SlideShare a Scribd company logo
HYBRID ATTRIBUTE- AND RE-ENCRYPTION-BASED 
KEY MANAGEMENT FOR SECURE AND SCALABLE 
MOBILE APPLICATIONS IN CLOUDS 
ABSTRACT: 
Outsourcing data to the cloud are beneficial for reasons of 
economy, scalability, and accessibility, but significant technical 
challenges remain. Sensitive data stored in the cloud must be 
protected from being read in the clear by a cloud provider that is 
honest but curious. Additionally, cloud-based data are 
increasingly being accessed by resource-constrained mobile 
devices for which the processing and communication cost must 
be minimized. Novel modifications to attribute-based encryption 
are proposed to allow authorized users access to cloud data 
based on the satisfaction of required attributes such that the 
higher computational load from cryptographic operations is 
assigned to the cloud provider and the total communication cost 
is lowered for the mobile user. Furthermore, data re-encryption
may be optionally performed by the cloud provider to reduce the 
expense of user revocation in a mobile user environment while 
preserving the privacy of user data stored in the cloud. The 
proposed protocol has been realized on commercially popular 
mobile and cloud platforms to demonstrate real-world 
benchmarks that show the efficacy of the scheme. A simulation 
calibrated with the benchmark results shows the scalability 
potential of the scheme in the context of a realistic workload in a 
mobile cloud computing system. 
EXISTING SYSTEM: 
Data outsourcing to a cloud is appropriate for any class of 
applications that requires data to be kept in storage and 
disseminated to many users. Clients that engage a cloud provider 
typically only pay for the amount of storage, related 
computation, and amount of network communication actually 
consumed; they do not incur the capital and maintenance costs 
of an in-house solution. In addition, the cloud provider offers the
advantages of automatic backup and replication to ensure the 
safety, longevity, and high accessibility of the user data. A 
major concern that is typically not sufficiently addressed in 
practice, however, is that data, by default, are stored in the clear; 
it may be accessed and read by a cloud administrator without 
knowledge of the client. A cloud administrator may not be 
trusted despite the presence of contractual security obligations, 
if data security is not further enforced through technical means. 
An additional risk is that sensitive data carry the persistent risk 
of being intercepted by an unauthorized party despite safeguards 
promised by the provider. Therefore, it is useful to apply 
software techniques, such as encryption key management, to 
ensure that the confidentiality of cloud data is preserved at all 
times. It is especially crucial to safeguard sensitive user data 
such as e-mails, personal customer information, financial 
records, and medical records.
DISADVANTAGES OF EXISTING SYSTEM: 
· It is not secure. 
· There is no confidentiality. 
· It is especially crucial to safeguard sensitive user data. 
PROBLEM STATEMENT: 
A major concern that is typically not sufficiently addressed 
in practice, however, is that data, by default, are stored in the 
clear; it may be accessed and read by a cloud administrator 
without knowledge of the client. 
SCOPE: 
Important requirement is for data to be addressable with 
fine-grained access controls on the record-level or finer, to 
provide flexibility. 
PROPOSED SYSTEM: 
A protocol for outsourcing data storage to a cloud provider 
in secure fashion is provided. The provider is unable to read 
stored data; authorized users may do so based on qualification
through possession of the right attributes without arbitration by 
the data owner. The protocol is designed to be efficient for 
resource-constrained mobile users by delegating computation 
and requests to a cloud provider or trusted authority, where 
appropriate, without compromising security. An improvement is 
made over a traditional attribute based encryption scheme, such 
that responsibility over key generation is divided between a 
mobile data owner and a trusted authority; the owner is relieved 
of the highest computational and messaging burdens. Additional 
security is provided through a group keying mechanism; the data 
owner controls access based on the distribution of an additional 
secret key, beyond possession of the required attributes. This 
additional security measure is an optional variant applicable to 
highly sensitive data subject to frequent access. Re-encryption, 
as a process of transforming the stored ciphertext, permits 
efficient revocation of users; it does not require removal of 
attributes and subsequent key regeneration, and may be
administered by a trusted authority without involvement of the 
data owner. 
ADVANTAGES OF PROPOSED SYSTEM: 
· It is more secure. 
· It reduces data traffic. 
· Cost efficient.
SYSTEM ARCHITECTURE:
SYSTEM CONFIGURATION:- 
HARDWARE REQUIREMENTS:- 
 Processor - Pentium –IV 
 Speed - 1.1 Ghz 
 RAM - 512 MB(min) 
 Hard Disk - 40 GB 
 Key Board - Standard Windows Keyboard 
 Mouse - Two or Three Button Mouse 
 Monitor - LCD/LED 
SOFTWARE REQUIREMENTS: 
• Operating system : Windows XP 
• Coding Language : Java 
• Data Base : MySQL 
• Tool : Net Beans IDE
REFERENCE: 
Piotr K.Tysowski and M.Anwarul Hasan “Hybrid Attribute- and Re- 
Encryption-Based Key Management for Secure and Scalable Mobile 
Applications in Clouds” IEEE TRANSACTIONS ON CLOUD COMPUTING, 
VOL. 1, NO. 2, JULY-DECEMBER 2013.
REFERENCE: 
Piotr K.Tysowski and M.Anwarul Hasan “Hybrid Attribute- and Re- 
Encryption-Based Key Management for Secure and Scalable Mobile 
Applications in Clouds” IEEE TRANSACTIONS ON CLOUD COMPUTING, 
VOL. 1, NO. 2, JULY-DECEMBER 2013.
Ad

