shared aythority ppt design [autosaved]

20
PRESENTED BY K RAJU 13621D5805

Upload: raj-kumar

Post on 19-Jul-2015

34 views

Category:

Software


1 download

TRANSCRIPT

Page 1: Shared  aythority  ppt design [autosaved]

PRESENTED BY

K RAJU

13621D5805

Page 2: Shared  aythority  ppt design [autosaved]

ABSTRACT

Cloud computing is emerging as a prevalent data interactive paradigm to realize users’ data remotely stored in an online cloud server.

Cloud services provide great conveniences for the users to enjoy the on-demand cloud applications without considering the local infrastructure limitations.

During the data accessing, different users may be in a collaborative relationship, and thus data sharing becomes significant to achieve productive benefits.

In this paper, we propose a shared authority based privacy-preserving authentication protocol (SAPA) to address above privacy issue for cloud storage.

Page 3: Shared  aythority  ppt design [autosaved]

EXISTING SYSTEM

Most previous researches focus on the authentication to realize that only a legal user can access its authorized data, which ignores the case that different users may want to access and share each other’s authorized data fields to achieve productive benefits

In this work, we aim to address a user’s sensitive access desire related privacy during data sharing in the cloud environments, and it is significant to design a humanistic security scheme to simultaneously achieve data access control, access authority sharing, and privacy preservation.

DISADVANTAGES: Existing work does not have the option of granting/revoking data access.

Page 4: Shared  aythority  ppt design [autosaved]

PROPOSED SYSTEM:

shared authority based privacy preserving authentication protocol (SAPA) for the cloud data storage, which realizes authentication and authorization without compromising a user’s private information.

It identify a new privacy challenge in cloud storage, and address a subtle privacy issue during a user challenging the cloud server for data sharing, in which the challenged request itself cannot reveal the user’s privacy no matter whether or not it can obtain the access authority.

Page 5: Shared  aythority  ppt design [autosaved]

It proposed an authentication protocol to enhance a user’s access request related privacy, and the shared access authority is achieved by anonymous access request matching mechanism.

It Applies cipher text-policy attribute based access control to realize that a user can reliably access its own data fields, and adopt the proxy re-encryption to provide temp authorized data sharing among multiple users.

ADVANTAGES: This secured system and data owner can decide whether the user can access the system or not

Page 6: Shared  aythority  ppt design [autosaved]

HARDWARE REQUIREMENTS

Processor Type : Pentium IV

Speed : 2.4GHZ

RAM : 1GB

Hard disk : 80GB

SOFTWARE REQUIREMENTS

Operating System : Windows 7

Programming Package : Microsoft Visual Studio 2010

Coding Language : C#. Net

Page 7: Shared  aythority  ppt design [autosaved]

Use case diagrams

Page 8: Shared  aythority  ppt design [autosaved]

Sequence diagram

Page 9: Shared  aythority  ppt design [autosaved]
Page 10: Shared  aythority  ppt design [autosaved]

Collaboration diagram

Page 11: Shared  aythority  ppt design [autosaved]
Page 12: Shared  aythority  ppt design [autosaved]

Class diagram

Page 13: Shared  aythority  ppt design [autosaved]

Object diagram

Page 14: Shared  aythority  ppt design [autosaved]

State Chart diagram

Page 15: Shared  aythority  ppt design [autosaved]

Activity diagram

Page 16: Shared  aythority  ppt design [autosaved]
Page 17: Shared  aythority  ppt design [autosaved]
Page 18: Shared  aythority  ppt design [autosaved]

Component diagram

Page 19: Shared  aythority  ppt design [autosaved]

Deployment diagram

Page 20: Shared  aythority  ppt design [autosaved]