ppt for idbsdds schemes

42
IDENTITY BASED SECURE DISTRIBUTED DATA STORAGE SCHEMES PRESENTED BY: N.SAHITHI (12C11D5816) UNDER GUIDANCE OF Mr. J.NAGARAJU, (M.TECH)

Upload: sahithi-naraparaju

Post on 22-May-2015

232 views

Category:

Career


1 download

TRANSCRIPT

Page 1: PPT FOR IDBSDDS SCHEMES

IDENTITY BASED SECURE DISTRIBUTED DATA STORAGE SCHEMES

PRESENTED BY:N.SAHITHI

(12C11D5816)

UNDER GUIDANCE OFMr. J.NAGARAJU, (M.TECH)

Page 2: PPT FOR IDBSDDS SCHEMES

IBSDDS SCHEMES

ABSTRACT

Secure distributed data storage can shift the burden of maintaining a large number of

files from owner to proxy servers. Proxy servers can convert encrypted files for owner

to encrypted files for receiver without necessity of knowing the content of original

files. IBSDSS schemes uses 2 identity based secure distributed data storage schemes.

First scheme is secure against chosen plaintext attacks (CPA). Second scheme is

secure against chosen chipertext attacks (CCA). It is first identity based secure

distributed data storage schemes where access permissions is made by owner of file

and collusion attacks can be protected.

Page 3: PPT FOR IDBSDDS SCHEMES

IBSDDS SCHEMES

INTRODUCTION

Cloud computing provides users a convenient mechanism to manage their personal

files with notion called Database-As-Services (DAS).

Proxy servers can perform some functions on outsourced cipher texts without

knowing anything about original files.

This technique has not been employed due to confidentiality and integrity.

Page 4: PPT FOR IDBSDDS SCHEMES

IBSDDS SCHEMES

To address these issues IBSDDS scheme is proposed, which uses two schemes.

These schemes capture following properties :

i) The file owner can decide the access permission independently.

ii) For one query, a receiver can only access one file instead of all files of

the owner.

iii) Our schemes secure against the collusion attacks.

Page 5: PPT FOR IDBSDDS SCHEMES

IBSDDS SCHEMES

PROBLEM STATEMENT

Writing a problem statement helps to identify the purpose of the project clearly.

A problem statement consists of 3 parts namely:

1) Ideal

2) Reality

3) Consequences

1) Ideal : cloud computing provides users with a convenient mechanism to

manage their personal files with a notion called database-as-service (DAS).

In DAS schemes, user outsources his encrypted files to proxy server so, that the

burden of maintaining large amount of files on local system can be reduced.

Page 6: PPT FOR IDBSDDS SCHEMES

IBSDDS SCHEMES

2) Reality: Security and privacy are biggest concerns of each and every user.

Some user might feel uncomfortable in surrendering their personal data to a third

party.

No guarantee to files outsourced to proxy servers.

As the applications and services run on remote third party environments, users have

limited control over the function and execution of software and hardware.

3) Consequences: In response to above problem, Identity based secure distributed

datastorage schemes were proposed.

In this IBSDDS proxy server validates the outsourced cipher text and store them.

To prevent unauthorized access proxy validates user by his id and password.

Page 7: PPT FOR IDBSDDS SCHEMES

IBSDDS SCHEMES

LITERATURE SURVEY

Atomic proxy crypto system where a semi-trusted proxy server can transfer a

cipher text of the original decryptor to a cipher text for the designated decryptor

without knowing plain text. It is used in e-mail forwarding.

Identity based crypto system introduced by shamir. It is a system where the public

key can be arbitrary string and secret key is issued by trusted third party.

Page 8: PPT FOR IDBSDDS SCHEMES

IBSDDS SCHEMES

Identity-based proxy encryption (IBPE) was proposed by Ivan and Dodis .

In these schemes, the master secret key which is used to extract secret keys for

users is split into 2 parts one is sent to proxy server other is sent to user.

The user can decrypt cipher text with the help of proxy server, but these

schemes are not secure against collusion attacks.

Identity- based proxy re-encryption proposed by green and ateniese. Where

proxy server can transfer a cipher text of original decryptor to cipher text of

designated decryptor after he gets a re-encryption key.