More Related Content

What's hot (14)

Lecture26 cc-security1
Lecture26 cc-security1Lecture26 cc-security1
Lecture26 cc-security1
Ankit Gupta
 
A robust and verifiable threshold multi authority access control system in pu...
A robust and verifiable threshold multi authority access control system in pu...A robust and verifiable threshold multi authority access control system in pu...
A robust and verifiable threshold multi authority access control system in pu...
IJARIIT
 
Analysis-of-Security-Algorithms-in-Cloud-Computing [Autosaved]
Analysis-of-Security-Algorithms-in-Cloud-Computing [Autosaved]Analysis-of-Security-Algorithms-in-Cloud-Computing [Autosaved]
Analysis-of-Security-Algorithms-in-Cloud-Computing [Autosaved]
Mahmuda Rahman
 
data storage security technique for cloud computing
data storage security technique for cloud computingdata storage security technique for cloud computing
data storage security technique for cloud computing
hasimshah
 
Privacy Preserving Public Auditing for Data Storage Security in Cloud.ppt
Privacy Preserving Public Auditing for Data Storage Security in Cloud.pptPrivacy Preserving Public Auditing for Data Storage Security in Cloud.ppt
Privacy Preserving Public Auditing for Data Storage Security in Cloud.ppt
Girish Chandra
 
DATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTING
DATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTINGDATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTING
DATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTING
ijsptm
 
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage SecurityEnhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Editor IJMTER
 
IRJET- Attribute based Access Control for Cloud Data Storage
IRJET- Attribute based Access Control for Cloud Data StorageIRJET- Attribute based Access Control for Cloud Data Storage
IRJET- Attribute based Access Control for Cloud Data Storage
IRJET Journal
 
Security challenges of cloud computing
Security challenges of cloud computingSecurity challenges of cloud computing
Security challenges of cloud computing
Md. Hasibur Rashid
 
Secure data sharing in cloud computing using revocable storage identity-based...
Secure data sharing in cloud computing using revocable storage identity-based...Secure data sharing in cloud computing using revocable storage identity-based...
Secure data sharing in cloud computing using revocable storage identity-based...
Shakas Technologies
 
Cloud computing security
Cloud computing securityCloud computing security
Cloud computing security
Pratik Sharma
 
Achieving Secure, sclable and finegrained Cloud computing report
Achieving Secure, sclable and finegrained Cloud computing reportAchieving Secure, sclable and finegrained Cloud computing report
Achieving Secure, sclable and finegrained Cloud computing report
Kiran Girase
 
Security issue in Cloud computing
Security issue in Cloud computingSecurity issue in Cloud computing
Security issue in Cloud computing
Seema Kumari
 
Biznet GIO National Seminar on Digital Forensics
Biznet GIO National Seminar on Digital ForensicsBiznet GIO National Seminar on Digital Forensics
Biznet GIO National Seminar on Digital Forensics
Yusuf Hadiwinata Sutandar
 
Lecture26 cc-security1
Lecture26 cc-security1Lecture26 cc-security1
Lecture26 cc-security1
Ankit Gupta
 
A robust and verifiable threshold multi authority access control system in pu...
A robust and verifiable threshold multi authority access control system in pu...A robust and verifiable threshold multi authority access control system in pu...
A robust and verifiable threshold multi authority access control system in pu...
IJARIIT
 
Analysis-of-Security-Algorithms-in-Cloud-Computing [Autosaved]
Analysis-of-Security-Algorithms-in-Cloud-Computing [Autosaved]Analysis-of-Security-Algorithms-in-Cloud-Computing [Autosaved]
Analysis-of-Security-Algorithms-in-Cloud-Computing [Autosaved]
Mahmuda Rahman
 
data storage security technique for cloud computing
data storage security technique for cloud computingdata storage security technique for cloud computing
data storage security technique for cloud computing
hasimshah
 
Privacy Preserving Public Auditing for Data Storage Security in Cloud.ppt
Privacy Preserving Public Auditing for Data Storage Security in Cloud.pptPrivacy Preserving Public Auditing for Data Storage Security in Cloud.ppt
Privacy Preserving Public Auditing for Data Storage Security in Cloud.ppt
Girish Chandra
 
DATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTING
DATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTINGDATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTING
DATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTING
ijsptm
 
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage SecurityEnhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Editor IJMTER
 
IRJET- Attribute based Access Control for Cloud Data Storage
IRJET- Attribute based Access Control for Cloud Data StorageIRJET- Attribute based Access Control for Cloud Data Storage
IRJET- Attribute based Access Control for Cloud Data Storage
IRJET Journal
 
Security challenges of cloud computing
Security challenges of cloud computingSecurity challenges of cloud computing
Security challenges of cloud computing
Md. Hasibur Rashid
 
Secure data sharing in cloud computing using revocable storage identity-based...
Secure data sharing in cloud computing using revocable storage identity-based...Secure data sharing in cloud computing using revocable storage identity-based...
Secure data sharing in cloud computing using revocable storage identity-based...
Shakas Technologies
 
