SlideShare a Scribd company logo
1 of 48
A Fully Anonymous Attribute-Based Encryption to
Control Cloud Data Access and Anonymity
Submitted by Under the Guidance of
Pavan Boora Santosh Naik
M.Tech (Network & Internet Engineering) Assistant Professor
ISE Department ISE Department
Jain University Bangalore Jain University Bangalore
11/27/2016 1Jain University, ISE Department
Contents
1) Problem statement
2) Motivation
3) Introduction
4) Existing system
5) Drawbacks of existing system
6) Literature Survey
7) Proposed system
8) Software requirements
9) System design
10) System implementation
11) Results
12) Testing
13) Conclusion
14) Future enhancements
15) References
11/27/2016 Jain University, ISE Department 2
Problem Statement
ā€¢ To design and implement a multi authority fully anonymous Attribute
Based Encryption control scheme to address the data privacy and
user identity privacy problems in cloud computing environment .
11/27/2016 3Jain University, ISE Department
Motivation
ā€¢ Cloud Computing provides big trends in todayā€™s IT world. Due to the
benefitsā€¦. it provides attention on business, industry as well as academia.
ā€¢ It provides computing resources dynamically via Internet. But has some
challenges related, like data confidentiality, data privacy and security.
ā€¢ Privacy is related to the data contents and the users identity, so it is need
to protect the identity of users.
11/27/2016 4Jain University, ISE Department
Introduction
ā€¢ Cloud computing provides many advantages in the todayā€™s IT world,
which enables ļ¬‚exible, ubiquitous, on-demand, and low-cost usage of
computing resources.
ā€¢ But the data is outsourced to some cloud servers, and various privacy
concerns come out from it.
ā€¢ An anonymous ABE privilege control scheme to address not only the data
privacy, but also the user identity privacy.
11/27/2016 5Jain University, ISE Department
ā€¢ AnonyControl-F decentralizes the central authority and makes multi
authorities to limit the identity leakage and thus we can achieves
anonymity.
Evolution to ABE
ā€¢ Identity-based encryption (IBE) was ļ¬rst introduced by Shamir, in which
the sender of a message can add an identity to msg and only a receiver
with matching identity can decrypt it.
ā€¢ Few years later, Fuzzy Identity-Based Encryption is proposed, which is also
known as Attribute-Based Encryption (ABE).
11/27/2016 6Jain University, ISE Department
ā€¢ In ABE an identity is viewed as a set of descriptive attributes, and
decryption is possible if a decrypterā€™s identity has some overlaps (same
attributes) with the one speciļ¬ed in the Ciphertext.
ā€¢ Soon after, more general tree-based ABE schemes Key-Policy Attribute-
Based Encryption (KP-ABE) and Ciphertext-Policy Attribute-Based
Encryption (CP-ABE)
11/27/2016 7Jain University, ISE Department
CP-ABE
ā€¢ In the CP-ABE, ciphertexts are created with an access structure e.g. (A or
B) AND ( E AND F), which speciļ¬es the encryption policy, and private keys
are generated according to userā€™s attributes.
ā€¢ A user can decrypt the ciphertext if and only if his/her attributes private
key(s) satisfy the access structure speciļ¬ed in the ciphertext.
ā€¢ By doing so, the encrypter holds the ultimate authority about the
encryption policy. Also, the already issued private keys will never be
modiļ¬ed unless the whole system reboots.
11/27/2016 8Jain University, ISE Department
Access Control via CP-ABE
PK
MSK
SKSarah:
ā€œmanagerā€
ā€œIT dept.ā€
SKKevin:
ā€œmanagerā€
ā€œsalesā€
OR
IT dept. AND
manager marketing
ļƒ¼
ļƒ»
ļƒ»
ļƒ¼
ļƒ¼
ļƒ»
ļƒ»
11/27/2016 9Jain University, ISE Department
Existing System
ā€¢ A semi anonymous privilege control scheme called AnonyControl that
addresses the data Confidentiality, and partial user identity privacy
leakage is present in existing access control methods. Partially tolerates
the compromise attacks towards attribute authorities.
ā€¢ The key point of the identity information leakage we had in existing
scheme is that key generator issues attributeā€™s private key based on the
reported attribute, and the generator has to know the userā€™s attribute to
do so.
11/27/2016 10Jain University, ISE Department
Drawbacks of Existing System
ā€¢ Privacy risks would rise drastically because the servers may illegally
inspect user's data and access sensitive information.
ā€¢ Personal data is at risk because one's identity is authenticated based on
his/her data. Scope of collude(come to a secret understanding) with
malicious Data Consumers or Data Owners to harvest othersā€™ ļ¬le contents
to gain illegal proļ¬ts.
11/27/2016 11Jain University, ISE Department
Literature Survey
Author Name of the paper Existing Solution Drawbacks
V. BožoviĀ“ c, D.
Socek, R.
Steinwandt, and V.
I. VillƔnyi,
Multi-authority
attribute-based
encryption with
honest-but-curious
central authority
scheme is secure in
the selective ID
model and can
tolerate an honest-
but-curious central
authority.
Cant not tolerates
the compromise
attacks towards
attribute
authorities.
Violating the intent
of the encrypting
party
11/27/2016 Jain University, ISE Department 12
Literature Survey (continued..)
Author Name of the paper Existing system Drawbacks
M. Chase and S. S.
M. Chow
Improving privacy
and security in
multi-authority
attribute-based
encryption
Multi-authority
attribute-based
encryption enables
a more realistic
deployment of
attribute-based
access control, such
that different
authorities are
responsible for
issuing different
sets of attributes
Data contents
confidentiality and
privacy has been
achieved but
identity privacy
neglected
11/27/2016 Jain University, ISE Department 13
Literature Survey (continued..)
Author Name of the paper Existing system Drawback
A. Sahai and B.
Waters
Fuzzy identity-
based encryption
Fuzzy-IBE can be
used for a type of
application that we
term ā€œattribute-
based encryptionā€.
Open problem is to
build other Fuzzy-
IBE schemes that
use different
distance metrics
between identities.
J. Bethencourt, A.
Sahai, and B.
Waters
Ciphertext-policy
attributebased
encryption
techniques
encrypted data can
be kept confidential
even if the storage
server is untrusted
User identity
privacy and
anonymity
neglected
11/27/2016 Jain University, ISE Department 14
Proposed System
ā€¢ We propose AnonyControl-F to allow cloud servers to control userā€™s access
privileges without knowing their identity information.
ā€¢ The proposed schemes are able to protect userā€™s privacy against each
single authority. No information is disclosed in AnonyControl-F.
ā€¢ Proposed method implements the multiauthority Attribute Based
Encryption Control Scheme AnonyControl-F.
11/27/2016 15Jain University, ISE Department
Software Requirements
ā€¢ Operating System Windows
ā€¢ Web Application Server Tomcat Web Server
ā€¢ Front End Design HTML, Java, JavaScript
ā€¢ Server Side Script Java Server Pages
ā€¢ Database Connectivity JDBC
ā€¢ Database Mysql
11/27/2016 16Jain University, ISE Department
System Design
11/27/2016 17Jain University, ISE Department
System Design(Continued)
Cloud Server:
ā€¢ The Cloud Server, who is assumed to have adequate storage capacity, does
nothing but store them.
N Attribute Authorities:
ā€¢ Authorities are assumed to have powerful computation abilities, and they
are supervised by government ofļ¬ces.
ā€¢ The whole attribute set is divided into N disjoint sets and controlled by
each authority, therefore each authority is aware of only part of attributes.
11/27/2016 18Jain University, ISE Department
Data Owner:
ā€¢ A Data Owner is the entity who wishes to outsource encrypted data ļ¬le to
the Cloud Servers. A user can be a Data owner and a Data consumer
simultaneously
Data Consumers:
ā€¢ Newly joined Data Consumers request private keys from all of the
authorities, and they do not know which attributes are controlled by
which authorities.
11/27/2016 19Jain University, ISE Department
System Design(Continued)
System Design(Continued)
ā€¢ When the Data Consumers request their private keys from the authorities,
authorities will jointly create corresponding private key and send it to
them.
ā€¢ All Data Consumers are able to download any of the encrypted data ļ¬les,
but only those whose private keys satisfy the Encryption Policy can
execute the operation.
11/27/2016 Jain University, ISE Department 20
Owner_
+username
+password
+file Upload()
+Profile()
+Logout()
User Registration
+name
+username
+password
+gender
+email
+contact NO
+Location
+Experiance
+Specialiazation
+Medical Degree
+registration()
Class Login
+username
+password
+login()
File Upload
+fileid
+fname
+file data
+Get SecreteKey()
+Select Attribute()
+Set Operations()
+Upload()
Profile_
+View Profile()
Cloud Server_
+username
+password
+Strrage Files()
+Requests()
+Logout()
AA_
+username
+password
+Sign Up()
+Login()
+Generate Keys()
User_
+username
+password
+sighn up()
+Login()
+Profile()
+File Download()
+Logout()
File Download
+File ID
+File name
+Secrete Key
+Decrypt()
+Download()
CA_
+username
+password
+Login()
+User's()
+AA's()
+Logout()
Class Diagram
