SlideShare a Scribd company logo
Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore
www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
CONTROL CLOUD DATA ACCESS PRIVILEGE AND
ANONYMITY WITH FULLY ANONYMOUS
ATTRIBUTE-BASED ENCRYPTION
ABSTRACT
Cloud computing is a revolutionary computing paradigm,
which enables flexible, on-demand, and low-cost usage of computing
resources, but the data is outsourced to some cloud servers, and various
privacy concerns emerge from it. Various schemes based on the
attribute-based encryption have been proposed to secure the cloud
storage. However, most work focuses on the data contents privacy and
the access control, while less attention is paid to the privilege control
and the identity privacy. In this paper, we present a semianonymous
privilege control scheme AnonyControl to address not only the data
privacy, but also the user identity privacy in existing access control
schemes. AnonyControl decentralizes the central authority to limit the
identity leakage and thus achieves semianonymity. Besides, it also
generalizes the file access control to the privilege control, by which
Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore
www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
privileges of all operations on the cloud data can be managed in a fine-
grained manner. Subsequently, we present the AnonyControl-F, which
fully prevents the identity leakage and achieve the full anonymity. Our
security analysis shows that both AnonyControl and AnonyControl-F
are secure under the decisional bilinear Diffie–Hellman assumption, and
our performance evaluation exhibits the feasibility of our schemes.
EXISTING SYSTEM
we present a semianonymous privilege control scheme
AnonyControl to address not only the data privacy, but also the user
identity privacy in existing access control schemes.
Besides the fact that we can express arbitrarily general encryption
policy, our system also tolerates the compromise attack towards
attributes authorities, which is not covered in many existing works.
We extend existing schemes by generalizing the access tree to a
privilege tree.
we extend existing schemes by generalizing the access tree to a
privilege tree.
Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore
www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
The key point of the identity information leakage we had in our
previous scheme as well as every existing attribute based encryption
schemes is that key generator issues attribute key based on the reported
attribute, and the generator has to know the user’s attribute to do so.
PROPOSE SYSTEM
Various schemes based on the attribute-based encryption have
been proposed to secure the cloud storage.
Various techniques have been proposed to protect the data contents
privacy via access control.
we propose AnonyControl and AnonyControl-F (Fig. 1) to allow
cloud servers to control users’ access privileges without knowing their
identity information.
They will follow our proposed protocol in general, but try to find
out as much information as possible individually.
Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore
www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
The proposed schemes are able to protect user’s privacy against
each single authority. Partial information is disclosed in AnonyControl
and no information is disclosed in AnonyControl-F.
We firstly implement the real toolkit of a multiauthority based
encryption scheme AnonyControl and AnonyControl-F.
SYSTEM CONFIGURATION
SOFTWARE REQUIREMENTS:
Operating System : Windows
Technology : Java and J2EE
Web Technologies : Html, JavaScript, CSS
IDE : My Eclipse
Web Server : Tomcat
Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore
www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
Tool kit : Android Phone
Database : My SQL
Java Version : J2SDK1.5
HARDWARE REQUIREMENTS:
Hardware : Pentium
Speed : 1.1 GHz
RAM : 1GB
Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore
www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
Hard Disk : 20 GB
Floppy Drive : 1.44 MB
Key Board : Standard Windows Keyboard
Mouse : Two or Three Button Mouse
Monitor : SVGA
IMPLEMENTATION
Implementation is the stage of the project when the theoretical design
is turned out into a working system. Thus it can be considered to be the
most critical stage in achieving a successful new system and in giving
the user, confidence that the new system will work and be effective.
Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore
www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
The implementation stage involves careful planning, investigation of
the existing system and it’s constraints on implementation, designing of
methods to achieve changeover and evaluation of changeover methods.
MODULE DESCRIPTION:
Number of Modules
After careful analysis the system has been identified to have the
following modules:
1. Registration based Social Authentication Module
2. Security Module
3. Attribute-based encryption module.
4. Multi-authority module.
1. Registration -Based Social Authentication Module:
Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore
www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
The system prepares trustees for a user Alice in this phase.
Specifically, Alice is first authenticated with her main authenticator (i.e.,
password),and then a few(e.g., 5) friends, who also have accounts in the
system, are selected by either Alice herself or the service provider from
Alice’s friend list and are appointed as Alice’s Registration.
2. Security Module:
Authentication is essential for securing your account and preventing
spoofed messages from damaging your online reputation. Imagine a
phishing email being sent from your mail because someone had forged
your information. Angry recipients and spam complaints resulting from
it become your mess to clean up, in order to repair your reputation.
trustee-based social authentication systems ask users to select their own
trustees without any constraint. In our experiments (i.e., Section VII), we
show that the service provider can constrain trustee selections via
imposing that no users are selected as trustees by too many other users,
which can achieve better security guarantees
3.Attribute-based encryption module.
Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore
www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
Attribute-based encryption module is using for each and every
node encrypt data store. After encrypted data and again the re-encrypted
the same data is using for fine-grain concept using user data uploaded.
the attribute-based encryption have been proposed to secure the cloud
storage. Attribute-Based Encryption (ABE). In such encryption scheme,
an identity is viewed as a set of descriptive attributes, and decryption is
possible if a decrypter’s identity has some overlaps with the one
specified in the ciphertext.
4.Multi-authority module.
A multi-authority system is presented in which each user has an id
and they can interact with each key generator (authority) using different
pseudonyms. Our goal is to achieve a multi-authority CP-ABE which
achieves the security defined above; guarantees the confidentiality of
Data Consumers’ identity information; and tolerates compromise attacks
on the authorities or the collusion attacks by the authorities. This is the
first implementation of a multi-authority attribute based encryption
scheme.
Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore
www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457

