![Page 1: Authentication on Cloud using Attribute Based Encryption](https://reader031.vdocuments.mx/reader031/viewer/2022022415/5a656b787f8b9a7f628b490d/html5/thumbnails/1.jpg)
Presented By-
Ankit Raj (1309113012)
Aqib Jamal (1309113017)
Nisha Gupta (1309113056)
Akash Prajapati (1309113008)
Authentication on Cloud using Attribute Based Encryption
Mentor-
Mrs. Archana Saxena
![Page 2: Authentication on Cloud using Attribute Based Encryption](https://reader031.vdocuments.mx/reader031/viewer/2022022415/5a656b787f8b9a7f628b490d/html5/thumbnails/2.jpg)
• As cloud is widely used for remote access of information as well as transfer of information geographically, so there is a great need of making cloud even more secure.
• Attribute Based Encryption can help in increasing the security on cloud.
• ABE is a public-key based one-to-many encryption that allows users to encrypt and decrypt data based on user attributes.
Fig 1:Cloud Services[4]
![Page 3: Authentication on Cloud using Attribute Based Encryption](https://reader031.vdocuments.mx/reader031/viewer/2022022415/5a656b787f8b9a7f628b490d/html5/thumbnails/3.jpg)
Improving Cloud Security for Authentication using Attribute Based
Encryption.
![Page 4: Authentication on Cloud using Attribute Based Encryption](https://reader031.vdocuments.mx/reader031/viewer/2022022415/5a656b787f8b9a7f628b490d/html5/thumbnails/4.jpg)
• Design and develop attribute based encryption(ABE)
algorithm.
• Use a cloud environment and implement ABE on cloud.
![Page 5: Authentication on Cloud using Attribute Based Encryption](https://reader031.vdocuments.mx/reader031/viewer/2022022415/5a656b787f8b9a7f628b490d/html5/thumbnails/5.jpg)
• The concept of ABE was first proposed by Amit Sahai and Brent Waters[1]
Sahai and Waters gave two concepts
1. IBE: Concept uses Biometric Identities.
2. Attribute based Encryption: Encrypt a document to all users that have
certain set of attributes.
Contd…
![Page 6: Authentication on Cloud using Attribute Based Encryption](https://reader031.vdocuments.mx/reader031/viewer/2022022415/5a656b787f8b9a7f628b490d/html5/thumbnails/6.jpg)
Although ABE concept is very powerful and a promising mechanism, ABE systems suffer mainly from
two drawbacks:
• Non-efficiency.
• proposal was much expensive decryption.
Fig 2: ABE scheme[4]
OR
![Page 7: Authentication on Cloud using Attribute Based Encryption](https://reader031.vdocuments.mx/reader031/viewer/2022022415/5a656b787f8b9a7f628b490d/html5/thumbnails/7.jpg)
In order to reduce the cost of Decryption Lia[2] suggested to outsource the
majority of actual data without revealing private key.
Considering a new requirement of ABE with outsourced decryption: Modifying
the original model of ABE with outsourced decryption proposed by Green to
include verifiability.
A concrete ABE scheme with outsourced decryption and proved that it is secure.
Lin[3] proposed an algorithm that provided a decryption algorithm for ABE,
whose computational time and cost was half as that of traditional decryption
algorithm of ABE.
Contd…
![Page 8: Authentication on Cloud using Attribute Based Encryption](https://reader031.vdocuments.mx/reader031/viewer/2022022415/5a656b787f8b9a7f628b490d/html5/thumbnails/8.jpg)
If receiver wants to download the file, they have to send request to cloud proxy server.
When proxy server will verify receiver then server will ask for transformation key. This
key will be generated through the attributes of receiver.
Transformation key is used for transforming cipher text into simpler cipher text.
Now simpler cipher text is send to receiver who decrypt simpler cipher text into plain text
using receiver secret key.
Fig:3 System Architecture[2]
![Page 9: Authentication on Cloud using Attribute Based Encryption](https://reader031.vdocuments.mx/reader031/viewer/2022022415/5a656b787f8b9a7f628b490d/html5/thumbnails/9.jpg)
![Page 10: Authentication on Cloud using Attribute Based Encryption](https://reader031.vdocuments.mx/reader031/viewer/2022022415/5a656b787f8b9a7f628b490d/html5/thumbnails/10.jpg)
Encrypt
Cloud AuthenticationCloud
Authority
Consumer Portal
Consumer Decrypt
Fig. 4: Architecture of ABE on cloud
Owner
![Page 11: Authentication on Cloud using Attribute Based Encryption](https://reader031.vdocuments.mx/reader031/viewer/2022022415/5a656b787f8b9a7f628b490d/html5/thumbnails/11.jpg)
1. Setup: Here is the depth of key structure. Take as input a parameter. It outputs apublic key PK and master secret key MK.
2. Key-gen: Takes as input the master secret key MK, user attributes, It outputs asecret key SK for user u.
3. Encrypt: Takes as input the public key PK, a message M, and an access tree T . Itoutputs a ciphertext CT.
4. Decrypt: Take as input a ciphertext CT and a secret key SK for user u. It outputs amessage m . If the key structure A associated with the secret key SK, satisfies theaccess tree T, associated with the ciphertext CT, then m is the original correctmessage M.
![Page 12: Authentication on Cloud using Attribute Based Encryption](https://reader031.vdocuments.mx/reader031/viewer/2022022415/5a656b787f8b9a7f628b490d/html5/thumbnails/12.jpg)
Setup Algorithm
![Page 13: Authentication on Cloud using Attribute Based Encryption](https://reader031.vdocuments.mx/reader031/viewer/2022022415/5a656b787f8b9a7f628b490d/html5/thumbnails/13.jpg)
Key Gen Algorithm
![Page 14: Authentication on Cloud using Attribute Based Encryption](https://reader031.vdocuments.mx/reader031/viewer/2022022415/5a656b787f8b9a7f628b490d/html5/thumbnails/14.jpg)
Encryption Algorithm
![Page 15: Authentication on Cloud using Attribute Based Encryption](https://reader031.vdocuments.mx/reader031/viewer/2022022415/5a656b787f8b9a7f628b490d/html5/thumbnails/15.jpg)
Decryption Algorithm
![Page 16: Authentication on Cloud using Attribute Based Encryption](https://reader031.vdocuments.mx/reader031/viewer/2022022415/5a656b787f8b9a7f628b490d/html5/thumbnails/16.jpg)
![Page 17: Authentication on Cloud using Attribute Based Encryption](https://reader031.vdocuments.mx/reader031/viewer/2022022415/5a656b787f8b9a7f628b490d/html5/thumbnails/17.jpg)
![Page 18: Authentication on Cloud using Attribute Based Encryption](https://reader031.vdocuments.mx/reader031/viewer/2022022415/5a656b787f8b9a7f628b490d/html5/thumbnails/18.jpg)
![Page 19: Authentication on Cloud using Attribute Based Encryption](https://reader031.vdocuments.mx/reader031/viewer/2022022415/5a656b787f8b9a7f628b490d/html5/thumbnails/19.jpg)
![Page 20: Authentication on Cloud using Attribute Based Encryption](https://reader031.vdocuments.mx/reader031/viewer/2022022415/5a656b787f8b9a7f628b490d/html5/thumbnails/20.jpg)
![Page 21: Authentication on Cloud using Attribute Based Encryption](https://reader031.vdocuments.mx/reader031/viewer/2022022415/5a656b787f8b9a7f628b490d/html5/thumbnails/21.jpg)
![Page 22: Authentication on Cloud using Attribute Based Encryption](https://reader031.vdocuments.mx/reader031/viewer/2022022415/5a656b787f8b9a7f628b490d/html5/thumbnails/22.jpg)
Successful Decryption for Authentic User
![Page 23: Authentication on Cloud using Attribute Based Encryption](https://reader031.vdocuments.mx/reader031/viewer/2022022415/5a656b787f8b9a7f628b490d/html5/thumbnails/23.jpg)
Decryption Fails for Unauthentic User
![Page 24: Authentication on Cloud using Attribute Based Encryption](https://reader031.vdocuments.mx/reader031/viewer/2022022415/5a656b787f8b9a7f628b490d/html5/thumbnails/24.jpg)
Fig 4: Comparison with other technique[6]
![Page 25: Authentication on Cloud using Attribute Based Encryption](https://reader031.vdocuments.mx/reader031/viewer/2022022415/5a656b787f8b9a7f628b490d/html5/thumbnails/25.jpg)
• Files stored in cloud can be corrupted. So for this issue using the file recovery technique to recover the corrupted file successfully.
• Data loss may occur because replicas of file storage is not maintained.
• The project can be extended for multi user attribute system where if all the authorized users are present then only file can be decrypted successfully. Less than required authorized users can’t decrypt the file.
Implementation of Attribute Based Encryption is done with outsource decryption Technique.
Following are the future scope for our project
![Page 26: Authentication on Cloud using Attribute Based Encryption](https://reader031.vdocuments.mx/reader031/viewer/2022022415/5a656b787f8b9a7f628b490d/html5/thumbnails/26.jpg)
Decrypt
![Page 27: Authentication on Cloud using Attribute Based Encryption](https://reader031.vdocuments.mx/reader031/viewer/2022022415/5a656b787f8b9a7f628b490d/html5/thumbnails/27.jpg)
[1] A. Sahai and B. Waters, “Fuzzy identity-based encryption,” International
Association for Cryptologic Research, Springer,2005.
[2] J. Lai, R. H. Deng, C. Guan, and J. Weng, “Attribute-based encryption
with verifiable outsourced decryption,” IEEE Trans. Inf. Forensics Security,
vol. 8, no. 8, pp. 1343–1354, Aug. 2013.
[3] Suqing Lin, Rui Zhang, Hui Ma, and Mingsheng Wang,“Revisiting
Attribute-Based Encryption With Verifiable Outsourced Decryption“, IEEE
Transactions On Information Forensics And Security, Vol. 10, No. 10, Feb
2016
![Page 28: Authentication on Cloud using Attribute Based Encryption](https://reader031.vdocuments.mx/reader031/viewer/2022022415/5a656b787f8b9a7f628b490d/html5/thumbnails/28.jpg)
[4] http://cloudcomputingvilla.com/how-does-cloud-computing-work/
[5] http://ualr.edu/sxyu1/cloud.htm
[6] P.Madhubala, Dr.P.Thangaraj ,” Comprehensive and Comparative Analysis of
Cryptographic Solutions in Cloud,” International Journal of Innovative Research in
Computer and Communication Engineering, Vol. 2, Issue 10, October 2014
[7] Eric Zavattoni, Luis J. Dominguez Perez, Shigeo Mitsunari, Ana H. S´anchez-
Ram´ırez, Tadanori Teruya, and Francisco Rodr´ıguez-Henr´ıquez, ”Software
implementation of an Attribute-Based Encryption scheme,” IEEE Transactions on
Computers, May 2015
![Page 29: Authentication on Cloud using Attribute Based Encryption](https://reader031.vdocuments.mx/reader031/viewer/2022022415/5a656b787f8b9a7f628b490d/html5/thumbnails/29.jpg)