You are on page 1of 12

A Seminar Report

on

“MY TITLE GOES HERE ”


Submitted by

Author
[ Exam no: ]
Guided by
GUIDE NAME
in partial fulfillment for the award of degree
of

MASTER OF ENGINEERING
in
COMPUTER ENGINEERING
At

Department of Computer Engineering


Matoshri College of Engineering and Research
Centre,Nashik
UNIVERSITY OF PUNE
October, 2016
DEPARTMENT OF COMPUTER ENGINEERING

Matoshri Education Society’s


Matoshri College of Engineering and Research Centre,Nashik

CERTIFICATE

This is to certify that NAME Exam No:[ ] from ME Computer En-


gineering has successfully completed her seminar work-II on “TITLE”
at Matoshri College of Engineering and Research Centre, Nashik in
partial fulfillment for the award of the Master Degree in Computer
Engineering.

GUIDE Dr. V. H. Patil Dr. G. K. Kharate


Project Guide Head Principal
ACKNOWLEDGEMENT

Inspiration and guidance are invaluable in every aspect of life, especially in


the field of education, which I have received from our respected Head Dr. Varsha
H. Patil who has guided me in seminar work and gave earnest co-operation whenever
required. I would like to express my sincere gratitude towards her.
I am pleased to announce that my presentation of the seminar work as well as
the report would not have been completed without the able guidance and complete
support of Prof. S.A. Bhavsar who helped me at each and every step in every pos-
sible way. She always provided me with access to the latest technology and facilities
and encouragement at every point and took active participation in the achievement
of my objective. Heartfelt my foremost thanks go to seminar guide and help of my
well-wishers and colleagues.
At last, I would like to take this opportunity to convey thanks to all my staff
members, who directly or indirectly encouraged and helped me to complete my work
on time and contributed their valuable time in helping me to achieve success in this
seminar work.

NAME
[ME Second Year Computer Engineering, Roll no.:-08 ]

i
ABSTRACT

YOUR ABSTRACT GOES HERE


Keyword :YOUR KEYWORDS

ii
INDEX

Acknowledgement i

Abstract ii

Table of Contents ii

List of Figures iv

1 Introduction 1
1.1 Organization of Report . . . . . . . . . . . . . . . . . . . . . . . . . . 1

2 Related Work 2
2.1 ANY SUBTITLE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
2.1.1 ANY SUB-SUBTITLE . . . . . . . . . . . . . . . . . . . . . . 2
2.1.2 SUBTITLE . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
2.2 NEXT SECTION . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2

3 NEXT CHAPTER 3

4 CONCLUSION 5

References 6

iii
List of Figures

3.1 Ontology representing the Authorization Model . . . . . . . . . . . . 4

iv
Chapter 1

Introduction

YOUR [1] INTRODUCTION

1.1 Organization of Report

Further Report [2] is organized into chapters as presented below.


Chapter 2 Which includes survey on existing system, its methodology, Also limita-
tion of existing system and proposed system architecture are discussed which shows
how proposed system overcome the limitations of existing system.
Chapter 3 Presents Proxy Re-Encryption and Identity-Based Encryption techniqes
as basis.
Chapter 4 Authorization Model used for protection of data on cloud systems.
Chapter 5Presents Data-Centric Solution for Data Protection in the Cloud
Chapter 6 It concludes the proposed work and also future scope of the system.

1
Chapter 2

Related Work

This section studies and identifies various earlier techniques used for protection of
data on cloud systems.
DATA1
2
3

2.1 ANY SUBTITLE

DATA

2.1.1 ANY SUB-SUBTITLE

DATA

2.1.2 SUBTITLE

DATA

2.2 NEXT SECTION

DATA

2
Chapter 3

NEXT CHAPTER

SecRBAC makes use of cryptography to protect data when moved to the Cloud.
Advanced cryptographic techniques are used to protect the authorization model in
order to avoid the CSP being able to disclose data without data owner consent.
Concretely, the solution is based on Proxy Re-Encryption (PRE). A PRE scheme [10]
is a cryptographic scheme that enables an entity called proxy to re-encrypt data from
one key to another without being able to decrypt it. That is, given a couple of key
pairs α and β, the proxy could re-encrypt a ciphertext cα encrypted under α public
key to another ciphertext cβ that can be decrypted using β private key.
Using this kind of cryptography, a user uα can encrypt a piece of data m using
his own public key pubα to obtain a ciphertext cα . A re-encryption key rkα−>β can
be generated for a proxy to re-encrypt from α to β, thus transforming cα to another
ciphertext cβ . Then, another user uβ can use his own private key privβ to decrypt cβ
and obtain the plain piece of data m.
Several works in this direction have arisen, resulting in diverse Proxy Re-Encryption
schemes with different features. The solution proposed in this paper is not tied to a
concrete PRE scheme or implementation. However, not all the available PRE schemes
are suitable to achieve the goals of this research. In order to characterize and compare
different schemes, provided a set of features relevant to proxy re-encryption. Based
on this characterization, the following set of features are required by the Proxy Re-
Encryption scheme used for the proposal in this paper:

• Unidirectionality
A unidirectional scheme enables the generation of a re-encryption key rkα−>β
without allowing re-encryption from β to α.

3
TITLE 4

• Non-interactivity
A non-interactive scheme enables a user uα to construct a re-encryption key
rkα−>β without the participation of uβ or any other entity.

• Multi-use
A multi-use scheme enables the proxy to perform multiple re-encryption oper-
ations on a single ciphertext. That is, to re-encrypt from cα to cβ , from cβ to
cγ and so on.

Figure 3.1: Ontology representing the Authorization Model

Department of Computer Engineering,MCERC,Nashik.


Chapter 4

CONCLUSION

This work proposes a data-centric authorization solution for the secure protec-
tion of data in the Cloud. SecRBAC allows managing authorization following a
rule-based approach and provides enriched role-based expressiveness including
role and object hierarchies.This work also provides guidelines for deployment in
a Cloud Service Provider have been also given, including an hybrid approach
compatible with Public Key Cryptography that enables the usage of standard
PKI for key management and distribution.The work can be extend to cover the
approaches such as modification and deletion of data in the Cloud by using
analysis of novel cryptographic techniques that could enable the this deletion
and modification.

5
Bibliography

[1] A. Lawall, D. Reichelt, and T. Schaller, Resource management and autho-


rization for cloud services, in Proceedings of the 7th International Confer-
ence on Subject-Oriented Business Process Management, ser. S-BPM ONE
15, New York, NY, USA, 2015, pp. 18:118:8.
[2] D. Y. Chang, M. Benantar, J. Y.-c. Chang, and V. Venkataramappa, Au-
thentication and authorization methods for cloud computing platform se-
curity, Jan. 1 2015, uS Patent 20,150,007,274.

You might also like