More Related Content

What's hot (18)

PDF
Attribute-Based Encryption for Access of Secured Data in Cloud Storage
IJSRD
 
PDF
Enhanced Security Through Token
IRJET Journal
 
PDF
766 a secure-data-sharing-in-cloud-storage-with-independent-key-generation-ce...
revathirram
 
PDF
IDENTITY-BASED PROXY-ORIENTED DATA UPLOADING AND REMOTE DATA INTEGRITY CHECKI...
Nexgen Technology
 
PPTX
Authentication on Cloud using Attribute Based Encryption
Ankit Raj
 
PDF
A review on key aggregate cryptosystem for scalable data sharing in cloud sto...
eSAT Journals
 
PDF
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
Editor IJCATR
 
DOC
documentation for identity based secure distrbuted data storage schemes
Sahithi Naraparaju
 
PDF
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET Journal
 
PDF
Audit free cloud storage via deniable attribute-based encryption
Pvrtechnologies Nellore
 
PDF
Identity based proxy-oriented data uploading and remote data integrity checki...
Shakas Technologies
 
PDF
Ijcatr04051002
Editor IJCATR
 
DOCX
Identity based proxy-oriented data uploading and remote data integrity checki...
Finalyearprojects Toall
 
PDF
IRJET - Providing High Securtiy for Encrypted Data in Cloud
IRJET Journal
 
PDF
Iaetsd a survey on cloud storage security with
Iaetsd Iaetsd
 
PDF
Cloud assisted mobile-access of health data with privacy and auditability
Shakas Technologies
 
DOCX
Cloud assisted mobile-access of health data with privacy and auditability
Adz91 Digital Ads Pvt Ltd
 
PDF
IJSRED-V2I3P52
IJSRED
 
Attribute-Based Encryption for Access of Secured Data in Cloud Storage
IJSRD
 
Enhanced Security Through Token
IRJET Journal
 
766 a secure-data-sharing-in-cloud-storage-with-independent-key-generation-ce...
revathirram
 
IDENTITY-BASED PROXY-ORIENTED DATA UPLOADING AND REMOTE DATA INTEGRITY CHECKI...
Nexgen Technology
 
Authentication on Cloud using Attribute Based Encryption
Ankit Raj
 
A review on key aggregate cryptosystem for scalable data sharing in cloud sto...
eSAT Journals
 
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
Editor IJCATR
 
documentation for identity based secure distrbuted data storage schemes
Sahithi Naraparaju
 
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET Journal
 
Audit free cloud storage via deniable attribute-based encryption
Pvrtechnologies Nellore
 
Identity based proxy-oriented data uploading and remote data integrity checki...
Shakas Technologies
 
Ijcatr04051002
Editor IJCATR
 
Identity based proxy-oriented data uploading and remote data integrity checki...
Finalyearprojects Toall
 
IRJET - Providing High Securtiy for Encrypted Data in Cloud
IRJET Journal
 
Iaetsd a survey on cloud storage security with
Iaetsd Iaetsd
 
Cloud assisted mobile-access of health data with privacy and auditability
Shakas Technologies
 
