Abstract

advertisement
Expressive, Efficient, and Revocable Data
Access Control for Multi-Authority
Cloud Storage
ABSTRACT:
Data access control is an effective way to ensure the data security in the
cloud. Due to data outsourcing and untrusted cloud servers, the data access
control becomes a challenging issue in cloud storage systems. Cipher text
Policy Attribute-based Encryption (CP-ABE) is regarded as one of the most
suitable technologies for data access control in cloud storage, because it gives
data owners more direct control on access policies. However, it is difficult to
directly apply existing CP-ABE schemes to data access control for cloud
storage systems because of the attribute revocation problem. In this paper, we
design an expressive, efficient and revocable data access control scheme for
multi-authority cloud storage systems, where there are multiple authorities coexist and each authority is able to issue attributes independently. Specifically,
we propose a revocable multi-authority CP ABE scheme, and apply it as the
underlying techniques to design the data access control scheme. Our attribute
revocation method can efficiently achieve both forward security and backward
security. The analysis and simulation results show that our proposed data access
control scheme is secure in the random oracle model and is more efficient than
previous works.
EXISTING SYSTEM:
Cipher text-Policy Attribute-based Encryption (CP-ABE) is regarded as
one of the most suitable technologies for data access control in cloud storage,
because it gives data owners more direct control on access policies. However, it
is difficult to directly apply existing CP-ABE schemes to data access control for
cloud storage systems because of the attribute revocation problem. In this paper,
we design an expressive, efficient and revocable data access control scheme for
multi-authority cloud storage systems, where there are multiple authorities coexist and each authority is able to issue attributes independently. Specifically,
we propose a revocable multi-authority CP-ABE scheme, and apply it as the
underlying techniques to design the data access control scheme. Our attribute
revocation method can efficiently achieve both forward security and backward
security. Existing attribute revocation methods either rely on a trusted server or
lack of efficiency, they are not suitable for dealing with the attribute revocation
problem in data access control in multi-authority cloud storage systems.
Disadvantages :
 The Multi-authority CP-ABE maintains single key for each user which is
public for all the operations like encryption and decryption.
 It doesn’t support for attribute revocation.
PROPOSED SYSTEM:
Our proposed data access control scheme is secure in the random oracle
model and is more efficient than previous works. We proposed a revocable
multi-authority CPABE scheme that can support efficient attribute revocation.
Then, we constructed an effective data access control scheme for multiauthority cloud storage systems. We also proved that our scheme was provable
secure in the random oracle model.
Advantages:
 The Framework is designed for the cloud storage so that data owners not
involved in the key generation
 Data access control scheme is highly improved that an attribute can be
used only once for the cipher text
MODULE DESCRIPTION:
Unique Id Generation : In this module we generate Unique Id’s for all the
users who are registered so that duplicity can be avoided .
Secret Key Generation : In Secret Key Generated for each attribute all the
users by the CA makes it more effective for high security.
Update Security Key: The security key is updated to maintain high level
security, if there is any disclose of the security keys.
Data Encryption : It encrypts data components with different content keys by
using symmetric encryption
Data Decryption : All the legal users in the system can freely query any
interested encrypted data. Upon receiving the data from the server, the user
runs the decryption algorithm to decrypt the cipher text by using its secret keys
from different AAs. Only the attributes the user possesses satisfy the access
structure defined in the cipher text CT, the user can get the content key.
ARCHITECTURE
SOFTWARE REQUIREMENTS:
 Operating System
:
Windows 7
 Technology
:
Java and J2EE
 Web Technologies
:
Html, JavaScript, CSS
 IDE
:
My Eclipse
 Web Server
:
Tomcat
 Database
:
My SQL
 Java Version
:
J2SDK1.5
HARDWARE REQUIREMENTS:
 Hardware
:
Pentium Dual Core
 Speed
:
2.80 GHz
 RAM
:
1GB
 Hard Disk
:
20 GB
 Floppy Drive
:
1.44 MB
 Key Board
:
Standard Windows Keyboard
 Mouse
:
Two or Three Button Mouse
 Monitor
:
SVGA
CONCLUSION:
We proposed a revocable multi-authority CP-ABE scheme that can
support efficient attribute revocation. Then, we constructed an effective data
access control scheme for multi-authority cloud storage systems. We also
proved that our scheme was provable secure in the random oracle model. The
revocable multi-authority CPABE is a promising technique, which can be
applied in any remote storage systems and online social networks etc.
Download