decentralized access control with anonymous authentication of data stored in clouds parallel...

Upload: lemeniz-infotech

Post on 09-Oct-2015

478 views

Category:

Documents


0 download

DESCRIPTION

Decentralized Access Control With Anonymous Authentication of Data Stored in Clouds Parallel Distributed SystemsWe propose a new decentralized access control scheme for secure data storage in clouds that supports anonymous authentication. In the proposed scheme, the cloud verifies the authenticity of the series without knowing the user's identity before storing data. Our scheme also has the added feature of access control in which only valid users are able to decrypt the stored information. The scheme prevents replay attacks and supports creation, modification, and reading data stored in the cloud. We also address user revocation. Moreover, our authentication and access control scheme is decentralized and robust, unlike other access control schemes designed for clouds which are centralized. The communication, computation, and storage overheads are comparable to centralized approaches.

TRANSCRIPT

  • 5/19/2018 Decentralized Access Control With Anonymous Authentication of Data Stored in Clouds Parallel Distributed Systems

    1/16

    www.lemenizinf

  • 5/19/2018 Decentralized Access Control With Anonymous Authentication of Data Stored in Clouds Parallel Distributed Systems

    2/16

    LeMeniz Infotech

  • 5/19/2018 Decentralized Access Control With Anonymous Authentication of Data Stored in Clouds Parallel Distributed Systems

    3/16

    LeMeniz Infotech

    LeMeniz Infotech a Leading Software Concern in Pondicherry Stepping in IEEE Proj2015. We are Proud to Presents Android App for IEEE Projects Titles 2014-2015.Download From : www.ieeeprojectspondicherrry.weebly.com

    Student Benefits:

    =>No False Commitment

    =>Real Time Implementation

    ->27 X 7 Online Supports

    =>Individual Attention

    =>100% Satisfaction

    In Project Based Implementation we give maxexposure to students in

    =>Project Requirement Specification=>Software Requirement Specification=>Coding Techniques=>Project flow Diagram=>Project Documentation=>Project Testing=>PPT preparation=>Project Based viva questions

    =>Project Based Interview questions for Place

  • 5/19/2018 Decentralized Access Control With Anonymous Authentication of Data Stored in Clouds Parallel Distributed Systems

    4/16

    For More IEEE Pr

    Visit : www.lemeni

    Projects Tech@LeMeniz In

    LeMeniz Infotech

  • 5/19/2018 Decentralized Access Control With Anonymous Authentication of Data Stored in Clouds Parallel Distributed Systems

    5/16

    LeMeniz Infotech

    For More IEEE Projects Title

    Visit : www.lemenizinfotech.co

    Projects Domains

    @LeMeniz Infotech

  • 5/19/2018 Decentralized Access Control With Anonymous Authentication of Data Stored in Clouds Parallel Distributed Systems

    6/16

    Decentralized Access Control with Anony

    Authentication of Data Stored in Clouds - PDistributed Systems

    @LeMen

  • 5/19/2018 Decentralized Access Control With Anonymous Authentication of Data Stored in Clouds Parallel Distributed Systems

    7/16

    Abstract

    We propose a new decentralized access control scheme f

    storage in clouds that supports anonymous authentication. Ischeme, the cloud verifies the authenticity of the series w

    the user's identity before storing data. Our scheme also

    feature of access control in which only valid users are able

    stored information. The scheme prevents replay attacks

    creation, modification, and reading data stored in the c

    address user revocation. Moreover, our authentication and

    scheme is decentralized and robust, unlike other access cdesigned for clouds which are centralized. The c

    computation, and storage overheads are comparable

    approaches.

