secure self destruction scheme in cloud computing

Upload: mathew-thomas

Post on 06-Jul-2018

225 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/18/2019 secure self destruction scheme in cloud computing

    1/27

    A SECURE DATA SELF-DESTRUCTION

    SCHEME IN CLOUD COMPUTING

    MANU THOMAS - 12cs22

    BTECH – IV Year / VIII Semester 

    DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING

    VIMAL JYOTHI ENGINEERING COLLEGE CHEM!ERI

    U"#er t$e G%a"ce '( Mr. JILSON P JOSE

    Asst)!r'(ess'r *e+artme"t '( C'm+%ter Sc&e"ce , E"&"eer&"

    VIMAL JYOTHI ENGINEERING COLLEGE CHEM!ERI

    SEMINAR 

  • 8/18/2019 secure self destruction scheme in cloud computing

    2/27

    Table of Content

    • I"tr'#%ct&'"

    • M't&.at&'"

    • !-TSABE sc$eme

    •S0stem m'#e '( !-TSABE

    • 'rma m'#e '( !-TSABE

    • S0stem #escr&+t&'" '( t$e !-TSABE

    • C'"c%s&'"

    • Re(ere"ces

    4/27/16 2

  • 8/18/2019 secure self destruction scheme in cloud computing

    3/27

    Intro!"#t$on

    • C'%# c'm+%t&" &s c'"sere# as t$e "e3t ste+ &" t$e

    e.'%t&'" '( '"-#ema"# &"('rmat&'" tec$"''0)

    • It c'm4&"es a set '( e3&st&" a"# "e5 tec$"&6%es (r'm researc$

    areas s%c$ as ser.&ce-'r&e"te# arc$&tect%res 7SOA8 a"#

    .&rt%a&9at&'")

    •  T$e s$are# #ata &" c'%# ser.ers $'5e.er %s%a0 c'"ta&"s

    %sers: se"s&t&.e &"('rmat&'" a"# "ee#s t' 4e 5e +r'tecte#)

    4/27/16 3

  • 8/18/2019 secure self destruction scheme in cloud computing

    4/27

    Intro!"#t$on %#ont!'

    • S$'%# s%++'rt %ser-#e(&"e# a%t$'r&9at&'" +er&'# a"# t'

     +r'.e (&"e-ra&"e# access c'"tr' #%r&" t$&s +er&'#)

    Tra!$t$on ("bl$# )e* en#r*(t$on

    O"e '( t$e met$'#s t' ae.&ate t$e +r'4ems &s t' st're

    #ata as a c'mm'" e"cr0+te# ('rm)

    !$a!+anta,e

    T$e %ser ca""'t s$are $&s/$er e"cr0+te# #ata at a (&"era&"e# e.e)

    4/27/16 4

  • 8/18/2019 secure self destruction scheme in cloud computing

    5/27

    Intro!"#t$on %#ont!'

    Attr$b"te-bae! en#r*(t$on %AE'

    Ac$&e.e 4't$ #ata sec%r&t0 a"# (&"e-ra&"e# access

    c'"tr'

    5& &"tr'#%ce +r'4ems 5&t$ rear# t' t&me s+ec&(&c

    c'"stra&"t a"# se(-#estr%ct&'"

    T$e!-releae en#r*(t$on %TRE'

    Ass'c&ate# 5&t$ a +re#e(&"e# reease t&me

    Rece&.er ca" '"0 c'"str%ct t$e c'rres+'"#&"

    #ecr0+t&'" ;e0 &" t$&s t&me &"sta"ce

    4/27/16 5

  • 8/18/2019 secure self destruction scheme in cloud computing

    6/27

  • 8/18/2019 secure self destruction scheme in cloud computing

    7/27

    Mot$+at$on

    • SSDD a"# F"llPP #'es "'t c'"ser t$e &ss%e '( #es&re#

    reease t&me '( t$e se"s&t&.e #ata

    •  T$e e3+&rat&'" t&me '( 4't$ SS** a"# 't$er sc$emes are

    &m&te# 40 t$e *HT "et5'r; a"# ca""'t 4e #eter-m&"e# 40 t$e

    %ser)

    • *e+e"#e"t '" t$e ea ass%m+t&'" '(

  • 8/18/2019 secure self destruction scheme in cloud computing

    8/27

    /P-TSAE SCHEME

    !-TSABE sc$eme &s a "'.e sec%re se(-#estr%ct&" sc$eme

    ('r #ata s$ar&" &" c'%# c'm+%t&"

    • A#.a"taes?

