SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 396
Secure Cloud Data Using Attribute Based Encryption
Miss. Chopade Sonali S.1, Miss. Bade Prachi N.2, Miss. Bagal Shweta A.3
Miss.Kapurkar Megha E.4
BE Student of Department of Computer Science and Engineering ,AGTI’S Dr.Daulatrao Aher College of Engg,
Karad, Maharashtra,India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract— Currently world there are many extra
challenges for security of data and access handle when
users outsource sensitive data for sharing on another
party server known as cloud servers, which are not
within the same trusted domain as data owners. The
existing ideas usedtomaintain confidentiality of personal
medical record (PMR) against untrusted servers by
disclosing data decryption keys only to authorized users.
However, in doing so, these answer inevitably introduce
complexity in key management also burden on the data
owner in data management well as in key management.
The problem of simultaneously achieving security and
data confidentiality and fine-grainedness of access
control still remains unresolved. This paper addresses
this challenge 1) Key management, 2) Defining and
enforcing access policies based on dataattributes,and, 3)
Keyword search over the encrypted data. PMR(patient
medical record)in the system users need to deal with
complicated key the management problem to accomplish
fine-grained access control when their PMRs are
encrypted using symmetric key cryptography or
asymmetric key cryptography and With our scheme
multi-authorityattributebased accesscontrol(MA-ABAC)
we can reduce the key management complexity for
owners and users. For this users are divided into the
two domains; professional domain and personal
domain. To achieve security of PMR, key management,
user revocation and efficient keyword searchexploiting
KP-ABE, Multi-authority attribute based access
control(MA-ABAC), and uniquely combining it with
techniques of proxy re-encryption.
Keywords—Attributebasedencryption,Cloudcomputing,
Fine-grained access control, KP-ABE, MA-ABAC, User
Revocation, Proxy Re-encryption.
I. INTRODUCTION
Many companies have their maintenanceandthey provide
lots of cloud computing services. More and more sensitive
data from consumers have been concentrated into the cloud
for its flexible management and economic savings. It is an
exceptionally hard to look the most suitable services or
products for ordinary consumers, as there are so many
services and has turned out to be more pervasive, because of
its advantages for consumers, including a products in cloud.
It is very general that before outsourcingthesensitivedatait
is encrypted. It is difficult to encrypting full data first and
then decrypting that data, due to the large bandwidth and
computation burden. ConsumersmayneedCloudcomputing
is a new trend of computing where resources like storage,
computation poor, network, applications etc. are delivered
as services. Pay-as-you-consume cloudcomputingparadigm
to retrieve only certain specific dateless they are fascinated
of the whole data collection. Cloud services provide great
conveniences for the users to enjoy the on demand cloud
applications without considering the local infrastructure
limitations. During the data accessing,differentusersmaybe
in a collaborative relationship, and thus data sharing
becomes significant to achieve productive benefits. The
existing security solutions mainly focus on the
authentication to realize that a user’s privative data cannot
be unauthorized accessed, but neglect a subtle privacy issue
during a user challenging the cloud server to request other
users for data sharing.
1.1 Motivation
There are already well-known existing securitysolutions
mainly focus on the authentication to realize that a user’s
privative data cannot be unauthorized accessed, but neglect
a subtle privacy issue during a user challenging the cloud
server to request other users for data sharing. The
challenged access requestitself mayreveal theusersprivacy.
The existing systems define shared authority basedprivacy-
preserving authentication protocol which allows security
and privacy in the cloud storage. In this, shared access
authority is achievedbyanonymousaccessrequestmatching
mechanism with security and privacy considerations.
Attribute based access control is adopted to realize that the
user can only access its own data fields; proxy re-encryption
is applied by the cloud server to provide data sharingamong
the multiple users
1.2 Project Overview
In cloud it’s a common practice to encrypt the data before
it is been stored in cloud storage. Access control is another
added security upon the encrypteddata to bestronglystored
in the cloud platform. At the start of the module while
registering the user verification is checked through the OTP
by Email. Attribute Based Encryption- ABE is finding its
existence in cloud technology since it can deliver data
privacy with one-to-many, fine grained and non-interactive
access control.CP-ABE- Cipher text-policy attribute based
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 397
encryption is a modified version of ABE with moreflexibility
in delivering security for general applications. Cloudservice
provider (CSP) manages all the servers and services
provided to the client. The data owner can encrypt, decrypt,
secure, store and share data to CSP. The files stored in cloud
platform follow a hierarchical structure.
1.3 Need of Project
There square measure already well-known existing
security solutions in the main specialize in the
authentication to appreciate that a user’s privative
information cannot be unauthorized accessed, however
neglect a refined privacy issue throughouta userdifficultthe
cloud server to request different users for information
sharing
II. LITERATURE SURVEY
Hong Liuet al. [1] explain Cloud services provide great
conveniences for the users to enjoy the on-demand cloud
applications without considering the local infrastructure
limitations. The existing security solutions mainly focus on
the authentication to realize that a user’s privative data
cannot be unauthorized accessed, but neglect a subtle
privacy issue during a user challenging the cloud server to
request other users for data sharing. The challenged access
request itself may reveal the user’s privacy no matter
whether or not it can obtain the data access permissions. In
this paper, propose a shared authority based privacy-
preserving authentication protocol (SAPA)toaddressabove
privacy issue for cloud storage. In the SAPA,
JingiLi, Jinet al.[2] suggests a design to solve the problem of
integrity auditing and secure deduplication on cloud data.
Specifically, aiming at achieving both data integrity and de
duplication in cloud, propose two secure systems, namely
Sec Cloud and Sec Cloud+.Sec Cloud introduces an auditing
entity with maintenance of a Map Reduce cloud, whichhelps
clients generate data tags before uploading as ll as audit the
integrity of data having been stored in cloud.
Prof. Rucha R. Galgali [3] investigated the problem relatedto
the data privacy variousschemes are proposed based on the
attribute based encryption techniques,still moreattentionis
on privacy of the data content and the access control of the
data and less attention is on the privilege control and the
privacy of user’s identity. In these presents Anony Control
scheme which address data privacy as ll as users identity
privacy also presents Anony Control-F for fully preventing
the identity problems. In proposed scheme add user
revocation in users to enable activating and deactivating
users to enhance efficiency of system and adding more
feasibility.
III. PROBLEM DEFINITION & SCOPE
A) Problem Statement
To provide security to the data on cloud by encrypting it
by using Advanced Encryption Standard algorithm and
Attribute Based Encryption scheme.
B) Reserch Scope
In our proposed system, we can store data securely on
cloud by encrypting it using AES and ABE algorithms. Also,
we can share data securely on cloud. Here, data is encrypted
by sender by using public key and same can be decrypted at
receiver side using private key. Therefore though the data is
captured by hacker, he cannot decrypt is it until he gets
private key, hence data is secure over the cloud.
C) Area of Reserch
Cloud computing is emerging paradigm provides various IT
related services. The security and privacy are two major
factors that inhibits the growth of cloud computing.Security
factors are reasons behind lesser number real time and
business relates cloud application compared to consumer
related cloud application.Firstly,the pros and cons of
different Attribute based encryption methods are
analyzed.Secondly,a new encryption method based on
Attribute Based Encryption (ABE) using hash function,
digital signature and asymmetric encryption scheme has
been proposed.Our proposed algorithm is simplified yet.
efficient algorithm that can implemented for cloud critical
application
.
The keys only associated with the policy that is to be
satisfied by the attributes that are associating the data can
decrypt the data. Key policy AttributeBasedEncryption(KP-
ABE) scheme is a public key encryption technique that is
designed for one-to-many communications.
2.4 Goals and Objectives
i] To encrypt data and store on cloud to protect from
hackers.
ii] For reliability and conventionality of cloud user.
iii] To provide data security.
iv] To provide access control.
v] To reduce the complexity involved in key
