11
Computer Science & Engineering

Achieving Secure,Scalable and Fine-grained Data Access Control in Cloud Computing

  • Upload
    pssumi2

  • View
    253

  • Download
    1

Embed Size (px)

Citation preview

Page 1: Achieving Secure,Scalable and Fine-grained Data Access Control in Cloud Computing

Computer Science & Engineering

Page 2: Achieving Secure,Scalable and Fine-grained Data Access Control in Cloud Computing

OBJECTIVEOBJECTIVETo reduce overhead on data ownerTo provide fine-grained data access control

Computer Science & Engineering

Page 3: Achieving Secure,Scalable and Fine-grained Data Access Control in Cloud Computing

EXISTING SYSTEMEXISTING SYSTEMExisting system uses cryptographic methodsHeavy overhead on the data owner

Disadvantages:Disadvantages:Software update/patchesSecurity concernsControl

Computer Science & Engineering

Page 4: Achieving Secure,Scalable and Fine-grained Data Access Control in Cloud Computing

PROPOSED SYSTEMPROPOSED SYSTEMTo provide secure, scalable, fine-grained data

access control on outsourced data in the cloud

Scheme Description:Scheme Description:System SetupNew File CreationNew User GrantUser RevocationFile AccessFile Deletion

Computer Science & Engineering

Page 5: Achieving Secure,Scalable and Fine-grained Data Access Control in Cloud Computing

MODULESMODULESKP-ABEProxy Re-EncryptionLazy Re-Encryption

Computer Science & Engineering

Page 6: Achieving Secure,Scalable and Fine-grained Data Access Control in Cloud Computing

KP-ABEKP-ABEAlgorithms:Algorithms:

Setup AttributesEncryptionSecret Key GenerationDecryptionAccess TreeConstruction of Access Tree

Computer Science & Engineering

Page 7: Achieving Secure,Scalable and Fine-grained Data Access Control in Cloud Computing

PROXY RE-ENCRYPTIONPROXY RE-ENCRYPTIONDivertible Protocols(m, n)-Interactive Turing MachineAtomic Proxy CryptographyCategories of Proxy Scheme

SymmetricAsymmetricActive AsymmetricPassive AsymmetricTransparentTranslucentOpaque

Computer Science & Engineering

Page 8: Achieving Secure,Scalable and Fine-grained Data Access Control in Cloud Computing

LAZY RE-ENCRYPTIONLAZY RE-ENCRYPTIONUpdate secret keysUpdate user attributes

Computer Science & Engineering

Page 9: Achieving Secure,Scalable and Fine-grained Data Access Control in Cloud Computing

Upload files to cloud server

Open file

Maintainance of files and users

Login

CheckOwner

End

User

Exists

Create account

no

Enter data to search

yes

Encrypt and decrypt the data

Send to cloud server

If files exists for datayes no

List out the files Displays no datas in server

Open the required file

Enter secret key Check

Correct

Displays duplicate dataWrong

Displays original file

End

Computer Science & Engineering

Fig: System Architecture

Page 10: Achieving Secure,Scalable and Fine-grained Data Access Control in Cloud Computing

CONCLUSIONCONCLUSION

One challenge is to achieve fine-grainedness, data confidentiality, and scalability simultaneously,which is not provided by current work

Computer Science & Engineering

Page 11: Achieving Secure,Scalable and Fine-grained Data Access Control in Cloud Computing

Computer Science & Engineering