Professional Documents
Culture Documents
WITH MULTI-AUTHORITIES
Submitted by
Tejaswini R M
5ZF11SSZ22
INTRODUCTION
Cloud storage is an important service of cloud computing.
Data access control is an effective way to ensure the data security in
the cloud.
Cloud storage service separates the roles of the data owner from the
data service provider, and the data owner does not interact with the
user directly for pro-viding data access service.
To prevent the untrusted servers from accessing sensitive data,
traditional methods usually encrypt the data and only users holding
valid keys can access the data.
These methods incur high storage overhead on the server, because
the server should store multiple encrypted copies of the same data
for users with different keys.
2
EXISTING SYSTEM
Due to data outsourcing and untrusted cloud servers, the data access control
systems, because they either produce multiple encrypted copies of the same
data or require a fully trusted cloud server.
PROBLEM STATEMENT
Cloud storage service separates the roles of the data owner from the data
service provider.
The data owner does not interact with the user directly for providing data
access service, which makes the data access control a challenging issue in
cloud storage systems.
The cloud server cannot be fully trusted by data owners, traditional server-
PROPOSED
SYSTEM
SYSTEM ARCHITECTURE
User
Cloud
Display File
UID,GPK,GS
K
Request File
CID File
Upload File
Control
Agent
AID
Secret Key
OID, Owner
Key
Owne
r
TPA
Attribut
e
Upload File
User
Name, IP address,
attr name, sector
name
Packet
s
Request
Request
Processin
g
UID
Response
Owne
r
Token
processi
ng
Name, IP
address
Login
process
and
generate
Id
OID
Name, IP
address
UID
Attribute
Secret Key
UID ,
Attribute
name
AID
CID
Name, IP
address
Requestin
g Secret
Key
Secret Ke
User
Cloud
File
ID
Cipher
Cipher
Text
File
File
Downloade
d
Reques
t for
File
Generat
e Key
Decrypt
using token
+Global
Private Key
+ Owner Key
Select no. of
Owners &
login ID OID
Select no. of
Cloud
Servers with
their login
Upload any
no. of file to
cloud from
owner
Implemen
t
Encryptio
n
Algorithm
Send a token
for reading
deciphered
text
Send Secret
Key &
Global Public
Key to Cloud
Implement
Decryption
Algorithm
Select File to
be
Downloaded
Send Secret
key to user
from
attribute
Use Random
Key
Generator
Algorithm
9
Control Agent
Module
Generate
UID,GPK
Generate
OID
Generate
AD
Generate
OID
TPA
10
User Module
Request
File
Download
File
Send
Secret Key
& GPK
Decrypt
Key
11
Owner
Module
Upload File
Authenticat
e Download
Generate
Secret Key
Send
owner key
12
Cloud Module
Request
File
Download
File
Send
Secret Key
& GPK
Send
Token
TPA
13
Attribute Module
Send
Agent
Authenticat
e User
14
Modules
Network Configuration Module
Input:- User Inputs (User Name, IP Address, Attribute Names,
15
Modules
Encryption/Decryption Module
Input:- Files (Data Files)
Output:- Encrypted/Decrypted Files (Encrypted data)
Key
IMPLEMENTATION
We encrypt the data using the Global public key
17
RSA ALGORITHM
each user generates a public/private key pair by:
selecting two large primes at random - p, q
computing their system modulus N=p.q
note (N)=(p-1)(q-1)
selecting at random the encryption key e
Conclusion
19
REFERENCES
[1] P. Mell and T. Grance, The NIST definition of cloud computing,
National Institute of Standards and Technology, Tech. Rep., 2009.
[2] J. Bethencourt, A. Sahai, and B. Waters, Ciphertext-policy
20
THANK YOU!
21