11/27/2016 21Jain University, ISE Department
Central Authority Collaboration Diagram
11/27/2016 22Jain University, ISE Department
Attribute Authority Collaboration Diagram
11/27/2016 23Jain University, ISE Department
Owner Collaboration Diagram
11/27/2016 24Jain University, ISE Department
User Collaboration Diagram
11/27/2016 25Jain University, ISE Department
System Implementation
Fully Anonymity Achieved
ā€¢ The key point of the identity information leakage we had in our previous
scheme as well as every existing attribute based encryption schemes is
that key generator (or attribute authorities in our scheme) issues private
key based on the reported attribute, and the generator has to know the
userā€™s attribute (identities) to do so.
ā€¢ We need to introduce a new technique to let key generators issue the
correct attribute key without knowing what attributes the users have.
11/27/2016 26Jain University, ISE Department
ā€¢ The solution is to give all the private keys of all the attributes to the key
requester and let him pick whatever he wants.
ā€¢ In this way, the key generator does not know which private keys the key
requester picked, but we have to fully trust the key requester.
ā€¢ To solve this, we leverage the following to Oblivious Transfer (OT).
11/27/2016 27Jain University, ISE Department
System Implementation ( Continued)
System Implementation ( Continued)
1-out-of-n oblivious transfer
ā€¢ In cryptography, an oblivious transfer protocol (OT) is a type of protocol.........
in which a sender transfers one of many pieces of information to a receiver,
but sender remains oblivious(unware) as what piece of information has been
transferred to receiver.
ā€¢ In an 1-out-of-n OT, the sender Bob has n messages M1, . . . , Mn , and the
receiver Alice wants to pick one Mi from those M1, . . . , Mn . Alice successfully
achieves Mi, and Bob does not know which Mi is picked by Alice.
11/27/2016 28Jain University, ISE Department
ā€¢ By introducing the 1-out-of-k Oblivious Transfer in our KeyGenerate
algorithm, the key-requester achieves the correct private key that he
wants but the attribute authority does not have any useful information
about what attribute is achieved by the requester.
ā€¢ The key requester achieves the full anonymity(user identity privacy) in our
scheme and no matter how many attribute authorities collude (come to
secret understanding) his identity information is kept secret
11/27/2016 29Jain University, ISE Department
System Implementation ( Continued)
Results
Home Page
11/27/2016 30Jain University, ISE Department
ā€¢ Central Authority approves the attribute authorities and users then after
approval users can request attribute authorities for unique private keys.
ā€¢ In this project there are two attribute authorities which can provide
private keys against user profile attributes and these authorities can
distribute the keys without looking into the user identity information
hence anonymity has achieved
11/27/2016 31Jain University, ISE Department
Results (continued..)
User 1 Registration Page
11/27/2016 32Jain University, ISE Department
Attribute Authority Page
11/27/2016 33Jain University, ISE Department
ā€¢ Attribute authorities generate private keys against attributes of users here
for user1 attributes are considered as Location, Experience, Specialty, &
MedicalDegree. We can create multiple authorities and each authority can
select attributes randomly & generate private keys.
ā€¢ For example if we create two Attribute authorities, one authority will
generate private keys for 2 attributes out of 4 attributes and second one
will generate for rest of 2 attributes.
11/27/2016 34Jain University, ISE Department
Results (continued..)
Owner File Upload by applying Access policy
11/27/2016 35Jain University, ISE Department
ā€¢ Owner uploads a file with encryption by using public key generated by
authority and owner adds an access policy structure such as
(India&&Cardiology)&&(MD||exp>4) and encryption hence attribute
based encryption achieved.
11/27/2016 36Jain University, ISE Department
Results (continued..)
User 1 trying to access(Decrypt) uploaded file
11/27/2016 37Jain University, ISE Department
Results (continued..)
ā€¢ User will decrypt the file only attributes can match the access structure
policy, in the above case user1 can not able to access & decrypt the file
and because user1 will get the popup window such as "Sorry the file
cannot Access by you", but user 2 can access & decrypt the file as user2
can satisfy the attributes which are part of access policy. Just for
verification see the user2 profile below.
11/27/2016 38Jain University, ISE Department
Results (continued..)
User 2 Profile Page
11/27/2016 39Jain University, ISE Department
Testing
Test
Id
Test case Title Description Expected
outcome
Status
1 Successful
user
verification
The login to the
system should be
tried by the admin
with correct
password
Login should
be successful
and user
should enter
into the
system
Success
2 Unsuccessful
verification
due to wrong
password
Login to the system
with a wrong
password
Login should
fail with an
error ā€œinvalid
Passwordā€
success
3 Unsuccessful
verification
due to invalid
login id
Login to the system
with a invalid login
id
Login should
fail with an
error ā€œinvalid
user idā€
Success
11/27/2016 40Jain University, ISE Department
Acceptance Testing
Test Id Description of
coverage
Expected Results Covered by script
1 Verification of a
particular record
If a particular record
already exists it
displays a message
This type of test in
{verify} procedure in
every Jsp file where a
record is inserted via an
interface
2 Updating of a
particular record
All the details should
not be updated
This type of test is
covered in all the Asp files
where updations are
made.
3 Validity of login Only the authorized
persons must access
system.
This is covered in the
login procedure for the
validity of a user
11/27/2016 Jain University, ISE Department 41
Conclusion
ā€¢ A semi-anonymous attribute-based privilege control scheme AnonyControl
and a fully-anonymous attribute-based privilege control scheme
AnonyControl-F to address the user privacy problem in a cloud storage
server.
ā€¢ Using multiple authorities in the cloud computing system, our proposed
schemes achieve not only ļ¬ne-grained privilege control but also identity
anonymity while conducting privilege control based on usersā€™ identity
information.
11/27/2016 42Jain University, ISE Department
ā€¢ More importantly, our system can tolerate up to N āˆ’ 2 authority
compromise, which is highly preferable especially in Internet-based cloud
computing environment.
11/27/2016 43Jain University, ISE Department
Future enhancements
ā€¢ One of the future works is to introduce the efficient user revocation
mechanism on top of anonymous Attribute Based Encryption. Supporting
user revocation is an important issue in the real application.
11/27/2016 Jain University, ISE Department 44
References
ā€¢ [1] A. Shamir, ā€œIdentity-based cryptosystems and signature schemes,ā€ in
Advances in Cryptology. Berlin, Germany: Springer-Verlag, 1985, pp. 47ā€“
53.
ā€¢ [2] A. Sahai and B. Waters, ā€œFuzzy identity-based encryption,ā€ in Advances
in Cryptology. Berlin, Germany: Springer-Verlag, 2005, pp. 457ā€“473.
ā€¢ [3] V. Goyal, O. Pandey, A. Sahai, and B. Waters, ā€œAttribute-based
encryption for fine-grained access control of encrypted data,ā€ in Proc. 13th
CCS, 2006, pp. 89ā€“98.
ā€¢ [4] J. Bethencourt, A. Sahai, and B. Waters, ā€œCiphertext-policy
attributebased encryption,ā€ in Proc. IEEE SP, May 2007, pp. 321ā€“334.
11/27/2016 Jain University, ISE Department 45
References
ā€¢ [5] M. Chase, ā€œMulti-authority attribute based encryption,ā€ in Theory of
Cryptography. Berlin, Germany: Springer-Verlag, 2007, pp. 515ā€“534.
ā€¢ [6] M. Chase and S. S. M. Chow, ā€œImproving privacy and security in multi-
authority attribute-based encryption,ā€ in Proc. 16th CCS, 2009, pp. 121ā€“
130.
ā€¢ [7] H. Lin, Z. Cao, X. Liang, and J. Shao, ā€œSecure threshold multi authority
attribute based encryption without a central authority,ā€ Inf. Sci., vol. 180,
no. 13, pp. 2618ā€“2632, 2010.
ā€¢
ā€¢ [8] V. BožoviĀ“ c, D. Socek, R. Steinwandt, and V. I. VillĆ”nyi, ā€œMulti-authority
attribute-based encryption with honest-but-curious central authority,ā€ Int.
J. Comput.Math., vol. 89, no. 3, pp. 268ā€“283, 2012.
11/27/2016 Jain University, ISE Department 46
References
ā€¢ [9] F. Li, Y. Rahulamathavan, M. Rajarajan, and R. C.-W. Phan, ā€œLow
complexity multi-authority attribute based encryption scheme for mobile
cloud computing,ā€ in Proc. IEEE 7th SOSE, Mar. 2013, pp. 573ā€“577.
ā€¢ [10] K. Yang, X. Jia, K. Ren, and B. Zhang, ā€œDAC-MACS: Effective data access
control for multi-authority cloud storage systems,ā€ in Proc. IEEE INFOCOM,
Apr. 2013, pp. 2895ā€“2903.
ā€¢ [11] http://www.sourcefordgde.com
ā€¢ [12] http://www.networkcomputing.com/
ā€¢ [13] http://www.roseindia.com/
11/27/2016 Jain University, ISE Department 47
Thank You
11/27/2016 48Jain University, ISE Department

