SlideShare a Scribd company logo
Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore
www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
Control Cloud Data Access Privilege and Anonymity With
Fully Anonymous Attribute-Based Encryption
ABSTRACT:
Cloud computing is a revolutionary computing paradigm, which enables flexible,
on-demand, and low-cost usage of computing resources, but the data is outsourced
to some cloud servers, and various privacy concerns emerge from it. Various
schemes based on the attribute-based encryption have been proposed to secure the
cloud storage. However, most work focuses on the data contents privacy and the
access control, while less attention is paid to the privilege control and the identity
privacy. In this paper, we present a semi-anonymous privilege control scheme
AnonyControl to address not only the data privacy, but also the user identity
privacy in existing access control schemes. AnonyControl decentralizes the central
authority to limit the identity leakage and thus achieves semianonymity. Besides, it
also generalizes the file access control to the privilege control, by which privileges
of all operations on the cloud data can be managed in a fine-grained manner.
Subsequently, we present the AnonyControl-F, which fully prevents the identity
leakage and achieve the full anonymity. Our security analysis shows that both
AnonyControl and AnonyControl-F are secure under the decisional bilinear Diffie–
Hellman assumption, and our performance evaluation exhibits the feasibility of our
schemes.
EXISTING SYSTEM:
Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore
www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
 Various techniques have been proposed to protect the data contents privacy
via access control. Identity-based encryption (IBE) was first introduced by
Shamir, in which the sender of a message can specify an identity such that
only a receiver with matching identity can decrypt it.
 Few years later, Fuzzy Identity-Based Encryption is proposed, which is also
known as Attribute-Based Encryption (ABE).
 The work by Lewko et al. and Muller et al. are the most similar ones to ours
in that they also tried to decentralize the central authority in the CP-ABE
into multiple ones.
 Lewko et al. use a LSSS matrix as an access structure, but their scheme only
converts the AND, OR gates to the LSSS matrix, which limits their
encryption policy to boolean formula, while we inherit the flexibility of the
access tree having threshold gates.
 Muller et al. also supports only Disjunctive Normal Form (DNF) in their
encryption policy.
DISADVANTAGES OF EXISTING SYSTEM:
 The identity is authenticated based on his information for the purpose of
access control(or privilege control in this paper).
 Preferably, any authority or server alone should not know any client’s
personal information.
Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore
www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
 The users in the same system must have their private keys re-issued so as to
gain access to the re-encrypted files, and this process causes considerable
problems in implementation.
PROPOSED SYSTEM:
 The data confidentiality, less effort is paid to protect users’ identity privacy
during those interactive protocols. Users’ identities, which are described
with their attributes, are generally disclosed to key issuers, and the issuers
issue private keys according to their attributes.
 We propose AnonyControl and AnonyControl-Fallow cloud servers to
control users’ access privileges without knowing their identity information.
In this setting, each authority knows only a part of any user’s attributes,
which are not enough to figure out the user’s identity. The scheme proposed
by Chase et al. considered the basic threshold-based KP-ABE. Many
attribute based encryption schemes having multiple authorities have been
proposedafterwards.
 In our system, there are four types of entities: N Attribute Authorities
(denoted as A), Cloud Server, Data Owners and Data Consumers. A user
can be a Data Owner and a Data Consumer simultaneously.
 Authorities are assumed to have powerful computation abilities, and they are
supervised by government offices because some attributes partially contain
users’ personally identifiable information. The whole attribute set is divided
Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore
www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
into N is joint sets and controlled by each authority, therefore each authority
is aware of only part of attributes.
ADVANTAGES OF PROPOSED SYSTEM:
 The proposed schemes are able to protect user’s privacy against each single
authority. Partial information is disclosed in AnonyControl and no
information is disclosed in AnonyControl-F.
 The proposed schemes are tolerant against authority compromise, and
compromising of up to (N −2) authorities does not bring the whole system
down.
 We provide detailed analysis on security and performance to show
feasibility of the scheme AnonyControl and AnonyControl-F.
 We firstly implement the real toolkit of a multiauthority based encryption
scheme AnonyControl and AnonyControl-F.
SYSTEM ARCHITECTURE:
Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore
www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
SYSTEM REQUIREMENTS:
HARDWARE REQUIREMENTS:
 System : Pentium IV 2.4 GHz.
 Hard Disk : 40 GB.
 Floppy Drive : 1.44 Mb.
 Monitor : 15 VGA Colour.
 Mouse : Logitech.
 Ram : 512 Mb.
SOFTWARE REQUIREMENTS:
Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore
www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
 Operating system : Windows XP/7.
 Coding Language : JAVA/J2EE
 IDE : Netbeans 7.4
 Database : MYSQL
REFERENCE:
Taeho Jung, Xiang-Yang Li, Senior Member, IEEE, Zhiguo Wan, and Meng Wan,
Member, IEEE, “Control Cloud Data Access Privilege and Anonymity With Fully
Anonymous Attribute-Based Encryption”, IEEE TRANSACTIONS ON
INFORMATION FORENSICS AND SECURITY, VOL. 10, NO. 1,
JANUARY 2015.