Cloud computing security
Cloud computing securityCloud computing security
Cloud computing security
Pratik Sharma
 
Achieving Secure, sclable and finegrained Cloud computing report
Achieving Secure, sclable and finegrained Cloud computing reportAchieving Secure, sclable and finegrained Cloud computing report
Achieving Secure, sclable and finegrained Cloud computing report
Kiran Girase
 
Security issue in Cloud computing
Security issue in Cloud computingSecurity issue in Cloud computing
Security issue in Cloud computing
Seema Kumari
 
Biznet GIO National Seminar on Digital Forensics
Biznet GIO National Seminar on Digital ForensicsBiznet GIO National Seminar on Digital Forensics
Biznet GIO National Seminar on Digital Forensics
Yusuf Hadiwinata Sutandar
 

Similar to Hybrid attribute and re-encryption-based key management for secure and scalable mobile applications in clouds (20)

IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET Journal
 
Iaetsd storage privacy protection against data
Iaetsd storage privacy protection against dataIaetsd storage privacy protection against data
Iaetsd storage privacy protection against data
Iaetsd Iaetsd
 
Data security in cloud computing
Data security in cloud computingData security in cloud computing
Data security in cloud computing
Prince Chandu
 
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
IRJET Journal
 
Secure Redundant Data Avoidance over Multi-Cloud Architecture.
Secure Redundant Data Avoidance over Multi-Cloud Architecture. Secure Redundant Data Avoidance over Multi-Cloud Architecture.
Secure Redundant Data Avoidance over Multi-Cloud Architecture.
IJCERT JOURNAL
 
1784 1788
1784 17881784 1788
1784 1788
Editor IJARCET
 
Presentation (6).pptx
Presentation (6).pptxPresentation (6).pptx
Presentation (6).pptx
MSMuthu5
 
IRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET- Secure Cloud Data Using Attribute Based EncryptionIRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET Journal
 
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Editor IJMTER
 
V04405122126
V04405122126V04405122126
V04405122126
IJERA Editor
 
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generationImprove HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
Editor IJMTER
 
Privacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storagePrivacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storage
Shakas Technologies
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
Pyingkodi Maran
 
FOGCOMPUTING
FOGCOMPUTINGFOGCOMPUTING
FOGCOMPUTING
Anvesh Kolluri
 
IRJET- Security Enhancement for Sharing Data within Group Members in Cloud
IRJET- Security Enhancement for Sharing Data within Group Members in CloudIRJET- Security Enhancement for Sharing Data within Group Members in Cloud
IRJET- Security Enhancement for Sharing Data within Group Members in Cloud
IRJET Journal
 
Identity based distributed provable data possession in multi-cloud storage
Identity based distributed provable data possession in multi-cloud storageIdentity based distributed provable data possession in multi-cloud storage
Identity based distributed provable data possession in multi-cloud storage
Papitha Velumani
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
Pyingkodi Maran
 
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud. A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
IJCERT JOURNAL
 
Privacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storagePrivacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storage
JPINFOTECH JAYAPRAKASH
 
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...
eSAT Journals
 
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET Journal
 
Iaetsd storage privacy protection against data
Iaetsd storage privacy protection against dataIaetsd storage privacy protection against data
Iaetsd storage privacy protection against data
Iaetsd Iaetsd
 
Data security in cloud computing
Data security in cloud computingData security in cloud computing
Data security in cloud computing
Prince Chandu
 
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
IRJET Journal
 
Secure Redundant Data Avoidance over Multi-Cloud Architecture.
Secure Redundant Data Avoidance over Multi-Cloud Architecture. Secure Redundant Data Avoidance over Multi-Cloud Architecture.
Secure Redundant Data Avoidance over Multi-Cloud Architecture.
IJCERT JOURNAL
 
Presentation (6).pptx
Presentation (6).pptxPresentation (6).pptx
Presentation (6).pptx
MSMuthu5
 
IRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET- Secure Cloud Data Using Attribute Based EncryptionIRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET Journal
 
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Editor IJMTER
 
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generationImprove HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
Editor IJMTER
 
Privacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storagePrivacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storage
Shakas Technologies
 
IRJET- Security Enhancement for Sharing Data within Group Members in Cloud
IRJET- Security Enhancement for Sharing Data within Group Members in CloudIRJET- Security Enhancement for Sharing Data within Group Members in Cloud
IRJET- Security Enhancement for Sharing Data within Group Members in Cloud
IRJET Journal
 
Identity based distributed provable data possession in multi-cloud storage
Identity based distributed provable data possession in multi-cloud storageIdentity based distributed provable data possession in multi-cloud storage
Identity based distributed provable data possession in multi-cloud storage
Papitha Velumani
 
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud. A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
IJCERT JOURNAL
 
Privacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storagePrivacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storage
JPINFOTECH JAYAPRAKASH
 
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...
eSAT Journals
 
Ad

More from Papitha Velumani (20)

2015 - 2016 IEEE Project Titles and abstracts in Java
2015 - 2016 IEEE Project Titles and abstracts in Java2015 - 2016 IEEE Project Titles and abstracts in Java
2015 - 2016 IEEE Project Titles and abstracts in Java
Papitha Velumani
 
