SlideShare a Scribd company logo
IDENTITY BASED SECURE DISTRIBUTED DATA
STORAGE SCHEMES
UNDER ESTEMMED GUIDANCE OF
J.NAGARAJU M.TECH
By:
N.SAHITHI
(12C11D5816)
ABSTRACT
Secure distributed data storage can shift the burden of maintaining a large number of
files from owner to proxy servers. Proxy servers can convert encrypted files for owner
to encrypted files for receiver without necessity of knowing the content of original
files. The proposed project uses 2 identity based secure distributed data storage
schemes. First scheme is secure against chosen plaintext attacks (CPA). Second
scheme is secure against chosen chipertext attacks (CCA). It is first identity based
secure distributed data storage schemes where access permissions is made by owner
of file and collusion attacks can be protected.
INTRODUCTION
 Cloud computing provides users a convenient mechanism to manage their
personal files with notion called Database-As-Services (DAS).
 In DAS schemes, a user can outsource his encrypted files to untrusted
proxy servers.
 Proxy servers can perform some functions on outsourced cipher texts
without knowing anything about original files.
 This technique has not been employed due to confidentiality and integrity.
 To address these issues IBSDDS scheme is proposed, which uses two schemes.
These schemes capture following properties :
i) The file owner can decide the access permission independently.
ii) For one query, a receiver can only access one file instead of all files of the
owner.
iii) Our schemes secure against the collusion attacks.
LITERATURE SURVEY
 Identity-based proxy encryption (IBPE) was proposed by Ivan and Dodis .
 In these schemes, the master secret key which is used to extract secret keys. The
user can decrypt a cipher text for him with the help of the proxy server.
 These schemes are not secure against the attacks, if the user can compromise the
proxy server master secret key can be exposed.
EXISTING SYSTEM
 Cloud computing provides users with convenient mechanism to manage their
personal files with notation called database as a service (DAS).
 In DAS Schemes, a user can outsource his encrypted files to untrusted proxy servers.
 Proxy server can perform some functions on outsourced cipher texts without knowing
anything about original files.
 After outsourcing the files to proxy servers, user will remove them from his local
machine.
 Therefore, how to guarantee the outsourced files are not accessed by users
unauthorized users and not modified by proxy severs is an important problem that
has been considered in data storage research community.
DISADVANTAGES OF EXISTING SYSTEM
 Users are especially concerned on the confidentiality, integrity and query of
outsourced files as cloud computing is complicated than local data storage systems,
as cloud is managed by untrusted third party.
 There is no guarantee that the outsourced files are not accessed by unauthorized
users and not modified by proxy severs is an important problem.
PROPOSED SYSTEM
 In proposed project for one query, the receiver can access one of the owner’s file
instead of accessing all files.
 An access permission is bound not only to the identity of receiver but also to the file.
 The access permission can be decided by owner, instead of trusted third party.
 Proposed project is secure against collusion attacks.
ADVANTAGES OF PROPOSED SYSTEM
 It has 2 schemes of security:
i) the first scheme is secure against chosen plain text attacks (CPA).
ii) the second scheme is secure against chosen cipher text attacks (CCA).
 For one query, a receiver can access only one file , instead of all files of the owner.
 To achieve stronger security and implement file based access control ,the owner
must be online to authenticate requesters and also generate access permissions for
them.
STEPS INVOLVED IN IBSDDS SCHEME IMPLEMENTATION ARE:
 STEP 1: The file owner encrypts his files under his identity prior to outsourcing
a files to proxy servers.
 STEP 2: He (owner of file) sends cipher texts to proxy servers (as he encrypted
his files under his identity in step1 so that cipher text is generated ).
 STEP 3 : Proxy server transforms a cipher text encrypted under identity of the
owner to a cipher text encrypted under the identity of receiver, only after the receiver
has obtained access permission from owner of the file (file owner).
MODULES
 IBSDDS scheme consists of 4 modules :
i) Data owner
ii) proxy servers
iii) receiver
iv) Data Storage Systems
 Data Owner : In this module, first the new data owner registers and get a valid
login credentials. After login section, the data owner has permission to upload their
file to proxy server. Data owner encrypts his data and outsource the cipher text to
the proxy servers.
 Proxy server : In this module, proxy server store the encrypted data and transfer
the cipher text for the owner to cipher text for receiver when they obtain an access
permission from owner .They authenticate receivers and validate access
permissions.
 Receiver : Receiver authenticates himself to the owner and decrypts the
encrypted cipher text to obtain data. In these systems, an end-to-end security is
provided by cryptographic protocols. These systems are divided into two types
namely:
shared file system and non-shared file system.
 Data Storage Systems: Data storage systems enable user to store their data to
external proxy servers to enhance the access and availability and reduce
maintenance cost. Data storage schemes are classified into 3 kinds:
i) Network file system ii) Storage-based intrusion detection systems and
iii) Cryptographic file systems.
REQUIREMENT SPECIFICATION
HARDWARE REQUIREMENTS:
 Hardware - Pentium IV
 Speed - 1.1 GHz
 RAM - 1GB
 Hard Disk - 20 GB
 Floppy Drive - 1.44 MB
 Key Board - Standard Windows Keyboard
 Mouse - Two or Three Button Mouse
 Monitor - SVGA
SOFTWARE REQUIREMENTS:
 Operating System : Windows
 Technology : Java and J2EE
 Web Technologies : Html, JavaScript, CSS
 IDE : My Eclipse
 Web Server : Tomcat
 Database : My SQL
 Java Version : JSDK1.5
CONCLUSION
Distributed data storage schemes provide the users with convenience to outsource
their files to untrusted proxy servers. Identity-based secure distributed data storage
(IBSDDS) schemes are a special kind of distributed data storage schemes where
users are identified by their identities and can communicate without the need of
verifying the public key certificates.
REFERENCES
Jinguang Han, Student Member, IEEE, Willy Susilo, Senior Member, IEEE, and Yi
Mu, Senior Member, IEEE-“Identity-Based Secure Distributed Data Storage
Schemes”-IEEE TRANSACTIONS ON COMPUTERS, 2013.
THANK YOU

