hierarchical attribute based solution
Hasbe a hierarchical attribute based solutionHasbe a hierarchical attribute based solution
Hasbe a hierarchical attribute based solution
 
Hierarchical attribute based solution for flexible access control in cloud co...
Hierarchical attribute based solution for flexible access control in cloud co...Hierarchical attribute based solution for flexible access control in cloud co...
Hierarchical attribute based solution for flexible access control in cloud co...
 
survey paper on cp abe cloud computing
survey paper on cp abe cloud computingsurvey paper on cp abe cloud computing
survey paper on cp abe cloud computing
 
A Secure & Scalable Access Method in Cloud Computing
A Secure & Scalable Access Method in Cloud ComputingA Secure & Scalable Access Method in Cloud Computing
A Secure & Scalable Access Method in Cloud Computing
 
Investigation on Revocable Fine-grained Access Control Scheme for Multi-Autho...
Investigation on Revocable Fine-grained Access Control Scheme for Multi-Autho...Investigation on Revocable Fine-grained Access Control Scheme for Multi-Autho...
Investigation on Revocable Fine-grained Access Control Scheme for Multi-Autho...
 
Secure and-verifiable-policy-update-outsourcing-for-big-data-access-control-i...
Secure and-verifiable-policy-update-outsourcing-for-big-data-access-control-i...Secure and-verifiable-policy-update-outsourcing-for-big-data-access-control-i...
Secure and-verifiable-policy-update-outsourcing-for-big-data-access-control-i...
 
C04932125
C04932125C04932125
C04932125
 
Cloud Computing Environment using Secured Access Control Technique
Cloud Computing Environment using Secured Access Control TechniqueCloud Computing Environment using Secured Access Control Technique
Cloud Computing Environment using Secured Access Control Technique
 
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
 
Providing user security guarantees in public infrastructure clouds
Providing user security guarantees in public infrastructure cloudsProviding user security guarantees in public infrastructure clouds
Providing user security guarantees in public infrastructure clouds
 
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
 
IRJET- Data Centric Access Control Solution with Role baesd Proxy Re-Encryption
IRJET- Data Centric Access Control Solution with Role baesd Proxy Re-EncryptionIRJET- Data Centric Access Control Solution with Role baesd Proxy Re-Encryption
IRJET- Data Centric Access Control Solution with Role baesd Proxy Re-Encryption
 
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Attribute based encryption with verifia...
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Attribute based encryption with verifia...JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Attribute based encryption with verifia...
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Attribute based encryption with verifia...
 
Attribute based encryption with verifiable outsourced decryption
Attribute based encryption with verifiable outsourced decryptionAttribute based encryption with verifiable outsourced decryption
Attribute based encryption with verifiable outsourced decryption
 
Attribute based data sharing scheme revisited in cloud computing
Attribute based data sharing scheme revisited in cloud computingAttribute based data sharing scheme revisited in cloud computing
Attribute based data sharing scheme revisited in cloud computing
 
Enhanced Hybrid Blowfish and ECC Encryption to Secure cloud Data Access and S...
Enhanced Hybrid Blowfish and ECC Encryption to Secure cloud Data Access and S...Enhanced Hybrid Blowfish and ECC Encryption to Secure cloud Data Access and S...
Enhanced Hybrid Blowfish and ECC Encryption to Secure cloud Data Access and S...
 
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Privacy preserving delegated access con...
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Privacy preserving delegated access con...JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Privacy preserving delegated access con...
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Privacy preserving delegated access con...
 
A robust and verifiable threshold multi authority access control system in pu...
A robust and verifiable threshold multi authority access control system in pu...A robust and verifiable threshold multi authority access control system in pu...
A robust and verifiable threshold multi authority access control system in pu...
 
