achieving secure,scalable and fine-grained data access control in cloud computing
TRANSCRIPT
Computer Science & Engineering
OBJECTIVEOBJECTIVETo reduce overhead on data ownerTo provide fine-grained data access control
Computer Science & Engineering
EXISTING SYSTEMEXISTING SYSTEMExisting system uses cryptographic methodsHeavy overhead on the data owner
Disadvantages:Disadvantages:Software update/patchesSecurity concernsControl
Computer Science & Engineering
PROPOSED SYSTEMPROPOSED SYSTEMTo provide secure, scalable, fine-grained data
access control on outsourced data in the cloud
Scheme Description:Scheme Description:System SetupNew File CreationNew User GrantUser RevocationFile AccessFile Deletion
Computer Science & Engineering
MODULESMODULESKP-ABEProxy Re-EncryptionLazy Re-Encryption
Computer Science & Engineering
KP-ABEKP-ABEAlgorithms:Algorithms:
Setup AttributesEncryptionSecret Key GenerationDecryptionAccess TreeConstruction of Access Tree
Computer Science & Engineering
PROXY RE-ENCRYPTIONPROXY RE-ENCRYPTIONDivertible Protocols(m, n)-Interactive Turing MachineAtomic Proxy CryptographyCategories of Proxy Scheme
SymmetricAsymmetricActive AsymmetricPassive AsymmetricTransparentTranslucentOpaque
Computer Science & Engineering
LAZY RE-ENCRYPTIONLAZY RE-ENCRYPTIONUpdate secret keysUpdate user attributes
Computer Science & Engineering
Upload files to cloud server
Open file
Maintainance of files and users
Login
CheckOwner
End
User
Exists
Create account
no
Enter data to search
yes
Encrypt and decrypt the data
Send to cloud server
If files exists for datayes no
List out the files Displays no datas in server
Open the required file
Enter secret key Check
Correct
Displays duplicate dataWrong
Displays original file
End
Computer Science & Engineering
Fig: System Architecture
CONCLUSIONCONCLUSION
One challenge is to achieve fine-grainedness, data confidentiality, and scalability simultaneously,which is not provided by current work
Computer Science & Engineering
Computer Science & Engineering