More Related Content

What's hot

Identity based distributed provable data
Identity based distributed provable dataIdentity based distributed provable data
Identity based distributed provable data
jpstudcorner
 
Identity based secure distributed data storage schemes
Identity based secure distributed data storage schemesIdentity based secure distributed data storage schemes
Identity based secure distributed data storage schemes
JPINFOTECH JAYAPRAKASH
 
Hybrid Cloud Approach for Secure Authorized Deduplication
Hybrid Cloud Approach for Secure Authorized DeduplicationHybrid Cloud Approach for Secure Authorized Deduplication
Hybrid Cloud Approach for Secure Authorized Deduplication
Prem Rao
 
Secure Redundant Data Avoidance over Multi-Cloud Architecture.
Secure Redundant Data Avoidance over Multi-Cloud Architecture. Secure Redundant Data Avoidance over Multi-Cloud Architecture.
Secure Redundant Data Avoidance over Multi-Cloud Architecture.
IJCERT JOURNAL
 
cloud computing preservity
cloud computing preservitycloud computing preservity
cloud computing preservity
chennuruvishnu
 
Privacy Preserving Public Auditing for Data Storage Security in Cloud
Privacy Preserving Public Auditing for Data Storage Security in Cloud Privacy Preserving Public Auditing for Data Storage Security in Cloud
Privacy Preserving Public Auditing for Data Storage Security in Cloud
Girish Chandra
 
Providing user security guarantees in public infrastructure clouds
Providing user security guarantees in public infrastructure cloudsProviding user security guarantees in public infrastructure clouds
Providing user security guarantees in public infrastructure clouds
Kamal Spring
 
JPD1407 Identity-Based Distributed Provable Data Possession in Multi- Cloud ...
JPD1407  Identity-Based Distributed Provable Data Possession in Multi- Cloud ...JPD1407  Identity-Based Distributed Provable Data Possession in Multi- Cloud ...
JPD1407 Identity-Based Distributed Provable Data Possession in Multi- Cloud ...
chennaijp
 
