SlideShare a Scribd company logo
ISSN (Online): 2349-7084
GLOBAL IMPACT FACTOR 0.238
DIIF 0.876
INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING IN RESEARCH TRENDS
VOLUME 2, ISSUE 8, AUGUST 2015, PP 486-491
IJCERT © 2015 Page | 486
http://www.ijcert.org
Investigation on Revocable Fine-grained
Access Control Scheme for Multi-Authority
Cloud Storage Systems
1B.Natraj Kumar,2 M.Sri Lakshmi, 3Dr S.Prem Kumar
1
(M.Tech), CSE, Assistant professor Department of Computer Science and Engineering
2
Assistant Professor, Department of Computer Science and Engineering
3
Professor & HOD, Department of computer science and engineering,
G.Pullaiah College of Engineering and Technology, Kurnool, Andhra Pradesh, India.
Abstract: Cloud computing is one of the emerge technologies in order to outsource huge volume of data inters of storage and sharing. To
protect the data and privacy of users the access control methods ensure that authorized users access the data and the system. Fine grained-
approach is the appropriate method for data access control in cloud storage. However, CP-ABE schemes to data access control for cloud
storage systems are difficult because of the attribute revocation problem. Specifically, in this paper we investigate on revocable multi-authority
Fine-grained-Scheme performance.
Key Terms: Fine-grained access policy, Renewal policy, policy based access, multi-authority, CP-ABE.
———————————————————
I.INTRODUCTION
All Data access control is an efficient way to ensure the
data security in the cloud. Cloud storage services allows
data owner to outsource their data to the cloud. Attribute-
based encryption (ABE) [1] is a new concept of encryption
algorithms that allow the encryptor to set a policy
describing who should be able to read the data. In an
attribute-based encryption system, all the attribute sets are
distributed by an authority. A user should be able to
decrypt a ciphertext if and only if their attribute set
satisfy. In traditional public-key cryptography, a message
is encrypted for a specific receiver using the receiver’s
public-key. Identity-based cryptography and in particular
identity-based encryption (IBE) changed the conventional
understanding of public-key cryptography by allowing
the public-key to be an arbitrary string, e.g., the email
address of the receiver. ABE goes one step further and
defines the identity not atomic but as a set of attributes,
e.g. roles, and messages can be encrypted with respect to
subsets of attributes (key-policy ABE - KP-ABE) or policies
defined over a set of attributes (ciphertext-policy ABE -
CP-ABE). In ciphertext-policy attribute-based encryption
(CP-ABE) a user’s private-key is associated with a set of
attributes and a ciphertext specifies an access policy over a
defined universe of attributes within the system. A user
will be able to decrypt a ciphertext, if and only if his
attributes satisfy the policy of the respective ciphertext.
Fine–grained schema is considered as one of the most
suitable scheme for data access control in cloud storage.
This scheme provides data owners more direct control on
access policies at cloud level [2]. However, CP-ABE
schemes to data access control for cloud storage systems
are difficult because of the attribute revocation problem.
So This paper produce Fine –grained scheme on efficient
and revocable data access control scheme for multi-
authority cloud storage systems, where there are multiple
authorities cooperate and each authority is able to issue
attributes independently To achieve secure data
transaction in cloud, suitable cryptography method is
used. The data owner must encrypt the file and then store
the file to the cloud. If a third person downloads the file,
he/she may view the record if he/she had the key which
is used to decrypt the encrypted file. Sometimes this may
be failure due to the technology development and the
hackers.
ISSN (Online): 2349-7084
INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING IN RESEARCH TRENDS
VOLUME 2, ISSUE 8, AUGUST 2015, PP 486-491
IJCERT © 2015 Page | 487
http://www.ijcert.org
Fig1: Example diagram for data sharing with cloud
storage.
To overcome the problem the cloud computing contains
huge open distributed system. It is important to protect
the data and privacy of users. Access Control methods
ensure that authorized user’s access the data and the
system. Access control is generally a policy or procedure
that allows, denies or restricts access to a system. It may,
as well, monitor and record all attempts made to access a
system. Access Control may also identify users
attempting to access a system unauthorized. It is a
mechanism which is very much important for protection
in computer security.
Cloud Storage: The Cloud storage is an important
service of cloud computing. The Cloud Storage offers
services for data owners to host their data into the cloud.
A great challenge to data access control scheme was data
hosting and data access services. Because data owners
does not fully trust the cloud servers also they can no
longer rely on servers to do access control The data
access control becomes a challenging issue in cloud
storage systems because of data outsourcing and
untrusted cloud servers. Therefore Cloud storage is a
model of data storage where the digital data is stored in
logical pool.
CP-ABE: One of the most suitable technologies for data
access control in cloud storage systems is Cipher text-
Policy Attribute-based Encryption (CP-ABE). This scheme
provides the data owner more direct control on access
policies. The Authority in CP-ABE scheme is responsible
for attribute management and key distribution. The
authority may be the university registration office, the
human resource department in a company, etc. The data
owner in CP-ABE scheme defines the access policies and
encrypts data according to the policies. CP-ABE TYPES: In
CP-ABE scheme each user will be issued a secret key
reflecting its attributes. A user can decrypt the data only
when its attributes satisfy the access policies.
There are two types of CP-ABE systems:
SINGLE-AUTHORITY CP-ABE
MULTI-AUTHORITY CP-ABE
IN SINGLE-AUTHORITY CP-ABE SCHEME, where all
attributes are managed by a single authority.
IN A MULTI-AUTHORITY CP-ABE SCHEME where attributes
are from different domains and managed by different
authorities. This method is more appropriate for data
access control of cloud storage systems. Users contain
attributes those should be issued by multiple authorities
and data owners. Users may also share the data using
access policy defined over attributes from different
authorities.
DATA ACCESS CONTROL SYSTEM IN MULTI AUTHORITY
CLOUD STORAGE
There are five types of entities in the system as in Fig 2: a
certificate authority (CA), attribute authorities (AAs),
data owners (owners), the cloud server (server) and data
consumers (users). The CA is a global trusted certificate
authority in the system. It sets up the system and accepts
the registration of all the users and AAs in the system.
For each legal user in the system, the CA assigns a global
unique user identity to it and also generates a global
public key for this user. However, the CA is not involved
in any attribute management and the creation of secret
keys that are associated with attributes. For example, the
CA can be the Social Security Administration, an
independent agency of the United States government.
Each user will be issued a Social Security Number (SSN)
as its global identity. Every AA is an independent
attribute authority that is responsible for entitling and
revoking user’s attributes according to their role or
identity in its domain.
ISSN (Online): 2349-7084
INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING IN RESEARCH TRENDS
VOLUME 2, ISSUE 8, AUGUST 2015, PP 486-491
IJCERT © 2015 Page | 488
http://www.ijcert.org
Fig2. System model of data access control in multi-
authority cloud storage
In our scheme, every attribute is associated with a single
AA, but each AA can manage an arbitrary number of
attributes. Every AA has full control over the structure
and semantics of its attributes. Each AA is responsible for
generating a public attribute key for each attribute it
manages and a secret key. For each user reflecting
his/her attributes.
II.EXISTING SYSTEM
In a multi-authority cloud storage system, attributes of
user’s can be changed dynamically. A user may be join
some new attributes or revoked some current attributes.
SOME OF THE SCHEMES:
ATTRIBUTE BASED DATA SHARING WITH ATTRIBUTE
REVOCATION SCHEME
Use semi-trustable on-line proxy servers. This server
enables the authority to revoke user attributes with
minimal effort. This scheme was uniquely integrating the
technique of proxy re-encryption with CPABE, and also
enables the authority to delegate most of laborious tasks
to proxy servers.
THE ADVANTAGES of this scheme is More Secure against
chosen cipher text attacks. Provide importance to attribute
revocation which is difficult for CP-ABE schemes.
DRAWBACK: The storage overhead could be high if proxy
servers keep all the proxy re-key. Storage system,
attributes of user’s can be changed dynamically. A user
may be join some new attributes or revoked some current
attributes.
ATTRIBUTE-BASED ACCESS CONTROL WITH EFFICIENT
REVOCATION IN DATA OUTSOURCING SYSTEMS SCHEME
Some of the access control mechanism based on cipher
text-policy attribute-based encryption to enforce access
control policies with efficient attribute and user revocation
method. The fine-grained access control can be achieved
by dual encryption scheme. This dual encryption
mechanism takes advantage of the attribute-based
encryption and selective group key distribution in each
attribute group. The advantage of this scheme is securely
managing the outsourced data. This scheme achieve