Cloud assisted mobile-access of health data with privacy and auditability
Adz91 Digital Ads Pvt Ltd
 
IJSRED-V2I3P52
IJSRED
 

Similar to Control cloud data access privilege and anonymity with fully anonymous attribute based encryption (20)

PPTX
A Fully Anonymous Attribute-Based Encryption to Control Cloud Data Access and...
Pawan Arya
 
DOCX
Cloud keybank privacy and owner authorization
Pvrtechnologies Nellore
 
PDF
Two Aspect Validation Control Frameworks for Online Distributed Services
IRJET Journal
 
PDF
Organize Cloud Data Access Privilege and Anonymity with Fully Nameless Attrib...
rahulmonikasharma
 
DOCX
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Pvrtechnologies Nellore
 
PDF
IRJET- Attribute based Access Control for Cloud Data Storage
IRJET Journal
 
PDF
Access Policy Management For OSN Using Network Relationships
IJMTST Journal
 
DOCX
Circuit ciphertext policy attribute-based hybrid encryption with verifiable
Pvrtechnologies Nellore
 
PDF
Control Cloud Data Access Privilege and Anonymity with Fully Anonymous Attrib...
1crore projects
 
DOCX
Identity based encryption with outsourced revocation in cloud computing
Pvrtechnologies Nellore
 
PDF
IRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET Journal
 
PPTX
Final_attribute based encryption in cloud with significant reduction of compu...
Naveena N
 
PDF
Hierarchal attribute based cryptographic model to handle security services in...
IJECEIAES
 
PDF
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
IRJET Journal
 
PPTX
2nd rvw
Subraja Subi
 
PDF
A Survey on Access Control Scheme for Data in Cloud with Anonymous Authentica...
IRJET Journal
 
PDF
KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUD
Naseem nisar
 
A Fully Anonymous Attribute-Based Encryption to Control Cloud Data Access and...
Pawan Arya
 
Cloud keybank privacy and owner authorization
Pvrtechnologies Nellore
 
Two Aspect Validation Control Frameworks for Online Distributed Services
IRJET Journal
 
Organize Cloud Data Access Privilege and Anonymity with Fully Nameless Attrib...
rahulmonikasharma
 
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Pvrtechnologies Nellore
 
IRJET- Attribute based Access Control for Cloud Data Storage
IRJET Journal
 
Access Policy Management For OSN Using Network Relationships
IJMTST Journal
 
Circuit ciphertext policy attribute-based hybrid encryption with verifiable
Pvrtechnologies Nellore
 
Control Cloud Data Access Privilege and Anonymity with Fully Anonymous Attrib...
1crore projects
 
Identity based encryption with outsourced revocation in cloud computing
Pvrtechnologies Nellore
 
IRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET Journal
 
Final_attribute based encryption in cloud with significant reduction of compu...
Naveena N
 
Hierarchal attribute based cryptographic model to handle security services in...
IJECEIAES
 
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
IRJET Journal
 
2nd rvw
Subraja Subi
 
A Survey on Access Control Scheme for Data in Cloud with Anonymous Authentica...
IRJET Journal
 
KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUD
Naseem nisar
 
Ad

More from Pvrtechnologies Nellore (20)

DOCX
A High Throughput List Decoder Architecture for Polar Codes
Pvrtechnologies Nellore
 
DOCX
Performance/Power Space Exploration for Binary64 Division Units
Pvrtechnologies Nellore
 
DOCX
Hybrid LUT/Multiplexer FPGA Logic Architectures
Pvrtechnologies Nellore
 
DOCX
Input-Based Dynamic Reconfiguration of Approximate Arithmetic Units for Video...
Pvrtechnologies Nellore
 
DOCX
2016 2017 ieee matlab project titles
Pvrtechnologies Nellore
 
DOCX
2016 2017 ieee vlsi project titles
Pvrtechnologies Nellore
 
DOCX
2016 2017 ieee ece embedded- project titles
Pvrtechnologies Nellore
 
DOCX
A High-Speed FPGA Implementation of an RSD-Based ECC Processor
Pvrtechnologies Nellore
 
DOCX
6On Efficient Retiming of Fixed-Point Circuits
Pvrtechnologies Nellore
 
DOCX
Pre encoded multipliers based on non-redundant radix-4 signed-digit encoding
Pvrtechnologies Nellore
 