Secure Data Sharing in Cloud (SDSC)
Secure Data Sharing in Cloud (SDSC)Secure Data Sharing in Cloud (SDSC)
Secure Data Sharing in Cloud (SDSC)
Jishnu Pradeep
 
Privacy preserving public auditing for regenerating-code-based cloud storage
Privacy preserving public auditing for regenerating-code-based cloud storagePrivacy preserving public auditing for regenerating-code-based cloud storage
Privacy preserving public auditing for regenerating-code-based cloud storage
Nagamalleswararao Tadikonda
 
A Hybrid Cloud Approach for Secure Authorized Deduplication
A Hybrid Cloud Approach for Secure Authorized DeduplicationA Hybrid Cloud Approach for Secure Authorized Deduplication
A Hybrid Cloud Approach for Secure Authorized Deduplication
SWAMI06
 
Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...
LeMeniz Infotech
 
PUBLIC AUDITING FOR SECURE CLOUD STORAGE ...
PUBLIC AUDITING 	             FOR SECURE CLOUD STORAGE                       ...PUBLIC AUDITING 	             FOR SECURE CLOUD STORAGE                       ...
PUBLIC AUDITING FOR SECURE CLOUD STORAGE ...
Bharath Nair
 
Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...
IGEEKS TECHNOLOGIES
 
Secure deduplicaton with efficient and reliable convergent
Secure deduplicaton with  efficient and reliable   convergentSecure deduplicaton with  efficient and reliable   convergent
Secure deduplicaton with efficient and reliable convergent
Jayakrishnan U
 
Decentralized access control with authentication anonymous of data stored in ...
Decentralized access control with authentication anonymous of data stored in ...Decentralized access control with authentication anonymous of data stored in ...
Decentralized access control with authentication anonymous of data stored in ...
Guellord Mpia
 
Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...
Adz91 Digital Ads Pvt Ltd
 
Secure Data Sharing in Cloud Computing using Revocable Storage Identity- Base...
Secure Data Sharing in Cloud Computing using Revocable Storage Identity- Base...Secure Data Sharing in Cloud Computing using Revocable Storage Identity- Base...
Secure Data Sharing in Cloud Computing using Revocable Storage Identity- Base...
rahulmonikasharma
 
Identity-Based Distributed Provable Data Possession in Multicloud Storage
Identity-Based Distributed Provable Data Possession in Multicloud StorageIdentity-Based Distributed Provable Data Possession in Multicloud Storage
Identity-Based Distributed Provable Data Possession in Multicloud Storage
1crore projects
 
Secure data sharing in cloud computing using revocable storage identity-based...
Secure data sharing in cloud computing using revocable storage identity-based...Secure data sharing in cloud computing using revocable storage identity-based...
Secure data sharing in cloud computing using revocable storage identity-based...
Shakas Technologies
 

What's hot (20)

Identity based distributed provable data
Identity based distributed provable dataIdentity based distributed provable data
Identity based distributed provable data
 
Identity based secure distributed data storage schemes
Identity based secure distributed data storage schemesIdentity based secure distributed data storage schemes
Identity based secure distributed data storage schemes
 
Hybrid Cloud Approach for Secure Authorized Deduplication
Hybrid Cloud Approach for Secure Authorized DeduplicationHybrid Cloud Approach for Secure Authorized Deduplication
Hybrid Cloud Approach for Secure Authorized Deduplication
 
Secure Redundant Data Avoidance over Multi-Cloud Architecture.
Secure Redundant Data Avoidance over Multi-Cloud Architecture. Secure Redundant Data Avoidance over Multi-Cloud Architecture.
Secure Redundant Data Avoidance over Multi-Cloud Architecture.
 
cloud computing preservity
cloud computing preservitycloud computing preservity
cloud computing preservity
 