efficient and secure in the data outsourcing systems.
DRAWBACK: Huge issue in Enforcement of authorization
policies and the support of policy updates
EASIER: ENCRYPTION BASED ACCESS CONTROL IN SOCIAL
NETWORKS WITH EFFICIENT REVOCATION SCHEME
The advantage of this scheme is the Easier architecture
and construction provides performance evaluation, and
prototype application of our approach on Face book.
DRAWBACK: Does not Achieve Stronger Security
Guarantees
III.PROPOSED SYSTEM
 This paper, surveys a revocable multiauthority Fine -
grained access control scheme [5], to solve the
attribute revocation problem in the system. This
scheme is an efficient and secure revocation. The
attribute revocation method can efficiently achieve
both forward security and backward security. In
backward security scheme the revoked user cannot
decrypt any new Cipher text that requires the revoked
attribute to decrypt. In Forward security the newly
joined user can also decrypt the previously published
ciphertexts, if it has sufficient attributes. Moreover,
while updating the cipher texts, all the users need to
hold only the latest secret key, rather than to keep
records on all the previous secret keys.
OVERVIEW OF PROPOSED SYSTEM
 Attribute revocation method can efficiently achieve
both forward security and backward security.
ISSN (Online): 2349-7084
INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING IN RESEARCH TRENDS
VOLUME 2, ISSUE 8, AUGUST 2015, PP 486-491
IJCERT © 2015 Page | 489
http://www.ijcert.org
 An attribute revocation method is efficient in the
sense that it incurs less communication cost and
computation cost, secure in the sense that it can
achieve both backward security and forward security.
1. ENTITIES
EXISTING(MULTIAUTHORITY CP-ABE SCHEME)
 Certificate authority (CA), Attribute authorities
(AAs), Data owners (owners), Cloud
server(server) Data consumers (users) [5][6].
PROPOSED(REVOCABLE MULTIAUTHORITY FINE –
GRAINED SCHEME)
 Global Certificate authority (CA), Multiple
Attribute authorities (AAs), Data owners
(owners), Cloud server(server) Data consumers
(users).
1. ATTRIBUTE
EXISTING(MULTIAUTHORITY CP-ABE SCHEME) :Every
secret key is associated with a single AA.[2]
PROPOSED(REVOCABLE MULTIAUTHORITY FINE-GRAINED
SCHEME):Every secret key is associated with a Multiple
AA.
2. CERTIFICATE AUTHORITY (CA)
MULTIAUTHORITY CP-ABE SCHEME :The CA sets up the
system and accepts the registration of all the users and
AAs in the system [3].
REVOCABLE MULTIAUTHORITY FINE-GRAINED SCHEME: The
CA sets up the system and accepts the registration of users
and AAs in the system. CA assigns global authority
identity aid to each attribute in the system
3. DATA CONSUMERS (USERS).
MULTIAUTHORITY CP-ABE SCHEME :For each legal user in
the system, the CA assigns a global unique user identity to
it and also generates a global public key for this user[4].
REVOCABLE MULTIAUTHORITY FINE-GRAINED SCHEME::For
each legal user in the system, AA assigns a global user
identity uid to each user
4. ATTRIBUTE AUTHORITIES (AAS)
MULTIAUTHORITY CP-ABE SCHEME :Every AA is an
independent attribute authority that is Responsible for
entitling and revoking usersattributes [1].
REVOCABLE MULTIAUTHORITY FINE-GRAINED SCHEME::The
uid is globally unique in the system .Secret keys are issued
by different AAs for the same uid
5. DATA OWNERS (OWNERS)
MULTIAUTHORITY CP-ABE SCHEME :Each owner first
divides the data into several components and encrypts
each data component with different content keys by using
symmetric encryption techniques [2].
REVOCABLE MULTIAUTHORITY FINE-GRAINED SCHEME:Data
owners may share the data using access policy defined
over attributes from different authorities.
6. CLOUD SERVER
MULTIAUTHORITY CP-ABE SCHEME :Cipher Text stored
and updated into the Cloud Server[4]
REVOCABLE MULTIAUTHORITY FINE-GRAINED
SCHEME::Cipher text updated into the cloud server
ISSN (Online): 2349-7084
INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING IN RESEARCH TRENDS
VOLUME 2, ISSUE 8, AUGUST 2015, PP 486-491
IJCERT © 2015 Page | 490
http://www.ijcert.org
Fig3. System Architecture:
FINE-GRAINED SCHEME
Fine-grained Access Control. Fine-grained access
control systems facilitate granting differential access rights
to a set of users and allow edibility in specifying the access
rights of individual users. Several techniques are known
for implementing fine grained access control.
In order to address the above issues, our proposed system
performs a secure data transaction in the cloud; the
suitable cryptographic method is used .i.e. RSA algorithm.
The owner must encrypt the file with some specified
attributes, with owner’s private key which was generated
by the KDC operated by the Trustee.
Setup Phase: in this phase data owner can obtain Private
Key from KDC ,get his public key and get Time interval
tag from Time server for data availability and collect all
this things as attribute set and apply RSA algorithm to
encrypt the data be out sourcing to Cloud server.
Encrypt: in this phase data will encrypted along with
attribute set, which consist of E(M,Pk,T,Puk)-RSACT,
where M: Message,Pk: Private Key which is generated by
KDC,T: Time Interval ,Puk: Public Key
Decrypt: in this phase data will be decrypted along with
Attribute set, which consist of D(CT)RSA
M,Pk,T,Puk..Before to outsource the data into cloud server
data owner append a time interval tag which was issued
by the time server which will be used as a time stamp.
Finally Owner can upload encrypted data into cloud
server with Time intervals. If a third person want to access
that file remotely from cloud server, user need be
authorized by the cloud server i.e. here fine grained
approach will be performed at cloud level soon after
authorized by cloud server, cloud server send encrypted
content to user, now user need get Decrypted keys that is
Private key and Public Key by the Trustee it will done
based on user Identity. Users may view the record if the
user had the key which is used to decrypt the encrypted
file [6] . Sometimes this may be a failure due to the
technology development and the hackers. The key
distribution center is a server that is responsible for
cryptographic key management. The public key is time-
based, it means if key will be deleted or removed by the
key manager when an expiration time is reached, where
the expiration time is specified when the file is first
declared or uploaded . Without the public key, the private
key and hence the data file remain encrypted and are
deemed to be inaccessible. Thus, the main security
property of file assured deletion is that even if a cloud
provider does not remove expired file copies from its
storage, those files remain encrypted and
unrecoverable[6]. We propose a policy based file access [6]
and policy based file assured deletion [6], [7], [8] for better
access to the files and delete the files which are decided no
more.
ISSN (Online): 2349-7084
INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING IN RESEARCH TRENDS
VOLUME 2, ISSUE 8, AUGUST 2015, PP 486-491
IJCERT © 2015 Page | 491
http://www.ijcert.org
Our system also has the added feature of fine grained
access control in which only valid users are able to
decrypt the loading information. The system prevents
replay attacks and supports creation, modification, and
reading data collected in the cloud.
ADVANTAGES:
Distributed access control of data collected in cloud so
that only certified users with fully valid attributes can
read them. The confirmation of users who collection and
modify their data on the cloud. The identity of the user is
secure from the cloud during confirmation.
IV.CONCLUSION
This investigation explains a revocable multi-authority
Fine-grained scheme that can support efficient attribute
revocation. Then the effective data access control scheme
for multi-authority cloud storage systems is proposed. It
eliminates Decryption overhead for users according to
attributes .This secure attribute based cryptographic
technique for robust data security that’s being shared in
the cloud .This revocable multi-authority Fine-grained
scheme with Verifiable outsourced decryption and proved
that it is secure and verifiable.
REFERENCES
[1]. S.Yu, C.Wang, K.Ren, and W.Lou, „„Attribute Based
Data Sharing with Attribute Revocation,‟ ‟ in Proc. 5th
ACM Symp. Information, Computer and Comm. Security
(ASIACCS‟ 10), 2010, pp. 261-270.
[2]. J. Hur and D.K. Noh, „„Attribute-Based Access
Control with Efficient Revocation in Data Outsourcing
Systems,‟ ‟ IEEE Trans. Parallel Distributed Systems, vol.
22, no. 7, pp. 1214-1221, July 2011.
[3].S.Jahid, P.Mittal, and N.Borisov, „„Easier: Encryption-
Based Access Control in Social Networks with Efficient
Revocation,‟ ‟ in Proc. 6th ACM Symp. Information,
Computer and Comm. Security (ASIACCS‟ 11), 2011, pp.
411-415.
[4].M. Li, S. Yu, Y. Zheng, K. Ren, andW.Lou, „„Scalable
and Secure Sharing of Personal Health Records in Cloud
Computing Using Attribute-Based Encryption,‟ ‟ IEEE
Trans. Parallel Distributed Systems, vol. no. 1, pp. 131-143,
Jan. 2013. 24,
[5].Kan Yang, and Xiaohua Jia, „„Expressive, Efficient,
and Revocable Data Access Control for Multi-Authority
Cloud Storage,‟ ‟ IEEE transactions on parallel and
distributed systems, vol. 25, no. 7, july 2014.
[6] MrSanthoshkumarB.J, M.Tech, Amrita
VishwaVidyapeetham, Mysore Campus, India “Attribute
Based Encryption with Verifiable Outsourced
Decryption.” In International Journal of Advanced
Research in Computer Science and Software
Engineering”Volume 4, Issue 6, June 2014,ISSN: 2277
128X.
[7]Tejaswini R M1, Roopa C K2 , Ayesha Taranum
“Securing Cloud Server & Data Access withMulti-
Authorities” International Journal of Computer Science
and Information Technology Research ISSN 2348-120X
Vol. 2, Issue 2, pp: (297-302), Month: April-June 2014,

