Abstract
Cloud storage facilitates both individuals and enterprises to
cost effectively share their data over the Internet.However, this also brings
difficult challenges to the access control of shared data since few cloud
servers can be fully trusted. Ciphertext-policy attribute-based encryption
(CP-ABE) is a promising approach that enables the data owners themselves to
place fine-grained and cryptographically-enforced access control over
outsourced data. In this paper, we present secure and cost-effective attribute-based
data access control for cloud storage systems. Specifically, we construct a
multiauthority CP-ABE scheme that features: 1) the system does not need a fully
trusted central authority, and all attribute authorities independently issue
secret keys for users; 2) each attribute authority can dynamically remove any
user from its domain such that those revoked users cannot access subsequently
outsourced data; 3) cloud servers can update the encrypted data from the
current time period to the next one such that the revoked users cannot access
those previously available data; and 4) the update of secret keys and
ciphertext is performed in a public way. We show the merits of our scheme by
comparing it with the related works, and further implement it to demonstrate
its practicality. In addition, the proposed scheme is proven secure in the
random oracle model.
CONCLUSION
In this paper, to build a secure and cost-effective
multiauthority attribute-based access control scheme for data sharing in cloud
storage systems, we proposed a multiauthority CP-ABE scheme supporting scalable
user revocation and public ciphertext update. The proposed scheme achieves the
intended security properties Any Query Call Us: 9566355386
of forward security and
backward security, and can also withstand decryption key exposure. We proved
the security of the proposed scheme in the random oracle model. Both
performance discussions and implementation experiments show that our scheme is
more desirable for practical applications.
SYSTEM REQUIREMENTS:
HARDWARE REQUIREMENTS:
• System : Pentium IV
2.4 GHz.
• Hard Disk : 40 GB.
• Floppy Drive : 1.44
Mb.
• Monitor : 15 VGA
Colour.
• Mouse : Logitech.
• Ram : 512 Mb.
SOFTWARE REQUIREMENTS:
• Operating system : -
Windows XP/7.
• Coding Language :
JAVA/J2EE
• Data Base : MYSQL
REFERENCES
[1] A. Sahai and B. Waters, ―Fuzzy identity-based
encryption,‖ in Proc. Adv. Cryptol.—EUROCRYPT 2005. New York, NY, USA:
Springer, 2005, pp. 457–473.
[2] V. Goyal, O. Pandey, A. Sahai, and B.Waters, ―Attribute-based
encryption for fine-grained access control of encrypted data,‖ in Proc.
13th ACMConf. Comput. Commun. Security, 2006, pp. 89–98. Any
Query Call Us: 9566355386
[3] J. Bethencourt, A. Sahai, and B.Waters,
―Ciphertext-policy attribute-basedencryption,‖ in Proc. IEEE
Security Privacy 2007, 2007, pp. 321–334.