A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud-IEEE PROJECTS 2015-2016

  • Published on
    15-Aug-2015

  • View
    46

  • Download
    5

Embed Size (px)

Transcript

<ol><li> 1. miccansinfotech +91 90036 28940 +91 94435 11725" . 'l-i: iux-u)Dt. '(-i-ill-iniui- in IBIDIB -"lI-l ll-vr-itii_giiii-uiii hr iiuI1't-uiiicillt-iwiciuiiae , Ixl_Il, n,.IRE, Ill, ull. "xl"{v; u,L. .v; , Hllil : |'A'}l9l, Il, Dlnl iltggi-ii il'-w-lliigi-iii 1: . h,'l,JlCl_" L| "I, " . uk| ,|l, {(Cl| /I1 . ;iI_'i k'i, i;T. ',", L.; ,u5 lli1 nick v. -_i_, :i_i . "l, L.2lll_| -siIi"il , r'uulx| ,!ll, l iviiir: ,u: n.vi, inu~ Jlli'i, IJlJll_| lJl, lll!1 1(2) _Hl_"l. ." l"A, I9l Zi| ra. u| ,ll', u_. ., i~i, ii&gt;r: ,:.;. ,", {(Zli| ,l1, ' 'ii'l, l,tLDlj. .,l&gt;l! . sl, D. ., "'i'l5), lis".:), .'! sl: &gt;. ',' Cll'i_ILl, {l'. ." 3W-tr , I_llllllE:giuiul-uiie.7,151 till-i, IIL t'LI, Il, ";, vLl. s , IJlkIJV121"_W'. ',3,l pi, -iurml-lc , L5L3L5 CF aiiiillluiiilt-in giuin-idle 1:11 I I 1". .l, .. ,l, :_.B : ii&gt;ii&gt;; .ri_Ii&gt;i: _:i. :_r'-it. .ii, ir: u.m. i:, -iii: _:i. mi. ,~, :,i_It. t.. ii, iiu,IEEE Projects 100% WORKING CODE + DOcUMENTATlON+ EXPLAINATION BEST PRICE LOW PRICE GUARANTEEDA SECURE ANTI-COLLUSION DATA SHARING {SCHEME FOR DYNAMIC GROUPS IN THE CEOUDABSTRACTBeneted from cloud computing,users can achieve an effective and economical approach for data sharing among group members in the cloud with the characters of low maintenance and little management cost.Meanwhile,we must provide security guarantees for the sharing data files since they are outsourced.Unfortunately,because of the frequent change of the membership,sharing data while providing privacypreserving is still a challenging issue,especially for an untrusted cloud due to the collusion attack.Moreover,for existing schemes,the security of key distribution is based on the secure communication channel,however,to have such channel is a strong assumption and isdifficult for practice.In this paper,we propose a secure data sharing scheme formicansinfotech,NO:8 ,100 FEET ROAD. PONDlCHERRY.WWW. MlCANSlNFOTECH. COM ;MlCANSINFOTEcH@GMAlL. COM+91 90036 28940; +91 94435 11725 </li><li> 2. miccansinfotech +91 90036 28940 +91 94435 11725" , '(-n. tu. -u){&gt;$. '(-c-ll! -tutti- 1: IDIDH2. . '4qr-xu ii-W-llt)gItIl'~)Il luv nnurlmauella: -4tutu):4 , Ixl_Ilj; ,. Iltia, lI, E,, ,;, -ll.,", {v; ,u, L.. ,v; , mm : |'A'Ll9l, IlJ)lnl15.39:-ti ii-1'1-lhigx-Ha It..h, '/ ;, J13!" k| -"I, " . uk| ,|l, {(Zl| /I . ;"iI, H t'Aj; Y, "_L: u5' FRY melt 'u. :i_T . lt. ::utJ~<i>i_: - m, tr: ,:i_ni_ni, :&gt;aJ~ , {(: )_HM"l~. . mizw Iita, uI, lV: u.. ., mgr: ,:, vt': riu: m,t= :: v. u,t, :u&gt;1_; .,: m.~ t| ,i3'a. ,"'t'l3), {h".:i. -m. :r: ,- : m,m. o:'. 'I-1'4, llllllllz gljl-IHL.713 till-), IIi "A_I, Il'I'; ,uI&gt; . I_IlLI, i', "/u". :,: ,l gl, lI'lI"-l , L5LDl {Yo t . i;4nbir. .tt_I9t: _=l. :_r'-u. .m: ... m,L: ,-int: ,:i. m_L. ,v, :_tu. t.. m_uu..I1m, I:1.. m_le. .,= ' , , IEEE Projects 100% WORKING CODE + DOcUMENTATlON+ EXPLAINATION BEST PRICE LOW PRICE GUARANTEEDdynamic members.Firstly,we propose a secure way for key distribution without any secure communication channels,and the users can securely obtain their private keys from group manager.Secondly,our scheme can achieve negrained access control,any user in the group can use the source in the cloud and revoked users cannot access the cloud again after they are revoked.Thirdly,we can protect the scheme from collusion attack,which means that revoked users cannot get the original data le even if they conspire with the untrusted cloud.In our approach,by leveraging polynomial function,we can achieve a secure user revocation