2015 - 2016 IEEE Project Titles and abstracts in Android
2015 - 2016 IEEE Project Titles and abstracts in Android 2015 - 2016 IEEE Project Titles and abstracts in Android
2015 - 2016 IEEE Project Titles and abstracts in Android
Papitha Velumani
 
2015 - 2016 IEEE Project Titles and abstracts in Dotnet
2015 - 2016 IEEE Project Titles and abstracts in Dotnet 2015 - 2016 IEEE Project Titles and abstracts in Dotnet
2015 - 2016 IEEE Project Titles and abstracts in Dotnet
Papitha Velumani
 
Trajectory improves data delivery in urban vehicular networks
Trajectory improves data delivery in urban vehicular networks Trajectory improves data delivery in urban vehicular networks
Trajectory improves data delivery in urban vehicular networks
Papitha Velumani
 
Tracon interference aware scheduling for data-intensive applications in virtu...
Tracon interference aware scheduling for data-intensive applications in virtu...Tracon interference aware scheduling for data-intensive applications in virtu...
Tracon interference aware scheduling for data-intensive applications in virtu...
Papitha Velumani
 
Supporting privacy protection in personalized web search
Supporting privacy protection in personalized web searchSupporting privacy protection in personalized web search
Supporting privacy protection in personalized web search
Papitha Velumani
 
Stochastic bandwidth estimation in networks with random service
Stochastic bandwidth estimation in networks with random serviceStochastic bandwidth estimation in networks with random service
Stochastic bandwidth estimation in networks with random service
Papitha Velumani
 
Sos a distributed mobile q&a system based on social networks
Sos a distributed mobile q&a system based on social networksSos a distributed mobile q&a system based on social networks
Sos a distributed mobile q&a system based on social networks
Papitha Velumani
 
Security evaluation of pattern classifiers under attack
Security evaluation of pattern classifiers under attack Security evaluation of pattern classifiers under attack
Security evaluation of pattern classifiers under attack
Papitha Velumani
 
Real time misbehavior detection in ieee 802.11-based wireless networks an ana...
Real time misbehavior detection in ieee 802.11-based wireless networks an ana...Real time misbehavior detection in ieee 802.11-based wireless networks an ana...
Real time misbehavior detection in ieee 802.11-based wireless networks an ana...
Papitha Velumani
 
Probabilistic consolidation of virtual machines in self organizing cloud data...
Probabilistic consolidation of virtual machines in self organizing cloud data...Probabilistic consolidation of virtual machines in self organizing cloud data...
Probabilistic consolidation of virtual machines in self organizing cloud data...
Papitha Velumani
 
Privacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud dataPrivacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud data
Papitha Velumani
 
Privacy preserving and content-protecting location based queries
Privacy preserving and content-protecting location based queriesPrivacy preserving and content-protecting location based queries
Privacy preserving and content-protecting location based queries
Papitha Velumani
 
Pack prediction based cloud bandwidth and cost reduction system
Pack prediction based cloud bandwidth and cost reduction systemPack prediction based cloud bandwidth and cost reduction system
Pack prediction based cloud bandwidth and cost reduction system
Papitha Velumani
 
Occt a one class clustering tree for implementing one-to-man data linkage
Occt a one class clustering tree for implementing one-to-man data linkageOcct a one class clustering tree for implementing one-to-man data linkage
Occt a one class clustering tree for implementing one-to-man data linkage
Papitha Velumani
 
Leveraging social networks for p2p content based file sharing in disconnected...
Leveraging social networks for p2p content based file sharing in disconnected...Leveraging social networks for p2p content based file sharing in disconnected...
Leveraging social networks for p2p content based file sharing in disconnected...
Papitha Velumani
 
LDBP: localized boundary detection and parametrization for 3 d sensor networks
LDBP: localized boundary detection and parametrization for 3 d sensor networksLDBP: localized boundary detection and parametrization for 3 d sensor networks
LDBP: localized boundary detection and parametrization for 3 d sensor networks
Papitha Velumani
 
Integrity for join queries in the cloud
Integrity for join queries in the cloudIntegrity for join queries in the cloud
Integrity for join queries in the cloud
Papitha Velumani
 
Improving fairness, efficiency, and stability in http based adaptive video st...
Improving fairness, efficiency, and stability in http based adaptive video st...Improving fairness, efficiency, and stability in http based adaptive video st...
Improving fairness, efficiency, and stability in http based adaptive video st...
Papitha Velumani
 
Hybrid attribute and re-encryption-based key management for secure and scala...
Hybrid attribute  and re-encryption-based key management for secure and scala...Hybrid attribute  and re-encryption-based key management for secure and scala...
Hybrid attribute and re-encryption-based key management for secure and scala...
Papitha Velumani
 
2015 - 2016 IEEE Project Titles and abstracts in Java
2015 - 2016 IEEE Project Titles and abstracts in Java2015 - 2016 IEEE Project Titles and abstracts in Java
2015 - 2016 IEEE Project Titles and abstracts in Java
Papitha Velumani
 
2015 - 2016 IEEE Project Titles and abstracts in Android
2015 - 2016 IEEE Project Titles and abstracts in Android 2015 - 2016 IEEE Project Titles and abstracts in Android
2015 - 2016 IEEE Project Titles and abstracts in Android
Papitha Velumani
 