Privacy Preserving Public Auditing for Data Storage Security in Cloud
Privacy Preserving Public Auditing for Data Storage Security in Cloud Privacy Preserving Public Auditing for Data Storage Security in Cloud
Privacy Preserving Public Auditing for Data Storage Security in Cloud
 
Providing user security guarantees in public infrastructure clouds
Providing user security guarantees in public infrastructure cloudsProviding user security guarantees in public infrastructure clouds
Providing user security guarantees in public infrastructure clouds
 
JPD1407 Identity-Based Distributed Provable Data Possession in Multi- Cloud ...
JPD1407  Identity-Based Distributed Provable Data Possession in Multi- Cloud ...JPD1407  Identity-Based Distributed Provable Data Possession in Multi- Cloud ...
JPD1407 Identity-Based Distributed Provable Data Possession in Multi- Cloud ...
 
Secure Data Sharing in Cloud (SDSC)
Secure Data Sharing in Cloud (SDSC)Secure Data Sharing in Cloud (SDSC)
Secure Data Sharing in Cloud (SDSC)
 
Privacy preserving public auditing for regenerating-code-based cloud storage
Privacy preserving public auditing for regenerating-code-based cloud storagePrivacy preserving public auditing for regenerating-code-based cloud storage
Privacy preserving public auditing for regenerating-code-based cloud storage
 
A Hybrid Cloud Approach for Secure Authorized Deduplication
A Hybrid Cloud Approach for Secure Authorized DeduplicationA Hybrid Cloud Approach for Secure Authorized Deduplication
A Hybrid Cloud Approach for Secure Authorized Deduplication
 
Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...
 
PUBLIC AUDITING FOR SECURE CLOUD STORAGE ...
PUBLIC AUDITING 	             FOR SECURE CLOUD STORAGE                       ...PUBLIC AUDITING 	             FOR SECURE CLOUD STORAGE                       ...
PUBLIC AUDITING FOR SECURE CLOUD STORAGE ...
 
Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...
 
Secure deduplicaton with efficient and reliable convergent
Secure deduplicaton with  efficient and reliable   convergentSecure deduplicaton with  efficient and reliable   convergent
Secure deduplicaton with efficient and reliable convergent
 
Decentralized access control with authentication anonymous of data stored in ...
Decentralized access control with authentication anonymous of data stored in ...Decentralized access control with authentication anonymous of data stored in ...
Decentralized access control with authentication anonymous of data stored in ...
 
Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...
 
Secure Data Sharing in Cloud Computing using Revocable Storage Identity- Base...
Secure Data Sharing in Cloud Computing using Revocable Storage Identity- Base...Secure Data Sharing in Cloud Computing using Revocable Storage Identity- Base...
Secure Data Sharing in Cloud Computing using Revocable Storage Identity- Base...
 
Identity-Based Distributed Provable Data Possession in Multicloud Storage
Identity-Based Distributed Provable Data Possession in Multicloud StorageIdentity-Based Distributed Provable Data Possession in Multicloud Storage
Identity-Based Distributed Provable Data Possession in Multicloud Storage
 
Secure data sharing in cloud computing using revocable storage identity-based...
Secure data sharing in cloud computing using revocable storage identity-based...Secure data sharing in cloud computing using revocable storage identity-based...
Secure data sharing in cloud computing using revocable storage identity-based...
 

Similar to Identity based secure distributed data storage schemes

Psdot 12 a secure erasure code-based cloud storage
Psdot 12 a secure erasure code-based cloud storagePsdot 12 a secure erasure code-based cloud storage
Psdot 12 a secure erasure code-based cloud storage
ZTech Proje
 
Data Sharing: Ensure Accountability Distribution in the Cloud
Data Sharing: Ensure Accountability Distribution in the CloudData Sharing: Ensure Accountability Distribution in the Cloud
Data Sharing: Ensure Accountability Distribution in the Cloud
Suraj Mehta
 
Phase1
Phase1Phase1
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
Editor IJCATR
 