scheme.Finally,our scheme can achieve ne efficiency,which means previous users need not to update their private keys for thesituation either a new user joins in the group or a user is revoked from the group. miccmsinfotech,NO:3 ,100 FEET ROAD. PONDlCHERRY.VWVW. MlCANSlNFOTECH. COM ; MlCANsINFOTECH@GMAlL. COM+91 90036 28940; +91 94435 11725 </i></li><li> 3. miccansinfotech +91 90036 28940 +91 94435 11725" , '(-n. tu. -u){&gt;$. '(-c-ll! -tutti- 1: IDIDH2. : "lI-XH ii-W-llt)gItIl'~)Il luv nnurvtauella: -4tutu):4o , Ixl_Ilj; ,. Iltia, L. ull. "i, ",lv; x,L. ,v; , mm : |'A'Ll9l, IlJ)lnl 15.39:-ti ii-1'1-lhigx-no It..h, '/ ;, J13!" k| -"I, " . uk| ,|l, {(Zl| /I . ;"iI, H t'Aj; Y, "_L: u5' FRY melt 'u. :i_T . lt. ::utJ~<i>i_: - mu , :t T : ,:l. I, P", I,L. .,t'r, l : ... m,L : ,"_IK' IJL. ,t"l, L.}'il_Il--L. M,Ii1s . Ilm, I. .,m, le. ., IEEE Projects 100% WORKING CODE + DOcUMENTATlON+ EXPLAINATION BEST PRICE LOW PRICE GUARANTEEDEXISTING SYSTEMExisting techniques of key policy attributebasedencryption,proxy re-encryption and lazy re-encryption to achieve fine-grained data access control without disclosing data contents.However,the singleowner manners may hinder the implementation of applications,where any member in the group can use the cloud service to store and share data files with others.A secure provenance scheme by leveraging group signatures and cipher text-policy attribute-based encryption techniques.Each user obtains two keys after the registration while the attribute key is used to decrypt the data.A secure access control scheme on encrypted data in cloud storage by invoking rolebased encryption technique.It is claimed that the scheme can achieve efficient user revocation that combines role-based access control policies with encryption to secure large data storagein the cloud.Unfortunately,the verifications between entities are not concerned,themiccmsinfotech,NO:3 ,100 FEET ROAD. PONDlCHERRY.VWVW. MlCANSlNFOTECH. COM ; MlCANsINFOTECH@GMAlL. COM+91 90036 28940; +91 94435 11725 </i></li><li> 4. micansinfotech +91 90036 28940 +91 94435 11725r 7 Years of Excellence in IEEE Project development for universities across INDIA.USA.UK,AUSTRALIA.and SWEEDEN. }* Expert developers in JAVA .DOT NET .ANDROID .PHI.MATLAB .NS2 .NS3 ,VLSI , CLOUD SIM.TANNER ,MICROWIND .EMBEDDED .ROBOTICS .MECHANICAL .MECHATRONICS ,WIRELESS NETWORS.OPNET ,OMNETOver ll000+ projects .425 clients - MICANS IFNFOTI-ICH provides IEEE &amp; application pr ts forCSE. IT. ECE.. ...lECH. CIVlL, MCA. M.TECH, M.IHlLL. lIBA.DME. MS. PHD.IEEE Projects 100% WORKING CODE + DOCUMENTATlON+ EXFLAINATION ' LOW PRICE GUARANTEEDscheme easily suffer from attacks,for example,collusion att inal this attackcan lead to disclosing sensitive data files. Disadvantages0 Secret between the user and the ' supported and the privatekey will be disclosed once permanent portable secret isobtained by the attackers.0 Easily suffer frocan lead to &amp;scl s1mlcansinfotech,NO:8 ,100 FEET ROAD, POND| CHERRY.vwvw. mcANsmFoTEcH. coM ; MlCANSINFOTEcH@GMAl L. COM+91 90036 28940; +91 94435 11725for example,collusion attack.This attack e data les. </li><li> 5. miccansinfotech +91 90036 28940 +91 94435 11725" , '(-r. Ie~tr{&gt;$. '(tc-Ill-rtrd- tn IDIDHI.rtaritud ti-l'l-llt)gltIl'~)Il luv rrurltt-Iaefllt'-r: -udarrcet , Ixl_Ilj; ,, ILta, , lI, E,, ,;, -ll.,", lv; ,u, L.. ,v; , mm : |'t'Ll9l, IlJ)lnl ikggx-Ia ii-1'1-lltrgr-rao It..h, '/ ;, J13!" k| -"I, " . AJl| ,'), {(: )l/ " . ;"iI, H t'rj; Y, "_Ltu5' FRY melt 'u. :rr . l, Lt: rl| J~x1II"rl . butlt|5&gt;l, {- t'r, I,ll2,{(. 'r'l, ItI, | _: aIm, IrrrII_rr_rrrIrr~ , u:r_: m,--tr: .