2015 - 2016 IEEE Project Titles and abstracts in Dotnet
2015 - 2016 IEEE Project Titles and abstracts in Dotnet 2015 - 2016 IEEE Project Titles and abstracts in Dotnet
2015 - 2016 IEEE Project Titles and abstracts in Dotnet
Papitha Velumani
 
Trajectory improves data delivery in urban vehicular networks
Trajectory improves data delivery in urban vehicular networks Trajectory improves data delivery in urban vehicular networks
Trajectory improves data delivery in urban vehicular networks
Papitha Velumani
 
Tracon interference aware scheduling for data-intensive applications in virtu...
Tracon interference aware scheduling for data-intensive applications in virtu...Tracon interference aware scheduling for data-intensive applications in virtu...
Tracon interference aware scheduling for data-intensive applications in virtu...
Papitha Velumani
 
Supporting privacy protection in personalized web search
Supporting privacy protection in personalized web searchSupporting privacy protection in personalized web search
Supporting privacy protection in personalized web search
Papitha Velumani
 
Stochastic bandwidth estimation in networks with random service
Stochastic bandwidth estimation in networks with random serviceStochastic bandwidth estimation in networks with random service
Stochastic bandwidth estimation in networks with random service
Papitha Velumani
 
Sos a distributed mobile q&a system based on social networks
Sos a distributed mobile q&a system based on social networksSos a distributed mobile q&a system based on social networks
Sos a distributed mobile q&a system based on social networks
Papitha Velumani
 
Security evaluation of pattern classifiers under attack
Security evaluation of pattern classifiers under attack Security evaluation of pattern classifiers under attack
Security evaluation of pattern classifiers under attack
Papitha Velumani
 
Real time misbehavior detection in ieee 802.11-based wireless networks an ana...
Real time misbehavior detection in ieee 802.11-based wireless networks an ana...Real time misbehavior detection in ieee 802.11-based wireless networks an ana...
Real time misbehavior detection in ieee 802.11-based wireless networks an ana...
Papitha Velumani
 
Probabilistic consolidation of virtual machines in self organizing cloud data...
Probabilistic consolidation of virtual machines in self organizing cloud data...Probabilistic consolidation of virtual machines in self organizing cloud data...
Probabilistic consolidation of virtual machines in self organizing cloud data...
Papitha Velumani
 
Privacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud dataPrivacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud data
Papitha Velumani
 
Privacy preserving and content-protecting location based queries
Privacy preserving and content-protecting location based queriesPrivacy preserving and content-protecting location based queries
Privacy preserving and content-protecting location based queries
Papitha Velumani
 
Pack prediction based cloud bandwidth and cost reduction system
Pack prediction based cloud bandwidth and cost reduction systemPack prediction based cloud bandwidth and cost reduction system
Pack prediction based cloud bandwidth and cost reduction system
Papitha Velumani
 
Occt a one class clustering tree for implementing one-to-man data linkage
Occt a one class clustering tree for implementing one-to-man data linkageOcct a one class clustering tree for implementing one-to-man data linkage
Occt a one class clustering tree for implementing one-to-man data linkage
Papitha Velumani
 
Leveraging social networks for p2p content based file sharing in disconnected...
Leveraging social networks for p2p content based file sharing in disconnected...Leveraging social networks for p2p content based file sharing in disconnected...
Leveraging social networks for p2p content based file sharing in disconnected...
Papitha Velumani
 
LDBP: localized boundary detection and parametrization for 3 d sensor networks
LDBP: localized boundary detection and parametrization for 3 d sensor networksLDBP: localized boundary detection and parametrization for 3 d sensor networks
LDBP: localized boundary detection and parametrization for 3 d sensor networks
Papitha Velumani
 
Integrity for join queries in the cloud
Integrity for join queries in the cloudIntegrity for join queries in the cloud
Integrity for join queries in the cloud
Papitha Velumani
 
Improving fairness, efficiency, and stability in http based adaptive video st...
Improving fairness, efficiency, and stability in http based adaptive video st...Improving fairness, efficiency, and stability in http based adaptive video st...
Improving fairness, efficiency, and stability in http based adaptive video st...
Papitha Velumani
 
Hybrid attribute and re-encryption-based key management for secure and scala...
Hybrid attribute  and re-encryption-based key management for secure and scala...Hybrid attribute  and re-encryption-based key management for secure and scala...
Hybrid attribute and re-encryption-based key management for secure and scala...
Papitha Velumani
 
Ad

Recently uploaded (20)

dynastic art of the Pallava dynasty south India
dynastic art of the Pallava dynasty south Indiadynastic art of the Pallava dynasty south India
dynastic art of the Pallava dynasty south India
PrachiSontakke5
 
03#UNTAGGED. Generosity in architecture.
03#UNTAGGED. Generosity in architecture.03#UNTAGGED. Generosity in architecture.
03#UNTAGGED. Generosity in architecture.
MCH
 
"Basics of Heterocyclic Compounds and Their Naming Rules"
"Basics of Heterocyclic Compounds and Their Naming Rules""Basics of Heterocyclic Compounds and Their Naming Rules"
"Basics of Heterocyclic Compounds and Their Naming Rules"
rupalinirmalbpharm
 
