Sie sind auf Seite 1von 5

ABSTRACT

Data access control is a challenging issue in public cloud storage systems. Cipher text- policy attribute-
based encryption (CP-ABE) has been adopted as a promising technique to provide flexible, fine-grained,
and secure data access control for cloud storage with honest-but- curious cloud servers. However, in the
existing CP-ABE schemes, the single attribute authority must execute the time-consuming user legitimacy
verification and secret key distribution, and hence, it results in a single-point performance bottleneck
when a CP-ABE scheme is adopted in a large-scale cloud storage system. Users may be stuck in the waiting
queue for a long period to obtain their secret keys, thereby resulting in low efficiency of the system.
Although multiauthority access control schemes have been proposed, these schemes still cannot
overcome the drawbacks of single-point bottleneck and low efficiency, due to the fact that each of the
authorities still independently manages a disjoint attribute set. In this project, we propose a novel
heterogeneous framework to remove the problem of single-point performance bottleneck and provide a
more efficient access control scheme with an auditing mechanism. Our framework employs multiple
attribute authorities to share the load of user legitimacy verification.

Meanwhile, in our scheme, a central authority is introduced to generate secret keys for legitimacy verified
users. Unlike other multi-authority access control schemes, each of the authorities our scheme manages
the whole attribute set individually. To enhance security, we also propose an auditing mechanism to
detect which attribute authority has incorrectly or maliciously performed the legitimacy verification
procedure. Analysis shows that our system not only guarantees the security requirements but also makes
great performance improvement on key generation.
TABLE OF CONTENTS

1. INTRODUCTION........................................................................Error! Bookmark not defined.

1.1 CLOUD COMPUTING .......................................................Error! Bookmark not defined.

1.2 CLOUD STORAGE ............................................................Error! Bookmark not defined.

1.3 BENEFITS OF CLOUD COMPUTING .............................Error! Bookmark not defined.

2. LITERATURE SURVEY ............................................................Error! Bookmark not defined.

2.1 A Dynamic Secure Group Sharing Framework in Public Cloud Computing .............. Error!
Bookmark not defined.

2.2 Attribute-Based Access to Scalable Media in Cloud-Assisted Content Sharing Networks


....................................................................................................Error! Bookmark not defined.

2.3 Improving Security and Efficiency in Attribute-Based Data SharingError! Bookmark not
defined.

2.4 Time and Attribute Factors Combined Access Control for Time-Sensitive Data in Public
Cloud ..........................................................................................Error! Bookmark not defined.

3. SYSTEM ANALYSIS ..................................................................Error! Bookmark not defined.

3.1 INTRODUCTION TO SYSTEM ANALYSIS ...................Error! Bookmark not defined.

3.2 EXSISTING SYSTEM ........................................................Error! Bookmark not defined.

3.2 PROPOSED SYSTEM ........................................................Error! Bookmark not defined.

4. SYSTEM REQUIRMENT SPECIFICAION ............................Error! Bookmark not defined.

4.1 FUNCTIONAL REQUIREMENTS ....................................Error! Bookmark not defined.

4.2 NON-FUNCTIONAL REQUIREMENTS ..........................Error! Bookmark not defined.

4.3 SYSTEM REQUIREMENTS ..............................................Error! Bookmark not defined.

4.3.1Hardware Requirements: ...............................................Error! Bookmark not defined.

4.3.2 Software Requirements: ................................................Error! Bookmark not defined.

4.4 NetBeans ..............................................................................Error! Bookmark not defined.


4.4.1 NetBeans Platform ........................................................Error! Bookmark not defined.

4.4.2 NetBeans IDE ...............................................................Error! Bookmark not defined.

4.5 MySQL ................................................................................Error! Bookmark not defined.

4.6 JAVA SERVER PAGES .....................................................Error! Bookmark not defined.

4.7 NAVICAT PREMIUM ........................................................Error! Bookmark not defined.

4.8 JDBC ....................................................................................Error! Bookmark not defined.