Achieving Secure, sclable and finegrained Cloud computing report
Achieving Secure, sclable and finegrained Cloud computing reportAchieving Secure, sclable and finegrained Cloud computing report
Achieving Secure, sclable and finegrained Cloud computing report
Kiran Girase
 
Pp1t
Pp1tPp1t
pp1t
pp1tpp1t
Pp1t
Pp1tPp1t
A hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplicationA hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplication
Papitha Velumani
 
Ppt 1
Ppt 1Ppt 1
Securing data at rest with encryption
Securing data at rest with encryptionSecuring data at rest with encryption
Securing data at rest with encryption
Ruban Deventhiran
 
A secure erasure code based cloud storage
A secure erasure code based cloud storageA secure erasure code based cloud storage
A secure erasure code based cloud storage
IMPULSE_TECHNOLOGY
 
Presentation1.pptx
Presentation1.pptxPresentation1.pptx
Presentation1.pptx
chWaqasZahid
 
Pp1t
Pp1tPp1t
Ppt1 130410095050-phpapp01
Ppt1 130410095050-phpapp01Ppt1 130410095050-phpapp01
Ppt1 130410095050-phpapp01
Nitish Bhardwaj
 
Pp1t
Pp1tPp1t
Pp1t
Pp1tPp1t
Pp1t
Pp1tPp1t
Pp1t
Pp1tPp1t
82ugszwcqn29itkwai2q 140424034504-phpapp01
82ugszwcqn29itkwai2q 140424034504-phpapp0182ugszwcqn29itkwai2q 140424034504-phpapp01
82ugszwcqn29itkwai2q 140424034504-phpapp01
Nitish Bhardwaj
 

Similar to Identity based secure distributed data storage schemes (20)

Psdot 12 a secure erasure code-based cloud storage
Psdot 12 a secure erasure code-based cloud storagePsdot 12 a secure erasure code-based cloud storage
Psdot 12 a secure erasure code-based cloud storage
 
Data Sharing: Ensure Accountability Distribution in the Cloud
Data Sharing: Ensure Accountability Distribution in the CloudData Sharing: Ensure Accountability Distribution in the Cloud
Data Sharing: Ensure Accountability Distribution in the Cloud
 
Phase1
Phase1Phase1
Phase1
 
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
 
Achieving Secure, sclable and finegrained Cloud computing report
Achieving Secure, sclable and finegrained Cloud computing reportAchieving Secure, sclable and finegrained Cloud computing report
Achieving Secure, sclable and finegrained Cloud computing report
 
Pp1t
Pp1tPp1t
Pp1t
 
pp1t
pp1tpp1t
pp1t
 
Pp1t
Pp1tPp1t
Pp1t
 
A hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplicationA hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplication
 
Ppt 1
Ppt 1Ppt 1
Ppt 1
 
Securing data at rest with encryption
Securing data at rest with encryptionSecuring data at rest with encryption
Securing data at rest with encryption
 
A secure erasure code based cloud storage
A secure erasure code based cloud storageA secure erasure code based cloud storage
A secure erasure code based cloud storage
 
Presentation1.pptx
Presentation1.pptxPresentation1.pptx
Presentation1.pptx
 
Pp1t
Pp1tPp1t
Pp1t
 
Ppt1 130410095050-phpapp01
Ppt1 130410095050-phpapp01Ppt1 130410095050-phpapp01
Ppt1 130410095050-phpapp01
 
Pp1t
Pp1tPp1t
Pp1t
 
Pp1t
Pp1tPp1t
Pp1t
 
Pp1t
Pp1tPp1t
Pp1t
 
Pp1t
Pp1tPp1t
Pp1t
 
82ugszwcqn29itkwai2q 140424034504-phpapp01
82ugszwcqn29itkwai2q 140424034504-phpapp0182ugszwcqn29itkwai2q 140424034504-phpapp01
82ugszwcqn29itkwai2q 140424034504-phpapp01
 