Page 9: PPT FOR IDBSDDS SCHEMES

IBSDDS SCHEMES

EXISTING SYSTEM Cloud computing provides users with convenient mechanism to manage their

personal files with notation called database as a service (DAS).

Proxy server can perform some functions on outsourced cipher texts without

knowing anything about original files.

Therefore, how to guarantee the outsourced files are not accessed by users

unauthorized users and not modified by proxy severs is an important problem that

has been considered in data storage research community.

Page 10: PPT FOR IDBSDDS SCHEMES

IBSDDS SCHEMES

DISADVANTAGES OF EXISTING SYSTEM

Users are especially concerned on the confidentiality, integrity and query of

outsourced files as cloud computing is complicated than local data storage systems,

as cloud is managed by untrusted third party.

There is no guarantee that the outsourced files are not accessed by unauthorized

users and not modified by proxy severs is an important problem.

Page 11: PPT FOR IDBSDDS SCHEMES

IBSDDS SCHEMES

PROPOSED SYSTEM

In proposed project for one query, the receiver can access one of the owner’s file

instead of accessing all files.

An access permission is bound not only to the identity of receiver but also to the

file.

The access permission can be decided by owner, instead of trusted third party.

Proposed project is secure against collusion attacks.

Page 12: PPT FOR IDBSDDS SCHEMES

IBSDDS SCHEMES

ADVANTAGES OF PROPOSED SYSTEM

It has 2 schemes of security:

i) the first scheme is secure against chosen plain text attacks (CPA).

ii) the second scheme is secure against chosen cipher text attacks (CCA).

For one query, a receiver can access only one file , instead of all files of the owner.

To achieve stronger security and implement file based access control ,the owner

must be online to authenticate requesters and also generate access permissions for

them.

Page 13: PPT FOR IDBSDDS SCHEMES

IBSDDS SCHEMES

STEPS INVOLVED IN IBSDDS SCHEME IMPLEMENTATION ARE:

STEP 1:

The file owner encrypts his files under his identity prior to outsourcing a files to

proxy servers.

STEP 2:

He (owner of file) sends cipher texts to proxy servers (as he encrypted his files

under his identity in step1 so that cipher text is generated ).

STEP 3 :

Proxy server transforms a cipher text encrypted under identity of the owner to a

cipher text encrypted under the identity of receiver, only after the receiver has

obtained access permission from owner of the file (file owner).

Page 14: PPT FOR IDBSDDS SCHEMES

IBSDDS SCHEMES

REQUIREMENT SPECIFICATION

HARDWARE REQUIREMENTS:

Hardware - Pentium IV

Speed - 1.1 GHz

RAM - 1GB

Monitor - SVGA

Page 15: PPT FOR IDBSDDS SCHEMES

IBSDDS SCHEMES

SOFTWARE REQUIREMENTS:

Operating System : Windows xp/ 7/8

Technology : Java

IDE : My Eclipse

Web Server : Tomcat

Database : My SQL

Java Version : JDK1.7

Page 16: PPT FOR IDBSDDS SCHEMES

IBSDDS SCHEMES

MODULES IBSDDS scheme consists of 4 modules :

i) Data Storage system

ii) File system

iii) Storage-based Intrusion detection system

iv) Cryptographic File System

Page 17: PPT FOR IDBSDDS SCHEMES

IBSDDS SCHEMES

MODULE - 1

1) Data Storage system : Data storage system enable user to store their data to

external proxy server to enhance access and availability and reduce maintenance

cost.

Page 18: PPT FOR IDBSDDS SCHEMES

IBSDDS SCHEMES

MODULE - 2

2) File System: In these systems, proxy servers are assumed to be trusted.

Proxy authenticate receivers and validate access permissions.

The interactions between the proxy servers and receivers are executed in a secure

channel.

In these schemes, a receiver authenticates himself to the proxy server using his

password

Page 19: PPT FOR IDBSDDS SCHEMES

IBSDDS SCHEMES

MODULE - 3

Storage-based Intrusion Detection System: In this systems, an intrusion detection

scheme is embedded in proxy servers or the file owner to detect the intruder’s

behaviors, such as adding backdoors, inserting Trojan horses and tampering with

audit logs.