management where the user can encrypt his/her
private data.
IV. SOFTWARE DESIGN
A) Data flow diagram:
A data flow diagram (DFD)isa graphical representationof
the "flow" of data through an information system, modelling
its process aspects. A DFD is often used as a preliminarystep
to create an overview of the system without going into great
detail, which can later be elaborated. A context diagram is a
top level (also known as "Level 0") data flow diagram.Itonly
contains one process node ("Process 0") thatgeneralizesthe
function of the entire system in relationship to external
entities. DFD Layers. ... Draw the context diagram first,
followed by various layers of data flow diagrams. DFD
Levels.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 398
Fig. Dataflow Diagram-level 0
1st Level DFD:
Fig. Dataflow Diagram-level
B) Flow Chart:
A flowchart is a diagram that depicts a process, system or
computer algorithm. They are widely used in multiple
fields to document, study, and plan, improve and
communicate often complex processes in clear, easy-to
understand diagrams.
Fig.Flow Chart
V. IMPLEMENTATION DETAILS
Step 1: The application not only provides data content
privacy but also includes identity privacy by using
AnonyControl. AnonyControl decentralizes the central
authority to hide the identity of origin and semi-anonymity
is achieved with this. Subsequently, the AnonyControl-F,
which entirely hides the identity, helps in attaining full
anonymity.
Step 2: System uses Attribute Encryption Standard (AES)
algorithm. The algorithm is used to protect classified
information and is used by the entire world to encrypt and
decrypt sensitive data. AES consists of three block ciphers.
AES-128, AES-192, AES-256 and this each cipher uses 128
bits of blocks using cryptographic keys 128,192and256 bits
to encrypt and decrypt delicate data. The ciphersinstalledin
this algorithm uses. The same secret key for encrypting and
decrypting.The different rounds of keys that is executed.
Each series consists of steps that include substitution,
transposition, and mixing of plain text. Then the plain text is
transformed into cipher text.
Step 3: There are four types of systems: N Attribute
Authorities (denoted as A), Cloud Server, Data Owners and
Data Consumers. A user can be a Data Owner and Data
Consumer in one session. Data owner encrypts and uploads
the files to the cloud server. Data consumer decrypts and
downloads the files from the cloud server.
Step 4: To perform any operations on files and to have
unlimited access to such records, the data owner and data
consumer should first register in the application. When the
registered at a time password, and unique id will send to
their registered mail id.
Step 5: To upload and download files by the user. The user
data owner/data consumer requests authority for
permission. The authority provides publickeytodata owner
and private key to the consumer. Issuing keys to authority
and authentication in our system is succeeding using
attribute-based encryption.
Step 6: Attribute-based encryption is a type of public-key
encryption in which the secret User key and the cipher text
are dependent upon (e.g., the country he lives, or the kind of
Subscription he has). In such a system, the decryption of a
cipher text is conceivable only if the set of attributes of the
user key matches the attributes of the cipher text. A critical
security aspect ofAttribute-Based Encryption is collusion-
resistance. An adversary that holds multiple keys should be
able to access data if at least one individual key grants
access.
Step 7: The keys provided by the authoritytotheusers(data
owner and data consumer) can be used to perform
operations and to have access to files in and out from the
cloud server.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 399
Fig. Implementation details
A) Cloud Computing
Data privacy a lot of study has been done on the potential of
cloud and the services that cloud computing can and could
deal. These services can be characterized into four main
sections: Storage as a Service (StaaS), Platform as a Service
(PaaS), Infrastructure as a Service (IaaS) and Software as a
Service (SaaS).Following section highlights these services
and their usage in depth.
B) Storage as a Service:
Cloud offers a storage space that is huge, seemingly
boundless, and rising every day. Storage as a Service (StaaS)
allows cloud applications to gauge beyond their inadequate
servers. Cloud storage systems needs to focus on
requirements for upholding users' data and information,
considering high performance, availability, replication, data
reliability and reliability. The accountability to individual is
maintainedandupholdscustomersowncomputerstorageas
cloud vendors deal them the choice of loading their
information in the cloud which is reachable whenever they
need. Unfortunately, due to the contradictory nature of the
necessities of cloud services, no one system implements all
of them together.
C) Security Issues:
Companies are promptly movingontocloudbecausethey
can now use the greatest capitals available on the market in
the blink of an eye and also decrease their operations cost
radically. But as more and more information is moved to the
cloud the security concerns have continuing to grow. Data
breaking is the biggest security issue. A capable hacker can
easily get into a client side application and get into the
client's intimate data .Incompetent and faulty APIs and
interfaces become the target. IT companies which provide
cloud services allow third party companies to alter the APIs
and familiarize their own functionality which in turn allows
these companies to comprehendtheinternal workingsof the
cloud. Denial of Service (DoS) is also a major menace
wherein the user is approved partial or not at all access to
their data. Companies now use cloud very frequently say all
days and DoS can root huge increase in cost bothfortheuser
and service provider. Connection snooping is that inwhicha
hacker can scan your online actions and copy/replay a
particular broadcast to get into your private data. It can also
lead to the user to unlawful or unsolicited sites. Data loss is
also another issue.
C) Privacy Preservation
Trusted third party: an optional and neutral entity, which
has advanced capabilities on behalf of the users, to perform
data public auditing and dispute arbitration.
D) Shared authority
To address the above-mentioned privacy issue to propose
privacy preserving authentication protocol (SAPA) for the
cloud data storage based on cloud storage which gives
authentication and authorization without concedingprivate
information. The main consideration will be as follows:
1) A new privacy challenge in cloud storage is to be located
and also to identify an in-direct privacy for data sharing, in
which the challenged request itself cannot get the user's
privacy 2) Designanauthenticationprotocol whichenhances
a user's access request, which is related to the privacy. The
shared access authority is achieved by unidentified access
request matching mechanism. 3) Cipher text-policy is
applied and a user can access its own data fields and proxy
re-encryption is accepted toprovideauthorizeddata sharing
among multiple users.
VI. CONCLUSIONS AND FUTURE SCOPE
In our Approach, in the cloud computing to achieve
privacy-preserving access authority sharing.Authentication
is established to guarantee data confidentiality and data
integrity. Data anonymity is achieved since the wrapped
values are exchanged during transmission. User privacy is
enhanced by anonymous access requeststo privatelyinform
the cloud server about the users access desires. Forward
security is realized by the session identifiers to prevent the
session correlation. It indicates that the proposed scheme is
possibly applied for enhanced privacy preservation in cloud
applications.
VII .ACKNOWLEDMENT
We would like to give the special thanks to the computer
science engineering department of the college DACOE HOD
Prof. Ashish N. Patil and Project guide Prof. Sayali P. Shinde
to have their guidance. We are also thankful to the
technologies that we have used to havesuchformatofpaper.
REFERENCES
[1]Hong Liu, Student Member, IEEE, HuanshengNing,Senior
Member, IEEE, QingxuXiong,Member, IEEE,andLaurence
T. Yang, Member, IEEE “Shared Authority Based Privacy-
preserving Authentication Protocol in Cloud Computing”
IEEE Transactions on Parallel andDistributed Systems
Volume: 26, Issue: 1, Jan. 2015.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 400
[2]JingiLi,JinLi,DongqingXie and ZhangCai“SecureAuditing
and Deduplicating Data in Cloud” DOI
10.1109/TC.2015.2389960, IEEE Transactions on
Computers
[3] Amol D Shelkar, Prof.Rucha R. Galgali, “ Data Access
Privilege With Attribute Based Encryption and User
Revocation”, International Research Journal of
Engineering and Technology (IRJET), Nov 2016.
[4] Praveen N.R and Renju Samuel,” Enhanced Efficient User
Revocation Mechanism on Top of Anonymous Attribute
Based Encryption” , International Journal of Emerging
Technology in Computer Science Electronics, AUGUST
2016.
[5]M. Satishkumar,B. dayKumar,Ch.ArunKumar,”Attribute
Based Data Sharing with At tribute Revocation toControl
Cloud Data Access”, International Journal of
Computational Science, Mathematics and Engineering,
February-2016.
[6] MuhammadYasirShabir, AsifIqbal,ZahidMahammad,and
AtaullahGhafoor, “ Analysis of Classical Encryption
Techniques in Cloud Computing” , ISSN 1007-0214 09/10
pp102-119 Vol. 21, Number1, February

