Professional Documents
Culture Documents
ABSTRACT:
Data leakage detection sharing with sensitive information hiding for secure Cloud Storage.
We show how to flexibly, securely, efficiently and share data with others in cloud storage. The
novelty is that one can aggregate any set of secret keys and make them as compact as a single key,
but encompassing the power of all the keys being aggregated. In the secret key holder can release
a constant-size aggregate key for flexible choices of cipher text set in cloud storage, but the other
encrypted files outside the set remain confidential. We describe new private-key crypto systems
which produce constant-size cipher texts such that efficient delegation of decryption rights for any
set of cipher texts are possible. This compact aggregate key can be conveniently sent to others or
be stored in a storage with secure storage. We provide formal data security analysis of our schemes
in the standard model. We also describe other application of our schemes. Our schemes give the
first asymmetric key (public-key) patient-controlled encryption for flexible hierarchy, which was
yet to be known. Encryption keys also come with two flavors one is symmetric key and another
one is asymmetric key also symmetric key (private key) are using data leakage detection sharing
with sensitive information hiding for secure cloud storage. Using symmetric encryption, when user
wants the data to be originated from admin, she has to give the encrypt or her secret key to access
the data. Otherwise it throws a fake user message to user In this authentication system, our usability
goal is to support the users in selecting better passwords, thus increases the security by expanding
the effective password space and after that Data sharing is an important functionality in cloud
storage.
I.INTRODUCTION
➢ Referring to the previous section where we selected recognition out of the three categories
in graphical password techniques and afterwards select technique as the proposed
algorithm for image gallery security. Now we will explain the steps involved during
registration and login section using this existing algorithm.
➢ The CW (Cryptographic word) schemes are not applicable whenever a malicious attack
can take place.
1.2 Proposed System
➢ In our proposed approach, the delegation of decryption can be efficiently implemented with
the aggregate key, which is only of fixed size.
➢ KEY-AGGREGATE ENCRYPTION give the framework and definition for key aggregate
encryption.
➢ We propose data allocation strategies (across the agents) that improve the probability of
identifying leakages.
For example, in enterprise settings, every employee can upload encrypted data on the
cloud storage server without the knowledge of the company’s master-secret key.
Cued Click Points (CCP) is a proposed alternative to Pass Points. In CCP, users click
one point on each of c = 5 images rather than on five points on one image. It offers cued-
recall and introduces visual cues that instantly alert valid users if they have made a mistake
when entering their latest click-point (at which point they can cancel their attempt and retry
from the beginning). It also makes attacks based on hotspot analysis more challenging, as
we discuss later. As shown in Figure 1, each click results in showing a next-image, in
effect leading users down a “path” as they click on their sequence of points.
Fig 1.1
Graphical image password is based on the click count and pixel based for authentication of
users.
The login registration compare the image click points and username password provide
the authentication.
The admin will provide the permission for files and user lock the files by a secret key.
The admin will provide the permission for files and user unlock the files by a secret key.
System Design
System design is the vital phase because input, output and database designs are done in this
phase. This is the core part of the project. It can be defined as a transition from a user’s view to
view of programmers and database personnel. It concentrates on translating to design specification.
The major steps in the design phase are input design, output design and database design.
Input design describes how we designed the input forms according to the user’s
requirements. In the same manner, the output design shows how the output forms are formatted
according to user requirements. The next step is the database design, which concentrates on
choosing the database, which suits most to the application environment. Database tables are
designed by using all necessary fields in a compact and correct manner so that redundancy and
duplication of fields can be avoided. Design is the phase were quality is fostered in software
development. Design is the only way where requirements are actually translated into finished
software products or system.
IV. SCREENSHOTS
This form is used by the administrator. The administrator has to give the permission to user to
upload files in the space provided.
Upload the files and give a security code (OTP) for the file access to reduce the data leakage
detection.
Output design
Graphical image password is based on the click count and pixel based for authentication of users.
And then upload the files and give a security code (OTP) to g-mail for the file access to reduce the
data leakage detection and identify the fake users.
After giving the secret key the file will be downloaded to the authenticated users.
V.CONCLUSION
This system has been developed as versatile and user friendly as possible keeping in mind
the advanced features in this technology. In this system, users first choose an ordered sequence of
5 clicking point and then select single image to click-draw their secrets. At the time of login phase
images appear as per the certain series. For registration, user selects 5 clicking point from the
image. User select the image clicking point one by one on X-axis and Y-axis. Based on the Cued
Click Points are a click-based graphical password scheme, on during registration. While user
coming to authentication phase, first step select images from the image pool based on image
selected by registration phase and server can generate the graphical password based on image
selection. Second step verify the registration graphical password with newly generated password
point. If both the password point are same the secrete key is generate and send to the mail-id.
Otherwise abort the user. The performance of the system proved to be efficient.
REFERENCES:
[1]S. S. M. Chow, Y. J. He, L. C. K. Hui, and S.-M. Yiu, “SPICE -Simple Privacy-Preserving
Management for Cloud Environment,”in Applied Cryptography and Network Security – ACNS
2012, ser. LNCS, vol. 7341. Springer, 2012, pp. 526–543.
[3] C. Wang, S. S. M. Chow, Q. Wang, K. Ren, and W. Lou, “Privacy-Preserving Public Auditing
for Secure Cloud Storage,” IEEE Trans.