Dual Access Control For Cloud Based Data Storage and Sharing 298tq7wg
Dual Access Control For Cloud Based Data Storage and Sharing 298tq7wg
-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
potential contenders for securing data in cloud-based
storage services. In specifically, Ciphertext-Policy
ABSTRACT ABE (CP-ABE) offers a reliable method of data
encryption that enables the specification of access
Due to its effective and affordable administration, policies, which specify the rights of possible data
cloud-based data storage has recently attracted receivers, over encrypted data. Please take note that
growing interest from academia and business. As in this research, we examine the usage of CP-ABE in
services are delivered via an open network, it is our method. Nevertheless, using the CP-ABE
critical for service providers to adopt secure data approach alone is insufficient to create a
storage and sharing mechanisms to protect user sophisticated system that ensures the control of both
privacy and the confidentiality of data. The most data access and download requests.
popular technique for preventing the compromise of
sensitive data is encryption. The practical necessity Objective:
for data management, however, cannot be
adequately addressed by just encrypting data. The primary goal of this project is to offer uploaded
Moreover, a strong access control over download data. Data owners alone will be in charge of dual
requests should be taken into account to prevent access control; no outside parties are involved. They
Economic Denial of Sustainability attacks from will obtain the data that was uploaded to the cloud at
being conducted to prevent users from using the the request of data users with the assistance of data
service. Each of the two dual access control systems owners. The cloud service encrypts the data and
is intended for a different planned context.We create distributes the key to the data consumers.
a technique for controlling download requests
without sacrificing security or effectiveness. There is Scope of the Project:
also a presentation of the systems' experimental and
security analyses. The project's primary objective is to provide a
privacy-enabled and secure cloud project that will be
used by AMAZON WEB SERVICES (AWS).
Keywords: Cloud-based data sharing, Access Services include preventing Denial of Sustainability
Control, Cloud Storage Service, Attribute Based assaults and providing privacy, encryption, and
Encryption. encryption.
Existing System:
Problem Statement:
The current method compromises security and
privacy by utilizing standard servers to store and As the key management server only contains the
share data. There is a danger that our data will be document metadata in encrypted format and the
stolen. This is the primary flaw in the current application server will have encrypted documents, a
method, thus to get around it, we may use the cloud administrator won't be able to decrypt any
suggested solution. documents. The papers will remain secure as a
Drawbacks : consequence. For dual access control, we proposed
an identity key verification technique.
• It makes extensive use of arithmetic. The goal of this project is to provide a Secured and
Privacy-Enabled The privacy, encryption, and
• Reduced security. decryption services provided by cloud projects
prevent Deny of Sustainability assaults.
• Analysis of the saved document is
challenging. Proposed System:
In the proposed system, we suggest a novel method
• The length of time it takes to search through in the proposed system called dual access control.
the database of saved documents is linear. One of the potential options for securing data in
cloud-based storage services is attribute-based
Literature Review: encryption, which allows for both fine-grained
management and the secrecy of outsourced data.
For flexible data exchange, attribute-based
encryption and searchable encryption are combined. Process:
Safe cloud storage is regarded as one of the most STEP-1: Install the necessary applications
critical problems that both enterprises and end users STEP-2: Defining the links to the databases.
must address before transferring their sensitive data STEP-3: Establish all of the database tables needed for
to the cloud. Recently, we've seen several intriguing this project.
techniques based on either the promising notion of STEP-4: Redesign the HTML and CSS pages.
Symmetric Searchable Encryption (SSE) or the well- STEP-5: Construct the project using the modules.
studied topic of Attribute-Based Encryption (ABE). STEP-6: Launch the Python program (app.py), copy
In the first scenario, researchers are attempting to the link, paste it in any browser, and then proceed as
build protocols that would safeguard users' data from directed.
both internal and external threats while ignoring the
issue of user revocation. In the second scenario, Architecture:
however, current alternatives handle the issue of
revocation. Our dual access control system topologies for cloud
data sharing are displayed. The systems specifically
The overall efficiency of these systems is include the following entities.
jeopardized, however, because the suggested
protocols are purely based on ABE schemes, and the
quantity of the created ciphertexts and the time
required to decrypt rises in direct proportion to the
complexity of the access formula. In this research,
we present a protocol that combines SSE and ABE
while using the fundamental benefits of each
approach. The proposed protocol allows users to
search directly over encrypted data using an SSE
method, while the matching symmetric key required
for decryption is safeguarded using a Ciphertext-
Policy Attribute-Based Encryption scheme. and
searchable encryption to allow for more flexible data
exchange.
• The cloud's call request is handled by Enclave. • Collecting and analysis of needs – at this stage,
all potential system requirements are gathered
and recorded in a requirement specification
document.
Module Description: • System Design – In this step, the required
specifications from the previous phase are
1. Data Owner : examined, and the system design is created. In
Register: addition to describing the overall system
Data owner can Register and login with valid architecture, this system design aids in
credentials identifying the hardware and system
Upload File: requirements.
Data provider can upload the file.
View File: • Implementation: Using feedback from the
Data Owner can view uploaded file once means system design, the system is initially created as
whether the file is correctly uploaded or not. a series of compact programmes known as units.
These units are then merged in the next step.
2. Data User : Unit testing is the process of developing and
Register: evaluating each unit for functionality.
Data user can do registration with his details. • Integration and Testing – Following the testing
Login: of each unit created during the implementation
The user needs to register and the data stored in phase, the entire system is integrated. The
MySQL database. entire system is tested for errors and failures
Search a File: after integration.
Data user can search a file based on the keyword ,if
• System deployment – After functional and non-
file is available then user can view file and send
request to cloud to download the file. functional testing, the product is either provided
Get Key & Download to customers or deployed in their environments.
Once User Request can accept get the key to cloud • Maintenance – The client environment
provider user can download the file. occasionally experiences problems. Patches are
published to address certain problems.
Moreover, various improved versions of the
Implementation :
This explains how the system functions. When we
have loaded all the libraries, the data owners will
upload and store the data to the cloud. Afterwards,
people who require the data will submit requests to
the data owners. The data owners will then see the
request.
Requirement specifications:
● Operating System : Windows 7/8/9
● IDE : Pycharm
● Server side scripts : HTML, CSS, JS
● Libraries Used : Numpy, IO, OS, sklearn,
Flask
● Technology : Python