- Krest Technology

advertisement
Control Cloud Data Access Privilege and
Anonymity with Fully Anonymous AttributeBased Encryption
ABSTRACT
In a ciphertext policy attribute based encryption system, a user’s private key is associated
with a set of attributes (describing the user) and an encrypted ciphertext will specify an access
policy over attributes. A user will be able to decrypt if and only if his attributes satisfy the cipher
text’s policy. In this work, we present the first construction of a ciphertext-policy attribute based
encryption scheme having a security proof based on a number theoretic assumption and
supporting advanced access structures. Previous CP-ABE systems could either support only very
limited access structures or had a proof of security only in the generic group model. Our
construction can support access structures which can be represented by a bounded size access
tree with threshold gates as its nodes. The bound on the size of the access trees is chosen at the
time of the system setup. Our security proof is based on the standard Decisional Bilinear
DiffieHellman assumption.
EXISTING SYSTEM
Security and privacy are very important issues in cloud computing. In existing system
access control in clouds are centralized in nature. The scheme uses a symmetric key approach
and does not support authentication. Symmetric key algorithm uses same key for both encryption
and decryption. The authors take a centralized approach where a single key distribution center
(KDC) distributes secret keys and attributes to all users.
Drawbacks of Existing System:
1. Data Confidentiality less in existing system.
2. Personal information of user is at risk because one’s identity is authenticated based on his
information for the purpose of access control.
PROPOSED SYSTEM
We propose AnonyControl and AnonyControl-F to allow cloud servers to control users’
access privileges without knowing their identity information. Using multiple authorities in the
cloud computing system, our proposed schemes achieve not only fine-grained privilege control
but also identity anonymity while conducting privilege control based on users’ identity
information. The proposed schemes are able to protect user’s privacy against each single
authority. Partial information is disclosed in AnonyControl and no information is disclosed in
AnonyControl-F.
Advantages of Proposed System:
1. Various techniques have been proposed to protect the data contents privacy via access
control.
2. We achieved full Anonymity.
SYSTEM ARCHITECTURE
MODULES
1. Data owner module
2. Data User module
3. Cloud server module
4. ABE module
Module Description:
Data Owner:
Data owner is encrypts the data with any encryption scheme and he send that data or files
to the cloud server.
Data User:
User gets the files or data from cloud server and also get private key to utilize that files
very secured.
Cloud Server:
Cloud server store the data which is belongs to both data owner and data user. It cosists
only encrypted file for the purpose of security.
ABE Module:
Attribute-based encryption (ABE) module is using for each and every node encrypt data
store. After encrypted data and again the re-encrypted the same data is using for fine-grain
concept using user data uploaded.
SYSTEM REQUIREMENTS
Hardware Requirements:

Processor
-
Pentium –IV

Speed
-
1.1 Ghz

Ram
-
256 Mb

Hard Disk
-
20 Gb

Key Board
-
Standard Windows Keyboard

Mouse
-
Two or Three Button Mouse

Monitor
-
SVGA
Software Requirements:

Operating System
:
Windows XP

Coding Language
:
Java

Database
:
My SQL
Download