0 оценок0% нашли этот документ полезным (0 голосов)
25 просмотров10 страниц
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09666155510, 09849539085 or mail us - ieeefinalsemprojects@gmail.com-Visit Our Website: www.finalyearprojects.org
Оригинальное название
IEEE 2014 JAVA/.NET NETWORK SECURITY PROJECT Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Computing
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09666155510, 09849539085 or mail us - ieeefinalsemprojects@gmail.com-Visit Our Website: www.finalyearprojects.org
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09666155510, 09849539085 or mail us - ieeefinalsemprojects@gmail.com-Visit Our Website: www.finalyearprojects.org
Abstract: Cloud computing is emerging as a prevalent data interactive paradigm to realize users data remotely stored in an online cloud server. Cloud services provide great conveniences for the users to enjoy the on-demand cloud applications without considering the local infrastructure limitations. During the data accessing, diferent users may be in a collaborative relationship, and thus data sharing becomes signicant to achieve productive benets. !he e"isting security solutions mainly focus on the authentication to realize that a users privative data cannot be unauthorized accessed, but neglect a subtle privacy issue during a user challenging the cloud server to re#uest other users for data sharing. !he challenged access re#uest itself may reveal the users privacy no matter whether or not it can obtain the data access permissions. $n this paper, we propose a shared authority based privacy-preserving authentication protocol %&'(') to address above privacy issue for cloud storage. $n the &'(', *) shared access authority is achieved by anonymous access re#uest matching mechanism with security and privacy considerations GLOBALSOFT TECHNOLOGIES IEEE PROJECTS & SOFTWARE DEVELOPMENTS IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS CELL: +91 9!9" #9$"% +91 99&&' #"(% +91 9!9" "(9$% +91 9($1! !$!$1 V)*)+: ,,,-.)/012304546738+*-649 M0)1 +6:)333.)/01*3:546738+*;9:0)1-86: GLOBALSOFT TECHNOLOGIES IEEE PROJECTS & SOFTWARE DEVELOPMENTS IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS CELL: +91 9!9" #9$"% +91 99&&' #"(% +91 9!9" "(9$% +91 9($1! !$!$1 V)*)+: ,,,-.)/012304546738+*-649 M0)1 +6:)333.)/01*3:546738+*;9:0)1-86: %e.g., authentication, data anonymity, user privacy, and forward security)+ ,) attribute based access control is adopted to realize that the user can only access its own data elds+ -) pro"y re-encryption is applied by the cloud server to provide data sharing among the multiple users. .eanwhile, universal compos ability %/C) model is established to prove that the &'(' theoretically has the design correctness. $t indicates that the proposed protocol realizing privacy-preserving data access authority sharing, is attractive for multi-user collaborative cloud applications. Existing System: 0owever, most previous researches focus on the authentication to realize that only a legal user can access its authorized data, which ignores the case that diferent users may want to access and share each others authorized data elds to achieve productive benets. 1hen a user challenges the cloud server to re#uest other users for data sharing, the access re#uest itself may reveal the users privacy no matter whether or not it can obtain the data access permissions. $n this wor2, we aim to address a users sensitive access desire related privacy during data sharing in the cloud environments, and it is signicant to design a humanistic security scheme to simultaneously achieve data access control, access authority sharing, and privacy preservation. Disadvantage: (revious &ystem does not have the option of granting3revo2ing data access Proposed System: $n this paper, we address the aforementioned privacy issue to propose a shared authority based privacy preserving authentication protocol %&'(') for the cloud data storage, which realizes authentication and authorization without compromising a users private information. !he main contributions are as follows. *) $dentify a new privacy challenge in cloud storage, and address a subtle privacy issue during a user challenging the cloud server for data sharing, in which the challenged re#uest itself cannot reveal the users privacy no matter whether or not it can obtain the access authority. ,) (ropose an authentication protocol to enhance a users access re#uest related privacy, and the shared access authority is achieved by anonymous access re#uest matching mechanism. -) 'pply cipher te"t-policy attribute based access control to realize that a user can reliably access its own data elds, and adopt the pro"y re-encryption to provide temp authorized data sharing among multiple users Advantage: 0ere we proposed the secured system and data owner can decide whether the user can access the system or not. PRB!E" S#A#E"E$#: $n our model, privacy is accomplished by encrypting the data it can prevent the un authorized access. Scope: 1e are going to raise the privacy level of the data owner and the condentiality of the data by providing access to users Architecture: "odules : *. %ner ,. &ser -. Access Control 4. Cloud Service Provider 5. Encryption ' Decryption 6. (ile Do%nload 7. #rusted #hird Party
"odules Description %ner Registration: $n this module an owner has to upload its les in a cloud server, he3she should register rst. !hen only he3she can be able to do it. 8or that he needs to ll the details in the registration form. !hese details are maintained in a database.