More Related Content

What's hot (20)

IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET Journal
 
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Survey on Lightweight Secured Data Sharing Scheme for Cloud ComputingSurvey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
IRJET Journal
 
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud Systems
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud SystemsIRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud Systems
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud Systems
IRJET Journal
 
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic AlgorithamIRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET Journal
 
IRJET- A Review on Lightweight Secure Data Sharing Scheme for Mobile Cloud Co...
IRJET- A Review on Lightweight Secure Data Sharing Scheme for Mobile Cloud Co...IRJET- A Review on Lightweight Secure Data Sharing Scheme for Mobile Cloud Co...
IRJET- A Review on Lightweight Secure Data Sharing Scheme for Mobile Cloud Co...
IRJET Journal
 
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generationImprove HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
Editor IJMTER
 
IRJET- Securing Cloud Data Under Key Exposure
IRJET- Securing Cloud Data Under Key ExposureIRJET- Securing Cloud Data Under Key Exposure
IRJET- Securing Cloud Data Under Key Exposure
IRJET Journal
 
Fog computing a new concept to minimize the attacks and to provide security i...
Fog computing a new concept to minimize the attacks and to provide security i...Fog computing a new concept to minimize the attacks and to provide security i...
Fog computing a new concept to minimize the attacks and to provide security i...
eSAT Publishing House
 
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
IRJET Journal
 
An efficient and secure data storage in cloud computing using modified RSA pu...
An efficient and secure data storage in cloud computing using modified RSA pu...An efficient and secure data storage in cloud computing using modified RSA pu...
An efficient and secure data storage in cloud computing using modified RSA pu...
IJECEIAES
 
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...
IJCNCJournal
 
R180203114117
R180203114117R180203114117
R180203114117
IOSR Journals
 
IRJET- A Review Paper on an Efficient File Hierarchy Attribute Based Encr...
IRJET-  	  A Review Paper on an Efficient File Hierarchy Attribute Based Encr...IRJET-  	  A Review Paper on an Efficient File Hierarchy Attribute Based Encr...
IRJET- A Review Paper on an Efficient File Hierarchy Attribute Based Encr...
IRJET Journal
 
A Survey on Access Control Mechanisms using Attribute Based Encryption in cloud
A Survey on Access Control Mechanisms using Attribute Based Encryption in cloudA Survey on Access Control Mechanisms using Attribute Based Encryption in cloud
A Survey on Access Control Mechanisms using Attribute Based Encryption in cloud
ijsrd.com
 
IRJET- Redsc: Reliablity of Data Sharing in Cloud
IRJET- Redsc: Reliablity of Data Sharing in CloudIRJET- Redsc: Reliablity of Data Sharing in Cloud
IRJET- Redsc: Reliablity of Data Sharing in Cloud
IRJET Journal
 
Towards Achieving Efficient and Secure Way to Share the Data
Towards Achieving Efficient and Secure Way to Share the DataTowards Achieving Efficient and Secure Way to Share the Data
Towards Achieving Efficient and Secure Way to Share the Data
IRJET Journal
 
SecRBAC: Secure data in the Clouds
SecRBAC: Secure data in the CloudsSecRBAC: Secure data in the Clouds
SecRBAC: Secure data in the Clouds
Nexgen Technology
 
IRJET - Multimedia Security on Cloud Computing using Cryptography
IRJET - Multimedia Security on Cloud Computing using CryptographyIRJET - Multimedia Security on Cloud Computing using Cryptography
IRJET - Multimedia Security on Cloud Computing using Cryptography
IRJET Journal
 
Secure data sharing in cloud computing using revocable storage identity-based...
Secure data sharing in cloud computing using revocable storage identity-based...Secure data sharing in cloud computing using revocable storage identity-based...
Secure data sharing in cloud computing using revocable storage identity-based...
Shakas Technologies
 
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET Journal
 
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET Journal
 
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Survey on Lightweight Secured Data Sharing Scheme for Cloud ComputingSurvey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
IRJET Journal
 
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud Systems
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud SystemsIRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud Systems
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud Systems
IRJET Journal
 
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic AlgorithamIRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET Journal
 
IRJET- A Review on Lightweight Secure Data Sharing Scheme for Mobile Cloud Co...
IRJET- A Review on Lightweight Secure Data Sharing Scheme for Mobile Cloud Co...IRJET- A Review on Lightweight Secure Data Sharing Scheme for Mobile Cloud Co...
IRJET- A Review on Lightweight Secure Data Sharing Scheme for Mobile Cloud Co...
IRJET Journal
 
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generationImprove HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
Editor IJMTER
 
IRJET- Securing Cloud Data Under Key Exposure
IRJET- Securing Cloud Data Under Key ExposureIRJET- Securing Cloud Data Under Key Exposure
IRJET- Securing Cloud Data Under Key Exposure
IRJET Journal
 
Fog computing a new concept to minimize the attacks and to provide security i...
Fog computing a new concept to minimize the attacks and to provide security i...Fog computing a new concept to minimize the attacks and to provide security i...
Fog computing a new concept to minimize the attacks and to provide security i...
eSAT Publishing House
 
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
IRJET Journal
 
An efficient and secure data storage in cloud computing using modified RSA pu...
An efficient and secure data storage in cloud computing using modified RSA pu...An efficient and secure data storage in cloud computing using modified RSA pu...
An efficient and secure data storage in cloud computing using modified RSA pu...
IJECEIAES
 
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...
IJCNCJournal
 
IRJET- A Review Paper on an Efficient File Hierarchy Attribute Based Encr...
IRJET-  	  A Review Paper on an Efficient File Hierarchy Attribute Based Encr...IRJET-  	  A Review Paper on an Efficient File Hierarchy Attribute Based Encr...
IRJET- A Review Paper on an Efficient File Hierarchy Attribute Based Encr...
IRJET Journal
 
A Survey on Access Control Mechanisms using Attribute Based Encryption in cloud
A Survey on Access Control Mechanisms using Attribute Based Encryption in cloudA Survey on Access Control Mechanisms using Attribute Based Encryption in cloud
A Survey on Access Control Mechanisms using Attribute Based Encryption in cloud
ijsrd.com
 
IRJET- Redsc: Reliablity of Data Sharing in Cloud
IRJET- Redsc: Reliablity of Data Sharing in CloudIRJET- Redsc: Reliablity of Data Sharing in Cloud
IRJET- Redsc: Reliablity of Data Sharing in Cloud
IRJET Journal
 
Towards Achieving Efficient and Secure Way to Share the Data
Towards Achieving Efficient and Secure Way to Share the DataTowards Achieving Efficient and Secure Way to Share the Data
Towards Achieving Efficient and Secure Way to Share the Data
IRJET Journal
 
SecRBAC: Secure data in the Clouds
SecRBAC: Secure data in the CloudsSecRBAC: Secure data in the Clouds
SecRBAC: Secure data in the Clouds
Nexgen Technology
 
IRJET - Multimedia Security on Cloud Computing using Cryptography
IRJET - Multimedia Security on Cloud Computing using CryptographyIRJET - Multimedia Security on Cloud Computing using Cryptography
IRJET - Multimedia Security on Cloud Computing using Cryptography
IRJET Journal
 
Secure data sharing in cloud computing using revocable storage identity-based...
Secure data sharing in cloud computing using revocable storage identity-based...Secure data sharing in cloud computing using revocable storage identity-based...
Secure data sharing in cloud computing using revocable storage identity-based...
Shakas Technologies
 
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET Journal
 

Similar to IRJET- Secure Cloud Data Using Attribute Based Encryption (20)

Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
IRJET Journal
 
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage SecurityEnhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Editor IJMTER
 
Efficient and Empiric Keyword Search Using Cloud
Efficient and Empiric Keyword Search Using CloudEfficient and Empiric Keyword Search Using Cloud
Efficient and Empiric Keyword Search Using Cloud
IRJET Journal
 
Iaetsd storage privacy protection against data
Iaetsd storage privacy protection against dataIaetsd storage privacy protection against data
Iaetsd storage privacy protection against data
Iaetsd Iaetsd
 
