Sie sind auf Seite 1von 16

www.lemenizinfotech.

com

LeMeniz Infotech

LeMeniz Infotech
LeMeniz Infotech a Leading Software Concern in Pondicherry Stepping in IEEE Projects 20142015. We are Proud to Presents Android App for IEEE Projects Titles 2014-2015.
Download From : www.ieeeprojectspondicherrry.weebly.com

Student Benefits:
=>No False Commitment
=>Real Time Implementation
->27 X 7 Online Supports
=>Individual Attention
=>100% Satisfaction

In Project Based Implementation we give maximum


exposure to students in
=>Project Requirement Specification
=>Software Requirement Specification
=>Coding Techniques
=>Project flow Diagram
=>Project Documentation
=>Project Testing
=>PPT preparation
=>Project Based viva questions
=>Project Based Interview questions for Placements

LeMeniz Infotech

Projects Technology
@LeMeniz Infotech
For More IEEE Projects Titles
Visit : www.lemenizinfotech.com

LeMeniz Infotech

Projects Domains
@LeMeniz Infotech
For More IEEE Projects Titles
Visit : www.lemenizinfotech.com

Decentralized Access Control with Anonymous


Authentication of Data Stored in Clouds - Parallel
Distributed Systems
@LeMeniz Infotech

Abstract
We propose a new decentralized access control scheme for secure data
storage in clouds that supports anonymous authentication. In the proposed
scheme, the cloud verifies the authenticity of the series without knowing
the user's identity before storing data. Our scheme also has the added
feature of access control in which only valid users are able to decrypt the
stored information. The scheme prevents replay attacks and supports
creation, modification, and reading data stored in the cloud. We also
address user revocation. Moreover, our authentication and access control
scheme is decentralized and robust, unlike other access control schemes
designed for clouds which are centralized. The communication,
computation, and storage overheads are comparable to centralized
approaches.

Introduction
The user should authenticate itself before initiating any transaction, and on the other
hand, it must be ensured that the cloud does not tamper with the data that is
outsourced. User privacy is also required so that the cloud or other users do not know
the identity of the user. The cloud can hold the user accountable for the data it
outsources, and likewise, the cloud is itself accountable for the services it provides.
The validity of the user who stores the data is also verified. Apart from the technical
solutions to ensure security and privacy, there is also a need for law enforcement.

EXISTING SYSTEM
On access control in cloud are centralized in nature. Except and all other
schemes use attribute based encryption. The scheme in uses a symmetric
key approach and does not support authentication. The schemes do not
support authentication as well. Earlier work by Zhao. How ever, the authors
take a centralized approach where a single key distribution center
distributes secret keys and attributes to all users. Unfortunately, a single
KDC is not only a single point of failure but difficult to maintain because of
large number of users that are supported in cloud environment. We
emphasize that clouds should take a decentralized approach while
distributing secret keys and attributes to users.

Disadvantages

Did not provide user authentication.

User can create and store a file and other users can only read the file.
Write access was not permitted to users other than the creator.

PROPOSED SYSTEM
The protocol that we propose here computes a parameterized family of
functions, which we call threshold functions, in which the two extreme cases
correspond to the problems of computing the union and intersection of private
subsets.
Those are in fact general-purpose protocols that can be used in other contexts
as well. Another problem of secure multiparty computation that we solve here
as part of our discussion is the set inclusion problem; namely, the problem
where Alice holds a private subset of some round set, and Bob holds an
element in the ground set, and they wish to determine whether Bobs element
is within Alices subset, without revealing to either of them information about
the other partys input beyond the above described inclusion.

Advantages

Decentralized access control technique with anonymous.

authentication which provides user revocation and


prevents replay attack.

The cloud does not know the identity of the user who
stores information, but only verifies the users credentials.
Key distribution is done in a decentralized way. One
limitation is that the cloud knows the access policy for each
record stored in the cloud

Reference
S. Ruj, M. Stojmenovic and A. Nayak, Privacy Preserving
Access Control with Authentication for Securing Data in
Clouds, IEEE/ACM International Symposium on Cluster, Cloud
and Grid Computing, pp. 556563, 2012.

Hardware Specification
Processor
Ram
Hard Disk
Compact Disk
Input device
Output device

: Any Processor above 500 MHz.


: 128Mb.
: 10 Gb.
: 650 Mb.
: Standard Keyboard and Mouse.
: VGA and High Resolution Monitor.

Software Specification
Operating System
Programming Language
Database

: Windows Family.
: ASP.NET, C#.Net.
: SQL Server 2005

Decentralized Access Control with Anonymous


Authentication of Data Stored in Clouds - Parallel
Distributed Systems
To Get this Project with
Complete Document
Reach Us :
LeMeniz Infotech
36, 100 Feet Road,
Natesan Nagar,
Near Indira Gandhi Statue,
Pondicherry-605 005.
Call: 0413-4205444,
+91 99625 88976,
95663 55386.

We Are Ready for You


For More Project Title Call Us Rafee
9962588976 / 9566355386
Mail : projects@lemenizinfotech.com

Das könnte Ihnen auch gefallen