More Related Content

What's hot

Security and Protection of Enterprise Data in Cloud: Implementation of Deniab...
Security and Protection of Enterprise Data in Cloud: Implementation of Deniab...Security and Protection of Enterprise Data in Cloud: Implementation of Deniab...
Security and Protection of Enterprise Data in Cloud: Implementation of Deniab...
IJERA Editor
 
Control cloud data access privilege and anonymity with fully anonymous attri...
Control cloud data access privilege and anonymity with  fully anonymous attri...Control cloud data access privilege and anonymity with  fully anonymous attri...
Control cloud data access privilege and anonymity with fully anonymous attri...
LeMeniz Infotech
 
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET Journal
 
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
Editor IJCATR
 
Cam cloud assisted privacy preserving mobile health monitoring
Cam cloud assisted privacy preserving mobile health monitoringCam cloud assisted privacy preserving mobile health monitoring
Cam cloud assisted privacy preserving mobile health monitoring
IEEEFINALYEARPROJECTS
 
Attribute based encryption with privacy preserving in clouds
Attribute based encryption with privacy preserving in cloudsAttribute based encryption with privacy preserving in clouds
Attribute based encryption with privacy preserving in clouds
Swathi Rampur
 
Dont look at this
Dont look at thisDont look at this
Dont look at thismylawyer1
 
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET Journal
 
Ppt 1
Ppt 1Ppt 1

What's hot (9)

Security and Protection of Enterprise Data in Cloud: Implementation of Deniab...
Security and Protection of Enterprise Data in Cloud: Implementation of Deniab...Security and Protection of Enterprise Data in Cloud: Implementation of Deniab...
Security and Protection of Enterprise Data in Cloud: Implementation of Deniab...
 
Control cloud data access privilege and anonymity with fully anonymous attri...
Control cloud data access privilege and anonymity with  fully anonymous attri...Control cloud data access privilege and anonymity with  fully anonymous attri...
Control cloud data access privilege and anonymity with fully anonymous attri...
 
