Вы находитесь на странице: 1из 25

Circuit Cipher Text-Policy AttributeBased Hybrid Encryption With

Verifiable Delegation In Cloud


Computing
Guided By
Mr. S.P.Raja B.Tech,M.E
Assistant Professor/IT
29/03/2016

By
V.K.Bharathi
(951312205004),
A.Divya
(951312205005).
Final-IT

Jayaraj Annapackiam C.S.I College of Engineering

PROJECT DOMAIN
NETWORK SECURITY
Transmit the data in secure manner

29/03/2016

OBJECTIVE
To Achieve access control and to make
the data as a confident one.

29/03/2016

ABSTRACT

To secure the data present in the cloud, the data owners use attribute based
encryption to encrypt the stored data.

User with limited computing power -likely to delegate mask of decryption task
to cloud servers.

During delegation servers tamper cipher text and respond forged result.

The data confidentially-the fine-grained access control and the correctness of


the delegated computing results are well guaranteed at the same time.

29/03/2016

5
29/03/2016

EXISTING SYSTEM

Cipher text policy attribute based encryption.

Access structure and private key with the set of descriptive attributes.

Users want to access data satisfy access structure.

CP-ABE under certain access policies.

The users who want to access the data files the most likely to outsource
part of the decryption process to the cloud server

Drawback: respond false transformed cipher text

29/03/2016

PROPOSED SYSTEM

Hybrid policy attribute based encryption.


Encryption with verifiable delegation.
Reduce computation cost.

Advantage :confidential data.

29/03/2016

ALGORITHMS USED
A hybrid VD-CPABE is defined by a tuple of algorithms
Setup -Executed by authority.
Hybrid Encrypt-Executed by data
owners
Key gen -Private keys for users.
Transform -Executed by cloud server.
Verify Encrypt-Executed by users.

29/03/2016

SOFTWARE
REQUIREMENT

Operating system:windows7,8.1

Front end :Microsoft visual studio.net 2013

Coding language :C#

Backend : SQL Server 2012

29/03/2016

HARDWARE
REQUIREMENTS

Processor :Pentium Dual core 2.00GHZ.

Hard disk:40GB.

Mouse : logitech.

RAM:2GB(Minimum).

Keyboard:110 keys enhanced.

29/03/2016

10

SYSTEM DESCRIPTION AND


ASSUMPTION

Authority
attribute key generator center(trusted third party)

Data owner
encryption party who uploads his encrypted data to the cloud

User
decrypting party who outsources the most overhead computation to
the cloud

Cloud server
the party who provides storage outsourced computation services

29/03/2016

11

PATIENT MODULE
Patient update their details.
Provided with an encrypted key.
Get an profile.
Send a request to visit the hospital.

29/03/2016

12

29/03/2016

13

14
29/03/2016

29/03/2016

15

DOCTOR MODULE
Creating doctors profile.
Instruct by the admin.
Allocating time for patient visit

29/03/2016

16

17
29/03/2016

18
29/03/2016

29/03/2016

19

ADMIN MODULE

Receives the patient request.


Manages the data's.
Directs the patient towards doctor.
Inform the doctor about the patient.

29/03/2016

20

29/03/2016

21

29/03/201
6

23

PERFORMANACE OF OUR
HYBRID VD-CPABE SCHEME
Encryption and partial decryption algorithm.
Hash functions and exclusive OR operations.
reduce the cost of multi linear pairing.

29/03/2016

24

CONCLUSION

We implement the scheme over the integers.


Reduced cost of computation and communication
consumption.
Ensure data confidentiality.
Fined-grained access control.
Verifiable delegation in clouds.

29/03/2016

25

THANK YOU.

29/03/2016

26

Вам также может понравиться