5. SYSTEM DESIGN AND DEVELOPMENT .............................Error! Bookmark not defined.

5.1 INPUT DESIGN ..................................................................Error! Bookmark not defined.

5.2 OUTPUT DESISGN ............................................................Error! Bookmark not defined.

5.3 SYSTEM ARCHITECTURE ..............................................Error! Bookmark not defined.

5.4 Use case diagram .................................................................Error! Bookmark not defined.

5.5 Data Flow Diagram: .............................................................Error! Bookmark not defined.

5.6 Sequence diagram: ...............................................................Error! Bookmark not defined.

6. IMPLEMENTATION .................................................................Error! Bookmark not defined.

6.1 PROGRAMMING LANGUAGE SELECTION .................Error! Bookmark not defined.

6.2 MODULE DESCRIPTION .................................................Error! Bookmark not defined.

6.3 ADVANCED ENCRYPTION STANDARD ......................Error! Bookmark not defined.

6.3.1 ENCRYPTION PROCESS ...........................................Error! Bookmark not defined.

6.3.2 DECRYPTION PROCESS ...........................................Error! Bookmark not defined.

7. TESTING ......................................................................................Error! Bookmark not defined.

7.1 TYPES OF TESING ............................................................Error! Bookmark not defined.

7.1.1 UNIT TESTING ...........................................................Error! Bookmark not defined.

7.1.2 INTEGRATION TESTING ..........................................Error! Bookmark not defined.

7.1.3 SYSTEM TESTING .....................................................Error! Bookmark not defined.

7.1.4 PERFORMANCE TESTING .......................................Error! Bookmark not defined.


7.1.5 VALIDATION TESING ..............................................Error! Bookmark not defined.

7.1.6 ACCEPTANCE TESING .............................................Error! Bookmark not defined.

7.2 TEST CASES.......................................................................Error! Bookmark not defined.

7.2.1 TEST CASES FOR UNIT TESTING...........................Error! Bookmark not defined.

7.2.2 TEST CASES FOR INTEGRATION TESTING .........Error! Bookmark not defined.

8. SNAPSHOTS ................................................................................Error! Bookmark not defined.

9. CONCLUSION ............................................................................Error! Bookmark not defined.

REFERENCES .................................................................................Error! Bookmark not defined.


LIST OF FIGURES

1. Figure 1.1: Cloud Computing ..................................................................................................... 1


2. Figure 1.2: Types of Cloud ......................................................................................................... 2
3. Figure 4.1:Start Page of Netbeans ............................................................................................ 20
4. Figure 4.2: MySQL Workbench in Windows ........................................................................... 22
5. Figure 4.3: JSP Model............................................................................................................... 23
6. Figure 5.1: System Architecture ............................................................................................... 28
7. Figure 5.2: Use Case Diagram .................................................................................................. 29
8. Figure 5.3:Data Flow Daigram-1 .............................................................................................. 30
9. Figure 5.4:Data Flow Diagram-2 .............................................................................................. 30
10. Figure 5.5: Data Flow Diagram-3 ........................................................................................... 31
11. Figure 5.6:Sequence Diagram ................................................................................................. 32
12. Figure 6.1:AES structure ........................................................................................................ 37
13. Figure 6.2:Flowchart of AES .................................................................................................. 39
14. Figure 8.1: Home Page of the Web Application. .................................................................... 56
15. Figure 8.2: Login Page ............................................................................................................ 56
16. Figure 8.3: Registration Page .................................................................................................. 57
17. Figure 8.4: Upload Page ......................................................................................................... 57
18. Figure 8.5: Selecting File to Download .................................................................................. 58
19. Figure 8.6: Sending Key Request to Admin ........................................................................... 58
20. Figure 8.7: Decrypt File .......................................................................................................... 59
21. Figure 8.8: Original File ......................................................................................................... 59