Thursday, 15 January 2015

ANONYMOUS AUTHENTICATION OF CLOUDS DATA WITH DA CONTROL USING ATTRIBUTE BASED ENCRYPTION

S.Abirami, J.Sangeetha
1PG Student STET Women’s college, Mannargudi.
2Professor of CS department, STET Women’s college, Mannargudi.

 Cloud computing is a rising technology delivers a lot of new challenges for data security and access control when clients outsource sensitive data for offering on cloud servers, which computing standard  assets of the computing framework are given as a service over the Internet. As guaranteeing as it may be, this standard additionally are not inside the same trusted dominion as data possessors. In any case, in completing thus, these results unavoidably present a substantial processing overhead on the data possessor for key distribution and data administration when fine-grained data access control is in demand, and subsequently don't scale well. The issue of at the same time accomplishing fine-grainedness, scalability, and data confidentiality of access control really still remains uncertain. This paper addresses this open issue by, on one hand, characterizing and implementing access policies based on data qualities, and, then again, permitting the data owner to representative the majority of the calculation undertakings included in fine-grained data access control to un-trusted cloud servers without unveiling the underlying data substance. We accomplish this goal by exploiting and combining techniques of decentralized key policy Attribute Based Encryption (KP-ABE). Extensive investigation shows that the proposed approach is highly efficient and secure. Cloud computing is typically defined as a type of computing that relies on sharing computing resources rather than having local servers or personal devices to handle applications .Cloud Computing is the internet-based storage for files, applications, and infrastructure. Cloud computing involves deploying groups of remote servers and software networks that allow centralized data storage and online access to computer services or resources. Centralized computing is computing done at a central location, using terminals that are attached to a central computer. The computer itself may control all the peripherals directly or they may be attached via a terminal server. Information security is a critical issue in cloud computing environments, so the nature of cloud computing raises serious issues regarding user authentication, information integrity and data confidentiality. Propose a new decentralized access control scheme is  for secure data storage in clouds that supports anonymous authentication. In the proposed scheme, the cloud verifies the authenticity of the series without knowing the user's identity before storing data. Our scheme also has the added feature of access control in which only valid users are able to decrypt the stored information. The scheme prevents replay attacks and supports creation, modification, and reading data stored in the cloud, also address user revocation. Moreover, authentication and access control scheme is decentralized and robust, unlike other access control schemes designed for clouds which are centralized. The communication, computation, and storage overheads
Share: