Attribute Based Encryption with Privacy Preserving In Clouds

Title: Attribute Based Encryption with Privacy Preserving In Clouds Domain: Cloud Computing Abstract: Security and privacy are very important issues in cl...

InnovationAdsOfIndia•4.5K views•5:53

🔥 Related Trending Topics

LIVE TRENDS

This video may be related to current global trending topics. Click any trend to explore more videos about what's hot right now!

THIS VIDEO IS TRENDING!

This video is currently trending in Bangladesh under the topic 's'.

About this video

Title: Attribute Based Encryption with Privacy Preserving In Clouds Domain: Cloud Computing Abstract: Security and privacy are very important issues in cloud computing. In existing system access control in clouds are centralized in nature. The scheme uses a symmetric key approach and does not support authentication. Symmetric key algorithm uses same key for both encryption and decryption. The authors take a centralized approach where a single key distribution center (KDC) distributes secret keys and attributes to all users. A new decentralized access control scheme for secure data storage in clouds that supports anonymous authentication. The validity of the user who stores the data is also verified. The proposed scheme is resilient to replay attacks. In this scheme using Secure Hash algorithm for authentication purpose, SHA is the one of several cryptographic hash functions, most often used to verify that a file has been unaltered. The Paillier crypto system is a probabilistic asymmetric algorithm for public key cryptography. Pailier algorithm use for Creation of access policy, file accessing and file restoring process. Key Features: 1. The proposed scheme is resilient to replay attacks. A writer whose attributes and keys have been revoked cannot write back stale information. Distributed access control of data stored in cloud so that only authorized users with valid attributes can access them. Authentication of users who store and modify their data on the cloud. The identity of the user is protected from the cloud during authentication. 2. The architecture is decentralized, meaning that there can be several KDCs for key management. The access control and authentication are both collusion resistant, meaning that no two users can collude and access data or authenticate themselves, if they are individually not authorized. Revoked users cannot access data after they have been revoked. The proposed scheme is resilient to replay attacks. 3. According to our scheme a user can create a file and store it securely in the cloud. This scheme consists of use of the two protocols ABE and ABS. The cloud verifies the authenticity of the user without knowing the user’s identity before storing data. The scheme also has the added feature of access control in which only valid users are able to decrypt the stored information. The scheme prevents replay attacks and supports creation, modification, and reading data stored in the cloud. 4. The main contributions of this paper are the following: • Distributed access control of data stored in cloud so that only authorized users with valid attributes can access them. • The identity of the user is protected from the cloud during authentication. • The architecture is decentralized, meaning that there can be several KDCs for key management. • The access control and authentication are both collusion resistant, meaning that no two users can collude and access data or authenticate themselves, if they are individually not authorized. Revoked users cannot access data after they have been revoked. • The proposed scheme is resilient to replay attacks. A writer whose attributes and keys have been revoked cannot write back stale information. The protocol supports multiple read and write on the data stored in the cloud. • The costs are comparable to the existing centralized approaches, and the expensive operations are mostly done by the cloud. • Authentication of users who store and modify their data on the cloud. • The identity of the user is protected from the cloud during authentication. 5. A decentralized access control technique with anonymous authentication, which provides user revocation and prevents replay attacks, is achieved. The cloud does not know the identity of the user who stores information, but only verifies the user’s credentials. Key distribution is done in a decentralized way and also hide the attributes and access policy of a user. One limitation is that the cloud knows the access policy for each record stored in the cloud. For more details contact: E-Mail: lightsoftomorrowtechnologies@gmail.com Buy Whole Project Kit for Rs 5000%. Project Kit: • 1 Review PPT • 2nd Review PPT • Full Coding with described algorithm • Video File • Full Document Note: *For bull purchase of projects and for outsourcing in various domains such as Java, .Net, .PHP, NS2, Matlab, Android, Embedded, Bio-Medical, Electrical, Robotic etc. contact us. *Contact for Real Time Projects, Web Development and Web Hosting services. *Comment and share on this video and win exciting developed projects for free of cost. Search Terms: 1. 2017 ieee projects 2. latest ieee projects in java 3. latest ieee projects in cloud computing 4. 2017 – 2018 cloud computing projects 5. 2017 – 2018 cloud simulation projects 6. 2017 – 2018 cloud sim projects 7. 2017 – 2018 best project center in Chennai 8. Ieee cloud simulation projects in Chennai 9. 2017 – 2018 real time cloud hosting

Video Information

Views
4.5K

Total views since publication

Likes
7

User likes and reactions

Duration
5:53

Video length

Published
Aug 5, 2014

Release date

Quality
hd

Video definition