More Related Content

What's hot (19)

PDF
Iaetsd a survey on cloud storage security with
Iaetsd Iaetsd
 
PDF
Control Cloud Data Access Privilege and Anonymity with Fully Anonymous Attrib...
1crore projects
 
DOCX
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Pvrtechnologies Nellore
 
PDF
Ijcatr04051002
Editor IJCATR
 
PDF
Secure Data Sharing Algorithm for Data Retrieval In Military Based Networks
IJTET Journal
 
PDF
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
Editor IJCATR
 
DOCX
Audit free cloud storage via deniable attribute based encryption
Mano Sriram
 
PDF
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
LeMeniz Infotech
 
PDF
Attribute-Based Encryption for Access of Secured Data in Cloud Storage
IJSRD
 
DOC
An efficient certificate less encryption for
Shakas Technologies
 
PDF
A review on key aggregate cryptosystem for scalable data sharing in cloud sto...
eSAT Journals
 
PDF
KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUD
Naseem nisar
 
PDF
ijircee_Template
ijircee
 
DOCX
JPJ1435 Secure Data Retrieval For Decentralized Disruption-Tolerant Militar...
chennaijp
 
DOC
Decentralized access control with anonymous authentication of data stored in ...
Adz91 Digital Ads Pvt Ltd
 
PPTX
Decentralized access control with anonymous authentication of data stored in ...
IGEEKS TECHNOLOGIES
 
PDF
A Survey on Access Control Mechanisms using Attribute Based Encryption in cloud
ijsrd.com
 
PPTX
A New Mode to Ensure Security in Cloud Computing Services
Mahmuda Rahman
 
PPTX
An efficient certificateless encryption for data sharing on public cloud
Abhijeet Patil
 
Iaetsd a survey on cloud storage security with
Iaetsd Iaetsd
 
Control Cloud Data Access Privilege and Anonymity with Fully Anonymous Attrib...
1crore projects
 
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Pvrtechnologies Nellore
 
Ijcatr04051002
Editor IJCATR
 
Secure Data Sharing Algorithm for Data Retrieval In Military Based Networks
IJTET Journal
 
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
Editor IJCATR
 
Audit free cloud storage via deniable attribute based encryption
Mano Sriram
 
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
LeMeniz Infotech
 
Attribute-Based Encryption for Access of Secured Data in Cloud Storage
IJSRD
 
An efficient certificate less encryption for
Shakas Technologies
 
A review on key aggregate cryptosystem for scalable data sharing in cloud sto...
eSAT Journals
 
KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUD
Naseem nisar
 
ijircee_Template
ijircee
 
JPJ1435 Secure Data Retrieval For Decentralized Disruption-Tolerant Militar...
chennaijp
 
Decentralized access control with anonymous authentication of data stored in ...
Adz91 Digital Ads Pvt Ltd
 
Decentralized access control with anonymous authentication of data stored in ...
IGEEKS TECHNOLOGIES
 
A Survey on Access Control Mechanisms using Attribute Based Encryption in cloud
ijsrd.com
 
A New Mode to Ensure Security in Cloud Computing Services
Mahmuda Rahman
 
An efficient certificateless encryption for data sharing on public cloud
Abhijeet Patil
 

Similar to Control cloud-data-access-privilege-and-anonymity-with-fully-anonymous-attribute-based-encryption-docx (20)

PPTX
A Fully Anonymous Attribute-Based Encryption to Control Cloud Data Access and...
Pawan Arya
 