More Related Content

What's hot

4 Mapping the Application
4 Mapping the Application4 Mapping the Application
4 Mapping the ApplicationSam Bowne
Ā 
Logistic Regression.pptx
Logistic Regression.pptxLogistic Regression.pptx
Logistic Regression.pptxMuskaan194530
Ā 
Feature Engineering in H2O Driverless AI - Dmitry Larko - H2O AI World London...
Feature Engineering in H2O Driverless AI - Dmitry Larko - H2O AI World London...Feature Engineering in H2O Driverless AI - Dmitry Larko - H2O AI World London...
Feature Engineering in H2O Driverless AI - Dmitry Larko - H2O AI World London...Sri Ambati
Ā 
MAC-Message Authentication Codes
MAC-Message Authentication CodesMAC-Message Authentication Codes
MAC-Message Authentication CodesDarshanPatil82
Ā 
Chapter - 6 Data Mining Concepts and Techniques 2nd Ed slides Han & Kamber
Chapter - 6 Data Mining Concepts and Techniques 2nd Ed slides Han & KamberChapter - 6 Data Mining Concepts and Techniques 2nd Ed slides Han & Kamber
Chapter - 6 Data Mining Concepts and Techniques 2nd Ed slides Han & Kambererror007
Ā 
User authentication
User authenticationUser authentication
User authenticationCAS
Ā 
Lect 2 getting to know your data
Lect 2 getting to know your dataLect 2 getting to know your data
Lect 2 getting to know your datahktripathy
Ā 
Data Integration and Transformation in Data mining
Data Integration and Transformation in Data miningData Integration and Transformation in Data mining
Data Integration and Transformation in Data miningkavitha muneeshwaran
Ā 
Klasifikasi - Algoritma Naive Bayes
Klasifikasi - Algoritma Naive Bayes Klasifikasi - Algoritma Naive Bayes
Klasifikasi - Algoritma Naive Bayes Elvi Rahmi
Ā 
Data Mining Concepts and Techniques, Chapter 10. Cluster Analysis: Basic Conc...
Data Mining Concepts and Techniques, Chapter 10. Cluster Analysis: Basic Conc...Data Mining Concepts and Techniques, Chapter 10. Cluster Analysis: Basic Conc...
Data Mining Concepts and Techniques, Chapter 10. Cluster Analysis: Basic Conc...Salah Amean
Ā 
Artificial Intelligence, Machine Learning and Deep Learning
Artificial Intelligence, Machine Learning and Deep LearningArtificial Intelligence, Machine Learning and Deep Learning
Artificial Intelligence, Machine Learning and Deep LearningSujit Pal
Ā 
k medoid clustering.pptx
k medoid clustering.pptxk medoid clustering.pptx
k medoid clustering.pptxRoshan86572
Ā 
Image Encryption in java ppt.
Image Encryption in java ppt.Image Encryption in java ppt.
Image Encryption in java ppt.Pradeep Vishwakarma
Ā 
Role of Data Cleaning in Data Warehouse
Role of Data Cleaning in Data WarehouseRole of Data Cleaning in Data Warehouse
Role of Data Cleaning in Data WarehouseRamakant Soni
Ā 
Iot security and Authentication solution
Iot security and Authentication solutionIot security and Authentication solution
Iot security and Authentication solutionPradeep Jeswani
Ā 
Ch 1: Web Application (In)security & Ch 2: Core Defense Mechanisms
Ch 1: Web Application (In)security & Ch 2: Core Defense Mechanisms Ch 1: Web Application (In)security & Ch 2: Core Defense Mechanisms
Ch 1: Web Application (In)security & Ch 2: Core Defense Mechanisms Sam Bowne
Ā 

What's hot (20)

4 Mapping the Application
4 Mapping the Application4 Mapping the Application
4 Mapping the Application
Ā 
Logistic Regression.pptx
Logistic Regression.pptxLogistic Regression.pptx
Logistic Regression.pptx
Ā 
Feature Engineering in H2O Driverless AI - Dmitry Larko - H2O AI World London...
Feature Engineering in H2O Driverless AI - Dmitry Larko - H2O AI World London...Feature Engineering in H2O Driverless AI - Dmitry Larko - H2O AI World London...
Feature Engineering in H2O Driverless AI - Dmitry Larko - H2O AI World London...
Ā 
Chapter 1: Introduction to Data Mining
Chapter 1: Introduction to Data MiningChapter 1: Introduction to Data Mining
Chapter 1: Introduction to Data Mining
Ā 
MAC-Message Authentication Codes
MAC-Message Authentication CodesMAC-Message Authentication Codes
MAC-Message Authentication Codes
Ā 
Chapter - 6 Data Mining Concepts and Techniques 2nd Ed slides Han & Kamber
Chapter - 6 Data Mining Concepts and Techniques 2nd Ed slides Han & KamberChapter - 6 Data Mining Concepts and Techniques 2nd Ed slides Han & Kamber
Chapter - 6 Data Mining Concepts and Techniques 2nd Ed slides Han & Kamber
Ā 
User authentication
User authenticationUser authentication
User authentication
Ā 
Curso SGSI 2023
Curso SGSI 2023Curso SGSI 2023
Curso SGSI 2023
Ā 
Lect 2 getting to know your data
Lect 2 getting to know your dataLect 2 getting to know your data
Lect 2 getting to know your data
Ā 
Intro to ML.pptx
Intro to ML.pptxIntro to ML.pptx
Intro to ML.pptx
Ā 
Email security
Email securityEmail security
Email security
Ā 
Data Integration and Transformation in Data mining
Data Integration and Transformation in Data miningData Integration and Transformation in Data mining
Data Integration and Transformation in Data mining
Ā 
Klasifikasi - Algoritma Naive Bayes
Klasifikasi - Algoritma Naive Bayes Klasifikasi - Algoritma Naive Bayes
Klasifikasi - Algoritma Naive Bayes
Ā 
Data Mining Concepts and Techniques, Chapter 10. Cluster Analysis: Basic Conc...
Data Mining Concepts and Techniques, Chapter 10. Cluster Analysis: Basic Conc...Data Mining Concepts and Techniques, Chapter 10. Cluster Analysis: Basic Conc...
Data Mining Concepts and Techniques, Chapter 10. Cluster Analysis: Basic Conc...
Ā 
Artificial Intelligence, Machine Learning and Deep Learning
Artificial Intelligence, Machine Learning and Deep LearningArtificial Intelligence, Machine Learning and Deep Learning
Artificial Intelligence, Machine Learning and Deep Learning
Ā 
k medoid clustering.pptx
k medoid clustering.pptxk medoid clustering.pptx
k medoid clustering.pptx
Ā 
Image Encryption in java ppt.
Image Encryption in java ppt.Image Encryption in java ppt.
Image Encryption in java ppt.
Ā 
Role of Data Cleaning in Data Warehouse
Role of Data Cleaning in Data WarehouseRole of Data Cleaning in Data Warehouse
Role of Data Cleaning in Data Warehouse
Ā 
Iot security and Authentication solution
Iot security and Authentication solutionIot security and Authentication solution
Iot security and Authentication solution
Ā 
Ch 1: Web Application (In)security & Ch 2: Core Defense Mechanisms
Ch 1: Web Application (In)security & Ch 2: Core Defense Mechanisms Ch 1: Web Application (In)security & Ch 2: Core Defense Mechanisms
Ch 1: Web Application (In)security & Ch 2: Core Defense Mechanisms
Ā 