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET Journal
 
IRJET- Deduplication of Encrypted Bigdata on Cloud
IRJET- Deduplication of Encrypted Bigdata on CloudIRJET- Deduplication of Encrypted Bigdata on Cloud
IRJET- Deduplication of Encrypted Bigdata on Cloud
IRJET Journal
 
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
Editor IJCATR
 
SECURITY IN COULD DATA STORAGE USING SOFT COMPUTING TECHNIQUES AND ELGAMAL CR...
SECURITY IN COULD DATA STORAGE USING SOFT COMPUTING TECHNIQUES AND ELGAMAL CR...SECURITY IN COULD DATA STORAGE USING SOFT COMPUTING TECHNIQUES AND ELGAMAL CR...
SECURITY IN COULD DATA STORAGE USING SOFT COMPUTING TECHNIQUES AND ELGAMAL CR...
IRJET Journal
 
Analysis of classical encryption techniques in cloud computing
Analysis of classical encryption techniques in cloud computingAnalysis of classical encryption techniques in cloud computing
Analysis of classical encryption techniques in cloud computing
redpel dot com
 
IRJET- Compress and Secure Data Sharing for Mobile Cloud Computing
IRJET- Compress and Secure Data Sharing for Mobile Cloud ComputingIRJET- Compress and Secure Data Sharing for Mobile Cloud Computing
IRJET- Compress and Secure Data Sharing for Mobile Cloud Computing
IRJET Journal
 
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET Journal
 
DATA SHARING PROTOCOL TO MINIMIZE THE SECURITY AND PRIVACY RISKS OF CLOUD STO...
DATA SHARING PROTOCOL TO MINIMIZE THE SECURITY AND PRIVACY RISKS OF CLOUD STO...DATA SHARING PROTOCOL TO MINIMIZE THE SECURITY AND PRIVACY RISKS OF CLOUD STO...
DATA SHARING PROTOCOL TO MINIMIZE THE SECURITY AND PRIVACY RISKS OF CLOUD STO...
IRJET Journal
 
IRJET- Security Enhancement for Sharing Data within Group Members in Cloud
IRJET- Security Enhancement for Sharing Data within Group Members in CloudIRJET- Security Enhancement for Sharing Data within Group Members in Cloud
IRJET- Security Enhancement for Sharing Data within Group Members in Cloud
IRJET Journal
 
A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...
A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...
A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...
cscpconf
 
A Survey on Access Control Scheme for Data in Cloud with Anonymous Authentica...
A Survey on Access Control Scheme for Data in Cloud with Anonymous Authentica...A Survey on Access Control Scheme for Data in Cloud with Anonymous Authentica...
A Survey on Access Control Scheme for Data in Cloud with Anonymous Authentica...
IRJET Journal
 
IRJET- Multi-Owner Keyword Search over Cloud with Cryptography
IRJET- Multi-Owner Keyword Search over Cloud with CryptographyIRJET- Multi-Owner Keyword Search over Cloud with Cryptography
IRJET- Multi-Owner Keyword Search over Cloud with Cryptography
IRJET Journal
 
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET Journal
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
IJERD Editor
 
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
IRJET Journal
 
THE SURVEY ON REFERENCE MODEL FOR OPEN STORAGE SYSTEMS INTERCONNECTION MASS S...
THE SURVEY ON REFERENCE MODEL FOR OPEN STORAGE SYSTEMS INTERCONNECTION MASS S...THE SURVEY ON REFERENCE MODEL FOR OPEN STORAGE SYSTEMS INTERCONNECTION MASS S...
THE SURVEY ON REFERENCE MODEL FOR OPEN STORAGE SYSTEMS INTERCONNECTION MASS S...
IRJET Journal
 
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
IRJET Journal
 
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage SecurityEnhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Editor IJMTER
 
Efficient and Empiric Keyword Search Using Cloud
Efficient and Empiric Keyword Search Using CloudEfficient and Empiric Keyword Search Using Cloud
Efficient and Empiric Keyword Search Using Cloud
IRJET Journal
 
Iaetsd storage privacy protection against data
Iaetsd storage privacy protection against dataIaetsd storage privacy protection against data
Iaetsd storage privacy protection against data
Iaetsd Iaetsd
 
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET Journal
 
IRJET- Deduplication of Encrypted Bigdata on Cloud
IRJET- Deduplication of Encrypted Bigdata on CloudIRJET- Deduplication of Encrypted Bigdata on Cloud
IRJET- Deduplication of Encrypted Bigdata on Cloud
IRJET Journal
 
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
Editor IJCATR
 
SECURITY IN COULD DATA STORAGE USING SOFT COMPUTING TECHNIQUES AND ELGAMAL CR...
SECURITY IN COULD DATA STORAGE USING SOFT COMPUTING TECHNIQUES AND ELGAMAL CR...SECURITY IN COULD DATA STORAGE USING SOFT COMPUTING TECHNIQUES AND ELGAMAL CR...
SECURITY IN COULD DATA STORAGE USING SOFT COMPUTING TECHNIQUES AND ELGAMAL CR...
IRJET Journal
 
Analysis of classical encryption techniques in cloud computing
Analysis of classical encryption techniques in cloud computingAnalysis of classical encryption techniques in cloud computing
Analysis of classical encryption techniques in cloud computing
redpel dot com
 
IRJET- Compress and Secure Data Sharing for Mobile Cloud Computing
IRJET- Compress and Secure Data Sharing for Mobile Cloud ComputingIRJET- Compress and Secure Data Sharing for Mobile Cloud Computing
IRJET- Compress and Secure Data Sharing for Mobile Cloud Computing
IRJET Journal
 
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET Journal
 
DATA SHARING PROTOCOL TO MINIMIZE THE SECURITY AND PRIVACY RISKS OF CLOUD STO...
DATA SHARING PROTOCOL TO MINIMIZE THE SECURITY AND PRIVACY RISKS OF CLOUD STO...DATA SHARING PROTOCOL TO MINIMIZE THE SECURITY AND PRIVACY RISKS OF CLOUD STO...
DATA SHARING PROTOCOL TO MINIMIZE THE SECURITY AND PRIVACY RISKS OF CLOUD STO...
IRJET Journal
 
IRJET- Security Enhancement for Sharing Data within Group Members in Cloud
IRJET- Security Enhancement for Sharing Data within Group Members in CloudIRJET- Security Enhancement for Sharing Data within Group Members in Cloud
IRJET- Security Enhancement for Sharing Data within Group Members in Cloud
IRJET Journal
 
A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...
A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...
A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...
cscpconf
 
A Survey on Access Control Scheme for Data in Cloud with Anonymous Authentica...
A Survey on Access Control Scheme for Data in Cloud with Anonymous Authentica...A Survey on Access Control Scheme for Data in Cloud with Anonymous Authentica...
A Survey on Access Control Scheme for Data in Cloud with Anonymous Authentica...
IRJET Journal
 
IRJET- Multi-Owner Keyword Search over Cloud with Cryptography
IRJET- Multi-Owner Keyword Search over Cloud with CryptographyIRJET- Multi-Owner Keyword Search over Cloud with Cryptography
IRJET- Multi-Owner Keyword Search over Cloud with Cryptography
IRJET Journal
 
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET Journal
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
IJERD Editor
 
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
IRJET Journal
 
THE SURVEY ON REFERENCE MODEL FOR OPEN STORAGE SYSTEMS INTERCONNECTION MASS S...
THE SURVEY ON REFERENCE MODEL FOR OPEN STORAGE SYSTEMS INTERCONNECTION MASS S...THE SURVEY ON REFERENCE MODEL FOR OPEN STORAGE SYSTEMS INTERCONNECTION MASS S...
THE SURVEY ON REFERENCE MODEL FOR OPEN STORAGE SYSTEMS INTERCONNECTION MASS S...
IRJET Journal
 

More from IRJET Journal (20)

Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
IRJET Journal
 
BRAIN TUMOUR DETECTION AND CLASSIFICATION
BRAIN TUMOUR DETECTION AND CLASSIFICATIONBRAIN TUMOUR DETECTION AND CLASSIFICATION
BRAIN TUMOUR DETECTION AND CLASSIFICATION
IRJET Journal
 