PDF
Control Cloud Data Access Privilege and Anonymity with Fully Anonymous Attrib...
1crore projects
 
PDF
Control Cloud Data Access Using Attribute-Based Encryption
paperpublications3
 
PDF
Control cloud data access privilege and anonymity with fully anonymous attrib...
LeMeniz Infotech
 
DOCX
CONTROL CLOUD DATA ACCESS PRIVILEGE AND ANONYMITY WITH FULLY ANONYMOUS ATTRI...
nexgentechnology
 
DOCX
CONTROL CLOUD DATA ACCESS PRIVILEGE AND ANONYMITY WITH FULLY ANONYMOUS ATTRI...
nexgentechnology
 
DOCX
Control cloud data access privilege and
nexgentech15
 
DOCX
Control cloud data access privilege and anonymity with fully
Shakas Technologies
 
PDF
Two Aspect Validation Control Frameworks for Online Distributed Services
IRJET Journal
 
PDF
IRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET Journal
 
DOCX
CONTROL CLOUD DATA ACCESS PRIVILEGE AND ANONYMITY WITH FULLY ANONYMOUS ATTRIB...
Shakas Technologies
 
PDF
Organize Cloud Data Access Privilege and Anonymity with Fully Nameless Attrib...
rahulmonikasharma
 
PPTX
2nd rvw
Subraja Subi
 
DOCX
Control cloud data access privilege and anonymity with fully anonymous attrib...
Shakas Technologies
 
DOCX
Control cloud data access privilege and anonymity with fully anonymous attrib...
Shakas Technologies
 
PDF
Access Policy Management For OSN Using Network Relationships
IJMTST Journal
 
PDF
IRJET- Integrity Verification and Attribute based Encryption for Cloud Storage
IRJET Journal
 
DOCX
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
Shakas Technologies
 
PPTX
Final_attribute based encryption in cloud with significant reduction of compu...
Naveena N
 
A Fully Anonymous Attribute-Based Encryption to Control Cloud Data Access and...
Pawan Arya
 
Control Cloud Data Access Privilege and Anonymity with Fully Anonymous Attrib...
1crore projects
 
Control Cloud Data Access Using Attribute-Based Encryption
paperpublications3
 
Control cloud data access privilege and anonymity with fully anonymous attrib...
LeMeniz Infotech
 
CONTROL CLOUD DATA ACCESS PRIVILEGE AND ANONYMITY WITH FULLY ANONYMOUS ATTRI...
nexgentechnology
 
CONTROL CLOUD DATA ACCESS PRIVILEGE AND ANONYMITY WITH FULLY ANONYMOUS ATTRI...
nexgentechnology
 
Control cloud data access privilege and
nexgentech15
 
Control cloud data access privilege and anonymity with fully
Shakas Technologies
 
Two Aspect Validation Control Frameworks for Online Distributed Services
IRJET Journal
 
IRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET Journal
 
CONTROL CLOUD DATA ACCESS PRIVILEGE AND ANONYMITY WITH FULLY ANONYMOUS ATTRIB...
Shakas Technologies
 
Organize Cloud Data Access Privilege and Anonymity with Fully Nameless Attrib...
rahulmonikasharma
 
2nd rvw
Subraja Subi
 
Control cloud data access privilege and anonymity with fully anonymous attrib...
Shakas Technologies
 
Control cloud data access privilege and anonymity with fully anonymous attrib...
Shakas Technologies
 
Access Policy Management For OSN Using Network Relationships
IJMTST Journal
 
IRJET- Integrity Verification and Attribute based Encryption for Cloud Storage
IRJET Journal
 
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
Shakas Technologies
 
Final_attribute based encryption in cloud with significant reduction of compu...
Naveena N
 
Ad

More from Pvrtechnologies Nellore (20)

DOCX
A High Throughput List Decoder Architecture for Polar Codes
Pvrtechnologies Nellore
 
DOCX
Performance/Power Space Exploration for Binary64 Division Units
Pvrtechnologies Nellore
 
DOCX
Hybrid LUT/Multiplexer FPGA Logic Architectures
Pvrtechnologies Nellore
 
DOCX
Input-Based Dynamic Reconfiguration of Approximate Arithmetic Units for Video...
Pvrtechnologies Nellore
 