Ijcatr04051007
Ijcatr04051007Ijcatr04051007
Ijcatr04051007
 

More from swathi78

secure mining of association rules in horizontally distributed databases
secure mining of association rules in horizontally distributed databasessecure mining of association rules in horizontally distributed databases
secure mining of association rules in horizontally distributed databases
swathi78
 
a system for denial-of-service attack detection based on multivariate correla...
a system for denial-of-service attack detection based on multivariate correla...a system for denial-of-service attack detection based on multivariate correla...
a system for denial-of-service attack detection based on multivariate correla...
swathi78
 
web service recommendation via exploiting location and qo s information
web service recommendation via exploiting location and qo s informationweb service recommendation via exploiting location and qo s information
web service recommendation via exploiting location and qo s information
swathi78
 
privacy-enhanced web service composition
privacy-enhanced web service compositionprivacy-enhanced web service composition
privacy-enhanced web service composition
swathi78
 
optimal distributed malware defense in mobile networks with heterogeneous dev...
optimal distributed malware defense in mobile networks with heterogeneous dev...optimal distributed malware defense in mobile networks with heterogeneous dev...
optimal distributed malware defense in mobile networks with heterogeneous dev...
swathi78
 
friend book a semantic-based friend recommendation system for social networks
friend book a semantic-based friend recommendation system for social networksfriend book a semantic-based friend recommendation system for social networks
friend book a semantic-based friend recommendation system for social networks
swathi78
 
efficient authentication for mobile and pervasive computing
efficient authentication for mobile and pervasive computingefficient authentication for mobile and pervasive computing
efficient authentication for mobile and pervasive computing
swathi78
 
cooperative caching for efficient data access in disruption tolerant networks
cooperative caching for efficient data access in disruption tolerant networkscooperative caching for efficient data access in disruption tolerant networks
cooperative caching for efficient data access in disruption tolerant networks
swathi78
 
an incentive framework for cellular traffic offloading
an incentive framework for cellular traffic offloadingan incentive framework for cellular traffic offloading
an incentive framework for cellular traffic offloading
swathi78
 
secure outsourced attribute-based signatures
secure outsourced attribute-based signaturessecure outsourced attribute-based signatures
secure outsourced attribute-based signatures
swathi78
 
traffic pattern-based content leakage detection for trusted content delivery ...
traffic pattern-based content leakage detection for trusted content delivery ...traffic pattern-based content leakage detection for trusted content delivery ...
traffic pattern-based content leakage detection for trusted content delivery ...
swathi78
 
the design and evaluation of an information sharing system for human networks
the design and evaluation of an information sharing system for human networksthe design and evaluation of an information sharing system for human networks
the design and evaluation of an information sharing system for human networks
swathi78
 
the client assignment problem for continuous distributed interactive applicat...
the client assignment problem for continuous distributed interactive applicat...the client assignment problem for continuous distributed interactive applicat...
the client assignment problem for continuous distributed interactive applicat...
swathi78
 
sos a distributed mobile q&a system based on social networks
sos a distributed mobile q&a system based on social networkssos a distributed mobile q&a system based on social networks
sos a distributed mobile q&a system based on social networks
swathi78
 
securing broker-less publish subscribe systems using identity-based encryption
securing broker-less publish subscribe systems using identity-based encryptionsecuring broker-less publish subscribe systems using identity-based encryption
securing broker-less publish subscribe systems using identity-based encryption
swathi78
 
rre a game-theoretic intrusion response and recovery engine
rre a game-theoretic intrusion response and recovery enginerre a game-theoretic intrusion response and recovery engine
rre a game-theoretic intrusion response and recovery engine
swathi78
 
on false data-injection attacks against power system state estimation modelin...
on false data-injection attacks against power system state estimation modelin...on false data-injection attacks against power system state estimation modelin...
on false data-injection attacks against power system state estimation modelin...
swathi78
 
loca ward a security and privacy aware location-based rewarding system
loca ward a security and privacy aware location-based rewarding systemloca ward a security and privacy aware location-based rewarding system
loca ward a security and privacy aware location-based rewarding system
swathi78
 
exploiting service similarity for privacy in location-based search queries
exploiting service similarity for privacy in location-based search queriesexploiting service similarity for privacy in location-based search queries
exploiting service similarity for privacy in location-based search queries
swathi78
 
enabling trustworthy service evaluation in service-oriented mobile social net...
enabling trustworthy service evaluation in service-oriented mobile social net...enabling trustworthy service evaluation in service-oriented mobile social net...
enabling trustworthy service evaluation in service-oriented mobile social net...
swathi78
 