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
 
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
 
Cam cloud assisted privacy preserving mobile health monitoring
Cam cloud assisted privacy preserving mobile health monitoringCam cloud assisted privacy preserving mobile health monitoring
Cam cloud assisted privacy preserving mobile health monitoring
 
Attribute based encryption with privacy preserving in clouds
Attribute based encryption with privacy preserving in cloudsAttribute based encryption with privacy preserving in clouds
Attribute based encryption with privacy preserving in clouds
 
Dont look at this
Dont look at thisDont look at this
Dont look at this
 
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
 
Ppt 1
Ppt 1Ppt 1
Ppt 1
 

Viewers also liked

Attitude Is Everything
Attitude Is EverythingAttitude Is Everything
Attitude Is EverythingAnuradha
 
Dip comm - 2016- projects list
Dip comm - 2016- projects listDip comm - 2016- projects list
Dip comm - 2016- projects list
NEWZEN INFOTECH
 
Using data mining methods knowledge discovery for text mining
Using data mining methods knowledge discovery for text miningUsing data mining methods knowledge discovery for text mining
Using data mining methods knowledge discovery for text mining
eSAT Journals
 
Strange Calculation (2)
Strange Calculation (2)Strange Calculation (2)
Strange Calculation (2)Anuradha
 
MS SQL SERVER: Data mining concepts and dmx
MS SQL SERVER: Data mining concepts and dmxMS SQL SERVER: Data mining concepts and dmx
MS SQL SERVER: Data mining concepts and dmx
DataminingTools Inc
 
Dictionnaire des cultures alimentaires
Dictionnaire des cultures alimentairesDictionnaire des cultures alimentaires
Dictionnaire des cultures alimentaires
Jean-Pierre Poulain
 
Cyberbulling
CyberbullingCyberbulling
Cyberbulling
Jose Lopez
 
ENJ-400 Función Administrativa del Juez de Paz
ENJ-400 Función Administrativa del Juez de PazENJ-400 Función Administrativa del Juez de Paz
ENJ-400 Función Administrativa del Juez de PazENJ
 
Selection procedure
Selection procedureSelection procedure
Selection procedure
preet kaur
 
Le Monde à Faim
Le Monde à Faim Le Monde à Faim
Le Monde à Faim
Jean-Pierre Poulain
 
IEEE 2015 Projects for M.Tech & B.Tech Embedded Systems, VLSI, Communication,...
IEEE 2015 Projects for M.Tech & B.Tech Embedded Systems, VLSI, Communication,...IEEE 2015 Projects for M.Tech & B.Tech Embedded Systems, VLSI, Communication,...
IEEE 2015 Projects for M.Tech & B.Tech Embedded Systems, VLSI, Communication,...
Maryala Srinivas
 
Modèles alimentaires et ethno-diversité
Modèles alimentaires et ethno-diversité  Modèles alimentaires et ethno-diversité
Modèles alimentaires et ethno-diversité
Jean-Pierre Poulain
 
Identity based proxy-oriented data uploading and remote data integrity checki...
Identity based proxy-oriented data uploading and remote data integrity checki...Identity based proxy-oriented data uploading and remote data integrity checki...
Identity based proxy-oriented data uploading and remote data integrity checki...
Finalyearprojects Toall
 
Extract - observatoire alimentaire 2015
Extract - observatoire alimentaire 2015Extract - observatoire alimentaire 2015
Extract - observatoire alimentaire 2015
Prisma Media Solutions
 
Sociology of food: "What did you have for dinner?“ Empirical Questions and Pr...
Sociology of food: "What did you have for dinner?“ Empirical Questions and Pr...Sociology of food: "What did you have for dinner?“ Empirical Questions and Pr...
Sociology of food: "What did you have for dinner?“ Empirical Questions and Pr...
Jean-Pierre Poulain
 
RapidMiner: Data Mining And Rapid Miner
RapidMiner: Data Mining And Rapid MinerRapidMiner: Data Mining And Rapid Miner
RapidMiner: Data Mining And Rapid Miner
DataminingTools Inc
 
Actissia
ActissiaActissia

Viewers also liked (19)

Attitude Is Everything
Attitude Is EverythingAttitude Is Everything
Attitude Is Everything
 
Dip comm - 2016- projects list
Dip comm - 2016- projects listDip comm - 2016- projects list
Dip comm - 2016- projects list
 
Using data mining methods knowledge discovery for text mining
Using data mining methods knowledge discovery for text miningUsing data mining methods knowledge discovery for text mining
Using data mining methods knowledge discovery for text mining
 
Material perroconpuerta
Material perroconpuertaMaterial perroconpuerta
Material perroconpuerta
 
Strange Calculation (2)
Strange Calculation (2)Strange Calculation (2)
Strange Calculation (2)
 
Gods Resume
Gods ResumeGods Resume
Gods Resume
 
MS SQL SERVER: Data mining concepts and dmx
MS SQL SERVER: Data mining concepts and dmxMS SQL SERVER: Data mining concepts and dmx
MS SQL SERVER: Data mining concepts and dmx
 
Dictionnaire des cultures alimentaires
Dictionnaire des cultures alimentairesDictionnaire des cultures alimentaires
Dictionnaire des cultures alimentaires
 
Cyberbulling
CyberbullingCyberbulling
Cyberbulling
 
ENJ-400 Función Administrativa del Juez de Paz
ENJ-400 Función Administrativa del Juez de PazENJ-400 Función Administrativa del Juez de Paz
ENJ-400 Función Administrativa del Juez de Paz
 
Selection procedure
Selection procedureSelection procedure
Selection procedure
 
Le Monde à Faim
Le Monde à Faim Le Monde à Faim
Le Monde à Faim
 
IEEE 2015 Projects for M.Tech & B.Tech Embedded Systems, VLSI, Communication,...
IEEE 2015 Projects for M.Tech & B.Tech Embedded Systems, VLSI, Communication,...IEEE 2015 Projects for M.Tech & B.Tech Embedded Systems, VLSI, Communication,...
IEEE 2015 Projects for M.Tech & B.Tech Embedded Systems, VLSI, Communication,...
 
Modèles alimentaires et ethno-diversité
Modèles alimentaires et ethno-diversité  Modèles alimentaires et ethno-diversité
Modèles alimentaires et ethno-diversité
 
Identity based proxy-oriented data uploading and remote data integrity checki...
Identity based proxy-oriented data uploading and remote data integrity checki...Identity based proxy-oriented data uploading and remote data integrity checki...
Identity based proxy-oriented data uploading and remote data integrity checki...
 
Extract - observatoire alimentaire 2015
Extract - observatoire alimentaire 2015Extract - observatoire alimentaire 2015
Extract - observatoire alimentaire 2015
 
Sociology of food: "What did you have for dinner?“ Empirical Questions and Pr...
Sociology of food: "What did you have for dinner?“ Empirical Questions and Pr...Sociology of food: "What did you have for dinner?“ Empirical Questions and Pr...
Sociology of food: "What did you have for dinner?“ Empirical Questions and Pr...
 
RapidMiner: Data Mining And Rapid Miner
RapidMiner: Data Mining And Rapid MinerRapidMiner: Data Mining And Rapid Miner
RapidMiner: Data Mining And Rapid Miner
 
Actissia
ActissiaActissia
Actissia
 

Similar to Investigation on Revocable Fine-grained Access Control Scheme for Multi-Authority Cloud Storage Systems.