Viewers also liked

CONTROL CLOUD DATA ACCESS PRIVILEGE AND ANONYMITY WITH FULLY ANONYMOUS ATTRIB...
CONTROL CLOUD DATA ACCESS PRIVILEGE AND ANONYMITY WITH FULLY ANONYMOUS ATTRIB...CONTROL CLOUD DATA ACCESS PRIVILEGE AND ANONYMITY WITH FULLY ANONYMOUS ATTRIB...
CONTROL CLOUD DATA ACCESS PRIVILEGE AND ANONYMITY WITH FULLY ANONYMOUS ATTRIB...Nexgen Technology
Ā 
Attribute Based Encryption with Privacy Preserving In Clouds
Attribute Based Encryption with Privacy Preserving In Clouds Attribute Based Encryption with Privacy Preserving In Clouds
Attribute Based Encryption with Privacy Preserving In Clouds Swathi Rampur
Ā 
Control cloud-data-access-privilege-and-anonymity-with-fully-anonymous-attrib...
Control cloud-data-access-privilege-and-anonymity-with-fully-anonymous-attrib...Control cloud-data-access-privilege-and-anonymity-with-fully-anonymous-attrib...
Control cloud-data-access-privilege-and-anonymity-with-fully-anonymous-attrib...Pvrtechnologies Nellore
Ā 
Attribute based encryption in cloud with significant reduction reviw2
Attribute based encryption in cloud with significant reduction reviw2Attribute based encryption in cloud with significant reduction reviw2
Attribute based encryption in cloud with significant reduction reviw2Naveena N
Ā 
Attribute-Based Encryption for Cloud Security
Attribute-Based Encryption for Cloud SecurityAttribute-Based Encryption for Cloud Security
Attribute-Based Encryption for Cloud SecurityMphasis
Ā 
Attributes based encryption with verifiable outsourced decryption
Attributes based encryption with verifiable outsourced decryptionAttributes based encryption with verifiable outsourced decryption
Attributes based encryption with verifiable outsourced decryptionKaashivInfoTech Company
Ā 
Comments on ā€œcontrol cloud data access privilege and anonymity with fully ano...
Comments on ā€œcontrol cloud data access privilege and anonymity with fully ano...Comments on ā€œcontrol cloud data access privilege and anonymity with fully ano...
Comments on ā€œcontrol cloud data access privilege and anonymity with fully ano...ieeepondy
Ā 
Cloud computing for java and dotnet
Cloud computing for java and dotnetCloud computing for java and dotnet
Cloud computing for java and dotnetredpel dot com
Ā 
Attribute based data sharing scheme revisited in cloud computing
Attribute based data sharing scheme revisited in cloud computingAttribute based data sharing scheme revisited in cloud computing
Attribute based data sharing scheme revisited in cloud computingieeepondy
Ā 
ATTRIBUTE-BASED DATA SHARING SCHEME REVISITED IN CLOUD COMPUTING,bulk ieee pr...
ATTRIBUTE-BASED DATA SHARING SCHEME REVISITED IN CLOUD COMPUTING,bulk ieee pr...ATTRIBUTE-BASED DATA SHARING SCHEME REVISITED IN CLOUD COMPUTING,bulk ieee pr...
ATTRIBUTE-BASED DATA SHARING SCHEME REVISITED IN CLOUD COMPUTING,bulk ieee pr...Nexgen Technology
Ā 
The_Hydra - Bagaimana Menulis dan Memaintain Elektronik Hacking Magazine
The_Hydra - Bagaimana Menulis dan Memaintain Elektronik Hacking MagazineThe_Hydra - Bagaimana Menulis dan Memaintain Elektronik Hacking Magazine
The_Hydra - Bagaimana Menulis dan Memaintain Elektronik Hacking Magazineidsecconf
Ā 
Circuit ciphertext policy attribute-based hybrid encryption with verifiable d...
Circuit ciphertext policy attribute-based hybrid encryption with verifiable d...Circuit ciphertext policy attribute-based hybrid encryption with verifiable d...
Circuit ciphertext policy attribute-based hybrid encryption with verifiable d...Shakas Technologies
Ā 
Application of CP-ABE Scheme in Data Sharing System for confidentiality
Application of CP-ABE Scheme in Data Sharing System for confidentialityApplication of CP-ABE Scheme in Data Sharing System for confidentiality
Application of CP-ABE Scheme in Data Sharing System for confidentialityEditor IJMTER
Ā 
Ijcatr04051002
Ijcatr04051002Ijcatr04051002
Ijcatr04051002Editor IJCATR
Ā 
Flexible and fine grained attribute-based data storage in cloud computing
Flexible and fine grained attribute-based data storage in cloud computingFlexible and fine grained attribute-based data storage in cloud computing
Flexible and fine grained attribute-based data storage in cloud computingShakas Technologies
Ā 
Final_attribute based encryption in cloud with significant reduction of compu...
Final_attribute based encryption in cloud with significant reduction of compu...Final_attribute based encryption in cloud with significant reduction of compu...
Final_attribute based encryption in cloud with significant reduction of compu...Naveena N
Ā 
Studi dan Implementasi Keamanan User Privacy menggunakan CP-ABE
Studi dan Implementasi Keamanan User Privacy menggunakan CP-ABEStudi dan Implementasi Keamanan User Privacy menggunakan CP-ABE
Studi dan Implementasi Keamanan User Privacy menggunakan CP-ABEidsecconf
Ā 
AN EFFICIENT FILE HIERARCHY ATTRIBUTE-BASED ENCRYPTION SCHEME IN CLOUD COMPUT...
AN EFFICIENT FILE HIERARCHY ATTRIBUTE-BASED ENCRYPTION SCHEME IN CLOUD COMPUT...AN EFFICIENT FILE HIERARCHY ATTRIBUTE-BASED ENCRYPTION SCHEME IN CLOUD COMPUT...
AN EFFICIENT FILE HIERARCHY ATTRIBUTE-BASED ENCRYPTION SCHEME IN CLOUD COMPUT...Nexgen Technology
Ā 

Viewers also liked (20)

CONTROL CLOUD DATA ACCESS PRIVILEGE AND ANONYMITY WITH FULLY ANONYMOUS ATTRIB...
CONTROL CLOUD DATA ACCESS PRIVILEGE AND ANONYMITY WITH FULLY ANONYMOUS ATTRIB...CONTROL CLOUD DATA ACCESS PRIVILEGE AND ANONYMITY WITH FULLY ANONYMOUS ATTRIB...
CONTROL CLOUD DATA ACCESS PRIVILEGE AND ANONYMITY WITH FULLY ANONYMOUS ATTRIB...
Ā 
Attribute Based Encryption with Privacy Preserving In Clouds
Attribute Based Encryption with Privacy Preserving In Clouds Attribute Based Encryption with Privacy Preserving In Clouds
Attribute Based Encryption with Privacy Preserving In Clouds
Ā 
Control cloud-data-access-privilege-and-anonymity-with-fully-anonymous-attrib...
Control cloud-data-access-privilege-and-anonymity-with-fully-anonymous-attrib...Control cloud-data-access-privilege-and-anonymity-with-fully-anonymous-attrib...
Control cloud-data-access-privilege-and-anonymity-with-fully-anonymous-attrib...
Ā 
Attribute based encryption in cloud with significant reduction reviw2
Attribute based encryption in cloud with significant reduction reviw2Attribute based encryption in cloud with significant reduction reviw2
Attribute based encryption in cloud with significant reduction reviw2
Ā 
Attribute-Based Encryption for Cloud Security
Attribute-Based Encryption for Cloud SecurityAttribute-Based Encryption for Cloud Security
Attribute-Based Encryption for Cloud Security
Ā 
Attributes based encryption with verifiable outsourced decryption
Attributes based encryption with verifiable outsourced decryptionAttributes based encryption with verifiable outsourced decryption
Attributes based encryption with verifiable outsourced decryption
Ā 
Comments on ā€œcontrol cloud data access privilege and anonymity with fully ano...
Comments on ā€œcontrol cloud data access privilege and anonymity with fully ano...Comments on ā€œcontrol cloud data access privilege and anonymity with fully ano...
Comments on ā€œcontrol cloud data access privilege and anonymity with fully ano...
Ā 
Cloud computing for java and dotnet
Cloud computing for java and dotnetCloud computing for java and dotnet
Cloud computing for java and dotnet
Ā 
Attribute based data sharing scheme revisited in cloud computing
Attribute based data sharing scheme revisited in cloud computingAttribute based data sharing scheme revisited in cloud computing
Attribute based data sharing scheme revisited in cloud computing
Ā 
ATTRIBUTE-BASED DATA SHARING SCHEME REVISITED IN CLOUD COMPUTING,bulk ieee pr...
ATTRIBUTE-BASED DATA SHARING SCHEME REVISITED IN CLOUD COMPUTING,bulk ieee pr...ATTRIBUTE-BASED DATA SHARING SCHEME REVISITED IN CLOUD COMPUTING,bulk ieee pr...
ATTRIBUTE-BASED DATA SHARING SCHEME REVISITED IN CLOUD COMPUTING,bulk ieee pr...
Ā 
The_Hydra - Bagaimana Menulis dan Memaintain Elektronik Hacking Magazine
The_Hydra - Bagaimana Menulis dan Memaintain Elektronik Hacking MagazineThe_Hydra - Bagaimana Menulis dan Memaintain Elektronik Hacking Magazine
The_Hydra - Bagaimana Menulis dan Memaintain Elektronik Hacking Magazine
Ā 
Circuit ciphertext policy attribute-based hybrid encryption with verifiable d...
Circuit ciphertext policy attribute-based hybrid encryption with verifiable d...Circuit ciphertext policy attribute-based hybrid encryption with verifiable d...
Circuit ciphertext policy attribute-based hybrid encryption with verifiable d...
Ā 
CP-ABE Scheme with extended reliability factor and load balancing in distribu...
CP-ABE Scheme with extended reliability factor and load balancing in distribu...CP-ABE Scheme with extended reliability factor and load balancing in distribu...
CP-ABE Scheme with extended reliability factor and load balancing in distribu...
Ā 
Application of CP-ABE Scheme in Data Sharing System for confidentiality
Application of CP-ABE Scheme in Data Sharing System for confidentialityApplication of CP-ABE Scheme in Data Sharing System for confidentiality
Application of CP-ABE Scheme in Data Sharing System for confidentiality
Ā 
Ijcatr04051002
Ijcatr04051002Ijcatr04051002
Ijcatr04051002
Ā 
Presentation
PresentationPresentation
Presentation
Ā 
Flexible and fine grained attribute-based data storage in cloud computing
Flexible and fine grained attribute-based data storage in cloud computingFlexible and fine grained attribute-based data storage in cloud computing
Flexible and fine grained attribute-based data storage in cloud computing
Ā 
Final_attribute based encryption in cloud with significant reduction of compu...
Final_attribute based encryption in cloud with significant reduction of compu...Final_attribute based encryption in cloud with significant reduction of compu...
Final_attribute based encryption in cloud with significant reduction of compu...
Ā 
Studi dan Implementasi Keamanan User Privacy menggunakan CP-ABE
Studi dan Implementasi Keamanan User Privacy menggunakan CP-ABEStudi dan Implementasi Keamanan User Privacy menggunakan CP-ABE
Studi dan Implementasi Keamanan User Privacy menggunakan CP-ABE
Ā 
AN EFFICIENT FILE HIERARCHY ATTRIBUTE-BASED ENCRYPTION SCHEME IN CLOUD COMPUT...
AN EFFICIENT FILE HIERARCHY ATTRIBUTE-BASED ENCRYPTION SCHEME IN CLOUD COMPUT...AN EFFICIENT FILE HIERARCHY ATTRIBUTE-BASED ENCRYPTION SCHEME IN CLOUD COMPUT...
AN EFFICIENT FILE HIERARCHY ATTRIBUTE-BASED ENCRYPTION SCHEME IN CLOUD COMPUT...
Ā 