More from swathi78 (20)

secure mining of association rules in horizontally distributed databases
secure mining of association rules in horizontally distributed databasessecure mining of association rules in horizontally distributed databases
secure mining of association rules in horizontally distributed databases
 
a system for denial-of-service attack detection based on multivariate correla...
a system for denial-of-service attack detection based on multivariate correla...a system for denial-of-service attack detection based on multivariate correla...
a system for denial-of-service attack detection based on multivariate correla...
 
web service recommendation via exploiting location and qo s information
web service recommendation via exploiting location and qo s informationweb service recommendation via exploiting location and qo s information
web service recommendation via exploiting location and qo s information
 
privacy-enhanced web service composition
privacy-enhanced web service compositionprivacy-enhanced web service composition
privacy-enhanced web service composition
 
optimal distributed malware defense in mobile networks with heterogeneous dev...
optimal distributed malware defense in mobile networks with heterogeneous dev...optimal distributed malware defense in mobile networks with heterogeneous dev...
optimal distributed malware defense in mobile networks with heterogeneous dev...
 
friend book a semantic-based friend recommendation system for social networks
friend book a semantic-based friend recommendation system for social networksfriend book a semantic-based friend recommendation system for social networks
friend book a semantic-based friend recommendation system for social networks
 
efficient authentication for mobile and pervasive computing
efficient authentication for mobile and pervasive computingefficient authentication for mobile and pervasive computing
efficient authentication for mobile and pervasive computing
 
cooperative caching for efficient data access in disruption tolerant networks
cooperative caching for efficient data access in disruption tolerant networkscooperative caching for efficient data access in disruption tolerant networks
cooperative caching for efficient data access in disruption tolerant networks
 
an incentive framework for cellular traffic offloading
an incentive framework for cellular traffic offloadingan incentive framework for cellular traffic offloading
an incentive framework for cellular traffic offloading
 
secure outsourced attribute-based signatures
secure outsourced attribute-based signaturessecure outsourced attribute-based signatures
secure outsourced attribute-based signatures
 
traffic pattern-based content leakage detection for trusted content delivery ...
traffic pattern-based content leakage detection for trusted content delivery ...traffic pattern-based content leakage detection for trusted content delivery ...
traffic pattern-based content leakage detection for trusted content delivery ...
 
the design and evaluation of an information sharing system for human networks
the design and evaluation of an information sharing system for human networksthe design and evaluation of an information sharing system for human networks
the design and evaluation of an information sharing system for human networks
 
the client assignment problem for continuous distributed interactive applicat...
the client assignment problem for continuous distributed interactive applicat...the client assignment problem for continuous distributed interactive applicat...
the client assignment problem for continuous distributed interactive applicat...
 
sos a distributed mobile q&a system based on social networks
sos a distributed mobile q&a system based on social networkssos a distributed mobile q&a system based on social networks
sos a distributed mobile q&a system based on social networks
 
securing broker-less publish subscribe systems using identity-based encryption
securing broker-less publish subscribe systems using identity-based encryptionsecuring broker-less publish subscribe systems using identity-based encryption
securing broker-less publish subscribe systems using identity-based encryption
 
rre a game-theoretic intrusion response and recovery engine
rre a game-theoretic intrusion response and recovery enginerre a game-theoretic intrusion response and recovery engine
rre a game-theoretic intrusion response and recovery engine
 
on false data-injection attacks against power system state estimation modelin...
on false data-injection attacks against power system state estimation modelin...on false data-injection attacks against power system state estimation modelin...
on false data-injection attacks against power system state estimation modelin...
 
loca ward a security and privacy aware location-based rewarding system
loca ward a security and privacy aware location-based rewarding systemloca ward a security and privacy aware location-based rewarding system
loca ward a security and privacy aware location-based rewarding system
 
exploiting service similarity for privacy in location-based search queries
exploiting service similarity for privacy in location-based search queriesexploiting service similarity for privacy in location-based search queries
exploiting service similarity for privacy in location-based search queries
 
enabling trustworthy service evaluation in service-oriented mobile social net...
enabling trustworthy service evaluation in service-oriented mobile social net...enabling trustworthy service evaluation in service-oriented mobile social net...
enabling trustworthy service evaluation in service-oriented mobile social net...
 

