You are on page 1of 5

Attribute based Encryption with Privacy Preserving in Clouds

Attribute based Encryption with Privacy Preserving in Clouds


ABSTRACT:
Security and privacy are very important issues in cloud computing. In existing
system access control in clouds are centralized in nature. The scheme uses a symmetric
key approach and does not support authentication. Symmetric key algorithm uses same
key for both encryption and decryption. The authors take a centralized approach where a
single key distribution center (KDC) distributes secret keys and attributes to all users. A
new decentralized access control scheme for secure data storage in clouds that supports
anonymous authentication. The validity of the user who stores the data is also verified.
The proposed scheme is resilient to replay attacks. In this scheme using Secure Hash
algorithm for authentication purpose, SHA is the one of several cryptographic hash
functions, most often used to verify that a file has been unaltered. The Paillier crypto
system, is a probabilistic asymmetric algorithm for public key cryptography. Pailier
algorithm use for Creation of access policy, file accessing and file restoring process.
EXISTING SYSTEM
Most existing public key encryption methods allow a party to encrypt data to a
particular user, but are unable to efficiently handle more expressive types of encrypted
access control.
PROPOSED SYSTEM
We proposed a privacy-preserving decentralized Key Distribution Center(KDC)
scheme to protect the users privacy. In our scheme, all the users secret keys are tied to
his identifier to resist the collusion attacks while the multiple authorities cannot know
anything about the users identifier. Notably, each authority can join or leave the system
freely without the need of reinitializing the system and there is no central authority.
Furthermore, any access structure can be expressed in our scheme using the access tree

Contact: 040-40274843,
9533694296
Email id: logicsystemsprojects@gmail.com,
www.logicsystems.org.in

Attribute based Encryption with Privacy Preserving in Clouds


technique. Finally, our scheme relies on the standard complexity assumption, rather than
the non-standard complexity assumptions.
MODULE :
1. Attribute-based Encryption
2. Cryptography
3. Encryption And Decryption
MODULE DESCRIPTION :
1. Attribute Based Encryption
Global Setup It takes as input a security parameter and outputs the system parameters
params.
Authority Setup Each authority generates his secret-public key pair and an access
structure.
KeyGen Each authority takes as input his secret key, a global identifier and a set of
attributes and outputs the secret.
Encryption It takes as input the system parameters params, a message and a set of
attributes and outputs the ciphertext.
Decryption It takes as input the global identifier, the secret keys and the ciphertext
and outputs the message.
2. Cryptography
The art of protecting information by transforming it (encrypting it) into an
unreadable format, called cipher text. Only those who possess a secret key can decipher
(or decrypt) the message into plain text. Encrypted messages can sometimes be broken by
cryptanalysis, also called code breaking, although modern cryptography techniques are
virtually unbreakable.

Contact: 040-40274843, 9533694296


Email id: logicsystemsprojects@gmail.com, www.logicsystems.org.in

Attribute based Encryption with Privacy Preserving in Clouds

3. Encryption and Decryption


Encryption: In an encryption scheme, the message or information (referred to as
plaintext) is encrypted using an encryption algorithm, turning it into an unreadable cipher
text (ibid.). This is usually done with the use of an encryption key, which specifies how
the message is to be encoded. Any adversary that can see the cipher text, should not be
able to determine anything about the original message.
Decryption: An authorized party, however, is able to decode the ciphertext using a
decryption algorithm, that usually requires a secret decryption key, that adversaries do
not have access to. For technical reasons, an encryption scheme usually needs a keygeneration algorithm, to randomly produce keys.

Contact: 040-40274843, 9533694296


Email id: logicsystemsprojects@gmail.com, www.logicsystems.org.in

Attribute based Encryption with Privacy Preserving in Clouds


SYSTEM ARCHITECTURE:

Contact: 040-40274843, 9533694296


Email id: logicsystemsprojects@gmail.com, www.logicsystems.org.in

Attribute based Encryption with Privacy Preserving in Clouds


SYSTEM SPECIFICATION:
Hardware Requirements:

System

: Pentium IV 2.4 GHz.

Hard Disk

: 40 GB.

Floppy Drive

: 1.44 Mb.

Monitor

: 14 Colour Monitor.

Mouse

: Optical Mouse.

Ram

: 512 Mb.

Software Requirements:

Operating system

: Windows 7.

Coding Language

: ASP.Net with C#

Data Base

: SQL Server 2008.

Contact: 040-40274843, 9533694296


Email id: logicsystemsprojects@gmail.com, www.logicsystems.org.in

You might also like