More from Sahithi Naraparaju

SYSTEM ARCHITECTURE / UML DIAGRAMS FOR IDENTITY BASED SECURE DISTRIBUTED DATA...
SYSTEM ARCHITECTURE / UML DIAGRAMS FOR IDENTITY BASED SECURE DISTRIBUTED DATA...SYSTEM ARCHITECTURE / UML DIAGRAMS FOR IDENTITY BASED SECURE DISTRIBUTED DATA...
SYSTEM ARCHITECTURE / UML DIAGRAMS FOR IDENTITY BASED SECURE DISTRIBUTED DATA...
Sahithi Naraparaju
 
over view of viruses
over view of virusesover view of viruses
over view of viruses
Sahithi Naraparaju
 
literature survey for identity based secure distributed data storage
literature survey for identity based secure distributed data storage literature survey for identity based secure distributed data storage
literature survey for identity based secure distributed data storage
Sahithi Naraparaju
 
Srs document for identity based secure distributed data storage schemes
Srs document for identity based secure distributed data storage schemesSrs document for identity based secure distributed data storage schemes
Srs document for identity based secure distributed data storage schemes
Sahithi Naraparaju
 
66913017 java-ring-1217949449014046-9 (1)
66913017 java-ring-1217949449014046-9 (1)66913017 java-ring-1217949449014046-9 (1)
66913017 java-ring-1217949449014046-9 (1)
Sahithi Naraparaju
 
Self protecteion in clustered distributed system new
Self protecteion in clustered distributed system newSelf protecteion in clustered distributed system new
Self protecteion in clustered distributed system new
Sahithi Naraparaju
 
OVERVIEW OF ‘C’ PROGRAM
OVERVIEW OF ‘C’ PROGRAMOVERVIEW OF ‘C’ PROGRAM
OVERVIEW OF ‘C’ PROGRAM
Sahithi Naraparaju
 
CONSTANTS, VARIABLES & DATATYPES IN C
CONSTANTS, VARIABLES & DATATYPES IN CCONSTANTS, VARIABLES & DATATYPES IN C
CONSTANTS, VARIABLES & DATATYPES IN C
Sahithi Naraparaju
 
constants, variables and datatypes in C
constants, variables and datatypes in Cconstants, variables and datatypes in C
constants, variables and datatypes in C
Sahithi Naraparaju
 
Steps for Developing a 'C' program
 Steps for Developing a 'C' program Steps for Developing a 'C' program
Steps for Developing a 'C' program
Sahithi Naraparaju
 
pre processor directives in C
pre processor directives in Cpre processor directives in C
pre processor directives in C
Sahithi Naraparaju
 
Self protecteion in clustered distributed system new
Self protecteion in clustered distributed system newSelf protecteion in clustered distributed system new
Self protecteion in clustered distributed system new
Sahithi Naraparaju
 
A Batch-authenticated And Key Agreement Framework For P2p-based Online Social...
A Batch-authenticated And Key AgreementFramework For P2p-based Online Social...A Batch-authenticated And Key AgreementFramework For P2p-based Online Social...
A Batch-authenticated And Key Agreement Framework For P2p-based Online Social...
Sahithi Naraparaju
 
Haptic technology
Haptic technologyHaptic technology
Haptic technology
Sahithi Naraparaju
 

More from Sahithi Naraparaju (14)

SYSTEM ARCHITECTURE / UML DIAGRAMS FOR IDENTITY BASED SECURE DISTRIBUTED DATA...
SYSTEM ARCHITECTURE / UML DIAGRAMS FOR IDENTITY BASED SECURE DISTRIBUTED DATA...SYSTEM ARCHITECTURE / UML DIAGRAMS FOR IDENTITY BASED SECURE DISTRIBUTED DATA...
SYSTEM ARCHITECTURE / UML DIAGRAMS FOR IDENTITY BASED SECURE DISTRIBUTED DATA...
 
over view of viruses
over view of virusesover view of viruses
over view of viruses
 
literature survey for identity based secure distributed data storage
literature survey for identity based secure distributed data storage literature survey for identity based secure distributed data storage
literature survey for identity based secure distributed data storage
 
