Professional Documents
Culture Documents
Attribute-based Encryption
Project members:
Project Guide:
ABSTRACT
Cloud storage services have become increasingly popular. Because of
INTRODUCTION
CLOUD storage is an important service of cloud computing which offers
services for data owners to host their data in the cloud. This new paradigm
of data hosting and data access services introduces a great challenge to
data access control.
In multi-authority cloud storage systems, users attributes can be changed
dynamically. A user may be entitled some new attributes or revoked some
current attributes. And his permission of data access should be changed
accordingly.
However, existing attribute revocation methods either rely on a trusted
server or lack of efficiency, they are not suitable for dealing with the
attribute revocation problem in data access control in multi-authority
cloud storage systems.
EXISTING SYSTEM
Most previous deniable encryption schemes, we do not use
PROPOSED SYSTEM
Techniques used in previous deniable encryption schemes, we
build two encryption environments at the same time, much like the
idea proposed in .We build our scheme with multiple dimensions
while claiming there is only one dimension.
This approach removes obvious redundant parts. We apply this
idea to an existing ABE scheme by replacing prime order groups
with composite order groups. Since the base ABE scheme can
encrypt one block each time, our deniable CPABE is certainly a
block wise deniable encryption scheme.
Though the bilinear operation for the composite order group is
slower than the prime order group, there are some techniques that
can convert an encryption scheme from composite order groups to
prime order groups for better computational performance.
HARDWARE REQUIREMENTS:
System
Hard Disk
Floppy Drive
Monitor
Mouse
Ram
:
:
SOFTWARE REQUIREMENTS:
Operating system
Coding Language
Database
:
:
Windows XP/7.
:
ASP.NET, C#.
SQLSERVER 2008
MODULES
HOME
ADMIN
USER
SIGN-OUT
ABOUT US
MODULES DESCRIPTION
USER MODULE
In this module, user should register their details and get the secret key
for login and user can uploaded files the users are able to access the
content stored in the cloud, depending on their access rights which are
authorizations granted by the admin, like the rights re-store the modified
data in the cloud.
ADMIN MODULE
This module is used to help the client to search the file using the file id
and file name .If the file id and name is incorrect means we do not get
the file, otherwise server ask the public key and get the encryption File.
If you want the decryption file means user have the secret key.
CONCLUSION
In this paper, we proposed a revocable multi-authority CPABE
THANK YOU