     – !-TSABE s%++'rts t$e (%"ct&'" '( %ser #e(&"e# a%t$'r&9at&'" +er&'#

     – E"s%res t$at t$e se"s&t&.e #ata ca""'t 4e rea# 4't$ 4e('re &ts #es&re#

    reease t&me a"# a(ter &ts e3+&rat&'")

     – !-TSABE #'es "'t re6%&re t$e ea ass%m+t&'" '(

  • 8/18/2019 secure self destruction scheme in cloud computing

    9/27

    /P-TSAE SCHEME

     – !-TSABE &s a4e t' &m+eme"t (&"e-ra&"e# access

    c'"tr' #%r&" t$e a%t$'r&9at&'" +er&'#

     –   Ma;es t$e se"s&t&.e #ata se(-#estr%ct&'" a(ter e3+&rat&'"

    5&t$'%t a"0 $%ma" &"ter.e"t&'")

     – !-TSABE &s +r'.e" t' 4e sec%re %"#er t$e sta"#ar#m'#e 40 %s&" t$e -4&&"ear *&((&eHema" &".ers&'"

    ass%m+t&'")

    4/27/16 9

  • 8/18/2019 secure self destruction scheme in cloud computing

    10/27

    /P-TSAE SCHEME

    • Eac$ #ata &tem &s ass'c&ate# 5&t$ a set '( attr&4%tes

    • E.er0 attr&4%te &s ass'c&ate# 5&t$ a s+ec&(&cat&'" '( t&me

    &"ter.a

    •&rst t' s%++'rt scaa4e a"# e((&c&e"t +r&.ac0 +reser.&" +%4&c st'rae a%#&t&" &" c'%#)

    4/27/16 10

  • 8/18/2019 secure self destruction scheme in cloud computing

    11/27

    /P-TSAE SCHEME

    CONCEPTS• A"t0or$1at$on (er$o!) It &s a t&me &"ter.a +re#e(&"e# 40 a

    #ata '5"er start&" (r'm t$e #es&re# reease t&me a"# e"#&" at

    t$e e3+&rat&'" t&me)

    • E2($rat$on t$e) It &s a t$res$'# t&me &"sta"t +re#e(&"e# 40

    t$e '5"er) T$e s$are# #ata ca" '"0 4e accesse# 40 t$e %ser

     4e('re t$&s t&me &"sta"t)

    • F"ll l$fe#*#le) It &s a t&me &"ter.a (r'm t$e creat&'" '( t$e

    s$are# #ata a%t$'r&9at&'" +er&'# t' e3+&rat&'" t&me)

    4/27/16 11

  • 8/18/2019 secure self destruction scheme in cloud computing

    12/27

    S3STEM MODEL OF /P-TSAE

    T$e s0stem m'#e &s #e(&"e# 40 #&.&" t$e !-TSABE sc$eme&"t' t$e (''5&" s&3 e"t&t&es

    • Data O4ner) *ata '5"er ca" +r'.e #ata 'r (&es t$at c'"ta&"

    s'me se"s&t&.e &"('rmat&'" 5$&c$ are %se# ('r s$ar&" 5&t$$&s/$er (r&e"#s 7#ata %sers8) A t$ese s$are# #ata are

    '%ts'%rce# t' t$e c'%# ser.ers t' st're)

    • A"t0or$t*) It &s a" &"#&s+e"sa4e e"t&t0 5$&c$ &s res+'"s&4e('r e"erat&" #&str&4%t&" a"# ma"a&" a t$e +r&.ate ;e0s

    a"# &s tr%ste# 40 a t$e 't$er e"t&t&es &".'.e# &" t$e s0stem)

    4/27/16 12

  • 8/18/2019 secure self destruction scheme in cloud computing

    13/27

    S3STEM MODEL OF /P-TSAE

    T$e Ser+er. It &s a t&me re(ere"ce ser.er 5&t$'%t a"0 &"teract&'"5&t$ 't$er e"t&t&es &".'.e# &" t$e s0stem) It &s res+'"s&4e ('r a

     +rec&se reease t&me s+ec&(&cat&'")

    Data Uer. *ata %sers are s'me +e'+es 5$' +asse# t$e e"t&t0a%t$e"t&cat&'" a"# access t' t$e #ata '%ts'%rce# 40 t$e #ata

    '5"er) N't&ce t$at t$e s$are# #ata ca" '"0 4e accesse# 40 t$e

    a%t$'r&9e# %sers #%r&" &ts a%t$'r&9at&'" +er&'#)

