0% found this document useful (0 votes)
90 views10 pages

Decentralized Access Control With Anonymous Authentication of Data Stored in Clouds

The document proposes a decentralized access control scheme for secure data storage in clouds that supports anonymous authentication. The scheme allows clouds to verify the authenticity of data without knowing the user's identity. It also provides access control such that only valid users can decrypt stored information. This prevents issues with existing centralized approaches and supports functions like data creation, modification, and reading in the cloud.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
90 views10 pages

Decentralized Access Control With Anonymous Authentication of Data Stored in Clouds

The document proposes a decentralized access control scheme for secure data storage in clouds that supports anonymous authentication. The scheme allows clouds to verify the authenticity of data without knowing the user's identity. It also provides access control such that only valid users can decrypt stored information. This prevents issues with existing centralized approaches and supports functions like data creation, modification, and reading in the cloud.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 10

Decentralized Access Control

with Anonymous Authentication


of Data Stored in Clouds
ABSTRACT

• We propose a new decentralized access control


scheme for secure data storage in clouds that
supports anonymous authentication.
• In the proposed scheme, the cloud verifies the
authenticity of the series without knowing the user’s
identity before storing data.
• Our scheme also has the added feature of access
control in which only valid users are able to decrypt
the stored information.
EXISTING SYSTEM

• Existing work on access control in cloud are


centralized in nature. Except and , all other schemes
use ABE. The scheme in uses a symmetric key
approach and does not support authentication. The
schemes do not support authentication as well.
• It provides privacy preserving authenticated access
control in cloud. However, the authors take a
centralized approach where a single key distribution
center (KDC) distributes secret keys and attributes to
all users.
DISADVANTAGES OF EXISTING
SYSTEM
• The scheme in uses asymmetric key
approach and does not support
authentication.

• Difficult to maintain because of the


large number of users that are
supported in a cloud environment.
PROPOSED SYSTEM
• We propose a new decentralized access control
scheme for secure data storage in clouds that
supports anonymous authentication.
• In the proposed scheme, the cloud verifies the
authenticity of the series without knowing the
user’s identity before storing data.
• Our scheme also has the added feature of access
control in which only valid users are able to decrypt
the stored information.
• The scheme prevents replay attacks and supports
creation, modification, and reading data stored in
the cloud.
ADVANTAGES OF PROPOSED
SYSTEM
• Distributed access control of data
stored in cloud so that only authorized
users with valid attributes can access
them.
• Authentication of users who store and
modify their data on the cloud.
• The identity of the user is protected
from the cloud during authentication.
SYSTEM ARCHITECTURE
HARDWARE REQUIREMENTS
• System : Pentium IV 2.4
GHz.
• Hard Disk : 40 GB.
• Floppy Drive : 1.44 Mb.
• Monitor : 15 VGA Colour.
• Mouse : Logitech.
• Ram : 512 Mb.
SOFTWARE REQUIREMENTS
• Operating system : Windows XP/7.
• Coding Language : JAVA/J2EE
• IDE :Netbeans 7.4
• Database :MYSQL
REFERENCES
• Sushmita Ruj,Milos Stojmenovic,
and Amiya Nayak,“Decentralized
Access Control with Anonymous
Authentication of Data Stored in
Clouds”,VOL. 25, NO. 2, FEBRUARY
2014.

You might also like