Professional Documents
Culture Documents
Available at http://www.ijcsonline.com/
Badhusha S , aChippy Raju, aDhanya V.S, aNazila A.N, aSyamini S, bSuja Vijayan, cJooby E
Abstract
For securing data in cloud, we propose a new privacy preserving authenticated access control scheme. In this scheme,
mainly cloud verifies the users authenticity. And this be done without knowing the users identity before storing
information. It also has some added features of access control in which, only the authorized or valid users are able to
decrypt the stored information. It also support modification, creation and reading data within the cloud and prevent
replay attacks. One of the main advantages of this scheme is the authentication and access control. But in other schemes
access control designed for clouds are centralized. And the scheme is also robust and decentralized. The properties that
are comparable to centralized approaches are communication, computation and storage.
Keywords: Access control, authentication, attribute based signature, attribute based encryption, cloud storage.
I.
INTRODUCTION
94 | International Journal of Computer Systems, ISSN-(2394-1065), Vol. 03, Issue 02, February, 2016
Badhusha S et al
RELATED WORK
IMPLEMENTATION
95 | International Journal of Computer Systems, ISSN-(2394-1065), Vol. 03, Issue 02, February, 2016
Badhusha S et al
Attribute-Based Encryption:
a) System Initialization
b) Key Generation and Distribution by KDCs
c) Encryption by Sender
d) Decryption by Receiver
c) KDC Setup
d) Attribute Generation
e) Sign
f) Verify
C.
96 | International Journal of Computer Systems, ISSN-(2394-1065), Vol. 03, Issue 02, February, 2016
Badhusha S et al
V.
A. RSA Algorithm
RSA algorithm is used for securing users
details(contents in PHR). RSA is a public key encryption
algorithm. RSA involves a public key and a private key.
The public key can be known by everyone and is used for
encrypting messages. Messages encrypted with the public
key can only be decrypted in a reasonable amount of time
using the private key. The keys for the RSA algorithm are
generated the following way:
1.
2.
Compute
n
=
pq.
n is used as the modulus for both the public and
private keys. Its length, usually expressed in bits,
is the key length.
3.
4.
5.
97 | International Journal of Computer Systems, ISSN-(2394-1065), Vol. 03, Issue 02, February, 2016
Badhusha S et al
B. Encryption
Alice transmits her public key (n, e) to Bob and keeps
the private key secret. Bob then wishes to send message M
to Alice. He first turns M into an integer m, such that 0 m
< n by using an agreed-upon reversible protocol known as
a padding scheme. He then computes the ciphertext c
corresponding to
. This can be done
quickly using the method exponentiation by squaring. Bob
then transmits c to Alice.
[5]
[6]
[7]
14th Intl Conf. Financial Cryptography and Data Security, pp. 136149, 2010.
H. Li, Y. Dai, L. Tian, and H. Yang, Identity-Based
Authentication for Cloud Computing, Proc. First Intl Conf. Cloud
Computing (CloudCom), pp. 157-166, 2009.
C. Gentry, A Fully Homomorphic Encryption Scheme, PhD
dissertation, Stanford Univ., http://www.crypto.stanford.edu/
craig, 2009.
A.-R. Sadeghi, T. Schneider, and M. Winandy, Token-Based
Cloud Computing, Proc. Third Intl Conf. Trust and Trustworthy
Computing (TRUST), pp. 417-429, 2010.
C. Decryption
Alice can recover m from c by using her private key
exponent
d
via
computing
.Given m, she can recover the original
message M by reversing the padding scheme.
VI.
CONCLUSION
ACKNOWLEDGEMENT
We are greatly indebted to God Almighty for being the
guiding light throughout with his abundant grace and
blessing that strengthened us to do this endeavour with
confidence. We express our heartfelt gratitude towards
Prof. Z.A ZOYA, Principal, College of Engineering
Perumon, for extending all the facilities required for doing
our project. We would also like to thank Dr Dheebha J,
Head, Department of Computer Engineering, for providing
constant support and encouragement. Now We extend our
sincere thanks to our project co-ordinator Mrs.Jooby E,
Assistant professor of Computer Science Department and
project guide Dr. Suja Vijayan, Assistant professor of
Information technology Department for guiding our work
and providing timely advices and valuable suggestions.
Last but not the least; we extend our heartfelt gratitude to
our parents and friends for their support and assistance.
REFERENCES
[1]
[2]
[3]
[4]
S.Ruj,M.Stojmenovic, and
A.Nayak,Privacy Preserving Acess
Control with Authentication for Securing Data in Clouds,Proc.
IEEE/ACM Intl Symp. Cluster, Cloud and Grid Computing, pp.
556- 563, 2012.
C. Wang, Q. Wang, K. Ren, N. Cao, and W. Lou, Toward Secure
and Dependable Storage Services in Cloud Computing, IEEE
Trans. Services Computing, vol. 5, no. 2, pp. 220-232, Apr.-June
2012.
J. Li, Q. Wang, C. Wang, N. Cao, K. Ren, and W. Lou, Fuzzy
Keyword Search Over Encrypted Data in Cloud Computing, Proc.
IEEE INFOCOM, pp. 441-445, 2010.
S. Kamara and K. Lauter, Cryptographic Cloud Storage, Proc.
98 | International Journal of Computer Systems, ISSN-(2394-1065), Vol. 03, Issue 02, February, 2016