Вы находитесь на странице: 1из 10

Shared Authority Based Privacy-preserving

Authentication Protocol in Cloud Computing


Abstract:
Cloud computing is emerging as a prevalent
data interactive paradigm to realize users data remotely
stored in an online cloud server. Cloud services provide
great conveniences for the users to enjoy the on-demand
cloud applications without considering the local
infrastructure limitations. During the data accessing,
diferent users may be in a collaborative relationship, and
thus data sharing becomes signicant to achieve
productive benets. !he e"isting security solutions mainly
focus on the authentication to realize that a users
privative data cannot be unauthorized accessed, but
neglect a subtle privacy issue during a user challenging
the cloud server to re#uest other users for data sharing.
!he challenged access re#uest itself may reveal the
users privacy no matter whether or not it can obtain the
data access permissions. $n this paper, we propose a
shared authority based privacy-preserving authentication
protocol %&'(') to address above privacy issue for cloud
storage. $n the &'(', *) shared access authority is
achieved by anonymous access re#uest matching
mechanism with security and privacy considerations
GLOBALSOFT TECHNOLOGIES
IEEE PROJECTS & SOFTWARE DEVELOPMENTS
IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE
BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS
CELL: +91 9!9" #9$"% +91 99&&' #"(% +91 9!9" "(9$% +91 9($1! !$!$1
V)*)+: ,,,-.)/012304546738+*-649 M0)1 +6:)333.)/01*3:546738+*;9:0)1-86:
GLOBALSOFT TECHNOLOGIES
IEEE PROJECTS & SOFTWARE DEVELOPMENTS
IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE
BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS
CELL: +91 9!9" #9$"% +91 99&&' #"(% +91 9!9" "(9$% +91 9($1! !$!$1
V)*)+: ,,,-.)/012304546738+*-649 M0)1 +6:)333.)/01*3:546738+*;9:0)1-86:
%e.g., authentication, data anonymity, user privacy, and
forward security)+ ,) attribute based access control is
adopted to realize that the user can only access its own
data elds+ -) pro"y re-encryption is applied by the cloud
server to provide data sharing among the multiple users.
.eanwhile, universal compos ability %/C) model is
established to prove that the &'(' theoretically has the
design correctness. $t indicates that the proposed
protocol realizing privacy-preserving data access
authority sharing, is attractive for multi-user collaborative
cloud applications.
Existing System:
0owever, most previous
researches focus on the authentication to realize that
only a legal user can access its authorized data, which
ignores the case that diferent users may want to access
and share each others authorized data elds to achieve
productive benets. 1hen a user challenges the cloud
server to re#uest other users for data sharing, the access
re#uest itself may reveal the users privacy no matter
whether or not it can obtain the data access permissions.
$n this wor2, we aim to address a users sensitive access
desire related privacy during data sharing in the cloud
environments, and it is signicant to design a humanistic
security scheme to simultaneously achieve data access
control, access authority sharing, and privacy
preservation.
Disadvantage:
(revious &ystem does not have the
option of granting3revo2ing data access
Proposed System:
$n this paper, we address the
aforementioned privacy issue to propose a shared
authority based privacy preserving authentication
protocol %&'(') for the cloud data storage, which realizes
authentication and authorization without compromising a
users private information.
!he main contributions are as follows. *) $dentify a new
privacy challenge in cloud storage, and address a subtle
privacy issue during a user challenging the cloud server
for data sharing, in which the challenged re#uest itself
cannot reveal the users privacy no matter whether or not
it can obtain the access authority. ,) (ropose an
authentication protocol to enhance a users access
re#uest related privacy, and the shared access authority
is achieved by anonymous access re#uest matching
mechanism. -) 'pply cipher te"t-policy attribute based
access control to realize that a user can reliably access its
own data elds, and adopt the pro"y re-encryption to
provide temp authorized data sharing among multiple
users
Advantage:
0ere we proposed the secured system and
data owner can decide whether the user can access the
system or not.
PRB!E" S#A#E"E$#:
$n our model, privacy is
accomplished by encrypting the data it can prevent the
un authorized access.
Scope:
1e are going to raise the privacy level of the
data owner and the condentiality of the data by
providing access to users
Architecture:
"odules :
*. %ner
,. &ser
-. Access Control
4. Cloud Service Provider
5. Encryption ' Decryption
6. (ile Do%nload
7. #rusted #hird Party

