cloud based content rating system

23
Cloud based content rating system ABSTRACT An important problem in public clouds is how to selectively share documents based on fine-grained attribute based access control policies. An approach is to encrypt documents satisfying different policies with different keys using a public key crytosystem such as attribute based encryption (ABE), and/or proxy re- encryption (PRE). However, such an approach has some weaknesses: it cannot efficiently handle adding/revoking users or identity attributes, and policy changes; it requires to keep multiple encrypted copies of the same documents; it incurs high computational cost. A direct application of a symmetric key cryptosystem, where users are grouped based on the policies they satisfy and assigning unique keys for each group, also has similar weaknesses. Without utilizing public key cryptography and by allowing users to dynamically derive the symmetric keys at the time of decryption, one can address the above weaknesses. Based on this idea, a new key management scheme called

Upload: kishor-kumar

Post on 13-Jan-2016

226 views

Category:

Documents


0 download

DESCRIPTION

content rating system cloud based

TRANSCRIPT

Page 1: Cloud Based Content Rating System

Cloud based content rating system

ABSTRACT

An important problem in public clouds is how to selectively share documents

based on fine-grained attribute based access control policies. An approach is to

encrypt documents satisfying different policies with different keys using a public

key crytosystem such as attribute based encryption (ABE), and/or proxy re-

encryption (PRE). However, such an approach has some weaknesses: it cannot

efficiently handle adding/revoking users or identity attributes, and policy changes;

it requires to keep multiple encrypted copies of the same documents; it incurs high

computational cost. A direct application of a symmetric key cryptosystem, where

users are grouped based on the policies they satisfy and assigning unique keys for

each group, also has similar weaknesses. Without utilizing public key

cryptography and by allowing users to dynamically derive the symmetric keys at

the time of decryption, one can address the above weaknesses. Based on this idea,

a new key management scheme called broadcast group key management (BGKM)

is proposed and then give a secure construction of a BGKM scheme called ACV-

BGKM. The idea is to give some secrets to users based on the identity attributes

they have and later allow them to derive actual symmetric keys based on their

secrets and some public information. A key advantage of the BGKM scheme is

that adding users/revoking users or updating access control policies can be

performed efficiently by updating only some public information.

Page 2: Cloud Based Content Rating System

EXISTING SYSTEM

Group Key Management (GKM)

This approach encodes secrets given to users at registration phase in a special

polynomial of order at least n in such a way that users can derive the secret key

from this polynomial.

Disadvantages

In GKM the security of the scheme weakens as n increases.

Attribute Based Encryption (ABE)

ABE is another approach for implementing encryption-based access control to

documents. Under such an approach, users are able to decrypt subdocuments if

they satisfy certain policies.

Disadvantages

Whenever the group dynamic changes, the re-keying operation requires to

update the private keys given to existing members in order to provide

backward/forward secrecy.

Requires establishing private communication channels with each group

member which is not desirable in a large group setting.

Whenever the group membership policy changes, new private keys must be

re-issued to members of the group.

In applications involving stateless members where it is not possible to

update the initially given private keys and the only way to revoke a member

Page 3: Cloud Based Content Rating System

is to exclude it from the public information, an ABE based approach does

not work.

Selective Dissemination

Encryption of different subdocuments with different keys, which are provided to

users at the registration phase, and broadcasting the encrypted subdocuments to all

users.

Selective multicast of different subdocuments to different user groups, where all

sub-documents are encrypted with one symmetric encryption key.

Disadvantages

It assumes that the users are honest and do not try to access the

subdocuments to which they do not have access authorization.

Therefore, these approaches provide neither backward nor forward key

secrecy.

Secure Data Outsourcing

With the increasing utilization of cloud computing services, there has been a real

need to access control the encrypted documents stored in an un-trusted third party.

There has been some recent research efforts to construct privacy preserving access

control systems by combining oblivious transfer and anonymous credentials.

Disadvantages

Each transfer protocol allows one to access only one record from the

database.

Page 4: Cloud Based Content Rating System

Size of the encrypted database is not constant with respect to the original

database size.

Redundant encryption of the same record is required to support acps

involving disjunctions.

Page 5: Cloud Based Content Rating System

PROPOSED SYSTEM

Without utilizing public key cryptography and by allowing users to dynamically

derive the symmetric keys at the time of decryption, one can address the group key

management issues. Based on this idea, a new GKM scheme called broadcast

GKM(BGKM) and then give a secure construction of BGKM scheme and formally

prove its security.

The idea is to give secrets to users based on the identity attributes they have and

later allow them to derive actual symmetric keys based on their secrets and some

public information.

Develop an attribute-based access control mechanism whereby a user is able to

decrypt the contents if and only if its identity attributes satisfy the content

provider’s policies, whereas the content provider and the cloud learn nothing about

user’s identity attributes.

Advantages

A key advantage of the BGKM scheme is that adding users/revoking users

or updating access control policies can be performed efficiently and only

requires updating the public information.

Maximum trust

Key indistinguishability

Key independence

Forward secrecy

Page 6: Cloud Based Content Rating System

Backward secrecy and

Minimal computational, space and communication cost.

Page 7: Cloud Based Content Rating System

System Specification

System Requirements:

Hardware Requirements

System : Pentium IV 2.4 GHz.

Hard Disk : 40 GB.

Floppy Drive : 1.44 Mb.

Monitor : 15 VGA Colour.

