Documente Academic
Documente Profesional
Documente Cultură
967
ISSN 2321 3361 2016 IJESC
Abstract:
We propose another decentralized access control plan in order to secure information stockpiling in mists that backings unknown
verification. In the proposed plan, the cloud will be able to confirm the arrangement's credibility without knowing the client's
character before putting away information. Our plan additionally has the included element of access control in which just
substantial clients have the capacity to decode the put away data. The plan averts replay assaults and backings creation,
adjustment, and perusing information put away in the cloud. We additionally address client denial. In addition, our confirmation
and access control plan is decentralized and vigorous as well as robust, not at all like different access control plans intended for
mists which are brought together. The correspondence, calculation, and capacity overheads are tantamount to incorporated
approaches.
Keywords: Access control , Key distribution system , Authentication , Attribute based encryption.
International Journal of Engineering Science and Computing, April 2016 4216 http://ijesc.org/
data in cloud. In order to address this new problem and ALGORITHM :
further achieve a secure and dependable cloud storage
service, we propose in this paper flexible distributed storage Initial Phase:
integrity auditing mechanism, utilizing the homomorphism 1. Firstly user done registration by using initial name
token and distributed erasure-coded data. The proposed final name phone no. etc.
design allows users to audit the cloud storage with very 2. After registration, user log in by using user name
lightweight communication and computation cost. The and password.
auditing result not only ensures strong cloud storage 3. By using KDC owner decide which user can
correctness guarantee, but also simultaneously achieves fast authenticate the cloud.
data error localization, i.e. the identification of misbehaving
server. Considering the cloud data are dynamic in nature, Searching Phase:
the proposed design further supports secure and efficient 1. User send the keywords to the cloud.
dynamic operations on outsourced data, including block 2. Owner calculates all possible keywords and send to
modification, deletion, and append. Analysis shows the user.
proposed scheme is highly efficient 3. User selects the similar words with the edit
distance.
III. SYSTEM ARCHITECTURE 4. User computes the hashes of selected keyword, and
This architecture for encrypted cloud data includes send it to the cloud.
following components: Data Owner, Data User, Cloud 5. Cloud construct set of file IDs for each keyword.
Storage or Server. 6. Then IDs of files in the intersection set of the list of
sets from above step are returned to the user.
A. Data Owner 7. User then decrypt this IDs and retrieve the files.
Data owner extract keyword from data collection. He also
construct search-able encrypted index from the data V. CONCLUSION
collection, then he encrypt all files and send both encrypted We have exhibited a decentralized access control procedure
index and file to cloud server. with unknown verification, which gives client repudiation
and anticipates replay assaults. The cloud does not know the
B. Data User client's character that stores data, yet just checks the client's
User requests in the form of keywords to the cloud server. certifications. Key conveyance is done in a decentralized
manner. One impediment is that the cloud knows the
C. Cloud Server entrance arrangement for every record put away in the
Receives the request from user and then send the cloud. In future, we might want to shroud the properties and
corresponding encrypted files to the user as response. access approach of a client.
VI. REFERENCES
[1] Hanhua Chen, HaiJin , Lei Chen, Yunhao Liu, and
Lionel M. Ni., Optimizing Bloom Filter Settings in Peer-to-
Peer Multi-keyword Searching.
IEEE Transactions On Knowledge And Data Engineering,
Vol.24, No. 4, April 2012
[2] Ning Cao, Cong Wang, Ming Li, KuiRen, and Wenjing
Lou., Privacy-Preserving Multi-Keyword Ranked Search
over Encrypted Cloud Data. IEEE Transactions On Parallel
And Distributed Systems, Vol. 25, No. 1, January 2014
Fig 1 Cloud storage model
[3] Muhammad Naveed, ManojPrabhakaran, Carl A. Gunter
IV. PROPOSED SYSTEM
University of Illinois at Urbana-Champaign. Dynamic
This system combine the idea about the Decentralized
Searchable Encryption via Blind Storage.2014 IEEE
access control and the authentication techniques which is
Symposium on Security and Privacy.
considered as anonymous. Such proposed system is quite
unique and it helps to overcome the disadvantages of
security achieved by the cryptographic techniques or
encryption techniques. As we know that encryption or
cryptography greatly reduces the usabilty of cloud.
International Journal of Engineering Science and Computing, April 2016 4217 http://ijesc.org/