IRJET- Data Centric Access Control Solution with Role baesd Proxy Re-Encryption
IRJET- Data Centric Access Control Solution with Role baesd Proxy Re-EncryptionIRJET- Data Centric Access Control Solution with Role baesd Proxy Re-Encryption
IRJET- Data Centric Access Control Solution with Role baesd Proxy Re-Encryption
IRJET Journal
 
A Secure & Scalable Access Method in Cloud Computing
A Secure & Scalable Access Method in Cloud ComputingA Secure & Scalable Access Method in Cloud Computing
A Secure & Scalable Access Method in Cloud Computing
ijsrd.com
 
IRJET- A Review Paper on an Efficient File Hierarchy Attribute Based Encr...
IRJET-  	  A Review Paper on an Efficient File Hierarchy Attribute Based Encr...IRJET-  	  A Review Paper on an Efficient File Hierarchy Attribute Based Encr...
IRJET- A Review Paper on an Efficient File Hierarchy Attribute Based Encr...
IRJET Journal
 
82ugszwcqn29itkwai2q 140424034504-phpapp01
82ugszwcqn29itkwai2q 140424034504-phpapp0182ugszwcqn29itkwai2q 140424034504-phpapp01
82ugszwcqn29itkwai2q 140424034504-phpapp01Nitish Bhardwaj
 
Ppt1 130410095050-phpapp01
Ppt1 130410095050-phpapp01Ppt1 130410095050-phpapp01
Ppt1 130410095050-phpapp01Nitish Bhardwaj
 
82ugszwcqn29itkwai2q 140424034504-phpapp01
82ugszwcqn29itkwai2q 140424034504-phpapp0182ugszwcqn29itkwai2q 140424034504-phpapp01
82ugszwcqn29itkwai2q 140424034504-phpapp01Nitish Bhardwaj
 
Ppt1 130410095050-phpapp01
Ppt1 130410095050-phpapp01Ppt1 130410095050-phpapp01
Ppt1 130410095050-phpapp01Nitish Bhardwaj
 
Ppt1 130410095050-phpapp01
Ppt1 130410095050-phpapp01Ppt1 130410095050-phpapp01
Ppt1 130410095050-phpapp01Nitish Bhardwaj
 
Ppt1 130410095050-phpapp01
Ppt1 130410095050-phpapp01Ppt1 130410095050-phpapp01
Ppt1 130410095050-phpapp01Nitish Bhardwaj
 

Similar to Investigation on Revocable Fine-grained Access Control Scheme for Multi-Authority Cloud Storage Systems. (20)

IRJET- Data Centric Access Control Solution with Role baesd Proxy Re-Encryption
IRJET- Data Centric Access Control Solution with Role baesd Proxy Re-EncryptionIRJET- Data Centric Access Control Solution with Role baesd Proxy Re-Encryption
IRJET- Data Centric Access Control Solution with Role baesd Proxy Re-Encryption
 
A Secure & Scalable Access Method in Cloud Computing
A Secure & Scalable Access Method in Cloud ComputingA Secure & Scalable Access Method in Cloud Computing
A Secure & Scalable Access Method in Cloud Computing
 
IRJET- A Review Paper on an Efficient File Hierarchy Attribute Based Encr...
IRJET-  	  A Review Paper on an Efficient File Hierarchy Attribute Based Encr...IRJET-  	  A Review Paper on an Efficient File Hierarchy Attribute Based Encr...
IRJET- A Review Paper on an Efficient File Hierarchy Attribute Based Encr...
 
Pp1t
Pp1tPp1t
Pp1t
 
Pp1t
Pp1tPp1t
Pp1t
 
Pp1t
Pp1tPp1t
Pp1t
 
82ugszwcqn29itkwai2q 140424034504-phpapp01
82ugszwcqn29itkwai2q 140424034504-phpapp0182ugszwcqn29itkwai2q 140424034504-phpapp01
82ugszwcqn29itkwai2q 140424034504-phpapp01
 
Pp1t
Pp1tPp1t
Pp1t
 
Pp1t
Pp1tPp1t
Pp1t
 
Ppt1 130410095050-phpapp01
Ppt1 130410095050-phpapp01Ppt1 130410095050-phpapp01
Ppt1 130410095050-phpapp01
 
Pp1t
Pp1tPp1t
Pp1t
 
Pp1t
Pp1tPp1t
Pp1t
 
Pp1t
Pp1tPp1t
Pp1t
 
82ugszwcqn29itkwai2q 140424034504-phpapp01
82ugszwcqn29itkwai2q 140424034504-phpapp0182ugszwcqn29itkwai2q 140424034504-phpapp01
82ugszwcqn29itkwai2q 140424034504-phpapp01
 
Ppt1 130410095050-phpapp01
Ppt1 130410095050-phpapp01Ppt1 130410095050-phpapp01
Ppt1 130410095050-phpapp01
 
Pp1t
Pp1tPp1t
Pp1t
 
Pp1t
Pp1tPp1t
Pp1t
 
Ppt1 130410095050-phpapp01
Ppt1 130410095050-phpapp01Ppt1 130410095050-phpapp01
Ppt1 130410095050-phpapp01
 
Ppt1 130410095050-phpapp01
Ppt1 130410095050-phpapp01Ppt1 130410095050-phpapp01
Ppt1 130410095050-phpapp01
 
Pp1t
Pp1tPp1t
Pp1t
 

More from IJCERT JOURNAL

Light Dimmer with Implementation of Data Abstraction While Crashing
Light Dimmer with Implementation of Data Abstraction While CrashingLight Dimmer with Implementation of Data Abstraction While Crashing
Light Dimmer with Implementation of Data Abstraction While Crashing
IJCERT JOURNAL
 
Mining Opinion Features in Customer Reviews
Mining Opinion Features in Customer ReviewsMining Opinion Features in Customer Reviews
Mining Opinion Features in Customer Reviews
IJCERT JOURNAL
 
Augmenting Publish/Subscribe System by Identity Based Encryption (IBE) Techni...
Augmenting Publish/Subscribe System by Identity Based Encryption (IBE) Techni...Augmenting Publish/Subscribe System by Identity Based Encryption (IBE) Techni...
Augmenting Publish/Subscribe System by Identity Based Encryption (IBE) Techni...
IJCERT JOURNAL
 
Design of an adaptive JPEG Steganalysis with UED
Design of an adaptive JPEG Steganalysis with UED Design of an adaptive JPEG Steganalysis with UED
Design of an adaptive JPEG Steganalysis with UED
IJCERT JOURNAL
 
Challenges and outlook with Big Data
Challenges and outlook with Big Data Challenges and outlook with Big Data
Challenges and outlook with Big Data
IJCERT JOURNAL
 
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud. A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
IJCERT JOURNAL
 
Secure Redundant Data Avoidance over Multi-Cloud Architecture.
Secure Redundant Data Avoidance over Multi-Cloud Architecture. Secure Redundant Data Avoidance over Multi-Cloud Architecture.
Secure Redundant Data Avoidance over Multi-Cloud Architecture.
IJCERT JOURNAL
 