DOCX
2016 2017 ieee matlab project titles
Pvrtechnologies Nellore
 
DOCX
2016 2017 ieee vlsi project titles
Pvrtechnologies Nellore
 
DOCX
2016 2017 ieee ece embedded- project titles
Pvrtechnologies Nellore
 
DOCX
A High-Speed FPGA Implementation of an RSD-Based ECC Processor
Pvrtechnologies Nellore
 
DOCX
6On Efficient Retiming of Fixed-Point Circuits
Pvrtechnologies Nellore
 
DOCX
Pre encoded multipliers based on non-redundant radix-4 signed-digit encoding
Pvrtechnologies Nellore
 
DOCX
Quality of-protection-driven data forwarding for intermittently connected wir...
Pvrtechnologies Nellore
 
DOC
11.online library management system
Pvrtechnologies Nellore
 
DOC
06.e voting system
Pvrtechnologies Nellore
 
DOCX
New web based projects list
Pvrtechnologies Nellore
 
DOCX
Power controlled medium access control
Pvrtechnologies Nellore
 
DOCX
IEEE PROJECTS LIST
Pvrtechnologies Nellore
 
DOCX
Cloud keybank privacy and owner authorization
Pvrtechnologies Nellore
 
DOCX
Circuit ciphertext policy attribute-based hybrid encryption with verifiable
Pvrtechnologies Nellore
 
DOCX
Closeness through-microaggregation-strict-privacy-with-enhanced-utility-prese...
Pvrtechnologies Nellore
 
DOCX
A secure-anti-collusion-data-sharing-scheme-for-dynamic-groups-in-the-cloud
Pvrtechnologies Nellore
 
A High Throughput List Decoder Architecture for Polar Codes
Pvrtechnologies Nellore
 
Performance/Power Space Exploration for Binary64 Division Units
Pvrtechnologies Nellore
 
Hybrid LUT/Multiplexer FPGA Logic Architectures
Pvrtechnologies Nellore
 
Input-Based Dynamic Reconfiguration of Approximate Arithmetic Units for Video...
Pvrtechnologies Nellore
 
2016 2017 ieee matlab project titles
Pvrtechnologies Nellore
 
2016 2017 ieee vlsi project titles
Pvrtechnologies Nellore
 
2016 2017 ieee ece embedded- project titles
Pvrtechnologies Nellore
 
A High-Speed FPGA Implementation of an RSD-Based ECC Processor
Pvrtechnologies Nellore
 
6On Efficient Retiming of Fixed-Point Circuits
Pvrtechnologies Nellore
 
Pre encoded multipliers based on non-redundant radix-4 signed-digit encoding
Pvrtechnologies Nellore
 
Quality of-protection-driven data forwarding for intermittently connected wir...
Pvrtechnologies Nellore
 
11.online library management system
Pvrtechnologies Nellore
 
06.e voting system
Pvrtechnologies Nellore
 
New web based projects list
Pvrtechnologies Nellore
 
Power controlled medium access control
Pvrtechnologies Nellore
 
IEEE PROJECTS LIST
Pvrtechnologies Nellore
 
Cloud keybank privacy and owner authorization
Pvrtechnologies Nellore
 
Circuit ciphertext policy attribute-based hybrid encryption with verifiable
Pvrtechnologies Nellore
 
Closeness through-microaggregation-strict-privacy-with-enhanced-utility-prese...
Pvrtechnologies Nellore
 
A secure-anti-collusion-data-sharing-scheme-for-dynamic-groups-in-the-cloud
Pvrtechnologies Nellore
 
Ad

Recently uploaded (20)

PPTX
MARTSIA: A Tool for Confidential Data Exchange via Public Blockchain - Pitch ...
Michele Kryston
 
PPTX
The birth and death of Stars - earth and life science
rizellemarieastrolo
 
PDF
Understanding AI Optimization AIO, LLMO, and GEO
CoDigital
 
PPSX
Usergroup - OutSystems Architecture.ppsx
Kurt Vandevelde
 
PDF
Next level data operations using Power Automate magic
Andries den Haan
 
PDF
Unlocking FME Flow’s Potential: Architecture Design for Modern Enterprises
Safe Software
 
PDF
Enhancing Environmental Monitoring with Real-Time Data Integration: Leveragin...
Safe Software
 
PDF
Optimizing the trajectory of a wheel loader working in short loading cycles
Reno Filla
 
