Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage ABSTRACT: Data access control is an effective way to ensure the data security in the cloud. Due to data outsourcing and untrusted cloud servers, the data access control becomes a challenging issue in cloud storage systems. Cipher text Policy Attribute-based Encryption (CP-ABE) is regarded as one of the most suitable technologies for data access control in cloud storage, because it gives data owners more direct control on access policies. However, it is difficult to directly apply existing CP-ABE schemes to data access control for cloud storage systems because of the attribute revocation problem. In this paper, we design an expressive, efficient and revocable data access control scheme for multi-authority cloud storage systems, where there are multiple authorities coexist and each authority is able to issue attributes independently. Specifically, we propose a revocable multi-authority CP ABE scheme, and apply it as the underlying techniques to design the data access control scheme. Our attribute revocation method can efficiently achieve both forward security and backward security. The analysis and simulation results show that our proposed data access control scheme is secure in the random oracle model and is more efficient than previous works. EXISTING SYSTEM: Cipher text-Policy Attribute-based Encryption (CP-ABE) is regarded as one of the most suitable technologies for data access control in cloud storage, because it gives data owners more direct control on access policies. However, it is difficult to directly apply existing CP-ABE schemes to data access control for cloud storage systems because of the attribute revocation problem. In this paper, we design an expressive, efficient and revocable data access control scheme for multi-authority cloud storage systems, where there are multiple authorities coexist and each authority is able to issue attributes independently. Specifically, we propose a revocable multi-authority CP-ABE scheme, and apply it as the underlying techniques to design the data access control scheme. Our attribute revocation method can efficiently achieve both forward security and backward security. Existing attribute revocation methods either rely on a trusted server or lack of efficiency, they are not suitable for dealing with the attribute revocation problem in data access control in multi-authority cloud storage systems. Disadvantages : The Multi-authority CP-ABE maintains single key for each user which is public for all the operations like encryption and decryption. It doesn’t support for attribute revocation. PROPOSED SYSTEM: Our proposed data access control scheme is secure in the random oracle model and is more efficient than previous works. We proposed a revocable multi-authority CPABE scheme that can support efficient attribute revocation. Then, we constructed an effective data access control scheme for multiauthority cloud storage systems. We also proved that our scheme was provable secure in the random oracle model. Advantages: The Framework is designed for the cloud storage so that data owners not involved in the key generation Data access control scheme is highly improved that an attribute can be used only once for the cipher text MODULE DESCRIPTION: Unique Id Generation : In this module we generate Unique Id’s for all the users who are registered so that duplicity can be avoided . Secret Key Generation : In Secret Key Generated for each attribute all the users by the CA makes it more effective for high security. Update Security Key: The security key is updated to maintain high level security, if there is any disclose of the security keys. Data Encryption : It encrypts data components with different content keys by using symmetric encryption Data Decryption : All the legal users in the system can freely query any interested encrypted data. Upon receiving the data from the server, the user runs the decryption algorithm to decrypt the cipher text by using its secret keys from different AAs. Only the attributes the user possesses satisfy the access structure defined in the cipher text CT, the user can get the content key. ARCHITECTURE SOFTWARE REQUIREMENTS: Operating System : Windows 7 Technology : Java and J2EE Web Technologies : Html, JavaScript, CSS IDE : My Eclipse Web Server : Tomcat Database : My SQL Java Version : J2SDK1.5 HARDWARE REQUIREMENTS: Hardware : Pentium Dual Core Speed : 2.80 GHz RAM : 1GB Hard Disk : 20 GB Floppy Drive : 1.44 MB Key Board : Standard Windows Keyboard Mouse : Two or Three Button Mouse Monitor : SVGA CONCLUSION: We proposed a revocable multi-authority CP-ABE scheme that can support efficient attribute revocation. Then, we constructed an effective data access control scheme for multi-authority cloud storage systems. We also proved that our scheme was provable secure in the random oracle model. The revocable multi-authority CPABE is a promising technique, which can be applied in any remote storage systems and online social networks etc.