Similar to A Fully Anonymous Attribute-Based Encryption to Control Cloud Data Access and Anonymity

Educause Annual 2007
Educause Annual 2007Educause Annual 2007
Educause Annual 2007Neil Matatall
Ā 
Ensuring distributed accountability
Ensuring distributed accountabilityEnsuring distributed accountability
Ensuring distributed accountabilityNandini Chandran
Ā 
Control Cloud Data Access Privilege and Anonymity with Fully Anonymous Attrib...
Control Cloud Data Access Privilege and Anonymity with Fully Anonymous Attrib...Control Cloud Data Access Privilege and Anonymity with Fully Anonymous Attrib...
Control Cloud Data Access Privilege and Anonymity with Fully Anonymous Attrib...1crore projects
Ā 
Control Cloud Data Access Privilege and Anonymity with Fully Anonymous Attrib...
Control Cloud Data Access Privilege and Anonymity with Fully Anonymous Attrib...Control Cloud Data Access Privilege and Anonymity with Fully Anonymous Attrib...
Control Cloud Data Access Privilege and Anonymity with Fully Anonymous Attrib...1crore projects
Ā 
A Survey on Access Control Mechanisms using Attribute Based Encryption in cloud
A Survey on Access Control Mechanisms using Attribute Based Encryption in cloudA Survey on Access Control Mechanisms using Attribute Based Encryption in cloud
A Survey on Access Control Mechanisms using Attribute Based Encryption in cloudijsrd.com
Ā 
IRJET - Reliable and Efficient Revocation and Data Sharing using Identity...
IRJET -  	  Reliable and Efficient Revocation and Data Sharing using Identity...IRJET -  	  Reliable and Efficient Revocation and Data Sharing using Identity...
IRJET - Reliable and Efficient Revocation and Data Sharing using Identity...IRJET Journal
Ā 
Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictiona...
Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictiona...Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictiona...
Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictiona...1crore projects
Ā 
Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictiona...
Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictiona...Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictiona...
Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictiona...1crore projects
Ā 
Final Phase 1.pptxgcjxdzgredhdjyrsjrxhthtxht
Final Phase 1.pptxgcjxdzgredhdjyrsjrxhthtxhtFinal Phase 1.pptxgcjxdzgredhdjyrsjrxhthtxht
Final Phase 1.pptxgcjxdzgredhdjyrsjrxhthtxhtAnup464706
Ā 
Understanding Database Encryption & Protecting Against the Insider Threat wit...
Understanding Database Encryption & Protecting Against the Insider Threat wit...Understanding Database Encryption & Protecting Against the Insider Threat wit...
Understanding Database Encryption & Protecting Against the Insider Threat wit...MongoDB
Ā 
B04010610
B04010610B04010610
B04010610IJMER
Ā 
Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...LeMeniz Infotech
Ā 
Cyber Security and Open Source
Cyber Security and Open SourceCyber Security and Open Source
Cyber Security and Open SourcePOSSCON
Ā 
Accurate and Efficient Secured Dynamic Multi-keyword Ranked Search
Accurate and Efficient Secured Dynamic Multi-keyword Ranked SearchAccurate and Efficient Secured Dynamic Multi-keyword Ranked Search
Accurate and Efficient Secured Dynamic Multi-keyword Ranked SearchDakshineshwar Swain
Ā 
Cloud assisted mobile-access of health data with privacy and auditability
Cloud assisted mobile-access of health data with privacy and auditabilityCloud assisted mobile-access of health data with privacy and auditability
Cloud assisted mobile-access of health data with privacy and auditabilityIGEEKS TECHNOLOGIES
Ā 

Similar to A Fully Anonymous Attribute-Based Encryption to Control Cloud Data Access and Anonymity (20)

Educause Annual 2007
Educause Annual 2007Educause Annual 2007
Educause Annual 2007
Ā 
Security Imeprative for iOS and Android Apps
Security Imeprative for iOS and Android AppsSecurity Imeprative for iOS and Android Apps
Security Imeprative for iOS and Android Apps
Ā 
Ensuring distributed accountability
Ensuring distributed accountabilityEnsuring distributed accountability
Ensuring distributed accountability
Ā 
Control Cloud Data Access Privilege and Anonymity with Fully Anonymous Attrib...
Control Cloud Data Access Privilege and Anonymity with Fully Anonymous Attrib...Control Cloud Data Access Privilege and Anonymity with Fully Anonymous Attrib...
Control Cloud Data Access Privilege and Anonymity with Fully Anonymous Attrib...
Ā 
Control Cloud Data Access Privilege and Anonymity with Fully Anonymous Attrib...
Control Cloud Data Access Privilege and Anonymity with Fully Anonymous Attrib...Control Cloud Data Access Privilege and Anonymity with Fully Anonymous Attrib...
Control Cloud Data Access Privilege and Anonymity with Fully Anonymous Attrib...
Ā 
A Survey on Access Control Mechanisms using Attribute Based Encryption in cloud
A Survey on Access Control Mechanisms using Attribute Based Encryption in cloudA Survey on Access Control Mechanisms using Attribute Based Encryption in cloud
A Survey on Access Control Mechanisms using Attribute Based Encryption in cloud
Ā 
IRJET - Reliable and Efficient Revocation and Data Sharing using Identity...
IRJET -  	  Reliable and Efficient Revocation and Data Sharing using Identity...IRJET -  	  Reliable and Efficient Revocation and Data Sharing using Identity...
IRJET - Reliable and Efficient Revocation and Data Sharing using Identity...
Ā 
Introduction to security testing raj
Introduction to security testing rajIntroduction to security testing raj
Introduction to security testing raj
Ā 
Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictiona...
Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictiona...Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictiona...
Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictiona...
Ā 
Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictiona...
Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictiona...Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictiona...
Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictiona...
Ā 
Final Phase 1.pptxgcjxdzgredhdjyrsjrxhthtxht
Final Phase 1.pptxgcjxdzgredhdjyrsjrxhthtxhtFinal Phase 1.pptxgcjxdzgredhdjyrsjrxhthtxht
Final Phase 1.pptxgcjxdzgredhdjyrsjrxhthtxht
Ā 
2nd rvw
2nd rvw2nd rvw
2nd rvw
Ā 
Understanding Database Encryption & Protecting Against the Insider Threat wit...
Understanding Database Encryption & Protecting Against the Insider Threat wit...Understanding Database Encryption & Protecting Against the Insider Threat wit...
Understanding Database Encryption & Protecting Against the Insider Threat wit...
Ā 
B04010610
B04010610B04010610
B04010610
Ā 
B04010610
B04010610B04010610
B04010610
Ā 
Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...
Ā 
Cybersecurity update 12
Cybersecurity update 12Cybersecurity update 12
Cybersecurity update 12
Ā 
Cyber Security and Open Source
Cyber Security and Open SourceCyber Security and Open Source
Cyber Security and Open Source
Ā 
Accurate and Efficient Secured Dynamic Multi-keyword Ranked Search
Accurate and Efficient Secured Dynamic Multi-keyword Ranked SearchAccurate and Efficient Secured Dynamic Multi-keyword Ranked Search
Accurate and Efficient Secured Dynamic Multi-keyword Ranked Search
Ā 
Cloud assisted mobile-access of health data with privacy and auditability
Cloud assisted mobile-access of health data with privacy and auditabilityCloud assisted mobile-access of health data with privacy and auditability
Cloud assisted mobile-access of health data with privacy and auditability
Ā 