PDF
How to Visualize the ​Spatio-Temporal Data Using CesiumJS​
SANGHEE SHIN
 
PDF
Dev Dives: Accelerating agentic automation with Autopilot for Everyone
UiPathCommunity
 
PPTX
New ThousandEyes Product Innovations: Cisco Live June 2025
ThousandEyes
 
DOCX
Daily Lesson Log MATATAG ICT TEchnology 8
LOIDAALMAZAN3
 
PDF
Why aren't you using FME Flow's CPU Time?
Safe Software
 
PDF
Kubernetes - Architecture & Components.pdf
geethak285
 
PDF
GDG Cloud Southlake #44: Eyal Bukchin: Tightening the Kubernetes Feedback Loo...
James Anderson
 
PDF
“Scaling i.MX Applications Processors’ Native Edge AI with Discrete AI Accele...
Edge AI and Vision Alliance
 
PDF
Redefining Work in the Age of AI - What to expect? How to prepare? Why it mat...
Malinda Kapuruge
 
PDF
Bridging CAD, IBM TRIRIGA & GIS with FME: The Portland Public Schools Case
Safe Software
 
PPTX
01_Approach Cyber- DORA Incident Management.pptx
FinTech Belgium
 
PPTX
Reimaginando la Ciberdefensa: De Copilots a Redes de Agentes
Cristian Garcia G.
 
MARTSIA: A Tool for Confidential Data Exchange via Public Blockchain - Pitch ...
Michele Kryston
 
The birth and death of Stars - earth and life science
rizellemarieastrolo
 
Understanding AI Optimization AIO, LLMO, and GEO
CoDigital
 
Usergroup - OutSystems Architecture.ppsx
Kurt Vandevelde
 
Next level data operations using Power Automate magic
Andries den Haan
 
Unlocking FME Flow’s Potential: Architecture Design for Modern Enterprises
Safe Software
 
Enhancing Environmental Monitoring with Real-Time Data Integration: Leveragin...
Safe Software
 
Optimizing the trajectory of a wheel loader working in short loading cycles
Reno Filla
 
How to Visualize the ​Spatio-Temporal Data Using CesiumJS​
SANGHEE SHIN
 
Dev Dives: Accelerating agentic automation with Autopilot for Everyone
UiPathCommunity
 
New ThousandEyes Product Innovations: Cisco Live June 2025
ThousandEyes
 
Daily Lesson Log MATATAG ICT TEchnology 8
LOIDAALMAZAN3
 
Why aren't you using FME Flow's CPU Time?
Safe Software
 
Kubernetes - Architecture & Components.pdf
geethak285
 
GDG Cloud Southlake #44: Eyal Bukchin: Tightening the Kubernetes Feedback Loo...
James Anderson
 
“Scaling i.MX Applications Processors’ Native Edge AI with Discrete AI Accele...
Edge AI and Vision Alliance
 
Redefining Work in the Age of AI - What to expect? How to prepare? Why it mat...
Malinda Kapuruge
 
Bridging CAD, IBM TRIRIGA & GIS with FME: The Portland Public Schools Case
Safe Software
 
01_Approach Cyber- DORA Incident Management.pptx
FinTech Belgium
 
Reimaginando la Ciberdefensa: De Copilots a Redes de Agentes
Cristian Garcia G.
 

Control cloud-data-access-privilege-and-anonymity-with-fully-anonymous-attribute-based-encryption-docx