These schemes can be classified into two types:

i) Host-based system and

ii) Network-based system.

Page 20: PPT FOR IDBSDDS SCHEMES

IBSDDS SCHEMES

MODULE - 4

Cryptographic File System: In these systems, an end to-end security is provided

by cryptographic protocols which are executed by the file owner to prevent proxy

servers and unauthorized users from modifying and accessing the sensitive files.

These systems can be divided into two types:

1) Shared file system and

2) Non-shared system

Page 21: PPT FOR IDBSDDS SCHEMES

IBSDDS SCHEMES

CLASS DIAGRAM

Page 22: PPT FOR IDBSDDS SCHEMES

IBSDDS SCHEMES

USECASE DIAGRAM

Page 23: PPT FOR IDBSDDS SCHEMES

IBSDDS SCHEMES

SEQUENCE DIAGRAM

Page 24: PPT FOR IDBSDDS SCHEMES

IBSDDS SCHEMES

ACTIVITY DIAGRAM

Page 25: PPT FOR IDBSDDS SCHEMES

IBSDDS SCHEMES

TECHNOLOGIES

Java MYSQL

Page 26: PPT FOR IDBSDDS SCHEMES

IBSDDS SCHEMES

SCREEN SHOTS

Screen shot 1: Welcome page

Page 27: PPT FOR IDBSDDS SCHEMES

IBSDDS SCHEMES

Screen shot 2: Registration page

Page 28: PPT FOR IDBSDDS SCHEMES

IBSDDS SCHEMES

Screenshot 3: Login page

Page 29: PPT FOR IDBSDDS SCHEMES

IBSDDS SCHEMES

Screen shot 4: Data owner choosing a file from system to upload

Page 30: PPT FOR IDBSDDS SCHEMES

IBSDDS SCHEMES

Screenshot 5: Proxy server providing key

Page 31: PPT FOR IDBSDDS SCHEMES

IBSDDS SCHEMES

Screenshot 6: Proxy server user authentication page

Page 32: PPT FOR IDBSDDS SCHEMES

IBSDDS SCHEMES

Screen shot 7: Welcome page for authorized user

Page 33: PPT FOR IDBSDDS SCHEMES

IBSDDS SCHEMES

Screen shot 8:User enter’s secret key to view files

Page 34: PPT FOR IDBSDDS SCHEMES

IBSDDS SCHEMES

Screen shot 9: User chooses a file to view

Page 35: PPT FOR IDBSDDS SCHEMES

IBSDDS SCHEMES

Screen shot 10: Proxy server asks for random key to view file

Page 36: PPT FOR IDBSDDS SCHEMES

IBSDDS SCHEMES

Screen shot 11:Encrypted format file is accessed to user

Page 37: PPT FOR IDBSDDS SCHEMES

IBSDDS SCHEMES

Screen shot 12: Proxy server asks for random key (to decrypt file).

Page 38: PPT FOR IDBSDDS SCHEMES

IBSDDS SCHEMES

Screen shot 14: Decrypted File is accessed to user

Page 39: PPT FOR IDBSDDS SCHEMES

IBSDDS SCHEMES

CONCLUSION

Distributed data storage schemes provide the users with convenience to outsource their files to

untrusted proxy servers. Identity-based secure distributed data storage (IBSDDS) schemes are

a special kind of distributed data storage schemes where users are identified by their identities

and can communicate without the need of verifying the public key certificates.

Page 40: PPT FOR IDBSDDS SCHEMES

IBSDDS SCHEMES

FUTURE ENHANCEMENTS

Future enhancements for identity-based secure distributed data storage (IBSDDS) are to allow

user to upload PDF files and excel sheets. Future research will include advancements like

uploading the pictures, images, videos in encrypted format for user convenience.

Page 41: PPT FOR IDBSDDS SCHEMES

IBSDDS SCHEMES

REFERENCES

Jinguang Han, Student Member, IEEE, Willy Susilo, Senior Member, IEEE, and Yi Mu, Senior Member, IEEE-“Identity-Based Secure Distributed Data Storage Schemes”-IEEE TRANSACTIONS ON COMPUTERS, 2013.

Page 42: PPT FOR IDBSDDS SCHEMES

IBSDDS SCHEMES

THANK YOU