Mouse : Logitech.

Ram : 512 Mb.

Software Requirements

Operating system : - Windows XP.

Coding Language : ASP.Net with C#.

Data Base : SQL Server 2005

Page 8: Cloud Based Content Rating System
Page 9: Cloud Based Content Rating System

MODULE

Construction of Cloud Data Storage

Data upload

Data Retrieval

Construction of Cloud Data Storage

In Admin Module the admin can login to give his username and password. Then

the server setup method can be opened. In server setup process the admin first set

the remote servers Ip-address for send that Ip-address to the receiver. Then the

server can skip the process to activate or De-activate the process. For activating the

process the storage server can display the Ip-address. For De-activating the process

the storage server cannot display the Ip-address. These details can be viewed by

clicking the key server. The activated Ip-addresses are stored in available storage

server. By clicking the available storage server button we can view the currently

available Ip-addresses.

Data upload

In Upload Module the new folder can be create for storing the files. In folder

creation process the cloud system may ask one question for that user. The user

should answer the question and must remember that answer for further usage. Then

enter the folder name for create the folder for that user. In file upload process the

user has to choose one file from browsing the system and enter the upload option.

Now, the server from the cloud can give the encrypted form of the uploading file.

Page 10: Cloud Based Content Rating System

Data Retrieval Module

In Download module contains the following details. There are username and file

name. First, the server process can be run which means the server can be connected

with its particular client. Now, the client has to download the file to download the

file key. In file key downloading process the fields are username, filename,

question, answer and the code. Now clicking the download option the client can

view the encrypted key. Then using that key the client can view the file and use

that file appropriately.

SYSTEM ARCHITECTURE

Page 11: Cloud Based Content Rating System

User

Page 12: Cloud Based Content Rating System

User Case Diagram

Page 13: Cloud Based Content Rating System
Page 14: Cloud Based Content Rating System

Class Diagram

Page 15: Cloud Based Content Rating System

Activity Diagram

SEQUENCE DIAGRAM

Page 16: Cloud Based Content Rating System
Page 17: Cloud Based Content Rating System

COMPANY PROFILE

I. The Company

LEGENDS INFOTECH Systems Limited is a mature software development house

inculcated with the following basic characteristics: agility, reliability, and capability.

LEGENDS INFOTECH possesses substantial experience in large development projects and

product development adding to nearly 3500 person years of experience. LEGENDS

INFOTECH uses a global delivery model that takes advantage of the state of art and cost

effective development facility in Chennai, India

History

A team of technocrats started LEGENDS INFOTECH, in 2002 in Chennai, India

providing reliable IT solutions in the Indian subcontinent.

Today, LEGENDS INFOTECH has the agility, size and momentum necessary for further

growth - built on the sound foundation laid in terms of marketing, technical, financial, and

quality process.

Operating Locations

Internationally, LEGENDS INFOTECH is present in USA and India. In USA, LEGENDS

INFOTECH operates from Atlanta and Chicago, which acts as LEGENDS INFOTECH’s

marketing arm for US operations with same business focus as LEGENDS INFOTECH.

Software

LEGENDS INFOTECH is equipped with skills and software in the following

environments, mostly in the development center in India:

Page 18: Cloud Based Content Rating System

Skills

Operating Systems Various UNIX flavors, Linux, AIX, WIN-NT, MVS, Windows 95,98,2000

RT Linux ITRON, WinCE, VxWorks

Databases Oracle, Oracle 8i, Oracle Financial, Sybase, MySQL,SQL Server, DB2, MS Access, SQL Anywhere

Programming Languages C, C ++, COBOL, PL/1, C#, Java,PHP, AS400 RPG, .Net

Tools

Front-end Developer 2000, Power Builder, VC++, VB, Designer 2000

Frameworks Dot Net, JSP STRUTS

Web Based Active X, Java, VJ++, JDK, Visual Café, Visual Studio 97, Cold fusion, Cold fusion Studio, ASP, JSP, EJB, J2EE, XML, Visual Interdev, Forte, CGI, HTML, DHTML, Dream Weaver, PHP, SGML

Data Modeling E-R Win, S-Designer, MS Vision

Object Modeling Rational Rose, UML

Testing & CM SQA Robot, Visual Test, Visual Source Safe, Clear Case

Business Intelligence Business Objects

Web Servers Apache, Netscape, IIS

Application Servers BEA Web logic, WebSphere, Site Server / Commerce Server, BroadVision, Biztalk Server, Share Point Server

Page 19: Cloud Based Content Rating System

II. LEGENDS INFOTECH’s Business Units

LEGENDS INFOTECH Systems Limited has formed new BUSINESS UNITS (BUs) in the

company. While IT SERVICES help us sustain our business, the new Business Units will help

us to achieve growth. It is a very significant change in our strategy and we are confident

that this will help in accelerating growth.

LEGENDS INFOTECH's Business Units will be responsible for the business plan from

the current year and will also work on future strategies and plans. This means the

responsibility will call for significant interactions with external world including clients,

prospects and other entities as well as take care of the operations of their respective

Business Units.

LEGENDS INFOTECH Systems Limited has spun off new Business Units, IT Services,

Business Intelligence, Business Process Management & Engineering Services that helps in

accelerating company’s business growth.

a. IT Services

b. Web Application

c. Business Process Management

Page 20: Cloud Based Content Rating System

Website: www.legendsinfotech.com