Abstract—People
endorse the great power of cloud computing, but cannot fully trust the cloud
providers to host privacy-sensitive data, due to the absence of user-to-cloud
controllability. To ensure confidentiality, data owners outsource encrypted
data instead of plaintexts. To share the encrypted files with other users,
Ciphertext-Policy Attribute-based Encryption (CP-ABE) can be utilized to
conduct fine-grained and owner-centric access control. But this does not
sufficiently become secure against other attacks. Many previous schemes did not
grant the cloud provider the capability to verify whether a downloader can
decrypt. Therefore, these files should be available to everyone accessible to
the cloud storage. A malicious attacker can download thousands of files to launch
Economic Denial of Sustainability (EDoS) attacks, which will largely consume
the cloud resource. The payer of the cloud service bears the expense. Besides,
the cloud provider serves both as the accountant and the payee of resource
consumption fee, lacking the transparency to data owners. These concerns should
be resolved in real-world public cloud storage. In this paper, we propose a
solution to secure encrypted cloud storages from EDoS attacks and provide
resource consumption accountability. It uses CP-ABE schemes in a black-box
manner and complies with arbitrary access policy of CP-ABE. We present two
protocols for different settings, followed by performance and security
analysis.
CONCLUSION
In this paper, we propose a
combined the cloud-side and data owner-side access control in encrypted cloud
storage, which is resistant to DDoS/EDoS attacks and provides resource
consumption accounting. Our system supports arbitrary CP-ABE constructions. The
construction is secure against malicious data users and a covert cloud
provider. We relax the security requirement of the cloud provider to covert
adversaries, which is a more practical and relaxed notion than that with
semi-honest adversaries. To make use of the covert security, we use bloom
filter and probabilistic check in the resource consumption accounting to reduce
the overhead. Performance analysis shows that the overhead of our construction
is small over existing systems.
SYSTEM REQUIREMENTS:
HARDWARE REQUIREMENTS:
•
System : Pentium IV 2.4 GHz.
• Hard
Disk : 40 GB.
•
Floppy Drive : 1.44 Mb.
•
Monitor : 15 VGA Colour.
•
Mouse : Logitech.
• Ram : 512 Mb.
SOFTWARE REQUIREMENTS:
•
Operating system : - Windows XP/7.
•
Coding Language : JAVA/J2EE
• Data Base : MYSQL