    4/27/16 13

  • 8/18/2019 secure self destruction scheme in cloud computing

    14/27

    S3STEM MODEL OF /P-TSAE

    Clo"! Ser+er. It c'"ta&"s am'st %"&m&te# st'rae s+ace 5$&c$&s a4e t' st're a"# ma"ae a t$e #ata 'r (&es &" t$e s0stem)

    Ot$er e"t&t&es 5&t$ &m&te# st'rae s+ace ca" st're t$e&r #ata t'

    t$e c'%# ser.ers)

    Potent$al A!+erar*. #ecares a" attr&4%te set a"# %se &t t'

    e"erate re+eate# +r&.ate ;e0 a"# t&me &"sta"t &" attem+t t'

    #ecr0+t t$e c0+$erte3t)

    4/27/16 14

  • 8/18/2019 secure self destruction scheme in cloud computing

    15/27

    S3STEM MODEL OF /P-TSAE

    4/27/16 15

  • 8/18/2019 secure self destruction scheme in cloud computing

    16/27

    FORMAL MODEL OF /P-TSAE

    T$e !-TSABE sc$eme ca" 4e #escr&4e# as a c'ect&'" '( t$e

    (''5&" ('%r a'r&t$ms? Set%+ E"cr0+t e0Ge" a"# *ecr0+t)

    Set"( %5 6 U'7

    • T$&s a'r&t$m &s r%" 40 t$e A%t$'r&t0

    • Ta;es as &"+%t t$e sec%r&t0 +arameter a"# attr&4%te %"&.erse

    U

    • Ge"erates s0stem +%4&c +arameters +arams a"# t$e master

    ;e0 MS)

    • T$e A%t$'r&t0 +%4&s$es +arams a"# ;ee+s MS secret t'

    &tse()

    4/27/16 16

  • 8/18/2019 secure self destruction scheme in cloud computing

    17/27

    FORMAL MODEL OF /P-TSAE

    En#r*(t %M6 (ara6 S6 TS'7

    • G&.e" t$e +%4&c +arameters +arams t$e s$are# messae M

    5$&c$ t$e '5"er 5a"ts t' e"cr0+t

    • T$e attr&4%te set S a"# t$e set '( t&me &"ter.as TS &" 5$&c$

    e.er0 eeme"t &" TS &s ass'c&ate# 5&t$ a c'rres+'"#&"

    attr&4%te &" S)

    •   T$&s a'r&t$m e"erates t$e c&+$erte3t CT 5$&c$ &s

    ass'c&ate# 5&t$ t$e (%990 attr&4%te set S)

    4/27/16 17

  • 8/18/2019 secure self destruction scheme in cloud computing

    18/27

    FORMAL MODEL OF /P-TSAE

    /e*Gen %MS/6 86 T 9'7

    • T$&s a'r&t$m ta;es as &"+%t t$e master ;e0 MS t$e access

    tree @ a"# t$e t&me set T )

    •  E.er0 attr&4%te 3 &" @ &s ass'c&ate# 5&t$ a t&me &"sta"t T It∈

    '%t+%ts a +r&.ate ;e0 S 5$&c$ c'"ta&"s @)

    •  

    4/27/16 18

  • 8/18/2019 secure self destruction scheme in cloud computing

    19/27

    FORMAL MODEL OF /P-TSAE

    De#r*(t %CT6 S/'7

    •   T$&s a'r&t$m ta;es as &"+%t t$e c&+$erte3t CT a"# t$e

     +r&.ate ;e0 S)

    • $e" a set '( t&me-s+ec&(&c attr&4%tes sat&s(&es @ &t &s a4e t'

    #ecr0+t t$e c&+$erte3t a"# ret%r" t$e +a&"te3t M)

    4/27/16 19

  • 8/18/2019 secure self destruction scheme in cloud computing

    20/27

    S3STEM DESCRIPTION

    OF THE /P-TSAE

    18 S*te et"(

    I" t$e s0stem &"&t&a&9at&'" +$ase

    • A #ata '5"er c$''ses a are sec%r&t0 +arameter a"#

    attr&4%te %"&.erse U

    • I".';es t$e a'r&t$m Set%+71;   U8 t' e"erate s0stem

     +arameters +arams a"# master ;e0 MS)

    4/27/16 20

  • 8/18/2019 secure self destruction scheme in cloud computing

    21/27

    S3STEM DESCRIPTION

    OF THE /P-TSAE

    2' En#r*(t$on 4$t0 t$e #ontra$nt

    • *ata '5"er c$''ses a" attr&4%te set S ('r t$e s$are# messae

    M

    •  *e(&"es a t&me &"ter.a set TS ('r S)

    • *ata '5"er &".';es t$e a'r&t$m E"cr0+t7M +arams S TS 8

    t' e"cr0+t M t' &ts c&+$erte3t CT 5$&c$ &s ass'c&ate# 5&t$ t$e

    set S a"# TS)

    •  &"a0 CT &s se"t t' c'%# ser.ers

    4/27/16 21

  • 8/18/2019 secure self destruction scheme in cloud computing

    22/27

    S3STEM DESCRIPTION

    OF THE /P-TSAE

    D8 F$ne-,ra$ne! a##e #ontrol !"r$n, t0e a"t0or$1at$on(er$o!