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
IRJET Journal
 
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ..."Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
IRJET Journal
 
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
IRJET Journal
 
Breast Cancer Detection using Computer Vision
Breast Cancer Detection using Computer VisionBreast Cancer Detection using Computer Vision
Breast Cancer Detection using Computer Vision
IRJET Journal
 
Auto-Charging E-Vehicle with its battery Management.
Auto-Charging E-Vehicle with its battery Management.Auto-Charging E-Vehicle with its battery Management.
Auto-Charging E-Vehicle with its battery Management.
IRJET Journal
 
Analysis of high energy charge particle in the Heliosphere
Analysis of high energy charge particle in the HeliosphereAnalysis of high energy charge particle in the Heliosphere
Analysis of high energy charge particle in the Heliosphere
IRJET Journal
 
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
A Novel System for Recommending Agricultural Crops Using Machine Learning App...A Novel System for Recommending Agricultural Crops Using Machine Learning App...
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
IRJET Journal
 
Auto-Charging E-Vehicle with its battery Management.
Auto-Charging E-Vehicle with its battery Management.Auto-Charging E-Vehicle with its battery Management.
Auto-Charging E-Vehicle with its battery Management.
IRJET Journal
 
Analysis of high energy charge particle in the Heliosphere
Analysis of high energy charge particle in the HeliosphereAnalysis of high energy charge particle in the Heliosphere
Analysis of high energy charge particle in the Heliosphere
IRJET Journal
 
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
IRJET Journal
 
FIR filter-based Sample Rate Convertors and its use in NR PRACH
FIR filter-based Sample Rate Convertors and its use in NR PRACHFIR filter-based Sample Rate Convertors and its use in NR PRACH
FIR filter-based Sample Rate Convertors and its use in NR PRACH
IRJET Journal
 
Kiona – A Smart Society Automation Project
Kiona – A Smart Society Automation ProjectKiona – A Smart Society Automation Project
Kiona – A Smart Society Automation Project
IRJET Journal
 
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
IRJET Journal
 
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
IRJET Journal
 
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
Invest in Innovation: Empowering Ideas through Blockchain Based CrowdfundingInvest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
IRJET Journal
 
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
IRJET Journal
 
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUBSPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
IRJET Journal
 
AR Application: Homewise VisionMs. Vaishali Rane, Om Awadhoot, Bhargav Gajare...
AR Application: Homewise VisionMs. Vaishali Rane, Om Awadhoot, Bhargav Gajare...AR Application: Homewise VisionMs. Vaishali Rane, Om Awadhoot, Bhargav Gajare...
AR Application: Homewise VisionMs. Vaishali Rane, Om Awadhoot, Bhargav Gajare...
IRJET Journal
 
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
IRJET Journal
 
BRAIN TUMOUR DETECTION AND CLASSIFICATION
BRAIN TUMOUR DETECTION AND CLASSIFICATIONBRAIN TUMOUR DETECTION AND CLASSIFICATION
BRAIN TUMOUR DETECTION AND CLASSIFICATION
IRJET Journal
 
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
IRJET Journal
 
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ..."Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
IRJET Journal
 
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
IRJET Journal
 
Breast Cancer Detection using Computer Vision
Breast Cancer Detection using Computer VisionBreast Cancer Detection using Computer Vision
Breast Cancer Detection using Computer Vision
IRJET Journal
 
Auto-Charging E-Vehicle with its battery Management.
Auto-Charging E-Vehicle with its battery Management.Auto-Charging E-Vehicle with its battery Management.
Auto-Charging E-Vehicle with its battery Management.
IRJET Journal
 
Analysis of high energy charge particle in the Heliosphere
Analysis of high energy charge particle in the HeliosphereAnalysis of high energy charge particle in the Heliosphere
Analysis of high energy charge particle in the Heliosphere
IRJET Journal
 
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
A Novel System for Recommending Agricultural Crops Using Machine Learning App...A Novel System for Recommending Agricultural Crops Using Machine Learning App...
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
IRJET Journal
 
Auto-Charging E-Vehicle with its battery Management.
Auto-Charging E-Vehicle with its battery Management.Auto-Charging E-Vehicle with its battery Management.
Auto-Charging E-Vehicle with its battery Management.
IRJET Journal
 
Analysis of high energy charge particle in the Heliosphere
Analysis of high energy charge particle in the HeliosphereAnalysis of high energy charge particle in the Heliosphere
Analysis of high energy charge particle in the Heliosphere
IRJET Journal
 
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
IRJET Journal
 
FIR filter-based Sample Rate Convertors and its use in NR PRACH
FIR filter-based Sample Rate Convertors and its use in NR PRACHFIR filter-based Sample Rate Convertors and its use in NR PRACH
FIR filter-based Sample Rate Convertors and its use in NR PRACH
IRJET Journal
 
Kiona – A Smart Society Automation Project
Kiona – A Smart Society Automation ProjectKiona – A Smart Society Automation Project
Kiona – A Smart Society Automation Project
IRJET Journal
 
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
IRJET Journal
 
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
IRJET Journal
 
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
Invest in Innovation: Empowering Ideas through Blockchain Based CrowdfundingInvest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
IRJET Journal
 
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
IRJET Journal
 
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUBSPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
IRJET Journal
 
AR Application: Homewise VisionMs. Vaishali Rane, Om Awadhoot, Bhargav Gajare...
AR Application: Homewise VisionMs. Vaishali Rane, Om Awadhoot, Bhargav Gajare...AR Application: Homewise VisionMs. Vaishali Rane, Om Awadhoot, Bhargav Gajare...
AR Application: Homewise VisionMs. Vaishali Rane, Om Awadhoot, Bhargav Gajare...
IRJET Journal
 

Recently uploaded (20)

IntroSlides-April-BuildWithAI-VertexAI.pdf
IntroSlides-April-BuildWithAI-VertexAI.pdfIntroSlides-April-BuildWithAI-VertexAI.pdf
IntroSlides-April-BuildWithAI-VertexAI.pdf
Luiz Carneiro
 
Data Structures_Introduction to algorithms.pptx
Data Structures_Introduction to algorithms.pptxData Structures_Introduction to algorithms.pptx
Data Structures_Introduction to algorithms.pptx
RushaliDeshmukh2
 
fluke dealers in bangalore..............
fluke dealers in bangalore..............fluke dealers in bangalore..............
fluke dealers in bangalore..............
Haresh Vaswani
 
Level 1-Safety.pptx Presentation of Electrical Safety
Level 1-Safety.pptx Presentation of Electrical SafetyLevel 1-Safety.pptx Presentation of Electrical Safety
Level 1-Safety.pptx Presentation of Electrical Safety
JoseAlbertoCariasDel
 
DSP and MV the Color image processing.ppt
DSP and MV the  Color image processing.pptDSP and MV the  Color image processing.ppt
DSP and MV the Color image processing.ppt
HafizAhamed8
 
DATA-DRIVEN SHOULDER INVERSE KINEMATICS YoungBeom Kim1 , Byung-Ha Park1 , Kwa...
DATA-DRIVEN SHOULDER INVERSE KINEMATICS YoungBeom Kim1 , Byung-Ha Park1 , Kwa...DATA-DRIVEN SHOULDER INVERSE KINEMATICS YoungBeom Kim1 , Byung-Ha Park1 , Kwa...
DATA-DRIVEN SHOULDER INVERSE KINEMATICS YoungBeom Kim1 , Byung-Ha Park1 , Kwa...
charlesdick1345
 
Smart_Storage_Systems_Production_Engineering.pptx
Smart_Storage_Systems_Production_Engineering.pptxSmart_Storage_Systems_Production_Engineering.pptx
Smart_Storage_Systems_Production_Engineering.pptx
rushikeshnavghare94
 
Compiler Design_Lexical Analysis phase.pptx
Compiler Design_Lexical Analysis phase.pptxCompiler Design_Lexical Analysis phase.pptx
Compiler Design_Lexical Analysis phase.pptx
RushaliDeshmukh2
 