Srs document for identity based secure distributed data storage schemes
Srs document for identity based secure distributed data storage schemesSrs document for identity based secure distributed data storage schemes
Srs document for identity based secure distributed data storage schemes
 
66913017 java-ring-1217949449014046-9 (1)
66913017 java-ring-1217949449014046-9 (1)66913017 java-ring-1217949449014046-9 (1)
66913017 java-ring-1217949449014046-9 (1)
 
Self protecteion in clustered distributed system new
Self protecteion in clustered distributed system newSelf protecteion in clustered distributed system new
Self protecteion in clustered distributed system new
 
OVERVIEW OF ‘C’ PROGRAM
OVERVIEW OF ‘C’ PROGRAMOVERVIEW OF ‘C’ PROGRAM
OVERVIEW OF ‘C’ PROGRAM
 
CONSTANTS, VARIABLES & DATATYPES IN C
CONSTANTS, VARIABLES & DATATYPES IN CCONSTANTS, VARIABLES & DATATYPES IN C
CONSTANTS, VARIABLES & DATATYPES IN C
 
constants, variables and datatypes in C
constants, variables and datatypes in Cconstants, variables and datatypes in C
constants, variables and datatypes in C
 
Steps for Developing a 'C' program
 Steps for Developing a 'C' program Steps for Developing a 'C' program
Steps for Developing a 'C' program
 
pre processor directives in C
pre processor directives in Cpre processor directives in C
pre processor directives in C
 
Self protecteion in clustered distributed system new
Self protecteion in clustered distributed system newSelf protecteion in clustered distributed system new
Self protecteion in clustered distributed system new
 
A Batch-authenticated And Key Agreement Framework For P2p-based Online Social...
A Batch-authenticated And Key AgreementFramework For P2p-based Online Social...A Batch-authenticated And Key AgreementFramework For P2p-based Online Social...
A Batch-authenticated And Key Agreement Framework For P2p-based Online Social...
 