Recently uploaded

VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With RoomVIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Roomgirls4nights
Ā 
Radiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsRadiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsstephieert
Ā 
Russian Call Girls in Kolkata Ishita šŸ¤Œ 8250192130 šŸš€ Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita šŸ¤Œ  8250192130 šŸš€ Vip Call Girls KolkataRussian Call Girls in Kolkata Ishita šŸ¤Œ  8250192130 šŸš€ Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita šŸ¤Œ 8250192130 šŸš€ Vip Call Girls Kolkataanamikaraghav4
Ā 
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607dollysharma2066
Ā 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girladitipandeya
Ā 
Call Girls Service Chandigarh Lucky ā¤ļø 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ā¤ļø 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky ā¤ļø 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ā¤ļø 7710465962 Independent Call Girls In C...Sheetaleventcompany
Ā 
Delhi Call Girls Rohini 9711199171 ā˜Žāœ”šŸ‘Œāœ” Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ā˜Žāœ”šŸ‘Œāœ” Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ā˜Žāœ”šŸ‘Œāœ” Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ā˜Žāœ”šŸ‘Œāœ” Whatsapp Hard And Sexy Vip Callshivangimorya083
Ā 
VIP Call Girls Kolkata Ananya šŸ¤Œ 8250192130 šŸš€ Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya šŸ¤Œ  8250192130 šŸš€ Vip Call Girls KolkataVIP Call Girls Kolkata Ananya šŸ¤Œ  8250192130 šŸš€ Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya šŸ¤Œ 8250192130 šŸš€ Vip Call Girls Kolkataanamikaraghav4
Ā 
Call Girls In Sukhdev Vihar Delhi šŸ’ÆCall Us šŸ”8264348440šŸ”
Call Girls In Sukhdev Vihar Delhi šŸ’ÆCall Us šŸ”8264348440šŸ”Call Girls In Sukhdev Vihar Delhi šŸ’ÆCall Us šŸ”8264348440šŸ”
Call Girls In Sukhdev Vihar Delhi šŸ’ÆCall Us šŸ”8264348440šŸ”soniya singh
Ā 
VIP Kolkata Call Girl Alambazar šŸ‘‰ 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar šŸ‘‰ 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar šŸ‘‰ 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar šŸ‘‰ 8250192130 Available With Roomdivyansh0kumar0
Ā 
VIP Kolkata Call Girl Kestopur šŸ‘‰ 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur šŸ‘‰ 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur šŸ‘‰ 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur šŸ‘‰ 8250192130 Available With Roomdivyansh0kumar0
Ā 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024APNIC
Ā 
Low Rate Young Call Girls in Sector 63 Mamura Noida āœ”ļøā˜†9289244007āœ”ļøā˜† Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida āœ”ļøā˜†9289244007āœ”ļøā˜† Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida āœ”ļøā˜†9289244007āœ”ļøā˜† Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida āœ”ļøā˜†9289244007āœ”ļøā˜† Female E...SofiyaSharma5
Ā 
ā‚¹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] šŸ”|97111...
ā‚¹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] šŸ”|97111...ā‚¹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] šŸ”|97111...
ā‚¹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] šŸ”|97111...Diya Sharma
Ā 
VIP Kolkata Call Girl Salt Lake šŸ‘‰ 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake šŸ‘‰ 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake šŸ‘‰ 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake šŸ‘‰ 8250192130 Available With Roomishabajaj13
Ā 
Call Girls In Model Towh Delhi šŸ’ÆCall Us šŸ”8264348440šŸ”
Call Girls In Model Towh Delhi šŸ’ÆCall Us šŸ”8264348440šŸ”Call Girls In Model Towh Delhi šŸ’ÆCall Us šŸ”8264348440šŸ”
Call Girls In Model Towh Delhi šŸ’ÆCall Us šŸ”8264348440šŸ”soniya singh
Ā 

Recently uploaded (20)

Call Girls In South Ex šŸ“± 9999965857 šŸ¤© Delhi šŸ«¦ HOT AND SEXY VVIP šŸŽ SERVICE
Call Girls In South Ex šŸ“±  9999965857  šŸ¤© Delhi šŸ«¦ HOT AND SEXY VVIP šŸŽ SERVICECall Girls In South Ex šŸ“±  9999965857  šŸ¤© Delhi šŸ«¦ HOT AND SEXY VVIP šŸŽ SERVICE
Call Girls In South Ex šŸ“± 9999965857 šŸ¤© Delhi šŸ«¦ HOT AND SEXY VVIP šŸŽ SERVICE
Ā 
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With RoomVIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
Ā 
Radiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsRadiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girls
Ā 
Russian Call Girls in Kolkata Ishita šŸ¤Œ 8250192130 šŸš€ Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita šŸ¤Œ  8250192130 šŸš€ Vip Call Girls KolkataRussian Call Girls in Kolkata Ishita šŸ¤Œ  8250192130 šŸš€ Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita šŸ¤Œ 8250192130 šŸš€ Vip Call Girls Kolkata
Ā 
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
Ā 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
Ā 
Call Girls Service Chandigarh Lucky ā¤ļø 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ā¤ļø 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky ā¤ļø 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ā¤ļø 7710465962 Independent Call Girls In C...
Ā 
Delhi Call Girls Rohini 9711199171 ā˜Žāœ”šŸ‘Œāœ” Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ā˜Žāœ”šŸ‘Œāœ” Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ā˜Žāœ”šŸ‘Œāœ” Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ā˜Žāœ”šŸ‘Œāœ” Whatsapp Hard And Sexy Vip Call
Ā 
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Ā 
VIP Call Girls Kolkata Ananya šŸ¤Œ 8250192130 šŸš€ Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya šŸ¤Œ  8250192130 šŸš€ Vip Call Girls KolkataVIP Call Girls Kolkata Ananya šŸ¤Œ  8250192130 šŸš€ Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya šŸ¤Œ 8250192130 šŸš€ Vip Call Girls Kolkata
Ā 
Call Girls In Sukhdev Vihar Delhi šŸ’ÆCall Us šŸ”8264348440šŸ”
Call Girls In Sukhdev Vihar Delhi šŸ’ÆCall Us šŸ”8264348440šŸ”Call Girls In Sukhdev Vihar Delhi šŸ’ÆCall Us šŸ”8264348440šŸ”
Call Girls In Sukhdev Vihar Delhi šŸ’ÆCall Us šŸ”8264348440šŸ”
Ā 
VIP Kolkata Call Girl Alambazar šŸ‘‰ 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar šŸ‘‰ 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar šŸ‘‰ 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar šŸ‘‰ 8250192130 Available With Room
Ā 
VIP Kolkata Call Girl Kestopur šŸ‘‰ 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur šŸ‘‰ 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur šŸ‘‰ 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur šŸ‘‰ 8250192130 Available With Room
Ā 
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Ā 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
Ā 
Low Rate Young Call Girls in Sector 63 Mamura Noida āœ”ļøā˜†9289244007āœ”ļøā˜† Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida āœ”ļøā˜†9289244007āœ”ļøā˜† Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida āœ”ļøā˜†9289244007āœ”ļøā˜† Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida āœ”ļøā˜†9289244007āœ”ļøā˜† Female E...
Ā 
ā‚¹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] šŸ”|97111...
ā‚¹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] šŸ”|97111...ā‚¹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] šŸ”|97111...
ā‚¹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] šŸ”|97111...
Ā 
VIP Kolkata Call Girl Salt Lake šŸ‘‰ 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake šŸ‘‰ 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake šŸ‘‰ 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake šŸ‘‰ 8250192130 Available With Room
Ā 
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Ā 
Call Girls In Model Towh Delhi šŸ’ÆCall Us šŸ”8264348440šŸ”
Call Girls In Model Towh Delhi šŸ’ÆCall Us šŸ”8264348440šŸ”Call Girls In Model Towh Delhi šŸ’ÆCall Us šŸ”8264348440šŸ”
Call Girls In Model Towh Delhi šŸ’ÆCall Us šŸ”8264348440šŸ”
Ā 

A Fully Anonymous Attribute-Based Encryption to Control Cloud Data Access and Anonymity