Smart Storage Solutions.pptx for production engineering
Smart Storage Solutions.pptx for production engineeringSmart Storage Solutions.pptx for production engineering
Smart Storage Solutions.pptx for production engineering
rushikeshnavghare94
 
MAQUINARIA MINAS CEMA 6th Edition (1).pdf
MAQUINARIA MINAS CEMA 6th Edition (1).pdfMAQUINARIA MINAS CEMA 6th Edition (1).pdf
MAQUINARIA MINAS CEMA 6th Edition (1).pdf
ssuser562df4
 
Introduction to FLUID MECHANICS & KINEMATICS
Introduction to FLUID MECHANICS &  KINEMATICSIntroduction to FLUID MECHANICS &  KINEMATICS
Introduction to FLUID MECHANICS & KINEMATICS
narayanaswamygdas
 
Mathematical foundation machine learning.pdf
Mathematical foundation machine learning.pdfMathematical foundation machine learning.pdf
Mathematical foundation machine learning.pdf
TalhaShahid49
 
Degree_of_Automation.pdf for Instrumentation and industrial specialist
Degree_of_Automation.pdf for  Instrumentation  and industrial specialistDegree_of_Automation.pdf for  Instrumentation  and industrial specialist
Degree_of_Automation.pdf for Instrumentation and industrial specialist
shreyabhosale19
 
some basics electrical and electronics knowledge
some basics electrical and electronics knowledgesome basics electrical and electronics knowledge
some basics electrical and electronics knowledge
nguyentrungdo88
 
ADVXAI IN MALWARE ANALYSIS FRAMEWORK: BALANCING EXPLAINABILITY WITH SECURITY
ADVXAI IN MALWARE ANALYSIS FRAMEWORK: BALANCING EXPLAINABILITY WITH SECURITYADVXAI IN MALWARE ANALYSIS FRAMEWORK: BALANCING EXPLAINABILITY WITH SECURITY
ADVXAI IN MALWARE ANALYSIS FRAMEWORK: BALANCING EXPLAINABILITY WITH SECURITY
ijscai
 
Structural Response of Reinforced Self-Compacting Concrete Deep Beam Using Fi...
Structural Response of Reinforced Self-Compacting Concrete Deep Beam Using Fi...Structural Response of Reinforced Self-Compacting Concrete Deep Beam Using Fi...
Structural Response of Reinforced Self-Compacting Concrete Deep Beam Using Fi...
Journal of Soft Computing in Civil Engineering
 
15th International Conference on Computer Science, Engineering and Applicatio...
15th International Conference on Computer Science, Engineering and Applicatio...15th International Conference on Computer Science, Engineering and Applicatio...
15th International Conference on Computer Science, Engineering and Applicatio...
IJCSES Journal
 
211421893-M-Tech-CIVIL-Structural-Engineering-pdf.pdf
211421893-M-Tech-CIVIL-Structural-Engineering-pdf.pdf211421893-M-Tech-CIVIL-Structural-Engineering-pdf.pdf
211421893-M-Tech-CIVIL-Structural-Engineering-pdf.pdf
inmishra17121973
 
theory-slides-for react for beginners.pptx
theory-slides-for react for beginners.pptxtheory-slides-for react for beginners.pptx
theory-slides-for react for beginners.pptx
sanchezvanessa7896
 
Compiler Design Unit1 PPT Phases of Compiler.pptx
Compiler Design Unit1 PPT Phases of Compiler.pptxCompiler Design Unit1 PPT Phases of Compiler.pptx
Compiler Design Unit1 PPT Phases of Compiler.pptx
RushaliDeshmukh2
 
IntroSlides-April-BuildWithAI-VertexAI.pdf
IntroSlides-April-BuildWithAI-VertexAI.pdfIntroSlides-April-BuildWithAI-VertexAI.pdf
IntroSlides-April-BuildWithAI-VertexAI.pdf
Luiz Carneiro
 
Data Structures_Introduction to algorithms.pptx
Data Structures_Introduction to algorithms.pptxData Structures_Introduction to algorithms.pptx
Data Structures_Introduction to algorithms.pptx
RushaliDeshmukh2
 
fluke dealers in bangalore..............
fluke dealers in bangalore..............fluke dealers in bangalore..............
fluke dealers in bangalore..............
Haresh Vaswani
 
Level 1-Safety.pptx Presentation of Electrical Safety
Level 1-Safety.pptx Presentation of Electrical SafetyLevel 1-Safety.pptx Presentation of Electrical Safety
Level 1-Safety.pptx Presentation of Electrical Safety
JoseAlbertoCariasDel
 
DSP and MV the Color image processing.ppt
DSP and MV the  Color image processing.pptDSP and MV the  Color image processing.ppt
DSP and MV the Color image processing.ppt
HafizAhamed8
 
DATA-DRIVEN SHOULDER INVERSE KINEMATICS YoungBeom Kim1 , Byung-Ha Park1 , Kwa...
DATA-DRIVEN SHOULDER INVERSE KINEMATICS YoungBeom Kim1 , Byung-Ha Park1 , Kwa...DATA-DRIVEN SHOULDER INVERSE KINEMATICS YoungBeom Kim1 , Byung-Ha Park1 , Kwa...
DATA-DRIVEN SHOULDER INVERSE KINEMATICS YoungBeom Kim1 , Byung-Ha Park1 , Kwa...
charlesdick1345
 
Smart_Storage_Systems_Production_Engineering.pptx
Smart_Storage_Systems_Production_Engineering.pptxSmart_Storage_Systems_Production_Engineering.pptx
Smart_Storage_Systems_Production_Engineering.pptx
rushikeshnavghare94
 
Compiler Design_Lexical Analysis phase.pptx
Compiler Design_Lexical Analysis phase.pptxCompiler Design_Lexical Analysis phase.pptx
Compiler Design_Lexical Analysis phase.pptx
RushaliDeshmukh2
 
Smart Storage Solutions.pptx for production engineering
Smart Storage Solutions.pptx for production engineeringSmart Storage Solutions.pptx for production engineering
Smart Storage Solutions.pptx for production engineering
rushikeshnavghare94
 
MAQUINARIA MINAS CEMA 6th Edition (1).pdf
MAQUINARIA MINAS CEMA 6th Edition (1).pdfMAQUINARIA MINAS CEMA 6th Edition (1).pdf
MAQUINARIA MINAS CEMA 6th Edition (1).pdf
ssuser562df4
 
Introduction to FLUID MECHANICS & KINEMATICS
Introduction to FLUID MECHANICS &  KINEMATICSIntroduction to FLUID MECHANICS &  KINEMATICS
Introduction to FLUID MECHANICS & KINEMATICS
narayanaswamygdas
 
Mathematical foundation machine learning.pdf
Mathematical foundation machine learning.pdfMathematical foundation machine learning.pdf
Mathematical foundation machine learning.pdf
TalhaShahid49
 
Degree_of_Automation.pdf for Instrumentation and industrial specialist
Degree_of_Automation.pdf for  Instrumentation  and industrial specialistDegree_of_Automation.pdf for  Instrumentation  and industrial specialist
Degree_of_Automation.pdf for Instrumentation and industrial specialist
shreyabhosale19
 
some basics electrical and electronics knowledge
some basics electrical and electronics knowledgesome basics electrical and electronics knowledge
some basics electrical and electronics knowledge
nguyentrungdo88
 
ADVXAI IN MALWARE ANALYSIS FRAMEWORK: BALANCING EXPLAINABILITY WITH SECURITY
ADVXAI IN MALWARE ANALYSIS FRAMEWORK: BALANCING EXPLAINABILITY WITH SECURITYADVXAI IN MALWARE ANALYSIS FRAMEWORK: BALANCING EXPLAINABILITY WITH SECURITY
ADVXAI IN MALWARE ANALYSIS FRAMEWORK: BALANCING EXPLAINABILITY WITH SECURITY
ijscai
 
15th International Conference on Computer Science, Engineering and Applicatio...
15th International Conference on Computer Science, Engineering and Applicatio...15th International Conference on Computer Science, Engineering and Applicatio...
15th International Conference on Computer Science, Engineering and Applicatio...
IJCSES Journal
 