Sinhala_Male_Names.pdf Sinhala_Male_Name
Sinhala_Male_Names.pdf Sinhala_Male_NameSinhala_Male_Names.pdf Sinhala_Male_Name
Sinhala_Male_Names.pdf Sinhala_Male_Name
keshanf79
 
Kasdorf "Accessibility Essentials: A 2025 NISO Training Series, Session 5, Ac...
Kasdorf "Accessibility Essentials: A 2025 NISO Training Series, Session 5, Ac...Kasdorf "Accessibility Essentials: A 2025 NISO Training Series, Session 5, Ac...
Kasdorf "Accessibility Essentials: A 2025 NISO Training Series, Session 5, Ac...
National Information Standards Organization (NISO)
 
GDGLSPGCOER - Git and GitHub Workshop.pptx
GDGLSPGCOER - Git and GitHub Workshop.pptxGDGLSPGCOER - Git and GitHub Workshop.pptx
GDGLSPGCOER - Git and GitHub Workshop.pptx
azeenhodekar
 
Introduction-to-Communication-and-Media-Studies-1736283331.pdf
Introduction-to-Communication-and-Media-Studies-1736283331.pdfIntroduction-to-Communication-and-Media-Studies-1736283331.pdf
Introduction-to-Communication-and-Media-Studies-1736283331.pdf
james5028
 
2541William_McCollough_DigitalDetox.docx
2541William_McCollough_DigitalDetox.docx2541William_McCollough_DigitalDetox.docx
2541William_McCollough_DigitalDetox.docx
contactwilliamm2546
 
apa-style-referencing-visual-guide-2025.pdf
apa-style-referencing-visual-guide-2025.pdfapa-style-referencing-visual-guide-2025.pdf
apa-style-referencing-visual-guide-2025.pdf
Ishika Ghosh
 
APM Midlands Region April 2025 Sacha Hind Circulated.pdf
APM Midlands Region April 2025 Sacha Hind Circulated.pdfAPM Midlands Region April 2025 Sacha Hind Circulated.pdf
APM Midlands Region April 2025 Sacha Hind Circulated.pdf
Association for Project Management
 
Biophysics Chapter 3 Methods of Studying Macromolecules.pdf
Biophysics Chapter 3 Methods of Studying Macromolecules.pdfBiophysics Chapter 3 Methods of Studying Macromolecules.pdf
Biophysics Chapter 3 Methods of Studying Macromolecules.pdf
PKLI-Institute of Nursing and Allied Health Sciences Lahore , Pakistan.
 
Grade 3 - English - Printable Worksheet (PDF Format)
Grade 3 - English - Printable Worksheet  (PDF Format)Grade 3 - English - Printable Worksheet  (PDF Format)
Grade 3 - English - Printable Worksheet (PDF Format)
Sritoma Majumder
 
BỘ ĐỀ TUYỂN SINH VÀO LỚP 10 TIẾNG ANH - 25 ĐỀ THI BÁM SÁT CẤU TRÚC MỚI NHẤT, ...
BỘ ĐỀ TUYỂN SINH VÀO LỚP 10 TIẾNG ANH - 25 ĐỀ THI BÁM SÁT CẤU TRÚC MỚI NHẤT, ...BỘ ĐỀ TUYỂN SINH VÀO LỚP 10 TIẾNG ANH - 25 ĐỀ THI BÁM SÁT CẤU TRÚC MỚI NHẤT, ...
BỘ ĐỀ TUYỂN SINH VÀO LỚP 10 TIẾNG ANH - 25 ĐỀ THI BÁM SÁT CẤU TRÚC MỚI NHẤT, ...
Nguyen Thanh Tu Collection
 
THE STG QUIZ GROUP D.pptx quiz by Ridip Hazarika
THE STG QUIZ GROUP D.pptx   quiz by Ridip HazarikaTHE STG QUIZ GROUP D.pptx   quiz by Ridip Hazarika
THE STG QUIZ GROUP D.pptx quiz by Ridip Hazarika
Ridip Hazarika
 
Sugar-Sensing Mechanism in plants....pptx
Sugar-Sensing Mechanism in plants....pptxSugar-Sensing Mechanism in plants....pptx
Sugar-Sensing Mechanism in plants....pptx
Dr. Renu Jangid
 
Metamorphosis: Life's Transformative Journey
Metamorphosis: Life's Transformative JourneyMetamorphosis: Life's Transformative Journey
Metamorphosis: Life's Transformative Journey
Arshad Shaikh
 
Contact Lens:::: An Overview.pptx.: Optometry
Contact Lens:::: An Overview.pptx.: OptometryContact Lens:::: An Overview.pptx.: Optometry
Contact Lens:::: An Overview.pptx.: Optometry
MushahidRaza8
 
K12 Tableau Tuesday - Algebra Equity and Access in Atlanta Public Schools
K12 Tableau Tuesday  - Algebra Equity and Access in Atlanta Public SchoolsK12 Tableau Tuesday  - Algebra Equity and Access in Atlanta Public Schools
K12 Tableau Tuesday - Algebra Equity and Access in Atlanta Public Schools
dogden2
 
How to Manage Opening & Closing Controls in Odoo 17 POS
How to Manage Opening & Closing Controls in Odoo 17 POSHow to Manage Opening & Closing Controls in Odoo 17 POS
How to Manage Opening & Closing Controls in Odoo 17 POS
Celine George
 
