ABSTRACT
Cloud
computing is a revolutionary computing paradigm, which enables flexible,
on-demand, and low-cost usage of computing resources, but the data is outsourced
to some cloud servers, and various privacy concerns emerge from it. Various
schemes based on the attribute-based encryption have been proposed to secure
the cloud storage. However, most work focuses on the data contents privacy and
the access control, while less attention is paid to the privilege control and
the identity privacy. In this paper, we present a semianonymous privilege
control scheme AnonyControl to address not only the data privacy, but also the
user identity privacy in existing access control schemes. AnonyControl
decentralizes the central authority to limit the identity leakage and thus
achieves semi anonymity. Besides, it also generalizes the file access control
to the privilege control, by which privileges of all operations on the cloud
data can be managed in a fine-grained manner. Subsequently, we present the
AnonyControl-F, which fully prevents the identity leakage and achieve the full
anonymity. Our security analysis shows that both AnonyControl and
AnonyControl-F are secure under the decisional bilinear Diffie–Hellman
assumption, and our performance evaluation exhibits the feasibility of our
schemes.
AIM
The
aim of this paper is present a semi anonymous privilege control scheme Anony Control
to address not only the data privacy, but also the user identity privacy in
existing access control schemes.
SCOPE
The
scope of this paper tend to Our security analysis shows that both AnonyControl and
AnonyControl-F are secure under the decisional bilinear Diffie–Hellman
assumption, and our performance evaluation exhibits the feasibility of our
schemes.
EXISTING SYSTEM
First
data confidentiality should be guaranteed. The data privacy is not only about
the data contents. Since the most attractive part of the cloud computing is the
computation outsourcing, it is far beyond enough to just conduct an access
control. More likely, users want to control the privileges of data manipulation
over other users or cloud servers. This is because when sensitive information
or computation is outsourced to the cloud servers or another user, which is out
of users’ control in most cases, privacy risks would rise dramatically because
the servers might illegally inspect users’ data and access sensitive
information, or other users might be able to infer sensitive information from
the outsourced computation. Therefore, not only the access but also the
operation should be controlled.
DISADVANTAGES
- The data is outsourced to some cloud servers, and various privacy concerns emerge from it
- It most work focuses on the data contents privacy and the access control, while less attention is paid to the privilege control and the identity privacy.
PROPOSED
SYSTEM
Various
techniques have been proposed to protect the data contents privacy via access
control. Identity-based encryption (IBE) was first introduced by Shamir , in
which the sender of a message can specify an identity such that only a receiver
with matching identity can decrypt it. Few years later, Fuzzy Identity-Based
Encryption is proposed, which is also
known as Attribute-Based Encryption (ABE). In such encryption scheme, an
identity is viewed as a set of descriptive attributes, and decryption is
possible if a decrypter’s identity has some overlaps with the one specified in
the ciphertext. Soon after, more general tree-based ABE schemes, Key-Policy
Attribute-Based Encryption (KP-ABE) and Ciphertext-Policy Attribute- Based
Encryption (CP-ABE) are presented to
express more general condition than simple ‘overlap’. They are counterparts to
each other in the sense that the decision of encryption policy (who can or
cannot decrypt the message) is made by different parties.
ADVANTAGES
- It achieves not only fine-grained privilege control but also identity anonymity while conducting privilege control based on users’ identity information
- The security and performance analysis which shows that Anony- Control both secure and efficient for cloud storage system.
SYSTEM ARCHITECTURE
SYSTEM CONFIGURATION
Hardware Requirements
- Speed - 1.1 Ghz
- Processor - Pentium IV
- RAM - 512 MB (min)
- Hard Disk - 40 GB
- Key Board - Standard Windows Keyboard
- Mouse - Two or Three Button Mouse
- Monitor - LCD/LED
Software
requirements
- Operating System : Windows 7
- Front End : ASP.Net and C#
- Database : MSSQL
- Tool : Microsoft Visual studio
REFERENCE
Lei,
Chin-Laung Chi, Po-Wen “CONTROL CLOUD DATA ACCESS PRIVILEGE AND ANONYMITY WITH
FULLY ANONYMOUS ATTRIBUTE-BASED ENCRYPTION” IEEE Transactions on Information
Forensics and Security, VOL 10,ISS 1, NOVEMBER 2014.
No comments:
Post a Comment