Sie sind auf Seite 1von 25

MINI PROJECT SEMINAR

ON
A SECURE ANTI-COLLUSION DATA
SHARING SCHEME FOR DYNAMIC GROUPS
IN THE CLOUD
Contents
Abstract
Introduction
Literature Survey
Existing system
Disadvantages of Existing system
Proposed system
Proposed system and Advantages
Software requirement specification
UML Diagrams
System Architecture
Screenshots
Conclusion
Future Enhancements
References
Abstract
 In cloud computing, users can achieve an effective and economical
approach for data sharing among group members in the cloud.
Meanwhile, we must provide security for the sharing data files since
they are outsourced.
 In this project, we propose a secure data sharing scheme for dynamic
members, a secure way for key distribution without any secure
communication channels, and the users can securely obtain their
private keys from group manager.
Introduction
Cloud Computing is the use of computing resources (hardware
and software) that are delivered as a service over a network (typically
the Internet). The name comes from the common use of a cloud-
shaped symbol as an abstraction for the complex infrastructure it
contains in system diagrams. Cloud computing entrusts remote
services with a user's data, software and computation. Cloud
computing consists of hardware and software resources made
available on the Internet as managed third-party services. These
services typically provide access to advanced software applications
and high-end networks of server computers.
Literature Survey
 “Practical and Flexible Key Management Mechanism For
Trusted Collaborative Computing”, in this paper Elisa
Bertino told about the key management for trusted cloud.
 He also said about the Generation of key, Security, How to
access a cloud from one Dynamic Group.
Existing System
 In existing system, the security of key distribution is based on
the secure communication channel.
 To have such a channel, it is a strong assumption and difficult to
practice.
 To share such a data providing privacy-preserving has become a
challenging issue.
Disadvantages of Existing System
 The system had a heavy key distribution.
 The single-owner manner may hinder the
implementation of applications.
 The complexities of user participation and revocation
increases with number of data owners and revoked
users.
Proposed System
 In this proposed system, we propose a secure data sharing scheme,
which can achieve secure key distribution and data sharing for
dynamic group.
 We provide a secure way for key distribution without any secure
communication channels.
 The users can securely obtain their private keys from group manager
without any Certificate Authorities due to the verification for the
public key of the user.
 We propose a secure data sharing scheme which can be protected from
collusion attack.
Advantages
 The computation cost is irrelevant to the number of
revoked users in RBAC scheme.
 The cost is irrelevant to the number of the revoked users.
The reason is that the computation cost of the cloud for
file upload in our scheme consists of two verifications for
signature.
 In our scheme, the users can securely obtain their private
keys from group manager certificate authorities and secure
communication channels.
Software Requirement Specification
SOFTWARE REQUIREMENTS:
Operating system : Windows XP/7.
Coding Language : JAVA/J2E
IDE : Eclipse
Database : MYSQL

HARDWARE REQUIREMENTS:
System : dual core
Hard Disk : 40 GB.
Ram : 1 GB.
UML Diagrams
Use Case Diagram for group member
Registration

Login

Uploadfile

Groupmember
Downloadfile

Update file that request send to trustee

Get private key from trustee

logout
Use Case Diagram for Group Manager

Login

View groups

View log details

View file details


Groupmanager

Delete files

Activate/deactivate group members

View user details

logout
Usecase diagram for Trustee:

Login

View all requests

Send response to group members for private key

Trustee
View all files

logout
Use case diagram for Cloud Admin:

login

view files
cloud admin

logout
Sequence Diagram

Group member Registration Login system database logout


cloud

1 : Give information()
2 : set values()

3 : register success()

4 : give username,password()
5 : checking()

6 : check()

7 : success()

8 : upload file()

9 : download file()

10 : update file()

11 : logout()

12 : successfuly logout()
Class Diagram
Registration login
+username +username
+password +password
+mail id
+address +submit()
+phone no +cancel()

+submit()
+cancel()

group member group manager trustee


cloud
+username +username +username
+password +password +password +username
+password
+login() +login() +login()
+upload file() +view groups() +view requests() +login()
+update file() +view / deletefiles() +send key() +view files()
+download file() +view users() +view files()
+view logdetails()
+activate/deactivate users()

file
+filename
+file id
Activity Diagram for Group Member:

Group member

Registration

no Get registered

yes

login

no please enter valid details

yes

valid members

Upload file

download file

update file

log out
System Architecture
Screenshots
Conclusion
 We design a secure anti-collusion data sharing scheme for
dynamic groups in the cloud. In our scheme, the users can
securely obtain their private keys from group manager
certificate authorities and secure communication channels.
 Also, our scheme is able to support dynamic groups
efficiently, when a new user joins in the group or a user is
revoked from the group, the private keys of the other users do
not need to be recomputed and updated.
Future Enhancements
 Reliability and scalability will be further introduced to back-up
for group manager. So group manager can handle problems in
case of failures.
References
 [[1] M.Armbrust, A.Fox, R.Griffith, A.D.Joseph, R.Katz,A.Konwinski, G. Lee,
D.Patterson, A.Rabkin, I.Stoica, andM.Zaharia. “A View of Cloud
Computing,”Comm. ACM, vol. 53,no.4, pp.50-58, Apr.2010.
 [2] S.Kamara and K.Lauter,“Cryptographic Cloud Storage,” Proc.Int’l Conf.
Financial Cryptography and Data Security (FC), pp.136-149, Jan. 2010.
 [3] M. Kallahalla, E. Riedel, R. Swaminathan, Q. Wang, and K.Fu,“Plutus:
Scalable Secure File Sharing on Untrusted Storage,” Proc.USENIX Conf. File
and Storage Technologies, pp. 29-42, 2003.
Thank You

Das könnte Ihnen auch gefallen