~=tvrrrw i_: JA,1lI_l"7;J, ..,I'A, l9l*}J! t'J, ",{(: )E| ,l~I 'rt'l, I,{L0l, .. ,l&gt;. ~k t| ,,G'r. ,"'r'lt3), l. ". : r,. -mI. :r: ,- : rm, Icr. o:'. 'I-1'4, llllllllz gratitude.713 till-I, tIi "A_I, Il'I'; ,uI&gt; . I_ilLI, i', "/u". :,: ,l gI, atvlI4II-Ia , L5LDl {Yo tlgrglltdttlttrt gratitude Itrv. ':lr. .r'_: :_: tt . i.Jr&gt;r_: r.. tt_ta: _=l. :_r'-u. .tr, I: t.. m,L: ,-rut: ,:l. m_L. ,v, :_r. tr. t.. tr_tru..Irt'r, I:1.. m_L. .,= ' , , IEEE Projects 100% WORKING CODE + DOcUMENTATlON+ EXPLAINATION BEST PRICE LOW PRICE GUARANTEEDPROPOSED SYSTEMWe propose a secure data sharing scheme,which can achieve secure key distribution and data sharing for dynamic group..The main contributions of our scheme include: 1. We provide a secure way for key distribution without any secure communication channels.The users can securely obtain their private keys from group manager without any Certificate Authorities due to the verication for the public key of the user. 2. Our scheme can achieve fine-grained access control,with the help of the group user list,any user in the group can use the source in the cloud and revoked users cannot access the cloud again after they are revoked. 3. We propose a secure data sharing scheme which can be protected frommiccmsinfotech,NO:8 ,100 FEET ROAD. PONDlCHERRY.VWVW. MlCANSlNFOTECH. COM ; MlCANsINFOTECH@GMAlL. COM+91 90036 28940; +91 94435 11725 </li><li> 6. miccansinfotech +91 90036 28940 +91 94435 11725" , '(-r. Ie~tr{&gt;$. '(tc-Ill-rtrd- tn IDIDHI.rtaritud ti-l'l-llt)gltIl'~)Il luv rrurltt-Iaefllt'-r: -udarrcet , Ixl_Ilj; ,, ILta, , L. ull. "i, ",lv; x,L. ,v; , mm : |'t'Ll9l, IlJ)lnl ikggx-Ia ii-1'1-lltrgr-rao It..h, '/ ;, J13!" k| -"I, " . AJl| ,'), {(: )l/ " . ;"iI, H t'rj; Y, "_Ltu5' FRY melt 'u. :rr . l, Lt: rl| J~x1II"rl . butlt|5&gt;l, {- mrr , u:tv. vr, IcIr _: aIm, IrrrII_rr_rrrIrr~ , u:r_: m,--ice tvrrrw i, :JA,1LI, ["7;J, ..,rrrarr, ,.. riu: rcIr= :: 'r'l, I,{L0l, .. ,l&gt;. ~k t| ,i3'r. ,'r'lt3), l. ". : r,. -mI. :r: ,- : rm, Icto: '. 'I-1'4, llllllllz gratitude.713 till-I, tIi "A_I, Il'I'; ,uI&gt; . I_ilLI, i', "/u". :,: ,l gI, atvlI4II-Ia , L5LDl {Yo tlgrglltdttlttrt gratitude Itrv". '.*ir&gt;. ._r' :1 or +' I it : &gt;Ir&gt;r_: r.. m_tiII T Lil. LP "_LL. .,I'r, l r : ;.. vr, L : ,"_IKr' ! Jl. r'r, L . ,~, :_r. u.t. .tr, t_tu..Irt'r, I:: ..m, Ie. ., IEEE Projects 100% WORKING CODE + DOcUMENTATlON+ EXPLAINATION BEST PRICE LOW PRICE GUARANTEEDcollusion attack.The revoked users can not be able to get theoriginal data files oncethey are revoked even if they conspire with the untrusted cloud.Our scheme canachieve secure user revocation with the help of polynomial function.4. Our scheme is able to support dynamic groups efciently,when a new userjoins in the group or a user is revoked from the group,the private keys of the other usersdo not need to be recomputed and updated. Advantages 0 Achieve secure key distribution and data sharing for dynamic group 0 The users can securely obtain their private keys from group manager without any Certicate Authorities 0 It can be protected froni collusion attack. 0 It is able to support dynamic groups efcientlymiccmsinfotech,NO:8 ,100 FEET ROAD. PONDlCHERRY.VWVW. MlCANSlNFOTECH. COM ; MlCANsINFOTECH@GMAlL. COM+91 90036 28940; +91 94435 11725 </li><li> 7. micansinfotech +91 90036 28940 +91 94435 11725r 7 Years of Excellence in IEEE Project development for universities across INDIA.USA.UK,AUSTRALIA.and SWEEDEN. }* Expert developers in JAVA .DOT NET .ANDROID .PHI.MATLAB .NS2 .NS3 ,VLSI , CLOUD SIM.TANNER ,MICROWIND .EMBEDDED .ROBOTICS ,MECHANICAL .MECHATRONICS ,WIRELESS NETWORS.OPNET ,OMNETOver ll000+ projects .425 clients - MICANS lFNl</li></ol>

Recommended

View more >