DOCX
Quality of-protection-driven data forwarding for intermittently connected wir...
Pvrtechnologies Nellore
 
DOC
11.online library management system
Pvrtechnologies Nellore
 
DOC
06.e voting system
Pvrtechnologies Nellore
 
DOCX
New web based projects list
Pvrtechnologies Nellore
 
DOCX
Power controlled medium access control
Pvrtechnologies Nellore
 
DOCX
IEEE PROJECTS LIST
Pvrtechnologies Nellore
 
DOCX
Closeness through-microaggregation-strict-privacy-with-enhanced-utility-prese...
Pvrtechnologies Nellore
 
DOCX
A secure-anti-collusion-data-sharing-scheme-for-dynamic-groups-in-the-cloud
Pvrtechnologies Nellore
 
DOCX
A proximity-aware-interest-clustered-p2 p-file-sharing-system-docx
Pvrtechnologies Nellore
 
DOCX
Agent based interactions and economic
Pvrtechnologies Nellore
 
A High Throughput List Decoder Architecture for Polar Codes
Pvrtechnologies Nellore
 
Performance/Power Space Exploration for Binary64 Division Units
Pvrtechnologies Nellore
 
Hybrid LUT/Multiplexer FPGA Logic Architectures
Pvrtechnologies Nellore
 
Input-Based Dynamic Reconfiguration of Approximate Arithmetic Units for Video...
Pvrtechnologies Nellore
 
2016 2017 ieee matlab project titles
Pvrtechnologies Nellore
 
2016 2017 ieee vlsi project titles
Pvrtechnologies Nellore
 
2016 2017 ieee ece embedded- project titles
Pvrtechnologies Nellore
 
A High-Speed FPGA Implementation of an RSD-Based ECC Processor
Pvrtechnologies Nellore
 
6On Efficient Retiming of Fixed-Point Circuits
Pvrtechnologies Nellore
 
Pre encoded multipliers based on non-redundant radix-4 signed-digit encoding
Pvrtechnologies Nellore
 
Quality of-protection-driven data forwarding for intermittently connected wir...
Pvrtechnologies Nellore
 
11.online library management system
Pvrtechnologies Nellore
 
06.e voting system
Pvrtechnologies Nellore
 
New web based projects list
Pvrtechnologies Nellore
 
Power controlled medium access control
Pvrtechnologies Nellore
 
IEEE PROJECTS LIST
Pvrtechnologies Nellore
 
Closeness through-microaggregation-strict-privacy-with-enhanced-utility-prese...
Pvrtechnologies Nellore
 
A secure-anti-collusion-data-sharing-scheme-for-dynamic-groups-in-the-cloud
Pvrtechnologies Nellore
 
A proximity-aware-interest-clustered-p2 p-file-sharing-system-docx
Pvrtechnologies Nellore
 
Agent based interactions and economic
Pvrtechnologies Nellore
 
Ad

Recently uploaded (20)

PDF
Unlocking FME Flow’s Potential: Architecture Design for Modern Enterprises
Safe Software
 
PDF
99 Bottles of Trust on the Wall — Operational Principles for Trust in Cyber C...
treyka
 
DOCX
Daily Lesson Log MATATAG ICT TEchnology 8
LOIDAALMAZAN3
 
PDF
Dev Dives: Accelerating agentic automation with Autopilot for Everyone
UiPathCommunity
 
PDF
Understanding The True Cost of DynamoDB Webinar
ScyllaDB
 
PDF
Darley - FIRST Copenhagen Lightning Talk (2025-06-26) Epochalypse 2038 - Time...
treyka
 
PDF
TrustArc Webinar - Navigating APAC Data Privacy Laws: Compliance & Challenges
TrustArc
 
PDF
Hyderabad MuleSoft In-Person Meetup (June 21, 2025) Slides
Ravi Tamada
 
PDF
Kubernetes - Architecture & Components.pdf
geethak285
 
PDF
The Future of Product Management in AI ERA.pdf
Alyona Owens
 
PPTX
Practical Applications of AI in Local Government
OnBoard
 
PPTX
Smarter Governance with AI: What Every Board Needs to Know
OnBoard
 
PPTX
Paycifi - Programmable Trust_Breakfast_PPTXT
FinTech Belgium
 
PDF
Why aren't you using FME Flow's CPU Time?
Safe Software
 
PDF
Optimizing the trajectory of a wheel loader working in short loading cycles
Reno Filla
 