211421893-M-Tech-CIVIL-Structural-Engineering-pdf.pdf
211421893-M-Tech-CIVIL-Structural-Engineering-pdf.pdf211421893-M-Tech-CIVIL-Structural-Engineering-pdf.pdf
211421893-M-Tech-CIVIL-Structural-Engineering-pdf.pdf
inmishra17121973
 
theory-slides-for react for beginners.pptx
theory-slides-for react for beginners.pptxtheory-slides-for react for beginners.pptx
theory-slides-for react for beginners.pptx
sanchezvanessa7896
 
Compiler Design Unit1 PPT Phases of Compiler.pptx
Compiler Design Unit1 PPT Phases of Compiler.pptxCompiler Design Unit1 PPT Phases of Compiler.pptx
Compiler Design Unit1 PPT Phases of Compiler.pptx
RushaliDeshmukh2
 

IRJET- Secure Cloud Data Using Attribute Based Encryption

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 396 Secure Cloud Data Using Attribute Based Encryption Miss. Chopade Sonali S.1, Miss. Bade Prachi N.2, Miss. Bagal Shweta A.3 Miss.Kapurkar Megha E.4 BE Student of Department of Computer Science and Engineering ,AGTI’S Dr.Daulatrao Aher College of Engg, Karad, Maharashtra,India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract— Currently world there are many extra challenges for security of data and access handle when users outsource sensitive data for sharing on another party server known as cloud servers, which are not within the same trusted domain as data owners. The existing ideas usedtomaintain confidentiality of personal medical record (PMR) against untrusted servers by disclosing data decryption keys only to authorized users. However, in doing so, these answer inevitably introduce complexity in key management also burden on the data owner in data management well as in key management. The problem of simultaneously achieving security and data confidentiality and fine-grainedness of access control still remains unresolved. This paper addresses this challenge 1) Key management, 2) Defining and enforcing access policies based on dataattributes,and, 3) Keyword search over the encrypted data. PMR(patient medical record)in the system users need to deal with complicated key the management problem to accomplish fine-grained access control when their PMRs are encrypted using symmetric key cryptography or asymmetric key cryptography and With our scheme multi-authorityattributebased accesscontrol(MA-ABAC) we can reduce the key management complexity for owners and users. For this users are divided into the two domains; professional domain and personal domain. To achieve security of PMR, key management, user revocation and efficient keyword searchexploiting KP-ABE, Multi-authority attribute based access control(MA-ABAC), and uniquely combining it with techniques of proxy re-encryption. Keywords—Attributebasedencryption,Cloudcomputing, Fine-grained access control, KP-ABE, MA-ABAC, User Revocation, Proxy Re-encryption. I. INTRODUCTION Many companies have their maintenanceandthey provide lots of cloud computing services. More and more sensitive data from consumers have been concentrated into the cloud for its flexible management and economic savings. It is an exceptionally hard to look the most suitable services or products for ordinary consumers, as there are so many services and has turned out to be more pervasive, because of its advantages for consumers, including a products in cloud. It is very general that before outsourcingthesensitivedatait is encrypted. It is difficult to encrypting full data first and then decrypting that data, due to the large bandwidth and computation burden. ConsumersmayneedCloudcomputing is a new trend of computing where resources like storage, computation poor, network, applications etc. are delivered as services. Pay-as-you-consume cloudcomputingparadigm to retrieve only certain specific dateless they are fascinated of the whole data collection. Cloud services provide great conveniences for the users to enjoy the on demand cloud applications without considering the local infrastructure limitations. During the data accessing,differentusersmaybe in a collaborative relationship, and thus data sharing becomes significant to achieve productive benefits. The existing security solutions mainly focus on the authentication to realize that a user’s privative data cannot be unauthorized accessed, but neglect a subtle privacy issue during a user challenging the cloud server to request other users for data sharing. 1.1 Motivation There are already well-known existing securitysolutions mainly focus on the authentication to realize that a user’s privative data cannot be unauthorized accessed, but neglect a subtle privacy issue during a user challenging the cloud server to request other users for data sharing. The challenged access requestitself mayreveal theusersprivacy. The existing systems define shared authority basedprivacy- preserving authentication protocol which allows security and privacy in the cloud storage. In this, shared access authority is achievedbyanonymousaccessrequestmatching mechanism with security and privacy considerations. Attribute based access control is adopted to realize that the user can only access its own data fields; proxy re-encryption is applied by the cloud server to provide data sharingamong the multiple users 1.2 Project Overview In cloud it’s a common practice to encrypt the data before it is been stored in cloud storage. Access control is another added security upon the encrypteddata to bestronglystored in the cloud platform. At the start of the module while registering the user verification is checked through the OTP by Email. Attribute Based Encryption- ABE is finding its existence in cloud technology since it can deliver data privacy with one-to-many, fine grained and non-interactive access control.CP-ABE- Cipher text-policy attribute based
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 397 encryption is a modified version of ABE with moreflexibility in delivering security for general applications. Cloudservice provider (CSP) manages all the servers and services provided to the client. The data owner can encrypt, decrypt, secure, store and share data to CSP. The files stored in cloud platform follow a hierarchical structure. 1.3 Need of Project There square measure already well-known existing security solutions in the main specialize in the authentication to appreciate that a user’s privative information cannot be unauthorized accessed, however neglect a refined privacy issue throughouta userdifficultthe cloud server to request different users for information sharing II. LITERATURE SURVEY Hong Liuet al. [1] explain Cloud services provide great conveniences for the users to enjoy the on-demand cloud applications without considering the local infrastructure limitations. The existing security solutions mainly focus on the authentication to realize that a user’s privative data cannot be unauthorized accessed, but neglect a subtle privacy issue during a user challenging the cloud server to request other users for data sharing. The challenged access request itself may reveal the user’s privacy no matter whether or not it can obtain the data access permissions. In this paper, propose a shared authority based privacy- preserving authentication protocol (SAPA)toaddressabove privacy issue for cloud storage. In the SAPA, JingiLi, Jinet al.[2] suggests a design to solve the problem of integrity auditing and secure deduplication on cloud data. Specifically, aiming at achieving both data integrity and de duplication in cloud, propose two secure systems, namely Sec Cloud and Sec Cloud+.Sec Cloud introduces an auditing entity with maintenance of a Map Reduce cloud, whichhelps clients generate data tags before uploading as ll as audit the integrity of data having been stored in cloud. Prof. Rucha R. Galgali [3] investigated the problem relatedto the data privacy variousschemes are proposed based on the attribute based encryption techniques,still moreattentionis on privacy of the data content and the access control of the data and less attention is on the privilege control and the privacy of user’s identity. In these presents Anony Control scheme which address data privacy as ll as users identity privacy also presents Anony Control-F for fully preventing the identity problems. In proposed scheme add user revocation in users to enable activating and deactivating users to enhance efficiency of system and adding more feasibility. III. PROBLEM DEFINITION & SCOPE A) Problem Statement To provide security to the data on cloud by encrypting it by using Advanced Encryption Standard algorithm and Attribute Based Encryption scheme. B) Reserch Scope In our proposed system, we can store data securely on cloud by encrypting it using AES and ABE algorithms. Also, we can share data securely on cloud. Here, data is encrypted by sender by using public key and same can be decrypted at receiver side using private key. Therefore though the data is captured by hacker, he cannot decrypt is it until he gets private key, hence data is secure over the cloud. C) Area of Reserch Cloud computing is emerging paradigm provides various IT related services. The security and privacy are two major factors that inhibits the growth of cloud computing.Security factors are reasons behind lesser number real time and business relates cloud application compared to consumer related cloud application.Firstly,the pros and cons of different Attribute based encryption methods are analyzed.Secondly,a new encryption method based on Attribute Based Encryption (ABE) using hash function, digital signature and asymmetric encryption scheme has been proposed.Our proposed algorithm is simplified yet. efficient algorithm that can implemented for cloud critical application . The keys only associated with the policy that is to be satisfied by the attributes that are associating the data can decrypt the data. Key policy AttributeBasedEncryption(KP- ABE) scheme is a public key encryption technique that is designed for one-to-many communications. 