  • 1. A Fully Anonymous Attribute-Based Encryption to Control Cloud Data Access and Anonymity Submitted by Under the Guidance of Pavan Boora Santosh Naik M.Tech (Network & Internet Engineering) Assistant Professor ISE Department ISE Department Jain University Bangalore Jain University Bangalore 11/27/2016 1Jain University, ISE Department
  • 2. Contents 1) Problem statement 2) Motivation 3) Introduction 4) Existing system 5) Drawbacks of existing system 6) Literature Survey 7) Proposed system 8) Software requirements 9) System design 10) System implementation 11) Results 12) Testing 13) Conclusion 14) Future enhancements 15) References 11/27/2016 Jain University, ISE Department 2
  • 3. Problem Statement ā€¢ To design and implement a multi authority fully anonymous Attribute Based Encryption control scheme to address the data privacy and user identity privacy problems in cloud computing environment . 11/27/2016 3Jain University, ISE Department
  • 4. Motivation ā€¢ Cloud Computing provides big trends in todayā€™s IT world. Due to the benefitsā€¦. it provides attention on business, industry as well as academia. ā€¢ It provides computing resources dynamically via Internet. But has some challenges related, like data confidentiality, data privacy and security. ā€¢ Privacy is related to the data contents and the users identity, so it is need to protect the identity of users. 11/27/2016 4Jain University, ISE Department
  • 5. Introduction ā€¢ Cloud computing provides many advantages in the todayā€™s IT world, which enables ļ¬‚exible, ubiquitous, on-demand, and low-cost usage of computing resources. ā€¢ But the data is outsourced to some cloud servers, and various privacy concerns come out from it. ā€¢ An anonymous ABE privilege control scheme to address not only the data privacy, but also the user identity privacy. 11/27/2016 5Jain University, ISE Department
  • 6. ā€¢ AnonyControl-F decentralizes the central authority and makes multi authorities to limit the identity leakage and thus we can achieves anonymity. Evolution to ABE ā€¢ Identity-based encryption (IBE) was ļ¬rst introduced by Shamir, in which the sender of a message can add an identity to msg and only a receiver with matching identity can decrypt it. ā€¢ Few years later, Fuzzy Identity-Based Encryption is proposed, which is also known as Attribute-Based Encryption (ABE). 11/27/2016 6Jain University, ISE Department
  • 7. ā€¢ In ABE an identity is viewed as a set of descriptive attributes, and decryption is possible if a decrypterā€™s identity has some overlaps (same attributes) with the one speciļ¬ed in the Ciphertext. ā€¢ Soon after, more general tree-based ABE schemes Key-Policy Attribute- Based Encryption (KP-ABE) and Ciphertext-Policy Attribute-Based Encryption (CP-ABE) 11/27/2016 7Jain University, ISE Department
  • 8. CP-ABE ā€¢ In the CP-ABE, ciphertexts are created with an access structure e.g. (A or B) AND ( E AND F), which speciļ¬es the encryption policy, and private keys are generated according to userā€™s attributes. ā€¢ A user can decrypt the ciphertext if and only if his/her attributes private key(s) satisfy the access structure speciļ¬ed in the ciphertext. ā€¢ By doing so, the encrypter holds the ultimate authority about the encryption policy. Also, the already issued private keys will never be modiļ¬ed unless the whole system reboots. 11/27/2016 8Jain University, ISE Department
  • 9. Access Control via CP-ABE PK MSK SKSarah: ā€œmanagerā€ ā€œIT dept.ā€ SKKevin: ā€œmanagerā€ ā€œsalesā€ OR IT dept. AND manager marketing ļƒ¼ ļƒ» ļƒ» ļƒ¼ ļƒ¼ ļƒ» ļƒ» 11/27/2016 9Jain University, ISE Department
  • 10. Existing System ā€¢ A semi anonymous privilege control scheme called AnonyControl that addresses the data Confidentiality, and partial user identity privacy leakage is present in existing access control methods. Partially tolerates the compromise attacks towards attribute authorities. ā€¢ The key point of the identity information leakage we had in existing scheme is that key generator issues attributeā€™s private key based on the reported attribute, and the generator has to know the userā€™s attribute to do so. 11/27/2016 10Jain University, ISE Department
  • 11. Drawbacks of Existing System ā€¢ Privacy risks would rise drastically because the servers may illegally inspect user's data and access sensitive information. ā€¢ Personal data is at risk because one's identity is authenticated based on his/her data. Scope of collude(come to a secret understanding) with malicious Data Consumers or Data Owners to harvest othersā€™ ļ¬le contents to gain illegal proļ¬ts. 11/27/2016 11Jain University, ISE Department
  • 12. Literature Survey Author Name of the paper Existing Solution Drawbacks V. BožoviĀ“ c, D. Socek, R. Steinwandt, and V. I. VillĆ”nyi, Multi-authority attribute-based encryption with honest-but-curious central authority scheme is secure in the selective ID model and can tolerate an honest- but-curious central authority. Cant not tolerates the compromise attacks towards attribute authorities. Violating the intent of the encrypting party 11/27/2016 Jain University, ISE Department 12
  • 13. Literature Survey (continued..) Author Name of the paper Existing system Drawbacks M. Chase and S. S. M. Chow Improving privacy and security in multi-authority attribute-based encryption Multi-authority attribute-based encryption enables a more realistic deployment of attribute-based access control, such that different authorities are responsible for issuing different sets of attributes Data contents confidentiality and privacy has been achieved but identity privacy neglected 11/27/2016 Jain University, ISE Department 13
  • 14. Literature Survey (continued..) Author Name of the paper Existing system Drawback A. Sahai and B. Waters Fuzzy identity- based encryption Fuzzy-IBE can be used for a type of application that we term ā€œattribute- based encryptionā€. Open problem is to build other Fuzzy- IBE schemes that use different distance metrics between identities. J. Bethencourt, A. Sahai, and B. Waters Ciphertext-policy attributebased encryption techniques encrypted data can be kept confidential even if the storage server is untrusted User identity privacy and anonymity neglected 11/27/2016 Jain University, ISE Department 14
  • 15. Proposed System ā€¢ We propose AnonyControl-F to allow cloud servers to control userā€™s access privileges without knowing their identity information. ā€¢ The proposed schemes are able to protect userā€™s privacy against each single authority. No information is disclosed in AnonyControl-F. ā€¢ Proposed method implements the multiauthority Attribute Based Encryption Control Scheme AnonyControl-F. 11/27/2016 15Jain University, ISE Department
  • 16. Software Requirements ā€¢ Operating System Windows ā€¢ Web Application Server Tomcat Web Server ā€¢ Front End Design HTML, Java, JavaScript ā€¢ Server Side Script Java Server Pages ā€¢ Database Connectivity JDBC ā€¢ Database Mysql 11/27/2016 16Jain University, ISE Department
  • 17. System Design 11/27/2016 17Jain University, ISE Department
  • 18. System Design(Continued) Cloud Server: ā€¢ The Cloud Server, who is assumed to have adequate storage capacity, does nothing but store them. N Attribute Authorities: ā€¢ Authorities are assumed to have powerful computation abilities, and they are supervised by government ofļ¬ces. ā€¢ The whole attribute set is divided into N disjoint sets and controlled by each authority, therefore each authority is aware of only part of attributes. 11/27/2016 18Jain University, ISE Department
  • 19. Data Owner: ā€¢ A Data Owner is the entity who wishes to outsource encrypted data ļ¬le to the Cloud Servers. A user can be a Data owner and a Data consumer simultaneously Data Consumers: ā€¢ Newly joined Data Consumers request private keys from all of the authorities, and they do not know which attributes are controlled by which authorities. 11/27/2016 19Jain University, ISE Department System Design(Continued)
  • 20. System Design(Continued) ā€¢ When the Data Consumers request their private keys from the authorities, authorities will jointly create corresponding private key and send it to them. ā€¢ All Data Consumers are able to download any of the encrypted data ļ¬les, but only those whose private keys satisfy the Encryption Policy can execute the operation. 11/27/2016 Jain University, ISE Department 20
  • 21. Owner_ +username +password +file Upload() +Profile() +Logout() User Registration +name +username +password +gender +email +contact NO +Location +Experiance +Specialiazation +Medical Degree +registration() Class Login +username +password +login() File Upload +fileid +fname +file data +Get SecreteKey() +Select Attribute() +Set Operations() +Upload() Profile_ +View Profile() Cloud Server_ +username +password +Strrage Files() +Requests() +Logout() AA_ +username +password +Sign Up() +Login() +Generate Keys() User_ +username +password +sighn up() +Login() +Profile() +File Download() +Logout() File Download +File ID +File name +Secrete Key +Decrypt() +Download() CA_ +username +password +Login() +User's() +AA's() +Logout() Class Diagram 11/27/2016 21Jain University, ISE Department