How to Set warnings for invoicing specific customers in odoo
How to Set warnings for invoicing specific customers in odooHow to Set warnings for invoicing specific customers in odoo
How to Set warnings for invoicing specific customers in odoo
Celine George
 
dynastic art of the Pallava dynasty south India
dynastic art of the Pallava dynasty south Indiadynastic art of the Pallava dynasty south India
dynastic art of the Pallava dynasty south India
PrachiSontakke5
 
03#UNTAGGED. Generosity in architecture.
03#UNTAGGED. Generosity in architecture.03#UNTAGGED. Generosity in architecture.
03#UNTAGGED. Generosity in architecture.
MCH
 
"Basics of Heterocyclic Compounds and Their Naming Rules"
"Basics of Heterocyclic Compounds and Their Naming Rules""Basics of Heterocyclic Compounds and Their Naming Rules"
"Basics of Heterocyclic Compounds and Their Naming Rules"
rupalinirmalbpharm
 
Sinhala_Male_Names.pdf Sinhala_Male_Name
Sinhala_Male_Names.pdf Sinhala_Male_NameSinhala_Male_Names.pdf Sinhala_Male_Name
Sinhala_Male_Names.pdf Sinhala_Male_Name
keshanf79
 
GDGLSPGCOER - Git and GitHub Workshop.pptx
GDGLSPGCOER - Git and GitHub Workshop.pptxGDGLSPGCOER - Git and GitHub Workshop.pptx
GDGLSPGCOER - Git and GitHub Workshop.pptx
azeenhodekar
 
Introduction-to-Communication-and-Media-Studies-1736283331.pdf
Introduction-to-Communication-and-Media-Studies-1736283331.pdfIntroduction-to-Communication-and-Media-Studies-1736283331.pdf
Introduction-to-Communication-and-Media-Studies-1736283331.pdf
james5028
 
2541William_McCollough_DigitalDetox.docx
2541William_McCollough_DigitalDetox.docx2541William_McCollough_DigitalDetox.docx
2541William_McCollough_DigitalDetox.docx
contactwilliamm2546
 
apa-style-referencing-visual-guide-2025.pdf
apa-style-referencing-visual-guide-2025.pdfapa-style-referencing-visual-guide-2025.pdf
apa-style-referencing-visual-guide-2025.pdf
Ishika Ghosh
 
Grade 3 - English - Printable Worksheet (PDF Format)
Grade 3 - English - Printable Worksheet  (PDF Format)Grade 3 - English - Printable Worksheet  (PDF Format)
Grade 3 - English - Printable Worksheet (PDF Format)
Sritoma Majumder
 
BỘ ĐỀ TUYỂN SINH VÀO LỚP 10 TIẾNG ANH - 25 ĐỀ THI BÁM SÁT CẤU TRÚC MỚI NHẤT, ...
BỘ ĐỀ TUYỂN SINH VÀO LỚP 10 TIẾNG ANH - 25 ĐỀ THI BÁM SÁT CẤU TRÚC MỚI NHẤT, ...BỘ ĐỀ TUYỂN SINH VÀO LỚP 10 TIẾNG ANH - 25 ĐỀ THI BÁM SÁT CẤU TRÚC MỚI NHẤT, ...
BỘ ĐỀ TUYỂN SINH VÀO LỚP 10 TIẾNG ANH - 25 ĐỀ THI BÁM SÁT CẤU TRÚC MỚI NHẤT, ...
Nguyen Thanh Tu Collection
 
THE STG QUIZ GROUP D.pptx quiz by Ridip Hazarika
THE STG QUIZ GROUP D.pptx   quiz by Ridip HazarikaTHE STG QUIZ GROUP D.pptx   quiz by Ridip Hazarika
THE STG QUIZ GROUP D.pptx quiz by Ridip Hazarika
Ridip Hazarika
 
Sugar-Sensing Mechanism in plants....pptx
Sugar-Sensing Mechanism in plants....pptxSugar-Sensing Mechanism in plants....pptx
Sugar-Sensing Mechanism in plants....pptx
Dr. Renu Jangid
 
Metamorphosis: Life's Transformative Journey
Metamorphosis: Life's Transformative JourneyMetamorphosis: Life's Transformative Journey
Metamorphosis: Life's Transformative Journey
Arshad Shaikh
 
Contact Lens:::: An Overview.pptx.: Optometry
Contact Lens:::: An Overview.pptx.: OptometryContact Lens:::: An Overview.pptx.: Optometry
Contact Lens:::: An Overview.pptx.: Optometry
MushahidRaza8
 
K12 Tableau Tuesday - Algebra Equity and Access in Atlanta Public Schools
K12 Tableau Tuesday  - Algebra Equity and Access in Atlanta Public SchoolsK12 Tableau Tuesday  - Algebra Equity and Access in Atlanta Public Schools
K12 Tableau Tuesday - Algebra Equity and Access in Atlanta Public Schools
dogden2
 
How to Manage Opening & Closing Controls in Odoo 17 POS
How to Manage Opening & Closing Controls in Odoo 17 POSHow to Manage Opening & Closing Controls in Odoo 17 POS
How to Manage Opening & Closing Controls in Odoo 17 POS
Celine George
 