PDF
My Journey from CAD to BIM: A True Underdog Story
Safe Software
 
PDF
''Taming Explosive Growth: Building Resilience in a Hyper-Scaled Financial Pl...
Fwdays
 
PPTX
2025 HackRedCon Cyber Career Paths.pptx Scott Stanton
Scott Stanton
 
PPTX
MARTSIA: A Tool for Confidential Data Exchange via Public Blockchain - Poster...
Michele Kryston
 
PDF
LLM Search Readiness Audit - Dentsu x SEO Square - June 2025.pdf
Nick Samuel
 
Unlocking FME Flow’s Potential: Architecture Design for Modern Enterprises
Safe Software
 
99 Bottles of Trust on the Wall — Operational Principles for Trust in Cyber C...
treyka
 
Daily Lesson Log MATATAG ICT TEchnology 8
LOIDAALMAZAN3
 
Dev Dives: Accelerating agentic automation with Autopilot for Everyone
UiPathCommunity
 
Understanding The True Cost of DynamoDB Webinar
ScyllaDB
 
Darley - FIRST Copenhagen Lightning Talk (2025-06-26) Epochalypse 2038 - Time...
treyka
 
TrustArc Webinar - Navigating APAC Data Privacy Laws: Compliance & Challenges
TrustArc
 
Hyderabad MuleSoft In-Person Meetup (June 21, 2025) Slides
Ravi Tamada
 
Kubernetes - Architecture & Components.pdf
geethak285
 
The Future of Product Management in AI ERA.pdf
Alyona Owens
 
Practical Applications of AI in Local Government
OnBoard
 
Smarter Governance with AI: What Every Board Needs to Know
OnBoard
 
Paycifi - Programmable Trust_Breakfast_PPTXT
FinTech Belgium
 
Why aren't you using FME Flow's CPU Time?
Safe Software
 
Optimizing the trajectory of a wheel loader working in short loading cycles
Reno Filla
 
My Journey from CAD to BIM: A True Underdog Story
Safe Software
 
''Taming Explosive Growth: Building Resilience in a Hyper-Scaled Financial Pl...
Fwdays
 
2025 HackRedCon Cyber Career Paths.pptx Scott Stanton
Scott Stanton
 
MARTSIA: A Tool for Confidential Data Exchange via Public Blockchain - Poster...
Michele Kryston
 
LLM Search Readiness Audit - Dentsu x SEO Square - June 2025.pdf
Nick Samuel
 

Control cloud data access privilege and anonymity with fully anonymous attribute based encryption