  • 22. Central Authority Collaboration Diagram 11/27/2016 22Jain University, ISE Department
  • 23. Attribute Authority Collaboration Diagram 11/27/2016 23Jain University, ISE Department
  • 24. Owner Collaboration Diagram 11/27/2016 24Jain University, ISE Department
  • 25. User Collaboration Diagram 11/27/2016 25Jain University, ISE Department
  • 26. System Implementation Fully Anonymity Achieved ā€¢ The key point of the identity information leakage we had in our previous scheme as well as every existing attribute based encryption schemes is that key generator (or attribute authorities in our scheme) issues private key based on the reported attribute, and the generator has to know the userā€™s attribute (identities) to do so. ā€¢ We need to introduce a new technique to let key generators issue the correct attribute key without knowing what attributes the users have. 11/27/2016 26Jain University, ISE Department
  • 27. ā€¢ The solution is to give all the private keys of all the attributes to the key requester and let him pick whatever he wants. ā€¢ In this way, the key generator does not know which private keys the key requester picked, but we have to fully trust the key requester. ā€¢ To solve this, we leverage the following to Oblivious Transfer (OT). 11/27/2016 27Jain University, ISE Department System Implementation ( Continued)
  • 28. System Implementation ( Continued) 1-out-of-n oblivious transfer ā€¢ In cryptography, an oblivious transfer protocol (OT) is a type of protocol......... in which a sender transfers one of many pieces of information to a receiver, but sender remains oblivious(unware) as what piece of information has been transferred to receiver. ā€¢ In an 1-out-of-n OT, the sender Bob has n messages M1, . . . , Mn , and the receiver Alice wants to pick one Mi from those M1, . . . , Mn . Alice successfully achieves Mi, and Bob does not know which Mi is picked by Alice. 11/27/2016 28Jain University, ISE Department
  • 29. ā€¢ By introducing the 1-out-of-k Oblivious Transfer in our KeyGenerate algorithm, the key-requester achieves the correct private key that he wants but the attribute authority does not have any useful information about what attribute is achieved by the requester. ā€¢ The key requester achieves the full anonymity(user identity privacy) in our scheme and no matter how many attribute authorities collude (come to secret understanding) his identity information is kept secret 11/27/2016 29Jain University, ISE Department System Implementation ( Continued)
  • 30. Results Home Page 11/27/2016 30Jain University, ISE Department
  • 31. ā€¢ Central Authority approves the attribute authorities and users then after approval users can request attribute authorities for unique private keys. ā€¢ In this project there are two attribute authorities which can provide private keys against user profile attributes and these authorities can distribute the keys without looking into the user identity information hence anonymity has achieved 11/27/2016 31Jain University, ISE Department Results (continued..)
  • 32. User 1 Registration Page 11/27/2016 32Jain University, ISE Department
  • 33. Attribute Authority Page 11/27/2016 33Jain University, ISE Department
  • 34. ā€¢ Attribute authorities generate private keys against attributes of users here for user1 attributes are considered as Location, Experience, Specialty, & MedicalDegree. We can create multiple authorities and each authority can select attributes randomly & generate private keys. ā€¢ For example if we create two Attribute authorities, one authority will generate private keys for 2 attributes out of 4 attributes and second one will generate for rest of 2 attributes. 11/27/2016 34Jain University, ISE Department Results (continued..)
  • 35. Owner File Upload by applying Access policy 11/27/2016 35Jain University, ISE Department
  • 36. ā€¢ Owner uploads a file with encryption by using public key generated by authority and owner adds an access policy structure such as (India&&Cardiology)&&(MD||exp>4) and encryption hence attribute based encryption achieved. 11/27/2016 36Jain University, ISE Department Results (continued..)
  • 37. User 1 trying to access(Decrypt) uploaded file 11/27/2016 37Jain University, ISE Department Results (continued..)
  • 38. ā€¢ User will decrypt the file only attributes can match the access structure policy, in the above case user1 can not able to access & decrypt the file and because user1 will get the popup window such as "Sorry the file cannot Access by you", but user 2 can access & decrypt the file as user2 can satisfy the attributes which are part of access policy. Just for verification see the user2 profile below. 11/27/2016 38Jain University, ISE Department Results (continued..)
  • 39. User 2 Profile Page 11/27/2016 39Jain University, ISE Department
  • 40. Testing Test Id Test case Title Description Expected outcome Status 1 Successful user verification The login to the system should be tried by the admin with correct password Login should be successful and user should enter into the system Success 2 Unsuccessful verification due to wrong password Login to the system with a wrong password Login should fail with an error ā€œinvalid Passwordā€ success 3 Unsuccessful verification due to invalid login id Login to the system with a invalid login id Login should fail with an error ā€œinvalid user idā€ Success 11/27/2016 40Jain University, ISE Department
  • 41. Acceptance Testing Test Id Description of coverage Expected Results Covered by script 1 Verification of a particular record If a particular record already exists it displays a message This type of test in {verify} procedure in every Jsp file where a record is inserted via an interface 2 Updating of a particular record All the details should not be updated This type of test is covered in all the Asp files where updations are made. 3 Validity of login Only the authorized persons must access system. This is covered in the login procedure for the validity of a user 11/27/2016 Jain University, ISE Department 41
  • 42. Conclusion ā€¢ A semi-anonymous attribute-based privilege control scheme AnonyControl and a fully-anonymous attribute-based privilege control scheme AnonyControl-F to address the user privacy problem in a cloud storage server. ā€¢ Using multiple authorities in the cloud computing system, our proposed schemes achieve not only ļ¬ne-grained privilege control but also identity anonymity while conducting privilege control based on usersā€™ identity information. 11/27/2016 42Jain University, ISE Department
  • 43. ā€¢ More importantly, our system can tolerate up to N āˆ’ 2 authority compromise, which is highly preferable especially in Internet-based cloud computing environment. 11/27/2016 43Jain University, ISE Department
  • 44. Future enhancements ā€¢ One of the future works is to introduce the efficient user revocation mechanism on top of anonymous Attribute Based Encryption. Supporting user revocation is an important issue in the real application. 11/27/2016 Jain University, ISE Department 44
  • 45. References ā€¢ [1] A. Shamir, ā€œIdentity-based cryptosystems and signature schemes,ā€ in Advances in Cryptology. Berlin, Germany: Springer-Verlag, 1985, pp. 47ā€“ 53. ā€¢ [2] A. Sahai and B. Waters, ā€œFuzzy identity-based encryption,ā€ in Advances in Cryptology. Berlin, Germany: Springer-Verlag, 2005, pp. 457ā€“473. ā€¢ [3] V. Goyal, O. Pandey, A. Sahai, and B. Waters, ā€œAttribute-based encryption for fine-grained access control of encrypted data,ā€ in Proc. 13th CCS, 2006, pp. 89ā€“98. ā€¢ [4] J. Bethencourt, A. Sahai, and B. Waters, ā€œCiphertext-policy attributebased encryption,ā€ in Proc. IEEE SP, May 2007, pp. 321ā€“334. 11/27/2016 Jain University, ISE Department 45
  • 46. References ā€¢ [5] M. Chase, ā€œMulti-authority attribute based encryption,ā€ in Theory of Cryptography. Berlin, Germany: Springer-Verlag, 2007, pp. 515ā€“534. ā€¢ [6] M. Chase and S. S. M. Chow, ā€œImproving privacy and security in multi- authority attribute-based encryption,ā€ in Proc. 16th CCS, 2009, pp. 121ā€“ 130. ā€¢ [7] H. Lin, Z. Cao, X. Liang, and J. Shao, ā€œSecure threshold multi authority attribute based encryption without a central authority,ā€ Inf. Sci., vol. 180, no. 13, pp. 2618ā€“2632, 2010. ā€¢ ā€¢ [8] V. BožoviĀ“ c, D. Socek, R. Steinwandt, and V. I. VillĆ”nyi, ā€œMulti-authority attribute-based encryption with honest-but-curious central authority,ā€ Int. J. Comput.Math., vol. 89, no. 3, pp. 268ā€“283, 2012. 11/27/2016 Jain University, ISE Department 46
  • 47. References ā€¢ [9] F. Li, Y. Rahulamathavan, M. Rajarajan, and R. C.-W. Phan, ā€œLow complexity multi-authority attribute based encryption scheme for mobile cloud computing,ā€ in Proc. IEEE 7th SOSE, Mar. 2013, pp. 573ā€“577. ā€¢ [10] K. Yang, X. Jia, K. Ren, and B. Zhang, ā€œDAC-MACS: Effective data access control for multi-authority cloud storage systems,ā€ in Proc. IEEE INFOCOM, Apr. 2013, pp. 2895ā€“2903. ā€¢ [11] http://www.sourcefordgde.com ā€¢ [12] http://www.networkcomputing.com/ ā€¢ [13] http://www.roseindia.com/ 11/27/2016 Jain University, ISE Department 47
  • 48. Thank You 11/27/2016 48Jain University, ISE Department