effective data access control for multi authority cloud stoorage systems
TRANSCRIPT
![Page 1: Effective data access control for multi authority cloud stoorage systems](https://reader036.vdocuments.site/reader036/viewer/2022062822/587ad3ef1a28ab760f8b7381/html5/thumbnails/1.jpg)
Effective Data Access Control For Multi-Authority Cloud Storage Systems
ByG.V.SAIBABA(12R91A1220)
DEPT. OF ITTKREC
![Page 2: Effective data access control for multi authority cloud stoorage systems](https://reader036.vdocuments.site/reader036/viewer/2022062822/587ad3ef1a28ab760f8b7381/html5/thumbnails/2.jpg)
ABSTRACT• Data access control is an effective way to ensure the data security in the cloud.
• However, due to data outsourcing and un trusted cloud servers, the data access control becomes a challenging issue in cloud storage systems.
![Page 3: Effective data access control for multi authority cloud stoorage systems](https://reader036.vdocuments.site/reader036/viewer/2022062822/587ad3ef1a28ab760f8b7381/html5/thumbnails/3.jpg)
ABSTRACT
• In this paper, we propose DAC-MACS (Data Access Control for Multi-Authority Cloud Storage), an effective and secure data access control scheme with efficient decryption and revocation.
• Specifically, we construct a new multi-authority CP-ABE (Cipher text-Policy Attribute-based Encryption) scheme with efficient decryption and also design an efficient attribute revocation method that can achieve both forward security and backward security.
![Page 4: Effective data access control for multi authority cloud stoorage systems](https://reader036.vdocuments.site/reader036/viewer/2022062822/587ad3ef1a28ab760f8b7381/html5/thumbnails/4.jpg)
EXISTING SYSTEM
• Data owners depend on data service providers.
Data Owner
Server
Data user
![Page 5: Effective data access control for multi authority cloud stoorage systems](https://reader036.vdocuments.site/reader036/viewer/2022062822/587ad3ef1a28ab760f8b7381/html5/thumbnails/5.jpg)
EXISTING SYSTEM
• Data owners encrypt files and outsource to the server.
![Page 6: Effective data access control for multi authority cloud stoorage systems](https://reader036.vdocuments.site/reader036/viewer/2022062822/587ad3ef1a28ab760f8b7381/html5/thumbnails/6.jpg)
DISADVANTAGES OF EXISTING SYSTEM
• Data owners cannot rely on service providers.
Data Owner
Server
UnauthorizedData user
![Page 7: Effective data access control for multi authority cloud stoorage systems](https://reader036.vdocuments.site/reader036/viewer/2022062822/587ad3ef1a28ab760f8b7381/html5/thumbnails/7.jpg)
DISADVANTAGES OF EXISTING SYSTEM
• Overload on server.
• Does not support Attribute revocation problem.
![Page 8: Effective data access control for multi authority cloud stoorage systems](https://reader036.vdocuments.site/reader036/viewer/2022062822/587ad3ef1a28ab760f8b7381/html5/thumbnails/8.jpg)
PROPOSED SYSTEM
• In this paper, we first propose a revocable multi authority CP-ABE scheme, where an efficient and secure revocation method is proposed to solve the attribute revocation problem in the system.
• Our scheme does not require the server to be fully trusted, because the key update is enforced by each attribute authority not the server.
![Page 9: Effective data access control for multi authority cloud stoorage systems](https://reader036.vdocuments.site/reader036/viewer/2022062822/587ad3ef1a28ab760f8b7381/html5/thumbnails/9.jpg)
PROPOSED SYSTEM
![Page 10: Effective data access control for multi authority cloud stoorage systems](https://reader036.vdocuments.site/reader036/viewer/2022062822/587ad3ef1a28ab760f8b7381/html5/thumbnails/10.jpg)
ADVANTAGES OF PROPOSED SYSTEM
• Data owners are not involved in the key generation.
![Page 11: Effective data access control for multi authority cloud stoorage systems](https://reader036.vdocuments.site/reader036/viewer/2022062822/587ad3ef1a28ab760f8b7381/html5/thumbnails/11.jpg)
ADVANTAGES OF PROPOSED SYSTEM
• The revoked user cannot decrypt the new cipher texts that require the revoked attributes to decrypt (Backward Security).
![Page 12: Effective data access control for multi authority cloud stoorage systems](https://reader036.vdocuments.site/reader036/viewer/2022062822/587ad3ef1a28ab760f8b7381/html5/thumbnails/12.jpg)
ADVANTAGES OF PROPOSED SYSTEM
• The newly joined user can also decrypt the previously published cipher texts that are encrypted if it has sufficient attributes (Forward Security).
![Page 13: Effective data access control for multi authority cloud stoorage systems](https://reader036.vdocuments.site/reader036/viewer/2022062822/587ad3ef1a28ab760f8b7381/html5/thumbnails/13.jpg)
HARDWARE REQUIREMENTS
• Processor : Intel Core (mini) • ROM : 40 GB or above• RAM : 1GB or above
![Page 14: Effective data access control for multi authority cloud stoorage systems](https://reader036.vdocuments.site/reader036/viewer/2022062822/587ad3ef1a28ab760f8b7381/html5/thumbnails/14.jpg)
SOFTWARE REQUIREMENTS
• Operating system : Windows XP SP3 or latest versions
• Coding Language : J2SE & J2EE• UI Design Languages : HTML5, CSS , JavaScript• Database : MySQL• IDE : Net beans 7.4• SoftwareDevelopmentKit : JDK 7• UML Design Tool : Rational Rose 98 EE• Browser : Any Browser that supports
HTML5
![Page 15: Effective data access control for multi authority cloud stoorage systems](https://reader036.vdocuments.site/reader036/viewer/2022062822/587ad3ef1a28ab760f8b7381/html5/thumbnails/15.jpg)