SURVEY ON IMPLEMANTATION OF COLUMN ORIENTED NOSQL DATA STORES ( BIGTABLE & CA...
SURVEY ON IMPLEMANTATION OF COLUMN ORIENTED NOSQL DATA STORES ( BIGTABLE & CA...SURVEY ON IMPLEMANTATION OF COLUMN ORIENTED NOSQL DATA STORES ( BIGTABLE & CA...
SURVEY ON IMPLEMANTATION OF COLUMN ORIENTED NOSQL DATA STORES ( BIGTABLE & CA...
IJCERT JOURNAL
 
Security Issues’ in Cloud Computing and its Solutions.
Security Issues’ in Cloud Computing and its Solutions. Security Issues’ in Cloud Computing and its Solutions.
Security Issues’ in Cloud Computing and its Solutions.
IJCERT JOURNAL
 

More from IJCERT JOURNAL (9)

Light Dimmer with Implementation of Data Abstraction While Crashing
Light Dimmer with Implementation of Data Abstraction While CrashingLight Dimmer with Implementation of Data Abstraction While Crashing
Light Dimmer with Implementation of Data Abstraction While Crashing
 
Mining Opinion Features in Customer Reviews
Mining Opinion Features in Customer ReviewsMining Opinion Features in Customer Reviews
Mining Opinion Features in Customer Reviews
 
Augmenting Publish/Subscribe System by Identity Based Encryption (IBE) Techni...
Augmenting Publish/Subscribe System by Identity Based Encryption (IBE) Techni...Augmenting Publish/Subscribe System by Identity Based Encryption (IBE) Techni...
Augmenting Publish/Subscribe System by Identity Based Encryption (IBE) Techni...
 
Design of an adaptive JPEG Steganalysis with UED
Design of an adaptive JPEG Steganalysis with UED Design of an adaptive JPEG Steganalysis with UED
Design of an adaptive JPEG Steganalysis with UED
 
Challenges and outlook with Big Data
Challenges and outlook with Big Data Challenges and outlook with Big Data
Challenges and outlook with Big Data
 
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud. A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
 
Secure Redundant Data Avoidance over Multi-Cloud Architecture.
Secure Redundant Data Avoidance over Multi-Cloud Architecture. Secure Redundant Data Avoidance over Multi-Cloud Architecture.
Secure Redundant Data Avoidance over Multi-Cloud Architecture.
 
SURVEY ON IMPLEMANTATION OF COLUMN ORIENTED NOSQL DATA STORES ( BIGTABLE & CA...
SURVEY ON IMPLEMANTATION OF COLUMN ORIENTED NOSQL DATA STORES ( BIGTABLE & CA...SURVEY ON IMPLEMANTATION OF COLUMN ORIENTED NOSQL DATA STORES ( BIGTABLE & CA...
SURVEY ON IMPLEMANTATION OF COLUMN ORIENTED NOSQL DATA STORES ( BIGTABLE & CA...
 
Security Issues’ in Cloud Computing and its Solutions.
Security Issues’ in Cloud Computing and its Solutions. Security Issues’ in Cloud Computing and its Solutions.
Security Issues’ in Cloud Computing and its Solutions.
 

Recently uploaded

Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
deeptiverma2406
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
Chapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdfChapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdf
Kartik Tiwari
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBCSTRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
kimdan468
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 

Recently uploaded (20)

Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Chapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdfChapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdf
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBCSTRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 

Investigation on Revocable Fine-grained Access Control Scheme for Multi-Authority Cloud Storage Systems.