How to Set warnings for invoicing specific customers in odoo
How to Set warnings for invoicing specific customers in odooHow to Set warnings for invoicing specific customers in odoo
How to Set warnings for invoicing specific customers in odoo
Celine George
 

Hybrid attribute and re-encryption-based key management for secure and scalable mobile applications in clouds

  • 1. HYBRID ATTRIBUTE- AND RE-ENCRYPTION-BASED KEY MANAGEMENT FOR SECURE AND SCALABLE MOBILE APPLICATIONS IN CLOUDS ABSTRACT: Outsourcing data to the cloud are beneficial for reasons of economy, scalability, and accessibility, but significant technical challenges remain. Sensitive data stored in the cloud must be protected from being read in the clear by a cloud provider that is honest but curious. Additionally, cloud-based data are increasingly being accessed by resource-constrained mobile devices for which the processing and communication cost must be minimized. Novel modifications to attribute-based encryption are proposed to allow authorized users access to cloud data based on the satisfaction of required attributes such that the higher computational load from cryptographic operations is assigned to the cloud provider and the total communication cost is lowered for the mobile user. Furthermore, data re-encryption
  • 2. may be optionally performed by the cloud provider to reduce the expense of user revocation in a mobile user environment while preserving the privacy of user data stored in the cloud. The proposed protocol has been realized on commercially popular mobile and cloud platforms to demonstrate real-world benchmarks that show the efficacy of the scheme. A simulation calibrated with the benchmark results shows the scalability potential of the scheme in the context of a realistic workload in a mobile cloud computing system. EXISTING SYSTEM: Data outsourcing to a cloud is appropriate for any class of applications that requires data to be kept in storage and disseminated to many users. Clients that engage a cloud provider typically only pay for the amount of storage, related computation, and amount of network communication actually consumed; they do not incur the capital and maintenance costs of an in-house solution. In addition, the cloud provider offers the
  • 3. advantages of automatic backup and replication to ensure the safety, longevity, and high accessibility of the user data. A major concern that is typically not sufficiently addressed in practice, however, is that data, by default, are stored in the clear; it may be accessed and read by a cloud administrator without knowledge of the client. A cloud administrator may not be trusted despite the presence of contractual security obligations, if data security is not further enforced through technical means. An additional risk is that sensitive data carry the persistent risk of being intercepted by an unauthorized party despite safeguards promised by the provider. Therefore, it is useful to apply software techniques, such as encryption key management, to ensure that the confidentiality of cloud data is preserved at all times. It is especially crucial to safeguard sensitive user data such as e-mails, personal customer information, financial records, and medical records.
  • 4. DISADVANTAGES OF EXISTING SYSTEM: · It is not secure. · There is no confidentiality. · It is especially crucial to safeguard sensitive user data. PROBLEM STATEMENT: A major concern that is typically not sufficiently addressed in practice, however, is that data, by default, are stored in the clear; it may be accessed and read by a cloud administrator without knowledge of the client. SCOPE: Important requirement is for data to be addressable with fine-grained access controls on the record-level or finer, to provide flexibility. PROPOSED SYSTEM: A protocol for outsourcing data storage to a cloud provider in secure fashion is provided. The provider is unable to read stored data; authorized users may do so based on qualification
  • 5. through possession of the right attributes without arbitration by the data owner. The protocol is designed to be efficient for resource-constrained mobile users by delegating computation and requests to a cloud provider or trusted authority, where appropriate, without compromising security. An improvement is made over a traditional attribute based encryption scheme, such that responsibility over key generation is divided between a mobile data owner and a trusted authority; the owner is relieved of the highest computational and messaging burdens. Additional security is provided through a group keying mechanism; the data owner controls access based on the distribution of an additional secret key, beyond possession of the required attributes. This additional security measure is an optional variant applicable to highly sensitive data subject to frequent access. Re-encryption, as a process of transforming the stored ciphertext, permits efficient revocation of users; it does not require removal of attributes and subsequent key regeneration, and may be
  • 6. administered by a trusted authority without involvement of the data owner. ADVANTAGES OF PROPOSED SYSTEM: · It is more secure. · It reduces data traffic. · Cost efficient.
  • 8. SYSTEM CONFIGURATION:- HARDWARE REQUIREMENTS:-  Processor - Pentium –IV  Speed - 1.1 Ghz  RAM - 512 MB(min)  Hard Disk - 40 GB  Key Board - Standard Windows Keyboard  Mouse - Two or Three Button Mouse  Monitor - LCD/LED SOFTWARE REQUIREMENTS: • Operating system : Windows XP • Coding Language : Java • Data Base : MySQL • Tool : Net Beans IDE
  • 9. REFERENCE: Piotr K.Tysowski and M.Anwarul Hasan “Hybrid Attribute- and Re- Encryption-Based Key Management for Secure and Scalable Mobile Applications in Clouds” IEEE TRANSACTIONS ON CLOUD COMPUTING, VOL. 1, NO. 2, JULY-DECEMBER 2013.
  • 10. REFERENCE: Piotr K.Tysowski and M.Anwarul Hasan “Hybrid Attribute- and Re- Encryption-Based Key Management for Secure and Scalable Mobile Applications in Clouds” IEEE TRANSACTIONS ON CLOUD COMPUTING, VOL. 1, NO. 2, JULY-DECEMBER 2013.