"odules Description
%ner Registration:
$n this module an owner has to
upload its les in a cloud server, he3she should register
rst. !hen only he3she can be able to do it. 8or that he
needs to ll the details in the registration form. !hese
details are maintained in a database.

%ner !ogin:
$n this module,any of the above
mentioned person have to login,they should login by
giving their emailid and password .
&ser Registration:
$n this module if a user wants to
access the data which is stored in a cloud, he3she should
register their details rst. !hese details are maintained in
a Database.
&ser !ogin:
$f the user is an authorized user, he3she can
download the le by using le id which has been stored
by data owner when it was uploading.
Access Control:
9wner can permit access or deny access
for accessing the data. &o users can able to access
his3her account by the corresponding data owner. $f
owner does not allow, user cant able to get the data.
Encryption ' Decryption:
0ere we are using this
aes:encrypt ; aes:decrypt for encryption and decryption.
!he le we have uploaded which has to be in encrypted
form and decrypt it
(ile &pload:

$n this module 9wner uploads the le%along with meta
data) into database, with the help of this metadata and
its contents, the end user has to download the le. !he
uploaded le was in encrypted form, only registered user
can decrypt it.
(ile Do%nload:
!he 'uthorized users can download the le
from clou database.
Cloud Service Provider Registration:
$n this module ,
if a cloud service provider%maintainer of cloud) wants to
do some cloud ofer , they should register rst.
Cloud Service Provider !ogin:
'fter Cloud
provider gets logged in, 0e3 &he can see Cloud provider
can view the les uploaded by their clients. 'lso upload
this le into separate Cloud Database
##P )#R&S#ED #*+RD PAR#,- !.+$:
$n this
module !!( has monitors the data owners le by verifying
the data owners le and stored the le in a database
.'lso ttp chec2s the C&(%C<9/D &=>?$C= (>9?$D=>),and
nd out whether the csp is authorized one or not.
System Configuration:-
H/W System Configuration:-
Processor - Pentium III
Speed - /0/ .*1
RA" - 234 "B )min-
*ard Dis5 - 26 .B
(loppy Drive - /077 "B
8ey Board - Standard 9indo%s 8eyboard
"ouse - #%o or #hree Button "ouse
"onitor - S:.A
S/W System Configuration:-
Operating System :Windows95/98/2000/XP
Application Server : omcat5!0/"!X
#ront $nd : %&'( )ava( )sp
Scripts : )avaScript!
Server side Script : )ava Server Pages!
*ata+ase : &y s,l
*ata+ase -onnectivity : )*.-!
!iterature survey:
<iterature survey is the most
important step in software development process. @efore
developing the tool it is necessary to determine the time
factor, economy n company strength. 9nce these things r
satised, ten ne"t steps are to determine which operating
system and language can be used for developing the tool.
9nce the programmers start building the tool the
programmers need lot of e"ternal support. !his support
can be obtained from senior programmers, from boo2 or
from websites. @efore building the system the above
consideration are ta2en into account for developing the
proposed system.
Conclusion:
$n this wor2, we have identied a new
privacy challenge during data accessing in the cloud
computing to achieve privacy-preserving access authority
sharing. 'uthentication is established to guarantee data
condentiality and data integrity. Data anonymity is
achieved since the wrapped values are e"changed during
transmission. /ser privacy is enhanced by anonymous
access re#uests to privately inform the cloud server
about the users access desires. 8orward security is
realized by the session identiers to prevent the session
correlation. $t indicates that the proposed scheme is
possibly applied for enhanced privacy preservation in
cloud applications.

Вам также может понравиться