%ner !ogin: $n this module,any of the above mentioned person have to login,they should login by giving their emailid and password . &ser Registration: $n this module if a user wants to access the data which is stored in a cloud, he3she should register their details rst. !hese details are maintained in a Database. &ser !ogin: $f the user is an authorized user, he3she can download the le by using le id which has been stored by data owner when it was uploading. Access Control: 9wner can permit access or deny access for accessing the data. &o users can able to access his3her account by the corresponding data owner. $f owner does not allow, user cant able to get the data. Encryption ' Decryption: 0ere we are using this aes:encrypt ; aes:decrypt for encryption and decryption. !he le we have uploaded which has to be in encrypted form and decrypt it (ile &pload:
$n this module 9wner uploads the le%along with meta data) into database, with the help of this metadata and its contents, the end user has to download the le. !he uploaded le was in encrypted form, only registered user can decrypt it. (ile Do%nload: !he 'uthorized users can download the le from clou database. Cloud Service Provider Registration: $n this module , if a cloud service provider%maintainer of cloud) wants to do some cloud ofer , they should register rst. Cloud Service Provider !ogin: 'fter Cloud provider gets logged in, 0e3 &he can see Cloud provider can view the les uploaded by their clients. 'lso upload this le into separate Cloud Database ##P )#R&S#ED #*+RD PAR#,- !.+$: $n this module !!( has monitors the data owners le by verifying the data owners le and stored the le in a database .'lso ttp chec2s the C&(%C<9/D &=>?$C= (>9?$D=>),and nd out whether the csp is authorized one or not. System Configuration:- H/W System Configuration:- Processor - Pentium III Speed - /0/ .*1 RA" - 234 "B )min- *ard Dis5 - 26 .B (loppy Drive - /077 "B 8ey Board - Standard 9indo%s 8eyboard "ouse - #%o or #hree Button "ouse "onitor - S:.A S/W System Configuration:- Operating System :Windows95/98/2000/XP Application Server : omcat5!0/"!X #ront $nd : %&'( )ava( )sp Scripts : )avaScript! Server side Script : )ava Server Pages! *ata+ase : &y s,l *ata+ase -onnectivity : )*.-! !iterature survey: <iterature survey is the most important step in software development process. @efore developing the tool it is necessary to determine the time factor, economy n company strength. 9nce these things r satised, ten ne"t steps are to determine which operating system and language can be used for developing the tool. 9nce the programmers start building the tool the programmers need lot of e"ternal support. !his support can be obtained from senior programmers, from boo2 or from websites. @efore building the system the above consideration are ta2en into account for developing the proposed system. Conclusion: $n this wor2, we have identied a new privacy challenge during data accessing in the cloud computing to achieve privacy-preserving access authority sharing. 'uthentication is established to guarantee data condentiality and data integrity. Data anonymity is achieved since the wrapped values are e"changed during transmission. /ser privacy is enhanced by anonymous access re#uests to privately inform the cloud server about the users access desires. 8orward security is realized by the session identiers to prevent the session correlation. $t indicates that the proposed scheme is possibly applied for enhanced privacy preservation in cloud applications.