An Effective Mechanism of Access Control With The Ability of Attribute Update and Outsourcing For Cloud Computing
An Effective Mechanism of Access Control With The Ability of Attribute Update and Outsourcing For Cloud Computing
An Effective Mechanism of Access Control With The Ability of Attribute Update and Outsourcing For Cloud Computing
to end users.
guaranteeing data confidentiality and fine-grained data access control. It enables data owners to define
• However, in CP-ABE systems, the problems of the time required to encrypt, decrypt and attribute update are
long-standing unsolved in the literature. In this paper, we propose the first access control (CP-ABE) scheme
• Specifically, the heavy computation operations of encryption and decryption are outsourced to fog nodes,
thus the computation operations for data owners to encrypt and users to decrypt are irrelevant to the number
• The cost brought by attribute update is efficient in the sense that we only concentrate on the update of the
ciphertext associated with the corresponding updated attribute. The security analysis shows that the
proposed scheme is secure under the decisional bilinear Diffie–Hellman assumption. The proposed scheme
is efficient, and the time of encryption for data owners and decryption for users are small and constant.
Existing System
• Existing System
• Match in My Way: Fine-Grained Bilateral Access Control for
Secure Cloud-Fog Computing
• Drawbacks
• Revocability and traceability is not considered whereas the
efficiency MABE system with some practical properties has to
be considered.
Proposed System
• Proposed System
• An effective mechanism of access control with the ability of attribute update and
outsourcing for cloud computing. In this approach an effective security mechanism is
introduced to meet the security challenges.
• Advantage
• An efficient access control scheme with outsourcing capability and attribute update for
fog computing is proposed, where the outsourcing method is presented to eliminate
the computational overhead of encryption and decryption with the help of fog nodes,
and the updating method is presented to address the attribute update problem
Modules
• Modules
• System Initialization
• Secret key Generation
• File Encryption
• File Decryption
• Updation
• Proofing the security
•
Hardware Requirements:
System : Pentium IV 2.4 GHz.
Hard Disk : 40 GB.
Floppy Drive : 1.44 Mb.
Monitor : 15 VGA Colour.
Mouse : Logitech.
Ram : 256 Mb.
Software Requirements:
Operating system :- Windows XP Professional
Tool :NETBEANS
CONCLUSION
• In this project, we developed problems of data sharing in cloud-fog computing and produced a secure
• The system model and the threat model were presented for our proposed system.
• To provide secure data sharing, we introduced a matchmaking attribute-based encryption with a formal
definition, and security models, which supports the receiver identifying ciphertexts from undesirable senders
• Moreover, the workload of senders verification can be outsourced to the fog nodes. We believe that our
proposed matchmaking attribute-based encryption finds many applications for providing data privacy and
• The future work could be investigating a more efficiency MABE system with some practical properties (e.g.,