2.4 Goals and Objectives i] To encrypt data and store on cloud to protect from hackers. ii] For reliability and conventionality of cloud user. iii] To provide data security. iv] To provide access control. v] To reduce the complexity involved in key management where the user can encrypt his/her private data. IV. SOFTWARE DESIGN A) Data flow diagram: A data flow diagram (DFD)isa graphical representationof the "flow" of data through an information system, modelling its process aspects. A DFD is often used as a preliminarystep to create an overview of the system without going into great detail, which can later be elaborated. A context diagram is a top level (also known as "Level 0") data flow diagram.Itonly contains one process node ("Process 0") thatgeneralizesthe function of the entire system in relationship to external entities. DFD Layers. ... Draw the context diagram first, followed by various layers of data flow diagrams. DFD Levels.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 398 Fig. Dataflow Diagram-level 0 1st Level DFD: Fig. Dataflow Diagram-level B) Flow Chart: A flowchart is a diagram that depicts a process, system or computer algorithm. They are widely used in multiple fields to document, study, and plan, improve and communicate often complex processes in clear, easy-to understand diagrams. Fig.Flow Chart V. IMPLEMENTATION DETAILS Step 1: The application not only provides data content privacy but also includes identity privacy by using AnonyControl. AnonyControl decentralizes the central authority to hide the identity of origin and semi-anonymity is achieved with this. Subsequently, the AnonyControl-F, which entirely hides the identity, helps in attaining full anonymity. Step 2: System uses Attribute Encryption Standard (AES) algorithm. The algorithm is used to protect classified information and is used by the entire world to encrypt and decrypt sensitive data. AES consists of three block ciphers. AES-128, AES-192, AES-256 and this each cipher uses 128 bits of blocks using cryptographic keys 128,192and256 bits to encrypt and decrypt delicate data. The ciphersinstalledin this algorithm uses. The same secret key for encrypting and decrypting.The different rounds of keys that is executed. Each series consists of steps that include substitution, transposition, and mixing of plain text. Then the plain text is transformed into cipher text. Step 3: There are four types of systems: N Attribute Authorities (denoted as A), Cloud Server, Data Owners and Data Consumers. A user can be a Data Owner and Data Consumer in one session. Data owner encrypts and uploads the files to the cloud server. Data consumer decrypts and downloads the files from the cloud server. Step 4: To perform any operations on files and to have unlimited access to such records, the data owner and data consumer should first register in the application. When the registered at a time password, and unique id will send to their registered mail id. Step 5: To upload and download files by the user. The user data owner/data consumer requests authority for permission. The authority provides publickeytodata owner and private key to the consumer. Issuing keys to authority and authentication in our system is succeeding using attribute-based encryption. Step 6: Attribute-based encryption is a type of public-key encryption in which the secret User key and the cipher text are dependent upon (e.g., the country he lives, or the kind of Subscription he has). In such a system, the decryption of a cipher text is conceivable only if the set of attributes of the user key matches the attributes of the cipher text. A critical security aspect ofAttribute-Based Encryption is collusion- resistance. An adversary that holds multiple keys should be able to access data if at least one individual key grants access. Step 7: The keys provided by the authoritytotheusers(data owner and data consumer) can be used to perform operations and to have access to files in and out from the cloud server.
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 399 Fig. Implementation details A) Cloud Computing Data privacy a lot of study has been done on the potential of cloud and the services that cloud computing can and could deal. These services can be characterized into four main sections: Storage as a Service (StaaS), Platform as a Service (PaaS), Infrastructure as a Service (IaaS) and Software as a Service (SaaS).Following section highlights these services and their usage in depth. B) Storage as a Service: Cloud offers a storage space that is huge, seemingly boundless, and rising every day. Storage as a Service (StaaS) allows cloud applications to gauge beyond their inadequate servers. Cloud storage systems needs to focus on requirements for upholding users' data and information, considering high performance, availability, replication, data reliability and reliability. The accountability to individual is maintainedandupholdscustomersowncomputerstorageas cloud vendors deal them the choice of loading their information in the cloud which is reachable whenever they need. Unfortunately, due to the contradictory nature of the necessities of cloud services, no one system implements all of them together. C) Security Issues: Companies are promptly movingontocloudbecausethey can now use the greatest capitals available on the market in the blink of an eye and also decrease their operations cost radically. But as more and more information is moved to the cloud the security concerns have continuing to grow. Data breaking is the biggest security issue. A capable hacker can easily get into a client side application and get into the client's intimate data .Incompetent and faulty APIs and interfaces become the target. IT companies which provide cloud services allow third party companies to alter the APIs and familiarize their own functionality which in turn allows these companies to comprehendtheinternal workingsof the cloud. Denial of Service (DoS) is also a major menace wherein the user is approved partial or not at all access to their data. Companies now use cloud very frequently say all days and DoS can root huge increase in cost bothfortheuser and service provider. Connection snooping is that inwhicha hacker can scan your online actions and copy/replay a particular broadcast to get into your private data. It can also lead to the user to unlawful or unsolicited sites. Data loss is also another issue. C) Privacy Preservation Trusted third party: an optional and neutral entity, which has advanced capabilities on behalf of the users, to perform data public auditing and dispute arbitration. D) Shared authority To address the above-mentioned privacy issue to propose privacy preserving authentication protocol (SAPA) for the cloud data storage based on cloud storage which gives authentication and authorization without concedingprivate information. The main consideration will be as follows: 1) A new privacy challenge in cloud storage is to be located and also to identify an in-direct privacy for data sharing, in which the challenged request itself cannot get the user's privacy 2) Designanauthenticationprotocol whichenhances a user's access request, which is related to the privacy. The shared access authority is achieved by unidentified access request matching mechanism. 3) Cipher text-policy is applied and a user can access its own data fields and proxy re-encryption is accepted toprovideauthorizeddata sharing among multiple users. VI. CONCLUSIONS AND FUTURE SCOPE In our Approach, in the cloud computing to achieve privacy-preserving access authority sharing.Authentication is established to guarantee data confidentiality and data integrity. Data anonymity is achieved since the wrapped values are exchanged during transmission. User privacy is enhanced by anonymous access requeststo privatelyinform the cloud server about the users access desires. Forward security is realized by the session identifiers to prevent the session correlation. It indicates that the proposed scheme is possibly applied for enhanced privacy preservation in cloud applications. VII .ACKNOWLEDMENT We would like to give the special thanks to the computer science engineering department of the college DACOE HOD Prof. Ashish N. Patil and Project guide Prof. Sayali P. Shinde to have their guidance. We are also thankful to the technologies that we have used to havesuchformatofpaper. REFERENCES [1]Hong Liu, Student Member, IEEE, HuanshengNing,Senior Member, IEEE, QingxuXiong,Member, IEEE,andLaurence T. Yang, Member, IEEE “Shared Authority Based Privacy- preserving Authentication Protocol in Cloud Computing” IEEE Transactions on Parallel andDistributed Systems Volume: 26, Issue: 1, Jan. 2015.
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 400 [2]JingiLi,JinLi,DongqingXie and ZhangCai“SecureAuditing and Deduplicating Data in Cloud” DOI 10.1109/TC.2015.2389960, IEEE Transactions on Computers [3] Amol D Shelkar, Prof.Rucha R. Galgali, “ Data Access Privilege With Attribute Based Encryption and User Revocation”, International Research Journal of Engineering and Technology (IRJET), Nov 2016. [4] Praveen N.R and Renju Samuel,” Enhanced Efficient User Revocation Mechanism on Top of Anonymous Attribute Based Encryption” , International Journal of Emerging Technology in Computer Science Electronics, AUGUST 2016. [5]M. Satishkumar,B. dayKumar,Ch.ArunKumar,”Attribute Based Data Sharing with At tribute Revocation toControl Cloud Data Access”, International Journal of Computational Science, Mathematics and Engineering, February-2016. [6] MuhammadYasirShabir, AsifIqbal,ZahidMahammad,and AtaullahGhafoor, “ Analysis of Classical Encryption Techniques in Cloud Computing” , ISSN 1007-0214 09/10 pp102-119 Vol. 21, Number1, February