Haptic technology
Haptic technologyHaptic technology
Haptic technology
 

Identity based secure distributed data storage schemes

  • 1. IDENTITY BASED SECURE DISTRIBUTED DATA STORAGE SCHEMES UNDER ESTEMMED GUIDANCE OF J.NAGARAJU M.TECH By: N.SAHITHI (12C11D5816)
  • 2. ABSTRACT Secure distributed data storage can shift the burden of maintaining a large number of files from owner to proxy servers. Proxy servers can convert encrypted files for owner to encrypted files for receiver without necessity of knowing the content of original files. The proposed project uses 2 identity based secure distributed data storage schemes. First scheme is secure against chosen plaintext attacks (CPA). Second scheme is secure against chosen chipertext attacks (CCA). It is first identity based secure distributed data storage schemes where access permissions is made by owner of file and collusion attacks can be protected.
  • 3. INTRODUCTION  Cloud computing provides users a convenient mechanism to manage their personal files with notion called Database-As-Services (DAS).  In DAS schemes, a user can outsource his encrypted files to untrusted proxy servers.  Proxy servers can perform some functions on outsourced cipher texts without knowing anything about original files.  This technique has not been employed due to confidentiality and integrity.
  • 4.  To address these issues IBSDDS scheme is proposed, which uses two schemes. These schemes capture following properties : i) The file owner can decide the access permission independently. ii) For one query, a receiver can only access one file instead of all files of the owner. iii) Our schemes secure against the collusion attacks.
  • 5. LITERATURE SURVEY  Identity-based proxy encryption (IBPE) was proposed by Ivan and Dodis .  In these schemes, the master secret key which is used to extract secret keys. The user can decrypt a cipher text for him with the help of the proxy server.  These schemes are not secure against the attacks, if the user can compromise the proxy server master secret key can be exposed.
  • 6. EXISTING SYSTEM  Cloud computing provides users with convenient mechanism to manage their personal files with notation called database as a service (DAS).  In DAS Schemes, a user can outsource his encrypted files to untrusted proxy servers.  Proxy server can perform some functions on outsourced cipher texts without knowing anything about original files.  After outsourcing the files to proxy servers, user will remove them from his local machine.  Therefore, how to guarantee the outsourced files are not accessed by users unauthorized users and not modified by proxy severs is an important problem that has been considered in data storage research community.
  • 7. DISADVANTAGES OF EXISTING SYSTEM  Users are especially concerned on the confidentiality, integrity and query of outsourced files as cloud computing is complicated than local data storage systems, as cloud is managed by untrusted third party.  There is no guarantee that the outsourced files are not accessed by unauthorized users and not modified by proxy severs is an important problem.
  • 8. PROPOSED SYSTEM  In proposed project for one query, the receiver can access one of the owner’s file instead of accessing all files.  An access permission is bound not only to the identity of receiver but also to the file.  The access permission can be decided by owner, instead of trusted third party.  Proposed project is secure against collusion attacks.
  • 9. ADVANTAGES OF PROPOSED SYSTEM  It has 2 schemes of security: i) the first scheme is secure against chosen plain text attacks (CPA). ii) the second scheme is secure against chosen cipher text attacks (CCA).  For one query, a receiver can access only one file , instead of all files of the owner.  To achieve stronger security and implement file based access control ,the owner must be online to authenticate requesters and also generate access permissions for them.
  • 10. STEPS INVOLVED IN IBSDDS SCHEME IMPLEMENTATION ARE:  STEP 1: The file owner encrypts his files under his identity prior to outsourcing a files to proxy servers.  STEP 2: He (owner of file) sends cipher texts to proxy servers (as he encrypted his files under his identity in step1 so that cipher text is generated ).  STEP 3 : Proxy server transforms a cipher text encrypted under identity of the owner to a cipher text encrypted under the identity of receiver, only after the receiver has obtained access permission from owner of the file (file owner).
  • 11. MODULES  IBSDDS scheme consists of 4 modules : i) Data owner ii) proxy servers iii) receiver iv) Data Storage Systems  Data Owner : In this module, first the new data owner registers and get a valid login credentials. After login section, the data owner has permission to upload their file to proxy server. Data owner encrypts his data and outsource the cipher text to the proxy servers.
  • 12.  Proxy server : In this module, proxy server store the encrypted data and transfer the cipher text for the owner to cipher text for receiver when they obtain an access permission from owner .They authenticate receivers and validate access permissions.  Receiver : Receiver authenticates himself to the owner and decrypts the encrypted cipher text to obtain data. In these systems, an end-to-end security is provided by cryptographic protocols. These systems are divided into two types namely: shared file system and non-shared file system.  Data Storage Systems: Data storage systems enable user to store their data to external proxy servers to enhance the access and availability and reduce maintenance cost. Data storage schemes are classified into 3 kinds: i) Network file system ii) Storage-based intrusion detection systems and iii) Cryptographic file systems.
  • 13. REQUIREMENT SPECIFICATION HARDWARE REQUIREMENTS:  Hardware - Pentium IV  Speed - 1.1 GHz  RAM - 1GB  Hard Disk - 20 GB  Floppy Drive - 1.44 MB  Key Board - Standard Windows Keyboard  Mouse - Two or Three Button Mouse  Monitor - SVGA
  • 14. SOFTWARE REQUIREMENTS:  Operating System : Windows  Technology : Java and J2EE  Web Technologies : Html, JavaScript, CSS  IDE : My Eclipse  Web Server : Tomcat  Database : My SQL  Java Version : JSDK1.5
  • 15. CONCLUSION Distributed data storage schemes provide the users with convenience to outsource their files to untrusted proxy servers. Identity-based secure distributed data storage (IBSDDS) schemes are a special kind of distributed data storage schemes where users are identified by their identities and can communicate without the need of verifying the public key certificates.
  • 16. REFERENCES Jinguang Han, Student Member, IEEE, Willy Susilo, Senior Member, IEEE, and Yi Mu, Senior Member, IEEE-“Identity-Based Secure Distributed Data Storage Schemes”-IEEE TRANSACTIONS ON COMPUTERS, 2013.