Recently uploaded

Computational Engineering IITH Presentation
Computational Engineering IITH PresentationComputational Engineering IITH Presentation
Computational Engineering IITH Presentation
co23btech11018
 
Object Oriented Analysis and Design - OOAD
Object Oriented Analysis and Design - OOADObject Oriented Analysis and Design - OOAD
Object Oriented Analysis and Design - OOAD
PreethaV16
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
IJECEIAES
 
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
ecqow
 
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
shadow0702a
 
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
171ticu
 
一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理
一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理
一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理
upoux
 
Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
IJECEIAES
 
22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt
KrishnaveniKrishnara1
 
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
IJECEIAES
 
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURSCompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
RamonNovais6
 
An Introduction to the Compiler Designss
An Introduction to the Compiler DesignssAn Introduction to the Compiler Designss
An Introduction to the Compiler Designss
ElakkiaU
 
Digital Twins Computer Networking Paper Presentation.pptx
Digital Twins Computer Networking Paper Presentation.pptxDigital Twins Computer Networking Paper Presentation.pptx
Digital Twins Computer Networking Paper Presentation.pptx
aryanpankaj78
 
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 08 Doors and Windows.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 08 Doors and Windows.pdf2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 08 Doors and Windows.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 08 Doors and Windows.pdf
Yasser Mahgoub
 
TIME TABLE MANAGEMENT SYSTEM testing.pptx
TIME TABLE MANAGEMENT SYSTEM testing.pptxTIME TABLE MANAGEMENT SYSTEM testing.pptx
TIME TABLE MANAGEMENT SYSTEM testing.pptx
CVCSOfficial
 
1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf
1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf
1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf
MadhavJungKarki
 
Software Engineering and Project Management - Software Testing + Agile Method...
Software Engineering and Project Management - Software Testing + Agile Method...Software Engineering and Project Management - Software Testing + Agile Method...
Software Engineering and Project Management - Software Testing + Agile Method...
Prakhyath Rai
 
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
upoux
 
SCALING OF MOS CIRCUITS m .pptx
SCALING OF MOS CIRCUITS m                 .pptxSCALING OF MOS CIRCUITS m                 .pptx
SCALING OF MOS CIRCUITS m .pptx
harshapolam10
 
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
nedcocy
 

Recently uploaded (20)

Computational Engineering IITH Presentation
Computational Engineering IITH PresentationComputational Engineering IITH Presentation
Computational Engineering IITH Presentation
 
Object Oriented Analysis and Design - OOAD
Object Oriented Analysis and Design - OOADObject Oriented Analysis and Design - OOAD
Object Oriented Analysis and Design - OOAD
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
 
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
 
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
 
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
 
一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理
一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理
一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理
 
Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
 
22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt
 
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
 
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURSCompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
 
An Introduction to the Compiler Designss
An Introduction to the Compiler DesignssAn Introduction to the Compiler Designss
An Introduction to the Compiler Designss
 
Digital Twins Computer Networking Paper Presentation.pptx
Digital Twins Computer Networking Paper Presentation.pptxDigital Twins Computer Networking Paper Presentation.pptx
Digital Twins Computer Networking Paper Presentation.pptx
 
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 08 Doors and Windows.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 08 Doors and Windows.pdf2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 08 Doors and Windows.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 08 Doors and Windows.pdf
 
TIME TABLE MANAGEMENT SYSTEM testing.pptx
TIME TABLE MANAGEMENT SYSTEM testing.pptxTIME TABLE MANAGEMENT SYSTEM testing.pptx
TIME TABLE MANAGEMENT SYSTEM testing.pptx
 
1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf
1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf
1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf
 
Software Engineering and Project Management - Software Testing + Agile Method...
Software Engineering and Project Management - Software Testing + Agile Method...Software Engineering and Project Management - Software Testing + Agile Method...
Software Engineering and Project Management - Software Testing + Agile Method...
 