  • 5/19/2018 Decentralized Access Control With Anonymous Authentication of Data Stored in Clouds Parallel Distributed Systems

    8/16

    Introduction

    The user should authenticate itself before initiating any transaction,

    hand, it must be ensured that the cloud does not tamper with

    outsourced. User privacy is also required so that the cloud or other u

    the identity of the user. The cloud can hold the user accountabl

    outsources, and likewise, the cloud is itself accountable for the se

    The validity of the user who stores the data is also verified. Apart f

    solutions to ensure security and privacy, there is also a need for law e

  • 5/19/2018 Decentralized Access Control With Anonymous Authentication of Data Stored in Clouds Parallel Distributed Systems

    9/16

    EXISTING SYSTEM

    On access control in cloud are centralized in nature. Exceschemes use attribute based encryption. The scheme in u

    key approach and does not support authentication. The s

    support authentication as well. Earlier work by Zhao. How e

    take a centralized approach where a single key dist

    distributes secret keys and attributes to all users. Unfortu

    KDC is not only a single point of failure but difficult to main

    large number of users that are supported in cloud en

    emphasize that clouds should take a decentralized

    distributing secret keys and attributes to users.

  • 5/19/2018 Decentralized Access Control With Anonymous Authentication of Data Stored in Clouds Parallel Distributed Systems

    10/16

    Disadvantages

    Did not provide user authentication.

    User can create and store a file and other users can only

    Write access was not permitted to users other than the c

  • 5/19/2018 Decentralized Access Control With Anonymous Authentication of Data Stored in Clouds Parallel Distributed Systems

    11/16

    PROPOSEDSYSTEM

    The protocol that we propose here computes a parameterized

    functions, which we call threshold functions, in which the two extre

    correspond to the problems of computing the union and intersection

    subsets.

    Those are in fact general-purpose protocols that can be used in othe

    as well. Another problem of secure multiparty computation that we s

    as part of our discussion is the set inclusion problem; namely, the

    where Alice holds a private subset of some round set, and Bob

    element in the ground set, and they wish to determine whether Bob

    is within Alicessubset, without revealing to either of them informa

    the other partysinput beyond the above described inclusion.

  • 5/19/2018 Decentralized Access Control With Anonymous Authentication of Data Stored in Clouds Parallel Distributed Systems

    12/16

    Advantages

    Decentralized access control technique with anonymous.

    authentication which provides user revocation and

    prevents replay attack.

    The cloud does not know the identity of the user who

    stores information, but only verifies the users credentials

    Key distribution is done in a decentralized way. One

    limitation is that the cloud knows the access policy for eacrecord stored in the cloud

  • 5/19/2018 Decentralized Access Control With Anonymous Authentication of Data Stored in Clouds Parallel Distributed Systems

    13/16

    Reference

    S. Ruj, M. Stojmenovic and A. Nayak, Privacy Preserving

    Access Control with Authentication for Securing Data inClouds, IEEE/ACM International Symposium on Cluster, Cloud

    and Grid Computing, pp. 556563, 2012.

  • 5/19/2018 Decentralized Access Control With Anonymous Authentication of Data Stored in Clouds Parallel Distributed Systems

    14/16

    Hardware Specification

    Processor : Any Processor above 500 M

    Ram : 128Mb.

    Hard Disk : 10 Gb.

    Compact Disk : 650 Mb.

    Input device : Standard Keyboard and M

    Output device : VGA and High Resolution

  • 5/19/2018 Decentralized Access Control With Anonymous Authentication of Data Stored in Clouds Parallel Distributed Systems

    15/16

    Software Specification

    Operating System : Windows Family.

    Programming Language : ASP.NET, C#.Net.

    Database : SQL Server 2005

  • 5/19/2018 Decentralized Access Control With Anonymous Authentication of Data Stored in Clouds Parallel Distributed Systems

    16/16

    To Get this Project withComplete Document

    Reach Us :

    LeMeniz Infotech

    36, 100 Feet Road,

    Natesan Nagar,Near Indira Gandhi Statue,

    Pondicherry-605 005.

    Call: 0413-4205444,

    +91 99625 88976,

    95663 55386.

    We Are Ready for

    For More Project Title

    9962588976 / 9566355

    Mail : projects@lemen

    Decentralized Access Control with Anony

    Authentication of Data Stored in Clouds -

    Distributed Systems