    *ata %ser 5a"ts t' access t$e s$are# #ata M #%r&" &ts

    a%t$'r&9at&'" +er&'#

      M%st +ass t$e e"t&t0 a%t$e"t&cat&'" a"# s$'%# +er('rm t$e

    (''5&" +r'cesses?

     – &rst0 t$e c%rre"t t&me &"sta"t t3 &s +r'.e# 40 t$e t&me ser.er 5&t$ t3 

    T 5$&c$ &s ass'c&ate# 5&t$ eac$ attr&4%te 3)∈

     – I( T TS a"# t$e attr&4%te set '( t$e %ser matc$es t$e access tree @)⊆

    4/27/16 22

  • 8/18/2019 secure self destruction scheme in cloud computing

    23/27

    S3STEM DESCRIPTION

    OF THE /P-TSAE

     – T$e" t$e A%t$'r&t0 r%"s t$e a'r&t$m e0Ge" 7MS @ T 8 t'e"erate t$e +r&.ate ;e0 S a"# se"#s &t t' t$e %ser)

     – O"ce t$e %ser rece&.e# t$e S $e 5& et t$e CT (r'm t$e c'%#

    ser.ers

     – *ata %ser &".';es t$e a'r&t$m *ecr0+t 7CT S8 t' #ecr0+t CT t'

    '4ta&" t$e s$are# #ata M)

     – Beca%se eac$ attr&4%te 3 &s ass'c&ate# 5&t$ a c%rre"t t&me &"sta"t t3 &(

    a"# '"0 &( t3  TS a"# attr&4%te set matc$es @ t$e %ser ca" '4ta&" t$e∈

    c'rrect +r&.ate ;e0 S t' #ecr0+t CT)

    4/27/16 23

  • 8/18/2019 secure self destruction scheme in cloud computing

    24/27

    S3STEM DESCRIPTION

    OF THE /P-TSAE

    :' Data elf-!etr"#t$on after e2($rat$on

    • O"ce t$e c%rre"t t&me &"sta"t tx 4ec'mes a(ter t$e t$res$'#

    .a%e '( t$e .a t&me &"ter.a tR,x

    • T$e %ser ca""'t '4ta&" t$e tr%e +r&.ate ;e0 S)

    • T$ere('re t$e c0+$erte3t CT &s "'t a4e t' 4e #ecr0+te# &"

     +'0"'m&a t&me)

    • T$&s (ac&&tates t$e se(-#estr%ct&'" '( t$e s$are# #ata a(tere3+&rat&'")

    4/27/16 24

  • 8/18/2019 secure self destruction scheme in cloud computing

    25/27

    CONCLUSION

    • !-TSABE sc$eme ac$&e.es t$e t&me-s+ec&(&e# c&+$erte3t &"

    'r#er t' sec%re #eetet&'" '( '%ts'%rce# #ata st're# &" t$e

    c'%# se.ers)

    • It Im+eme"ts (e3&4e (&"e-ra&"e# access c'"tr' #%r&" t$e

    a%t$'r&9at&'" +er&'# a"# t&me-c'"tr'a4e se(-#estr%ct&'"

    a(ter e3+&rat&'"

    4/27/16 25

  • 8/18/2019 secure self destruction scheme in cloud computing

    26/27

    REFERENCES

    • J) &'" ) L& J) Ma ) L&% F) Ya' a"# !) S) C$e" !eer t'-

    !eer Net5'r;&" a"# A++&cat&'"s A.a&a4e?

    $tt+?//#3)#'&)'r/1)1/s12D-1-2K-3

    •   ) L&% J) Ma J) &'" a"# G) L&% I"ter"at&'"a J'%r"a '( Net5'r; Sec%r&t0 .') 1 "') ++) D1– 

    D 21)

    4/27/16 26

    http://dx.doi.org/10.1007/s12083-014-0295-xhttp://dx.doi.org/10.1007/s12083-014-0295-x

  • 8/18/2019 secure self destruction scheme in cloud computing

    27/27

    THAN/ 3OU

    4/27/16 27