You are on page 1of 4

BASE PAPER TITLE:

Decentralized Access Control with Anonymous


Authentication of Data Stored in Clouds
OUR PROPOSED TITLE:
Enhanced Cloud Access Control Methodology by Preventing
Sensitive and Policy Informations

BASE PAPER ABSTRACT:

We propose a new decentralized access control scheme for secure data storage in
clouds that supports anonymous authentication. In the proposed scheme, the cloud
verifies the authenticity of the series without knowing the user’s identity before
storing data. Our scheme also has the added feature of access control in which only
valid users are able to decrypt the stored information. The scheme prevents replay
attacks and supports creation, modification, and reading data stored in the cloud.
We also address user revocation. Moreover, our authentication and access control
scheme is decentralized and robust, unlike other access control schemes designed
for clouds which are centralized. The communication, computation, and storage
overheads are comparable to centralized approaches.

OUR PROPOSED ABSTRACT:

One limitation is the existing system is that the cloud knows the access policy for
each record stored in the cloud. In future, we would like to hide the attributes and
access policy of a user. So to protect the confidentiality of sensitive data, the
convergent encryption technique has been proposed to encrypt the data before
outsourcing. To better protect data security, this paper makes the first attempt to
formally address the problem of authorized data. Different from traditional existing
systems, the differential privileges of users are further considered in duplicate
check besides the data itself. In this paper, we enhance our system in security.
Specifically, we present an advanced scheme to support stronger security by
encrypting the file with differential privilege keys. Unauthorized users cannot
decrypt the cipher text even collude with the S-CSP. Security analysis
demonstrates that our system is secure in terms of the definitions specified in the
proposed security model.

BASE PAPER SYSTEM ARCHITECTURE:


OUR PROPOSED SYSTEM ARCHITECTURE:

SYSTEM REQUIREMENTS:
HARDWARE REQUIREMENTS:

 System : Pentium IV 2.4 GHz.


 Hard Disk : 40 GB.
 Floppy Drive : 1.44 Mb.
 Monitor : 15 VGA Colour.
 Mouse : Logitech.
 Ram : 512 Mb.
SOFTWARE REQUIREMENTS:

 Operating system : Windows XP/7.


 Coding Language : JAVA/J2EE
 IDE : Netbeans 7.4
 Database : MYSQL

REFERENCE:

Sushmita Ruj, Milos Stojmenovic, and Amiya Nayak, “Decentralized Access


Control with Anonymous Authentication of Data Stored in Clouds”, IEEE
TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL.
25, NO. 2, FEBRUARY 2014.

You might also like