Abstract - IEEE 2015 Final Year Projects

advertisement
Shared Authority Based Privacy-preserving
Authentication Protocol in Cloud Computing
Abstract:
Cloud services provide great conveniences for the users to enjoy the on-demand
cloud applications without considering the local infrastructure limitations. During
the data accessing, different users may be in a collaborative relationship, and thus
data sharing becomes significant to achieve productive benefits. The existing
security solutions mainly focus on the authentication to realize that a user’s
privative data cannot be unauthorized accessed, but neglect a subtle privacy issue
during a user challenging the cloud server to request other users for data sharing.
The challenged access request itself may reveal the user’s privacy no matter
whether or not it can obtain the data access permissions. Several schemes
employing attribute-based encryption (ABE) have been proposed for access control
of outsourced data in cloud computing. It enables customers with limited
computational resources to outsource their large computation workloads to the
cloud, and economically enjoy the massive computational power, bandwidth,
storage, and even appropriate software that can be shared in a pay-per-use manner.
Despite the tremendous benefits, security is the primary obstacle that prevents the
wide adoption of this promising computing model, especially for customers when
their confidential data are consumed and produced during the computation. To
combat against unauthorized information leakage, sensitive data have to be
encrypted before outsourcing so as to provide end to- end data confidentiality
assurance in the cloud and beyond. However, ordinary data encryption techniques
in essence prevent cloud from performing any meaningful operation of the
underlying cipher text-policy, making the computation over encrypted data a very
hard problem. The proposed scheme not only achieves scalability due to its
hierarchical structure. As a result, there do exist various motivations for cloud
server to behave unfaithfully and to return incorrect results, i.e., they may behave
beyond the classical semi honest model.
Existing System:
Despite the tremendous benefits, outsourcing computation to the commercial
public cloud is also depriving customers’ direct control over the systems that
consume and produce their data during the computation, which inevitably brings in
new security concerns and challenges towards this promising computing model.
On the one hand, the outsourced computation workloads often contain sensitive
information, such as the business financial records, proprietary research data, or
personally identifiable health information sets. The unauthorized information
leakage, sensitive data have to be encrypted before outsourcing. so as to provide
end to- end data confidentiality assurance in the cloud and beyond. unauthorized
information leakage, sensitive data have to be encrypted before outsourcing. so as
to provide end to- end data confidentiality assurance in the cloud and beyond. For
example, for the computations that require a large amount of computing resources,
there are huge financial incentives for the cloud to be “lazy” if the customers
cannot tell the correctness of the output. Besides, possible software bugs, hardware
failures, or even outsider attacks might also affect the quality of the computed
results.
Disadvantage of Existing System:
The cloud is intrinsically not secure from the viewpoint of customers Without
providing a mechanism for secure computation outsourcing so to protect the
sensitive input and output information of the workloads.
The various motivations for cloud server to behave unfaithfully and to return
incorrect results, i.e., they may behave beyond the classical semi hones model.
Proposed System:
A shared authority based privacy-preserving authentication protocol (SAPA)
to address above privacy issue for cloud storage. In the SAPA, shared access
authority is achieved by anonymous access request matching mechanism with *security and privacy considerations (e.g., authentication, data anonymity, user
privacy, and forward security attribute based access control is adopted to realize
that the user can only access its own data fields proxy re-encryption is applied by
the cloud server to provide data sharing among the multiple users. Meanwhile,
universal compos ability (UC) model is established to prove that the SAPA
theoretically has the design correctness. It indicates that the proposed protocol
realizing privacy-preserving data access authority sharing is attractive for multiuser collaborative cloud applications. The outsourced computation workloads often
contain sensitive information, such as the business financial records, proprietary
research data, or personally identifiable health information etc. Fully homomorphic
encryption (FHE) scheme, a general result of secure computation outsourcing has
been shown viable in theory, where the computation is represented by an encrypted
combinational Boolean circuit that allows to be evaluated with encrypted private
inputs.
Advantages of Proposed System:
The outsourced computation workloads often contain sensitive information,
such as the business financial records, proprietary research data, or personally
identifiable health information can be secured using private computing.
Software Requirements:
• Operating System
: Windows Xp.
• Platform
• Backend
• Server
: Java1.6, jsp, servlet.
: MySQL5.0.
: Tomcat.
Hardware Requirements:
•
•
•
•
•
Processor
RAM
Hard Drive
Monitor
Disk Space
: Pentium IV Processor
: 512 MB
: 40GB
: 14” VGA COLOR MONITOR
: 1 GB
Download