  • 1. Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore www.pvrtechnology.com, E-Mail: [email protected], Ph: 81432 71457 CONTROL CLOUD DATA ACCESS PRIVILEGE AND ANONYMITY WITH FULLY ANONYMOUS ATTRIBUTE-BASED ENCRYPTION ABSTRACT Cloud computing is a revolutionary computing paradigm, which enables flexible, on-demand, and low-cost usage of computing resources, but the data is outsourced to some cloud servers, and various privacy concerns emerge from it. Various schemes based on the attribute-based encryption have been proposed to secure the cloud storage. However, most work focuses on the data contents privacy and the access control, while less attention is paid to the privilege control and the identity privacy. In this paper, we present a semianonymous privilege control scheme AnonyControl to address not only the data privacy, but also the user identity privacy in existing access control schemes. AnonyControl decentralizes the central authority to limit the identity leakage and thus achieves semianonymity. Besides, it also generalizes the file access control to the privilege control, by which
  • 2. Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore www.pvrtechnology.com, E-Mail: [email protected], Ph: 81432 71457 privileges of all operations on the cloud data can be managed in a fine- grained manner. Subsequently, we present the AnonyControl-F, which fully prevents the identity leakage and achieve the full anonymity. Our security analysis shows that both AnonyControl and AnonyControl-F are secure under the decisional bilinear Diffie–Hellman assumption, and our performance evaluation exhibits the feasibility of our schemes. EXISTING SYSTEM we present a semianonymous privilege control scheme AnonyControl to address not only the data privacy, but also the user identity privacy in existing access control schemes. Besides the fact that we can express arbitrarily general encryption policy, our system also tolerates the compromise attack towards attributes authorities, which is not covered in many existing works. We extend existing schemes by generalizing the access tree to a privilege tree. we extend existing schemes by generalizing the access tree to a privilege tree.
  • 3. Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore www.pvrtechnology.com, E-Mail: [email protected], Ph: 81432 71457 The key point of the identity information leakage we had in our previous scheme as well as every existing attribute based encryption schemes is that key generator issues attribute key based on the reported attribute, and the generator has to know the user’s attribute to do so. PROPOSE SYSTEM Various schemes based on the attribute-based encryption have been proposed to secure the cloud storage. Various techniques have been proposed to protect the data contents privacy via access control. we propose AnonyControl and AnonyControl-F (Fig. 1) to allow cloud servers to control users’ access privileges without knowing their identity information. They will follow our proposed protocol in general, but try to find out as much information as possible individually.
  • 4. Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore www.pvrtechnology.com, E-Mail: [email protected], Ph: 81432 71457 The proposed schemes are able to protect user’s privacy against each single authority. Partial information is disclosed in AnonyControl and no information is disclosed in AnonyControl-F. We firstly implement the real toolkit of a multiauthority based encryption scheme AnonyControl and AnonyControl-F. SYSTEM CONFIGURATION SOFTWARE REQUIREMENTS: Operating System : Windows Technology : Java and J2EE Web Technologies : Html, JavaScript, CSS IDE : My Eclipse Web Server : Tomcat
  • 5. Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore www.pvrtechnology.com, E-Mail: [email protected], Ph: 81432 71457 Tool kit : Android Phone Database : My SQL Java Version : J2SDK1.5 HARDWARE REQUIREMENTS: Hardware : Pentium Speed : 1.1 GHz RAM : 1GB
  • 6. Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore www.pvrtechnology.com, E-Mail: [email protected], Ph: 81432 71457 Hard Disk : 20 GB Floppy Drive : 1.44 MB Key Board : Standard Windows Keyboard Mouse : Two or Three Button Mouse Monitor : SVGA IMPLEMENTATION Implementation is the stage of the project when the theoretical design is turned out into a working system. Thus it can be considered to be the most critical stage in achieving a successful new system and in giving the user, confidence that the new system will work and be effective.
  • 7. Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore www.pvrtechnology.com, E-Mail: [email protected], Ph: 81432 71457 The implementation stage involves careful planning, investigation of the existing system and it’s constraints on implementation, designing of methods to achieve changeover and evaluation of changeover methods. MODULE DESCRIPTION: Number of Modules After careful analysis the system has been identified to have the following modules: 1. Registration based Social Authentication Module 2. Security Module 3. Attribute-based encryption module. 4. Multi-authority module. 1. Registration -Based Social Authentication Module:
  • 8. Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore www.pvrtechnology.com, E-Mail: [email protected], Ph: 81432 71457 The system prepares trustees for a user Alice in this phase. Specifically, Alice is first authenticated with her main authenticator (i.e., password),and then a few(e.g., 5) friends, who also have accounts in the system, are selected by either Alice herself or the service provider from Alice’s friend list and are appointed as Alice’s Registration. 2. Security Module: Authentication is essential for securing your account and preventing spoofed messages from damaging your online reputation. Imagine a phishing email being sent from your mail because someone had forged your information. Angry recipients and spam complaints resulting from it become your mess to clean up, in order to repair your reputation. trustee-based social authentication systems ask users to select their own trustees without any constraint. In our experiments (i.e., Section VII), we show that the service provider can constrain trustee selections via imposing that no users are selected as trustees by too many other users, which can achieve better security guarantees 3.Attribute-based encryption module.
  • 9. Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore www.pvrtechnology.com, E-Mail: [email protected], Ph: 81432 71457 Attribute-based encryption module is using for each and every node encrypt data store. After encrypted data and again the re-encrypted the same data is using for fine-grain concept using user data uploaded. the attribute-based encryption have been proposed to secure the cloud storage. Attribute-Based Encryption (ABE). In such encryption scheme, an identity is viewed as a set of descriptive attributes, and decryption is possible if a decrypter’s identity has some overlaps with the one specified in the ciphertext. 4.Multi-authority module. A multi-authority system is presented in which each user has an id and they can interact with each key generator (authority) using different pseudonyms. Our goal is to achieve a multi-authority CP-ABE which achieves the security defined above; guarantees the confidentiality of Data Consumers’ identity information; and tolerates compromise attacks on the authorities or the collusion attacks by the authorities. This is the first implementation of a multi-authority attribute based encryption scheme.
  • 10. Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore www.pvrtechnology.com, E-Mail: [email protected], Ph: 81432 71457