Sunteți pe pagina 1din 2

DOI 10.4010/2016.

967
ISSN 2321 3361 2016 IJESC

Research Article Volume 6 Issue No. 4

Decentralized Access Control and Anonymous Authentication of


Data Stored in Clouds
Vaibhav Hindole1, Amey Agnihotri2, Kuber Vishwas3, Dhruv Mishra4, Ashish Neeraj Dhaarkar 5
Department of Computer Engineering
Akurdi, Pune, India

Abstract:
We propose another decentralized access control plan in order to secure information stockpiling in mists that backings unknown
verification. In the proposed plan, the cloud will be able to confirm the arrangement's credibility without knowing the client's
character before putting away information. Our plan additionally has the included element of access control in which just
substantial clients have the capacity to decode the put away data. The plan averts replay assaults and backings creation,
adjustment, and perusing information put away in the cloud. We additionally address client denial. In addition, our confirmation
and access control plan is decentralized and vigorous as well as robust, not at all like different access control plans intended for
mists which are brought together. The correspondence, calculation, and capacity overheads are tantamount to incorporated
approaches.

Keywords: Access control , Key distribution system , Authentication , Attribute based encryption.

I. INTRODUCTION Searchable encryption:


RESEARCH in cloud computing is receiving a lot of Searchable encryption allows a party to outsource the
attention from both academic world,business world data in a private manner, while maintaining the ability to
industrial worlds. In cloud computing, users can outsource selectively search over it. In the process of searching on
their computation and storage to servers (also called clouds) private-key-encrypted data, the user himself encrypts the
using Internet. This frees users from the hassles of data, so he can organize it in an arbitrary way before
maintaining resources on-site. Clouds can provide several encryption and include additional data structures to allow
types of services like applications and platforms to help for efficient access of relevant data. The data and the
developers write applications . Much of the data stored in additional data structures can then be encrypted and stored
clouds is highly sensitive, for example, medical records and on the server so that only someone with the private key can
social networks. Security and privacy are, thus, very access it. In this setting, theinitial work for the user is at
important issues in cloud computing. In one hand, the user least as large as the data, but subsequent work of accessing
should authenticate itself before initiating any transaction, the Data is very small relative to the size of the data for both
and on the other hand, it must be ensured that the cloud does the user and the server.
not tamper with the data that is outsourced. User privacy is
also required so that the cloud or other users do not know II. LITERATURE REVIEW
the identity of the user. The cloud can hold the user 1) Privacy Preserving Access Control with Authentication
accountable for the data it outsources, and likewise, the for Securing Data in Clouds:
cloud is itself accountable for the services it provides. The We propose a new privacy preserving authenticated access
validity of the user who stores the data is also verified. control scheme for securing data in clouds. In the proposed
Apart from the technical solutions to ensure security and scheme, the cloud verifies the authenticity of the user
privacy, there is also a need for law enforcement. without knowing the users identity before storing
information. Our scheme also has the added feature of
The technologies being used are highlighted as follows: access control in which only valid users are able to decrypt
OwnCloud: the stored information. The scheme prevents replay attacks
OwnCloud is a suite of client-server software for and supports creation, modification, and reading data stored
creating file hosting services and using them. OwnCloud is in the cloud. Moreover, our authentication and access
functionally very similar to the widely used Dropbox, with control scheme is decentralized and robust, unlike other
the primary functional difference being that OwnCloud is access control schemes designed for clouds which are
free and open-source, and thereby allowing anyone to install centralized. The communication, computation, and storage
and operate it without charge on a private server, with no overheads are comparable to centralized approaches.
limits on storage space except for disk capacity or the
number of connected clients. Features of OwnCloud being 2) Toward Secure and Dependable Storage Services in
used are listed below. Cloud Computing:
Encryption of User Files. Cloud storage enables users to remotely store their data and
File storage in conventional directory structures. enjoy the on-demand high quality cloud applications
Sharing of content across groups or users. without the burden of local hardware and software
User and Group administration. management. Though the benefits are clear, such a service
Connecting External Storages. is also relinquishing users physical possession of their
outsourced data, which inevitably poses new security risks

International Journal of Engineering Science and Computing, April 2016 4216 http://ijesc.org/
data in cloud. In order to address this new problem and ALGORITHM :
further achieve a secure and dependable cloud storage
service, we propose in this paper flexible distributed storage Initial Phase:
integrity auditing mechanism, utilizing the homomorphism 1. Firstly user done registration by using initial name
token and distributed erasure-coded data. The proposed final name phone no. etc.
design allows users to audit the cloud storage with very 2. After registration, user log in by using user name
lightweight communication and computation cost. The and password.
auditing result not only ensures strong cloud storage 3. By using KDC owner decide which user can
correctness guarantee, but also simultaneously achieves fast authenticate the cloud.
data error localization, i.e. the identification of misbehaving
server. Considering the cloud data are dynamic in nature, Searching Phase:
the proposed design further supports secure and efficient 1. User send the keywords to the cloud.
dynamic operations on outsourced data, including block 2. Owner calculates all possible keywords and send to
modification, deletion, and append. Analysis shows the user.
proposed scheme is highly efficient 3. User selects the similar words with the edit
distance.
III. SYSTEM ARCHITECTURE 4. User computes the hashes of selected keyword, and
This architecture for encrypted cloud data includes send it to the cloud.
following components: Data Owner, Data User, Cloud 5. Cloud construct set of file IDs for each keyword.
Storage or Server. 6. Then IDs of files in the intersection set of the list of
sets from above step are returned to the user.
A. Data Owner 7. User then decrypt this IDs and retrieve the files.
Data owner extract keyword from data collection. He also
construct search-able encrypted index from the data V. CONCLUSION
collection, then he encrypt all files and send both encrypted We have exhibited a decentralized access control procedure
index and file to cloud server. with unknown verification, which gives client repudiation
and anticipates replay assaults. The cloud does not know the
B. Data User client's character that stores data, yet just checks the client's
User requests in the form of keywords to the cloud server. certifications. Key conveyance is done in a decentralized
manner. One impediment is that the cloud knows the
C. Cloud Server entrance arrangement for every record put away in the
Receives the request from user and then send the cloud. In future, we might want to shroud the properties and
corresponding encrypted files to the user as response. access approach of a client.

VI. REFERENCES
[1] Hanhua Chen, HaiJin , Lei Chen, Yunhao Liu, and
Lionel M. Ni., Optimizing Bloom Filter Settings in Peer-to-
Peer Multi-keyword Searching.
IEEE Transactions On Knowledge And Data Engineering,
Vol.24, No. 4, April 2012

[2] Ning Cao, Cong Wang, Ming Li, KuiRen, and Wenjing
Lou., Privacy-Preserving Multi-Keyword Ranked Search
over Encrypted Cloud Data. IEEE Transactions On Parallel
And Distributed Systems, Vol. 25, No. 1, January 2014
Fig 1 Cloud storage model
[3] Muhammad Naveed, ManojPrabhakaran, Carl A. Gunter
IV. PROPOSED SYSTEM
University of Illinois at Urbana-Champaign. Dynamic
This system combine the idea about the Decentralized
Searchable Encryption via Blind Storage.2014 IEEE
access control and the authentication techniques which is
Symposium on Security and Privacy.
considered as anonymous. Such proposed system is quite
unique and it helps to overcome the disadvantages of
security achieved by the cryptographic techniques or
encryption techniques. As we know that encryption or
cryptography greatly reduces the usabilty of cloud.

International Journal of Engineering Science and Computing, April 2016 4217 http://ijesc.org/

S-ar putea să vă placă și