Mona secure multi owner data sharing for dynamic groups in the cloud-ppt

Embed Size (px)


PPT -IEEE .NET PROJECT-2013 Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud

Text of Mona secure multi owner data sharing for dynamic groups in the cloud-ppt

  • 1. Mona Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud

2. List Of Content Abstract Existing System Disadvantages. Proposed System Advantages System Requirements Module 3. Abstract: I. With the character of low maintenance, cloud computing provides an economical and efficient solution for sharing group resource among cloud users. Unfortunately, sharing data in a multi-owner manner while preserving data and identity privacy from an untrusted cloud is still a challenging issue, due to the frequent change of the membership. II. In this paper, we propose a secure multi owner data sharing scheme, named Mona, for dynamic groups in the cloud. By leveraging group signature and dynamic broadcast encryption techniques, any cloud user can anonymously share data with others. III. Meanwhile, the storage overhead and encryption computation cost of our scheme are independent with the number of revoked users. In addition, we analyze the security of our scheme with rigorous proofs, and demonstrate the efficiency of our scheme in experiments. 4. Existing System: I. Several security schemes for data sharing on untrusted servers have been proposed. In these approaches, data owners store the encrypted data files in untrusted storage and distribute the corresponding decryption keys only to authorized users. Thus, unauthorized users as well as storage servers cannot learn the content of the data files because they have no knowledge of the decryption keys. II. However, the complexities of user participation and revocation in these schemes are linearly increasing with the number of data owners and the number of revoked users, respectively. 5. Disadvantages: I. Without Guarantee of Identity Privacy, users may be unwilling to join in cloud computing systems. II. Some users are behave as a misbehaving III. It is not possible to trace which user converts as a false file. IV. Users are also modifying the data, that kind of possibility is available here. V. The changes of membership make secure data sharing extremely difficult 6. Proposed System: I. We propose a secure multi-owner data sharing scheme. It implies that any user in the group can securely share data with others by the untrusted cloud. II. Our proposed scheme is able to support dynamic groups efficiently. Specifically, new granted users can directly decrypt data files uploaded before their participation without contacting with data owners. User revocation can be easily achieved through a novel revocation list without updating the secret keys of the remaining users. The size and computation overhead of encryption are constant and independent with the number of revoked users. III. We provide secure and privacy-preserving access control to users, which guarantees any member in a group to anonymously utilize the cloud resource. Moreover, the real identities of data owners can be revealed by the group manager when disputes occur. IV. We provide rigorous security analysis, and perform extensive simulations to demonstrate the efficiency of our scheme in terms of storage and computation overhead. 7. Advantages: I. We provide the services as a low maintenance cost. II. We provide the high quality services III. Save the investments data IV. Minimize the complexity of secrete key management environment here. V. Maintain the data as a sensitive data without accessing any unauthorized users. 8. HARDWARE REQUIREMENTS: System : Any Processor above 500 MHz. Hard Disk : 40 GB. Monitor : 15 VGA Color. Mouse : Logitech. Ram : 1 GB. 9. Platform Microsoft Visual Studio Framework .NET Framework 4.5 Language C# .NET Front End Back End SQL Server 2012 10. MODULES Registration Login File Upload Chart Creation File Download User Deletion 11. MODULES DESCRIPTION Registration: In this module an User has to register first, then only he/she has to access the data base. Login: In this module, any of the above mentioned person have to login, they should login by giving their email and password . 12. File Upload: In this module Manager(Owner) uploads the file(along with meta data) into database, with the help of this metadata and its contents, the end user has to download the file. The uploaded file was in encrypted form, only registered user can decrypt it. Even CSP can only view the encrypted file form. Chart Creation: User can view the chart, which is dynamically created by calculating the size of the file. 13. File Download: The Registered users can download the file and can do updates. The modified file will be uploaded into cloud server by the user User Deletion: Manager(admin) can reject the user, so as that rejected user doesnt login and access the database.