  • 1. ISSN (Online): 2349-7084 GLOBAL IMPACT FACTOR 0.238 DIIF 0.876 INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING IN RESEARCH TRENDS VOLUME 2, ISSUE 8, AUGUST 2015, PP 486-491 IJCERT © 2015 Page | 486 http://www.ijcert.org Investigation on Revocable Fine-grained Access Control Scheme for Multi-Authority Cloud Storage Systems 1B.Natraj Kumar,2 M.Sri Lakshmi, 3Dr S.Prem Kumar 1 (M.Tech), CSE, Assistant professor Department of Computer Science and Engineering 2 Assistant Professor, Department of Computer Science and Engineering 3 Professor & HOD, Department of computer science and engineering, G.Pullaiah College of Engineering and Technology, Kurnool, Andhra Pradesh, India. Abstract: Cloud computing is one of the emerge technologies in order to outsource huge volume of data inters of storage and sharing. To protect the data and privacy of users the access control methods ensure that authorized users access the data and the system. Fine grained- approach is the appropriate method for data access control in cloud storage. However, CP-ABE schemes to data access control for cloud storage systems are difficult because of the attribute revocation problem. Specifically, in this paper we investigate on revocable multi-authority Fine-grained-Scheme performance. Key Terms: Fine-grained access policy, Renewal policy, policy based access, multi-authority, CP-ABE. ——————————————————— I.INTRODUCTION All Data access control is an efficient way to ensure the data security in the cloud. Cloud storage services allows data owner to outsource their data to the cloud. Attribute- based encryption (ABE) [1] is a new concept of encryption algorithms that allow the encryptor to set a policy describing who should be able to read the data. In an attribute-based encryption system, all the attribute sets are distributed by an authority. A user should be able to decrypt a ciphertext if and only if their attribute set satisfy. In traditional public-key cryptography, a message is encrypted for a specific receiver using the receiver’s public-key. Identity-based cryptography and in particular identity-based encryption (IBE) changed the conventional understanding of public-key cryptography by allowing the public-key to be an arbitrary string, e.g., the email address of the receiver. ABE goes one step further and defines the identity not atomic but as a set of attributes, e.g. roles, and messages can be encrypted with respect to subsets of attributes (key-policy ABE - KP-ABE) or policies defined over a set of attributes (ciphertext-policy ABE - CP-ABE). In ciphertext-policy attribute-based encryption (CP-ABE) a user’s private-key is associated with a set of attributes and a ciphertext specifies an access policy over a defined universe of attributes within the system. A user will be able to decrypt a ciphertext, if and only if his attributes satisfy the policy of the respective ciphertext. Fine–grained schema is considered as one of the most suitable scheme for data access control in cloud storage. This scheme provides data owners more direct control on access policies at cloud level [2]. However, CP-ABE schemes to data access control for cloud storage systems are difficult because of the attribute revocation problem. So This paper produce Fine –grained scheme on efficient and revocable data access control scheme for multi- authority cloud storage systems, where there are multiple authorities cooperate and each authority is able to issue attributes independently To achieve secure data transaction in cloud, suitable cryptography method is used. The data owner must encrypt the file and then store the file to the cloud. If a third person downloads the file, he/she may view the record if he/she had the key which is used to decrypt the encrypted file. Sometimes this may be failure due to the technology development and the hackers.
  • 2. ISSN (Online): 2349-7084 INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING IN RESEARCH TRENDS VOLUME 2, ISSUE 8, AUGUST 2015, PP 486-491 IJCERT © 2015 Page | 487 http://www.ijcert.org Fig1: Example diagram for data sharing with cloud storage. To overcome the problem the cloud computing contains huge open distributed system. It is important to protect the data and privacy of users. Access Control methods ensure that authorized user’s access the data and the system. Access control is generally a policy or procedure that allows, denies or restricts access to a system. It may, as well, monitor and record all attempts made to access a system. Access Control may also identify users attempting to access a system unauthorized. It is a mechanism which is very much important for protection in computer security. Cloud Storage: The Cloud storage is an important service of cloud computing. The Cloud Storage offers services for data owners to host their data into the cloud. A great challenge to data access control scheme was data hosting and data access services. Because data owners does not fully trust the cloud servers also they can no longer rely on servers to do access control The data access control becomes a challenging issue in cloud storage systems because of data outsourcing and untrusted cloud servers. Therefore Cloud storage is a model of data storage where the digital data is stored in logical pool. CP-ABE: One of the most suitable technologies for data access control in cloud storage systems is Cipher text- Policy Attribute-based Encryption (CP-ABE). This scheme provides the data owner more direct control on access policies. The Authority in CP-ABE scheme is responsible for attribute management and key distribution. The authority may be the university registration office, the human resource department in a company, etc. The data owner in CP-ABE scheme defines the access policies and encrypts data according to the policies. CP-ABE TYPES: In CP-ABE scheme each user will be issued a secret key reflecting its attributes. A user can decrypt the data only when its attributes satisfy the access policies. There are two types of CP-ABE systems: SINGLE-AUTHORITY CP-ABE MULTI-AUTHORITY CP-ABE IN SINGLE-AUTHORITY CP-ABE SCHEME, where all attributes are managed by a single authority. IN A MULTI-AUTHORITY CP-ABE SCHEME where attributes are from different domains and managed by different authorities. This method is more appropriate for data access control of cloud storage systems. Users contain attributes those should be issued by multiple authorities and data owners. Users may also share the data using access policy defined over attributes from different authorities. DATA ACCESS CONTROL SYSTEM IN MULTI AUTHORITY CLOUD STORAGE There are five types of entities in the system as in Fig 2: a certificate authority (CA), attribute authorities (AAs), data owners (owners), the cloud server (server) and data consumers (users). The CA is a global trusted certificate authority in the system. It sets up the system and accepts the registration of all the users and AAs in the system. For each legal user in the system, the CA assigns a global unique user identity to it and also generates a global public key for this user. However, the CA is not involved in any attribute management and the creation of secret keys that are associated with attributes. For example, the CA can be the Social Security Administration, an independent agency of the United States government. Each user will be issued a Social Security Number (SSN) as its global identity. Every AA is an independent attribute authority that is responsible for entitling and revoking user’s attributes according to their role or identity in its domain.
  • 3. ISSN (Online): 2349-7084 INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING IN RESEARCH TRENDS VOLUME 2, ISSUE 8, AUGUST 2015, PP 486-491 IJCERT © 2015 Page | 488 http://www.ijcert.org Fig2. System model of data access control in multi- authority cloud storage In our scheme, every attribute is associated with a single AA, but each AA can manage an arbitrary number of attributes. Every AA has full control over the structure and semantics of its attributes. Each AA is responsible for generating a public attribute key for each attribute it manages and a secret key. For each user reflecting his/her attributes. II.EXISTING SYSTEM In a multi-authority cloud storage system, attributes of user’s can be changed dynamically. A user may be join some new attributes or revoked some current attributes. SOME OF THE SCHEMES: ATTRIBUTE BASED DATA SHARING WITH ATTRIBUTE REVOCATION SCHEME Use semi-trustable on-line proxy servers. This server enables the authority to revoke user attributes with minimal effort. This scheme was uniquely integrating the technique of proxy re-encryption with CPABE, and also enables the authority to delegate most of laborious tasks to proxy servers. THE ADVANTAGES of this scheme is More Secure against chosen cipher text attacks. Provide importance to attribute revocation which is difficult for CP-ABE schemes. DRAWBACK: The storage overhead could be high if proxy servers keep all the proxy re-key. Storage system, attributes of user’s can be changed dynamically. A user may be join some new attributes or revoked some current attributes. ATTRIBUTE-BASED ACCESS CONTROL WITH EFFICIENT REVOCATION IN DATA OUTSOURCING SYSTEMS SCHEME Some of the access control mechanism based on cipher text-policy attribute-based encryption to enforce access control policies with efficient attribute and user revocation method. The fine-grained access control can be achieved by dual encryption scheme. This dual encryption mechanism takes advantage of the attribute-based encryption and selective group key distribution in each attribute group. The advantage of this scheme is securely managing the outsourced data. This scheme achieve efficient and secure in the data outsourcing systems. DRAWBACK: Huge issue in Enforcement of authorization policies and the support of policy updates EASIER: ENCRYPTION BASED ACCESS CONTROL IN SOCIAL NETWORKS WITH EFFICIENT REVOCATION SCHEME The advantage of this scheme is the Easier architecture and construction provides performance evaluation, and prototype application of our approach on Face book. DRAWBACK: Does not Achieve Stronger Security Guarantees III.PROPOSED SYSTEM  This paper, surveys a revocable multiauthority Fine - grained access control scheme [5], to solve the attribute revocation problem in the system. This scheme is an efficient and secure revocation. The attribute revocation method can efficiently achieve both forward security and backward security. In backward security scheme the revoked user cannot decrypt any new Cipher text that requires the revoked attribute to decrypt. In Forward security the newly joined user can also decrypt the previously published ciphertexts, if it has sufficient attributes. Moreover, while updating the cipher texts, all the users need to hold only the latest secret key, rather than to keep records on all the previous secret keys. OVERVIEW OF PROPOSED SYSTEM  Attribute revocation method can efficiently achieve both forward security and backward security.
  • 4. ISSN (Online): 2349-7084 INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING IN RESEARCH TRENDS VOLUME 2, ISSUE 8, AUGUST 2015, PP 486-491 IJCERT © 2015 Page | 489 http://www.ijcert.org  An attribute revocation method is efficient in the sense that it incurs less communication cost and computation cost, secure in the sense that it can achieve both backward security and forward security. 1. ENTITIES EXISTING(MULTIAUTHORITY CP-ABE SCHEME)  Certificate authority (CA), Attribute authorities (AAs), Data owners (owners), Cloud server(server) Data consumers (users) [5][6]. PROPOSED(REVOCABLE MULTIAUTHORITY FINE – GRAINED SCHEME)  Global Certificate authority (CA), Multiple Attribute authorities (AAs), Data owners (owners), Cloud server(server) Data consumers (users). 1. ATTRIBUTE EXISTING(MULTIAUTHORITY CP-ABE SCHEME) :Every secret key is associated with a single AA.[2] PROPOSED(REVOCABLE MULTIAUTHORITY FINE-GRAINED SCHEME):Every secret key is associated with a Multiple AA. 2. CERTIFICATE AUTHORITY (CA) MULTIAUTHORITY CP-ABE SCHEME :The CA sets up the system and accepts the registration of all the users and AAs in the system [3]. REVOCABLE MULTIAUTHORITY FINE-GRAINED SCHEME: The CA sets up the system and accepts the registration of users and AAs in the system. CA assigns global authority identity aid to each attribute in the system 3. DATA CONSUMERS (USERS). MULTIAUTHORITY CP-ABE SCHEME :For each legal user in the system, the CA assigns a global unique user identity to it and also generates a global public key for this user[4]. REVOCABLE MULTIAUTHORITY FINE-GRAINED SCHEME::For each legal user in the system, AA assigns a global user identity uid to each user 4. ATTRIBUTE AUTHORITIES (AAS) MULTIAUTHORITY CP-ABE SCHEME :Every AA is an independent attribute authority that is Responsible for entitling and revoking usersattributes [1]. REVOCABLE MULTIAUTHORITY FINE-GRAINED SCHEME::The uid is globally unique in the system .Secret keys are issued by different AAs for the same uid 5. DATA OWNERS (OWNERS) MULTIAUTHORITY CP-ABE SCHEME :Each owner first divides the data into several components and encrypts each data component with different content keys by using symmetric encryption techniques [2]. REVOCABLE MULTIAUTHORITY FINE-GRAINED SCHEME:Data owners may share the data using access policy defined over attributes from different authorities. 6. CLOUD SERVER MULTIAUTHORITY CP-ABE SCHEME :Cipher Text stored and updated into the Cloud Server[4] REVOCABLE MULTIAUTHORITY FINE-GRAINED SCHEME::Cipher text updated into the cloud server
  • 5. ISSN (Online): 2349-7084 INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING IN RESEARCH TRENDS VOLUME 2, ISSUE 8, AUGUST 2015, PP 486-491 IJCERT © 2015 Page | 490 http://www.ijcert.org Fig3. System Architecture: FINE-GRAINED SCHEME Fine-grained Access Control. Fine-grained access control systems facilitate granting differential access rights to a set of users and allow edibility in specifying the access rights of individual users. Several techniques are known for implementing fine grained access control. In order to address the above issues, our proposed system performs a secure data transaction in the cloud; the suitable cryptographic method is used .i.e. RSA algorithm. The owner must encrypt the file with some specified attributes, with owner’s private key which was generated by the KDC operated by the Trustee. Setup Phase: in this phase data owner can obtain Private Key from KDC ,get his public key and get Time interval tag from Time server for data availability and collect all this things as attribute set and apply RSA algorithm to encrypt the data be out sourcing to Cloud server. Encrypt: in this phase data will encrypted along with attribute set, which consist of E(M,Pk,T,Puk)-RSACT, where M: Message,Pk: Private Key which is generated by KDC,T: Time Interval ,Puk: Public Key Decrypt: in this phase data will be decrypted along with Attribute set, which consist of D(CT)RSA M,Pk,T,Puk..Before to outsource the data into cloud server data owner append a time interval tag which was issued by the time server which will be used as a time stamp. Finally Owner can upload encrypted data into cloud server with Time intervals. If a third person want to access that file remotely from cloud server, user need be authorized by the cloud server i.e. here fine grained approach will be performed at cloud level soon after authorized by cloud server, cloud server send encrypted content to user, now user need get Decrypted keys that is Private key and Public Key by the Trustee it will done based on user Identity. Users may view the record if the user had the key which is used to decrypt the encrypted file [6] . Sometimes this may be a failure due to the technology development and the hackers. The key distribution center is a server that is responsible for cryptographic key management. The public key is time- based, it means if key will be deleted or removed by the key manager when an expiration time is reached, where the expiration time is specified when the file is first declared or uploaded . Without the public key, the private key and hence the data file remain encrypted and are deemed to be inaccessible. Thus, the main security property of file assured deletion is that even if a cloud provider does not remove expired file copies from its storage, those files remain encrypted and unrecoverable[6]. We propose a policy based file access [6] and policy based file assured deletion [6], [7], [8] for better access to the files and delete the files which are decided no more.
  • 6. ISSN (Online): 2349-7084 INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING IN RESEARCH TRENDS VOLUME 2, ISSUE 8, AUGUST 2015, PP 486-491 IJCERT © 2015 Page | 491 http://www.ijcert.org Our system also has the added feature of fine grained access control in which only valid users are able to decrypt the loading information. The system prevents replay attacks and supports creation, modification, and reading data collected in the cloud. ADVANTAGES: Distributed access control of data collected in cloud so that only certified users with fully valid attributes can read them. The confirmation of users who collection and modify their data on the cloud. The identity of the user is secure from the cloud during confirmation. IV.CONCLUSION This investigation explains a revocable multi-authority Fine-grained scheme that can support efficient attribute revocation. Then the effective data access control scheme for multi-authority cloud storage systems is proposed. It eliminates Decryption overhead for users according to attributes .This secure attribute based cryptographic technique for robust data security that’s being shared in the cloud .This revocable multi-authority Fine-grained scheme with Verifiable outsourced decryption and proved that it is secure and verifiable. REFERENCES [1]. S.Yu, C.Wang, K.Ren, and W.Lou, „„Attribute Based Data Sharing with Attribute Revocation,‟ ‟ in Proc. 5th ACM Symp. Information, Computer and Comm. Security (ASIACCS‟ 10), 2010, pp. 261-270. [2]. J. Hur and D.K. Noh, „„Attribute-Based Access Control with Efficient Revocation in Data Outsourcing Systems,‟ ‟ IEEE Trans. Parallel Distributed Systems, vol. 22, no. 7, pp. 1214-1221, July 2011. [3].S.Jahid, P.Mittal, and N.Borisov, „„Easier: Encryption- Based Access Control in Social Networks with Efficient Revocation,‟ ‟ in Proc. 6th ACM Symp. Information, Computer and Comm. Security (ASIACCS‟ 11), 2011, pp. 411-415. [4].M. Li, S. Yu, Y. Zheng, K. Ren, andW.Lou, „„Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption,‟ ‟ IEEE Trans. Parallel Distributed Systems, vol. no. 1, pp. 131-143, Jan. 2013. 24, [5].Kan Yang, and Xiaohua Jia, „„Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage,‟ ‟ IEEE transactions on parallel and distributed systems, vol. 25, no. 7, july 2014. [6] MrSanthoshkumarB.J, M.Tech, Amrita VishwaVidyapeetham, Mysore Campus, India “Attribute Based Encryption with Verifiable Outsourced Decryption.” In International Journal of Advanced Research in Computer Science and Software Engineering”Volume 4, Issue 6, June 2014,ISSN: 2277 128X. [7]Tejaswini R M1, Roopa C K2 , Ayesha Taranum “Securing Cloud Server & Data Access withMulti- Authorities” International Journal of Computer Science and Information Technology Research ISSN 2348-120X Vol. 2, Issue 2, pp: (297-302), Month: April-June 2014,