Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Decentralized Access Control With Anonymous Authentication of Data Stored in Clouds

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 18

DECENTRALIZED ACCESS

CONTROL WITH
ANONYMOUS
AUTHENTICATION OF DATA
STORED IN CLOUDS
ABSTRACT

 We propose a new decentralized access control


scheme for secure data storage in clouds that supports
anonymous authentication.
 In the proposed scheme, the cloud verifies the
authenticity of the series without knowing the user’s
identity before storing data.
 Our scheme also has the added feature of access
control in which only valid users are able to decrypt
the stored information.
EXISTING SYSTEM

 Existing work on access control in cloud are


centralized in nature. Except and , all other schemes
use ABE. The scheme in uses a symmetric key
approach and does not support authentication. The
schemes do not support authentication as well.
 It provides privacy preserving authenticated access
control in cloud. However, the authors take a
centralized approach where a single key distribution
center (KDC) distributes secret keys and attributes to
all users.
DISADVANTAGES OF EXISTING
SYSTEM

 The scheme in uses asymmetric key approach and


does not support authentication.

 Difficult to maintain because of the large number of


users that are supported in a cloud environment.
PROPOSED SYSTEM
 We propose a new decentralized access control scheme for
secure data storage in clouds that supports anonymous
authentication.
 In the proposed scheme, the cloud verifies the authenticity of the
series without knowing the user’s identity before storing data.
 Our scheme also has the added feature of access control in which
only valid users are able to decrypt the stored information.
 The scheme prevents replay attacks and supports creation,
modification, and reading data stored in the cloud.
ADVANTAGES OF PROPOSED SYSTEM

 Distributed access control of data stored in cloud so


that only authorized users with valid attributes can
access them.
 Authentication of users who store and modify their
data on the cloud.
 The identity of the user is protected from the cloud
during authentication.
SYSTEM ARCHITECTURE
HARDWARE REQUIREMENTS
 System : Pentium IV 2.4
GHz.
 Hard Disk : 40 GB.
 Floppy Drive : 1.44 Mb.
 Monitor : 15 VGA
Colour.
 Mouse : Logitech.
 Ram : 512 Mb.
SOFTWARE REQUIREMENTS

 Operating system : Windows XP/7.


 Coding Language : JAVA/J2EE
 IDE :Netbeans 7.4
 Database :MYSQL
MODULES:

 System Initialization Module.


 KDC Module
 Trustee Module
 Signature Module.
System Initialization:

 We present our cloud storage model, adversary


model and the assumptions we have made in the
paper.
 The cloud is honest-but-curious, which means that the
cloud administrators can be interested in viewing
user’s content, but cannot modify it.
KDC Module:

 We emphasize that clouds should take a


decentralized approach while distributing secret
keys and attributes to users. It is also quite natural
for clouds to have many KDCs in different locations
in the world. The architecture is decentralized,
meaning that there can be several KDCs for key
management.
 Attribute generation.
Trustee Module:

 A trustee can be someone like the federal


government who manages social insurance numbers
etc. On presenting her id (like health/social
insurance number), the trustee gives her a token.
 There are multiple KDCs, which can be scattered.
For example, these can be servers in different parts
of the world.
Signature Module:

 The access policy decides who can access the data


stored in the cloud. The creator decides on a claim
policy Y, to prove her authenticity and signs the
message under this claim.
 The ciphertext C with signature is c, and is sent to
the cloud. The cloud verifies the signature and stores
the ciphertext C. When a reader wants to read, the
cloud sends C. If the user has attributes matching
with access policy, it can decrypt and get back
original message.
REFERENCES

 Sushmita Ruj,Milos Stojmenovic, and Amiya


Nayak,“Decentralized Access Control with
Anonymous Authentication of Data Stored in
Clouds”,VOL. 25, NO. 2, FEBRUARY 2014.

You might also like