  • 1. Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore www.pvrtechnology.com, E-Mail: [email protected], Ph: 81432 71457 Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute-Based Encryption ABSTRACT: Cloud computing is a revolutionary computing paradigm, which enables flexible, on-demand, and low-cost usage of computing resources, but the data is outsourced to some cloud servers, and various privacy concerns emerge from it. Various schemes based on the attribute-based encryption have been proposed to secure the cloud storage. However, most work focuses on the data contents privacy and the access control, while less attention is paid to the privilege control and the identity privacy. In this paper, we present a semi-anonymous privilege control scheme AnonyControl to address not only the data privacy, but also the user identity privacy in existing access control schemes. AnonyControl decentralizes the central authority to limit the identity leakage and thus achieves semianonymity. Besides, it also generalizes the file access control to the privilege control, by which privileges of all operations on the cloud data can be managed in a fine-grained manner. Subsequently, we present the AnonyControl-F, which fully prevents the identity leakage and achieve the full anonymity. Our security analysis shows that both AnonyControl and AnonyControl-F are secure under the decisional bilinear Diffie– Hellman assumption, and our performance evaluation exhibits the feasibility of our schemes. EXISTING SYSTEM:
  • 2. Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore www.pvrtechnology.com, E-Mail: [email protected], Ph: 81432 71457  Various techniques have been proposed to protect the data contents privacy via access control. Identity-based encryption (IBE) was first introduced by Shamir, in which the sender of a message can specify an identity such that only a receiver with matching identity can decrypt it.  Few years later, Fuzzy Identity-Based Encryption is proposed, which is also known as Attribute-Based Encryption (ABE).  The work by Lewko et al. and Muller et al. are the most similar ones to ours in that they also tried to decentralize the central authority in the CP-ABE into multiple ones.  Lewko et al. use a LSSS matrix as an access structure, but their scheme only converts the AND, OR gates to the LSSS matrix, which limits their encryption policy to boolean formula, while we inherit the flexibility of the access tree having threshold gates.  Muller et al. also supports only Disjunctive Normal Form (DNF) in their encryption policy. DISADVANTAGES OF EXISTING SYSTEM:  The identity is authenticated based on his information for the purpose of access control(or privilege control in this paper).  Preferably, any authority or server alone should not know any client’s personal information.
  • 3. Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore www.pvrtechnology.com, E-Mail: [email protected], Ph: 81432 71457  The users in the same system must have their private keys re-issued so as to gain access to the re-encrypted files, and this process causes considerable problems in implementation. PROPOSED SYSTEM:  The data confidentiality, less effort is paid to protect users’ identity privacy during those interactive protocols. Users’ identities, which are described with their attributes, are generally disclosed to key issuers, and the issuers issue private keys according to their attributes.  We propose AnonyControl and AnonyControl-Fallow cloud servers to control users’ access privileges without knowing their identity information. In this setting, each authority knows only a part of any user’s attributes, which are not enough to figure out the user’s identity. The scheme proposed by Chase et al. considered the basic threshold-based KP-ABE. Many attribute based encryption schemes having multiple authorities have been proposedafterwards.  In our system, there are four types of entities: N Attribute Authorities (denoted as A), Cloud Server, Data Owners and Data Consumers. A user can be a Data Owner and a Data Consumer simultaneously.  Authorities are assumed to have powerful computation abilities, and they are supervised by government offices because some attributes partially contain users’ personally identifiable information. The whole attribute set is divided
  • 4. Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore www.pvrtechnology.com, E-Mail: [email protected], Ph: 81432 71457 into N is joint sets and controlled by each authority, therefore each authority is aware of only part of attributes. ADVANTAGES OF PROPOSED SYSTEM:  The proposed schemes are able to protect user’s privacy against each single authority. Partial information is disclosed in AnonyControl and no information is disclosed in AnonyControl-F.  The proposed schemes are tolerant against authority compromise, and compromising of up to (N −2) authorities does not bring the whole system down.  We provide detailed analysis on security and performance to show feasibility of the scheme AnonyControl and AnonyControl-F.  We firstly implement the real toolkit of a multiauthority based encryption scheme AnonyControl and AnonyControl-F. SYSTEM ARCHITECTURE:
  • 5. Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore www.pvrtechnology.com, E-Mail: [email protected], Ph: 81432 71457 SYSTEM REQUIREMENTS: HARDWARE REQUIREMENTS:  System : Pentium IV 2.4 GHz.  Hard Disk : 40 GB.  Floppy Drive : 1.44 Mb.  Monitor : 15 VGA Colour.  Mouse : Logitech.  Ram : 512 Mb. SOFTWARE REQUIREMENTS:
  • 6. Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore www.pvrtechnology.com, E-Mail: [email protected], Ph: 81432 71457  Operating system : Windows XP/7.  Coding Language : JAVA/J2EE  IDE : Netbeans 7.4  Database : MYSQL REFERENCE: Taeho Jung, Xiang-Yang Li, Senior Member, IEEE, Zhiguo Wan, and Meng Wan, Member, IEEE, “Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute-Based Encryption”, IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 10, NO. 1, JANUARY 2015.