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
 
SCALING OF MOS CIRCUITS m .pptx
SCALING OF MOS CIRCUITS m                 .pptxSCALING OF MOS CIRCUITS m                 .pptx
SCALING OF MOS CIRCUITS m .pptx
 
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
 

expressive, efficient, and revocable data access control for multi authority cloud storage

  • 1. Expressive, Efficient, and Revocable Data Access Control for Multi Authority Cloud Storage Expressive, Efficient, and Revocable Data Access Control for Multi Authority Cloud Storage Data access control is an effective way to ensure the data security in the cloud. Due to data outsourcing and untrusted cloud servers, the data access control becomes a challenging issue in cloud storage systems. Ciphertext-Policy Attributebased Encryption (CP-ABE) is regarded as one of the most suitable technologies for data access control in cloud storage, because it gives data owners more direct control on access policies. However, it is difficult to directly apply existing CP-ABE schemes to data access control for cloud storage systems because of the attribute revocation problem. In this paper, we design an expressive, efficient and revocable data access control scheme for multi-authority cloud storage systems, where there are multiple authorities co-exist and each authority is able to issue attributes independently. Specifically, we propose a revocable multi-authority CP-ABE scheme, and apply it as the underlying techniques to design the data access control scheme. Our attribute revocation method can efficiently achieve both forward security and backward security. The analysis and simulation results show that our proposed data access control scheme is secure in the random oracle model and is more efficient than previous works. This new paradigm of data hosting and data access services introduces a great challenge to dataaccess control. Because the cloud server cannot be fully trusted by data owners, they can no longer rely on servers to do access control. Ciphertext-Policy Attribute-based Encryption (CP-ABE) is regarded as one of the most suitabletechnologies for data access control in cloud storage systems,because it gives the data owner more direct control on access policies. In CP-ABE scheme, there is an authority that is responsible for attribute management and key distribution. DISADVANTAGES OF EXISTING SYSTEM:  Chase’s multi-authority CP-ABE protocol allows the central authority to decrypt allthe ciphertexts, since it holds the master key of the system. Contact: 9703109334, 9533694296 ABSTRACT: EXISTING SYSTEM: Email id: academicliveprojects@gmail.com, www.logicsystems.org.in
  • 2. Expressive, Efficient, and Revocable Data Access Control for Multi Authority Cloud Storage  Chase’s protocol does not support sattribute revocation. In this paper, we first propose a revocable multiauthority CP-ABE scheme, where an efficient and secure revocation method is proposed to solve the attribute revocation problem in the system. Our attribute revocation method is efficient in the sense that it incurs less communication cost and computation cost, and is secure in the sense that it can achieve both backward security (The revoked user cannot decrypt any new ciphertext that requires the revoked attribute to decrypt)and forward security (The newly joined user can also decrypt the previously published ciphertexts1, if it has sufficient.attributes). Our scheme does not require the server to be fully trusted, because the key update is enforced by each attribute authority not the server. Even if the server is not semitrusted in some scenarios, our scheme can still guarantee the backward security. Then, we apply our proposed revocable multi-authority CP-ABE scheme as the underlying techniques to construct the expressive and secure data access control scheme for multi-authority cloud storage systems. ADVANTAGES OF PROPOSED SYSTEM:  We modify the framework of the scheme and make it more practical to cloud storage systems, in which data owners are not involved in the key generation.  We greatly improve the efficiency of the attribute revocation method.  We also highly improve the expressiveness of our access control scheme, where we remove the limitation that each attribute can only appear at most once in a ciphertext. Contact: 9703109334, 9533694296 PROPOSED SYSTEM: Email id: academicliveprojects@gmail.com, www.logicsystems.org.in
  • 3. Expressive, Efficient, and Revocable Data Access Control for Multi Authority Cloud Storage SYSTEM ARCHITECTURE: SYSTEM REQUIREMENTS: HARDWARE REQUIREMENTS:  System : Pentium IV 2.4 GHz.  Hard Disk : 40 GB.  Floppy Drive : 1.44 Mb.  Monitor : 15 VGA Colour.  Mouse : Logitech.  Ram : 512 Mb. Contact: 9703109334, 9533694296 Email id: academicliveprojects@gmail.com, www.logicsystems.org.in
  • 4. Expressive, Efficient, and Revocable Data Access Control for Multi Authority Cloud Storage SOFTWARE REQUIREMENTS:  Operating system : Windows XP/7.  Coding Language : JAVA/J2EE  IDE : Netbeans 7.4  Database : MYSQL Kan Yang, Student Member, IEEE, and Xiaohua Jia, Fellow, IEEE“Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage” IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS,VOL. 25,NO. 7,JULY 2014. Contact: 9703109334, 9533694296 REFERENCE: Email id: academicliveprojects@gmail.com, www.logicsystems.org.in