Professional Documents
Culture Documents
T-11 Capstone Project Report: Group No: B43 Project Guide: Prof. Vinayak Musale Group Members SR No Name PRN No
T-11 Capstone Project Report: Group No: B43 Project Guide: Prof. Vinayak Musale Group Members SR No Name PRN No
Secure data sharing scheme allows any member of the group to sign messages while keeping the
identity secret from verifiers. User revocation is performed by the group manager via a public available
revocation list .To transmit encrypted data to a set of users so that only a privileged subset of users can
decrypt the data.
2. Problem Statement
2.1 Project Scope
We are developing an application that is comprised of four modules:
1. File Upload
This module is used to help the user to upload their files in secured clouds. Before uploading t
he files in the cloud the data will be send to Cryptographic Server. The uploaded data can be a
pdf, text.
2.Crytographic Access
This module is used when the time of file uploading the file will be send to an
cryptographic server. Here the cryptographic server is mentioned as the third party.
So the third party provides the security here. Cryptographic Server used for key generation.
3.Key Genration:
In this module the CS generates two types of different secret key, one for file owner and other f
or
users. Using the user’s key they can view the files or retrieve the files. But using the file owner’s
key they done a modification like delete, edit etc.
3. Literature Survey
PAPER AUTHOR PUBLICATION ABOUT LIMITATIONS AND GAP
NAME
Data Sharing N. C. IEEE Using the same key for both The security in these
Security and Thoutam encryption as well as decryption security systems suffers a
Privacy Kadam is major drawback when one
Preservation in Prasad, the key principle in symmetric user requests for the sharing
Cloud Jadhav algorithm. This mechanism of data of some user. This
Computing Poonam, involves procedure involves some
(2019) Khupase the existence of centralized Key loopholes that can allow the
Gauri Distribution Centre also known culprit to get access to
as personal information in the
KDC, responsible for cloud storage
distributing
and maintaining attributes and
secret
keys to its users.
There also is a decentralized
access
control scheme used to make
data
storage in clouds more secure.
Data Sharing Abdul Security is the main concern in The recent research proved
Attribute-Based Razaque, the that Multi cloud computing
Secure with Saty Siva cloud computing environment. provides all the services in a
Efficient Varma, The single architecture by
Revocation in Nadimpall usage of the cloud computing in combining many clouds.
Cloud i Suharsha increasing gradually, where the
Computing Vommina security is still lagging.
(2020) Traditionally,
use of single cloud in cloud
computing environment leads to
security issues, malicious users,
and
also untrusted users. This
research
aims in providing the reliable
source
of dependency on multi clouds.
The
main purpose of this paper is to
use
multi-clouds for data security.
4. Project Requirements
4.1 Software Requirements
Platform: Microsoft Visual Studio
Language: Java
Front End :Asp.net
Back End: SQL Server 2012
4.2 Hardware Requirements
System : Any Processor above 500 MHz
Hard Disk : 40 GB.
Monitor : 15 VGA Color.
Mouse : Logitech.
Ram : 1 GB.
5 System Architecture
SEQUENCE DIGRAM:
ACTIVITY DIGRAM:
6.Project Plan
7. Conclusion
We proposed the SeDaSC methodology, which is a cloud storage security scheme for group data. The
proposed methodology provides data confidentiality, secure data sharing without reencryption, access
control for malicious insiders, and forward and backward access control. Moreover, the SeDaSC.
methodology provides assured deletion by deleting the parameters required to decrypt a file. The
encryption and decryption functionalities are performed at the CS that is a trusted third party in the
SeDaSC methodology. The proposed methodology can be also employed to mobile cloud computing
due to the fact that compute-intensive tasks are performed at the CS. The working of SeDaSC was
formally analyzed using HLPNs, the SMT-Lib, and a Z3 solver. The performance of the SeDaSC
methodology was evaluated based on the time consumption during the key generation, file upload,
and file download operations. The results revealed that the SeDaSC methodology can be practically
used in the cloud for secure data sharing among the group. In the future, the proposed methodology
can be extended by limiting the trust level in the CS. This will further enhance the system to cope
with insider threats. Moreover, the response of the methodology with varying key sizes can be
evaluated.
[2]. Hong Liu, Huansheng Ning, Qingxu Xiong and Laurence T. Yang, “Shared Authority Based
PrivacyPreserving Authentication Protocol in Cloud Computing,” International Journal of Advanced
Research in Computer Engineering & Technology (IJARCET) Volume 6, Issue 3, March 2017, ISSN:
2278 – 1323 228 All Rights Reserved © 2017 IJARCET IEEE Transactions On Parallel And Distributed
Systems, Vol. 26, No. 1, January 2015.
[3] A. Abbas and S. U. Khan, “A review on the State-of-the-art privacy preserving approaches in e-
health clouds,” IEEE J. Biomed. Health Informat., vol. 18, no. 1, pp. 1431–1441, Jul. 2014.
[4] K. Alhamazani et al., “An overview of the commercial cloud monitoring tools: Research
dimensions, design issues, state-of-the-art,” Computing, DOI: 10.1007/s00607-014-0398-5, 2014, to
be published.
[5] A. N. Khan, M. L. M. Kiah, S. U. Khan, and S. A. Madani, “Towards secure mobile cloud computing:
A survey,” Future Gen. Comput. Syst., vol. 29, no. 5, pp. 1278–1299, Jul. 2013.
[6] L. Wei, H. Zhu, Z. Cao, Y. Chen, and A. V. Vasilakos, “Security and privacy for storage and
computation in cloud computing,” Inf. Sci., vol. 258, pp. 371–386, Feb. 2014.
[7] Cloud security Alliance, “Security guidelines for critical areas of focus in cloud computing v3.0,”
2011.
[8] D. Chen et al., “Fast and scalable multi-way analysis of massive neural data,” IEEE Trans. Comput.,
DOI: 10.1109/TC.2013.2295806, 2014, to be published.
[9] A. N. Khan, M. M. Kiah, S. A. Madani, M. Ali, and S. Shamshir-band, “Incremental proxy re-
encryption scheme for mobile cloud computing environment,” J. Supercomput., vol. 68, no. 2, pp.
624–651, May 2014.
[10] Y. Chen and W. Tzeng, “Efficient and provably-secure group key management scheme using key
derivation,” in Proc. IEEE 11th Int. Conf. TrustCom, 2012, pp. 295–302.
[11] L. Xu, X. Wu, and X. Zhang, “CL-PRE: A certificateless proxy reencryption scheme for secure data
sharing with public cloud,” in Proc. 7th ACM Symp. Inf. , Comput. Commun. Security, 2012, pp. 87–
88.
[12] P. Gutmann, “Secure deletion of data from magnetic and solid-state memory,” in Proc. 6th
USENIX Security Symp. Focusing Appl. Cryptography, 1996, p. 8.
[13] S. Seo, M. Nabeel, X. Ding, and E. Bertino, “An Efficient Certificateless Encryption for Secure
Data Sharing in Public Clouds,” IEEE Trans. Knowl. Data Eng., vol. 26, no. 9, pp. 2107–2119, Sep.
2013.
[14].Qiang Tang, “Nothing is for Free: Security in Searching Shared and Encrypted Data,” IEEE
Transactions on Information Forensics and Security, Vol. 9, No. 11, November 2014.
[15]. Xinyi Huang, Joseph K. Liu, Shaohua Tang, IEEE, Yang Xiang, Kaitai Liang, Li Xu, and Jianying
Zhou, “Cost-Effective Authentic and Anonymous Data Sharing with Forward Security,” IEEE
Transactions On Computers, Vol. 64, No. 4, April 2015.