Contact at mumbai.academics@gmail.com or 8097636691
Responsive Ads Here

Monday, 12 February 2018

Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds java(2014)



Decentralized Access Control

 with Anonymous Authentication

 of Data Stored in Clouds java(2014)

ABSTRACT:
We propose a new decentralized access control scheme for secure data storage in clouds that supports anonymous authentication. In the proposed scheme, the cloud verifies the authenticity of the series without knowing the user’s identity before storing data. Our scheme also has the added feature of access control in which only valid users are able to decrypt the stored information. The scheme prevents replay attacks and supports creation, modification, and reading data stored in the cloud. We also address user revocation. Moreover, our authentication and access control scheme is decentralized and robust, unlike other access control schemes designed for clouds which are centralized. The communication, computation, and storage overheads are comparable to centralized approaches.
EXISTING SYSTEM:
Ø Existing work on access control in cloud are centralized in nature. Except and, all other schemes use ABE. The scheme in uses a symmetric key approach and does not support authentication. The schemes do not support authentication as well.
Ø It provides privacy preserving authenticated access control in cloud. However, the authors take a centralized approach where a single key distribution center (KDC) distributes secret keys and attributes to all users.
DISADVANTAGES OF EXISTING SYSTEM:
Ø The scheme in uses asymmetric key approach and does not support authentication.
Ø Difficult to maintain because of the large number of users that are supported in a cloud environment.
PROPOSED SYSTEM:
Ø We propose a new decentralized access control scheme for secure data storage in clouds that supports anonymous authentication.
Ø  In the proposed scheme, the cloud verifies the authenticity of the series without knowing the user’s identity before storing data.
Ø Our scheme also has the added feature of access control in which only valid users are able to decrypt the stored information.
Ø  The scheme prevents replay attacks and supports creation, modification, and reading data stored in the cloud.
ADVANTAGES OF PROPOSED SYSTEM:
Ø Distributed access control of data stored in cloud so that only authorized users with valid attributes can access them.
Ø Authentication of users who store and modify their data on the cloud.
Ø The identity of the user is protected from the cloud during authentication.
MODULES:
] System Initialization Module.
] KDC Module
] Trustee Module
] Signature Module.
MODULES DESCRIPTION:
System Initialization:
ü We present our cloud storage model, adversary model and the assumptions we have made in the paper.
ü The cloud is honest-but-curious, which means that the cloud administrators can be interested in viewing user’s content, but cannot modify it.
ü Users can have either read or write or both accesses to a file stored in the cloud.
ü All communications between users/clouds are secured.
ü To write to an already existing file, the user must send its message with the claim policy as done during file creation. The cloud verifies the claim policy, and only if the user is authentic, is allowed to write on the file.
KDC Module:
ü We emphasize that clouds should take a decentralized approach while distributing secret keys and attributes to users. It is also quite natural for clouds to have many KDCs in different locations in the world. The architecture is decentralized, meaning that there can be several KDCs for key management.
ü Attribute generation.
ü The token verification algorithm verifies the signature contained in γ using the signature verification key TV er in TPK.
Trustee Module:
ü A trustee can be someone like the federal government who manages social insurance numbers etc. On presenting her id (like health/social insurance number), the trustee gives her a token.
ü There are multiple KDCs, which can be scattered. For example, these can be servers in different parts of the world.
ü A creator on presenting the token to one or more KDCs receives keys for encryption/decryption and signing.
Signature Module:
ü The access policy decides who can access the data stored in the cloud. The creator decides on a claim policy Y, to prove her authenticity and signs the message under this claim.
ü The ciphertext C with signature is c, and is sent to the cloud. The cloud verifies the signature and stores the ciphertext C. When a reader wants to read, the cloud sends C. If the user has attributes matching with access policy, it can decrypt and get back original message.
ü The verification process to the cloud, it relieves the individual users from time consuming verifications. When a reader wants to read some data stored in the cloud, it tries to decrypt it using the secret keys it receives from the KDCs.
SYSTEM REQUIREMENTS:
HARDWARE REQUIREMENTS:
Ø System                          :         Pentium IV 2.4 GHz.
Ø Hard Disk                      :         40 GB.
Ø Floppy Drive                 :         1.44 Mb.
Ø Monitor                         :         15 VGA Colour.
Ø Mouse                            :         Logitech.
Ø Ram                               :         512 Mb.
SOFTWARE REQUIREMENTS:
Ø Operating system           :         Windows XP/7.
Ø Coding Language          :         JAVA/J2EE
Ø IDE                                    :         Netbeans 7.4
Ø Database                         :         MYSQL

No comments:

Post a Comment