Professional Documents
Culture Documents
mobile phone based applications, secure data transmission is the pressing need for a real time
perspective of the technologies. For Example, users can download the encrypted data from the
storage, decrypt them, then send them to others for sharing, but it loses the value of cloud
storage.
Examples of the need for secure key management and distribution environments include secure
transmission of health related SMS, telecare medicine provisioning for critical applications.
The process of generating, distributing and maintaining the cryptographic keys is taken care by
We describe new public-key cryptosystems and Key-aggregate that produce Secure transmission
INTRODUCTION
To address user’s concerns over potential data leaks in cloud storage, a common
approach is for the data owner to encrypt all the data before uploading them to the
cloud, such that later the encrypted data may be retrieved and decrypted by those who
have the decryption keys. Such cloud storage is often called the cryptographic cloud
storage.
EXISTING SYSTEM
Attribute-Based Encryption (ABE) is a new paradigm where such policies are specified and
cryptographically enforced in the encryption algorithm itself.
ADVANTAGE
More secure
DISADVANTAGE
High transmission overhead
Extensive Survey on Usage of Attribute Based
Encryption in Cloud
ABE is key strength, enabling users to have a stronger encryption, than other encryption.
Cryptanalysis has revealed that the complexity of the algorithm is of good order and cannot be
made vulnerable.
ADVANTAGE
Decryption and user revocation efficiency.
DISADVANTAGE
Low computational capability
Improved Proxy Re-encryption Schemes with
Applications to Secure Distributed Storage
Re-encryption schemes that realize a stronger notion of security and demonstrate the
usefulness of proxy re-encryption as a method of adding access control to a secure file
system.
ADVANTAGE
re-encryption schemes that offer security improvements over earlier approaches.
DISADVANTAGE
Storage capacity is low.
Attribute-Based Encryption for Fine-Grained Access
Control of Encrypted Data
Sensitive data is shared and stored by third-party sites on the Internet, there will be a
need to encrypt data stored at these sites. One drawback of encrypting data, is that it can be
selectively shared only at a coarse-grained level. Here develop a new cryptosystem for fine-
grained sharing of encrypted data that we call Key-Policy Attribute-Based Encryption.
ADVANTAGE:
Avoid packet loss.
DISADVANTAGE:
High energy consumption.
Hierarchical Attribute-Based Encryption for Fine-
Grained Access Control in Cloud Storage Services
Hierarchical identity-based encryption (HIBE) system scheme to help enterprises to efficiently share
confidential data on cloud servers. We achieve this goal by first combining the cipher text-policy
attribute-based encryption (CP-ABE) system and proxy re-encryption.
ADVANTAGE:
High collusion resistant
DISADVANTAGE:
Low computational capabitity.
Cipher text-Policy Attribute-Based Encryption:
An Expressive, Efficient, and Provably Secure Realization
Cipher text-policy attribute-based encryption (CP-ABE), as one of the most promising encryption systems in this field,
allows the encryption of data by specifying an access control policy over attributes, so that only users with a set of attributes
ADVANTAGE:
Node
share private data using secret key.
DISADVANTAGE:
High
storage capacity.
Polynomial-based key management for secure intra-group
and inter-group communication
Secure group communication has become an important issue in many applications. Both intra-group and inter-group
METHODOLOGY
Polynomial-based
key management scheme
ADVANTAGE
Group
members and the group controller can share the intra-group key without any encryption/decryption.
DISADVANTAGE
Central
mechanism is implicated in generating, dispensing, re-keying, and providing access control for every group, it
is regularly accessed.
Efficient group Diffie–Hellman key agreement protocols
Secure group communication has become an important issue in many applications. Both intra-group and inter-group multicast traffic
METHODOLOGY
Authenticated
group Diffie–Hellman (GDH) key agreement protocols are used.
ADVANTAGE
GDH
key agreement protocols are based on the secret sharing.
Solution
is efficient, robust and secure.
DISADVANTAGE
Communication
complexity.
Computation
overhead.
An efficient secure communication for healthcare system
using wearable devices
The messages are sent in a computationally efficient way and the experimental results confirm
that the proposed work ensures end-to-end security with lower computational and communication overheads.
METHODOLOGY
Short
Message Service scheme
ADVANTAGE
An
efficient multicast SMS alert system has been proposed to help the heart patients.
An
attack resistant end-to-end secure SMS alert system is ensured from patient to the doctor, relative, ambulance and hospital.
DISADVANTAGE
Cellular
networks do not provide confidentiality, authentication and end-to-end security
Computationally efficient privacy preserving anonymous
mutual and batch authentication schemes for vehicular ad
hoc networks
The concept of intelligent transportation system is developed to manage the traffic of the city, where Vehicular Ad-
METHODOLOGY
A password-based
CPPA and group-key agreement (PW-CPPA-GKA) protocol is used for VANETs.
ADVANTAGE
It
takes Computation cost for authentication message generation and verification phases.
Better
efficiency and performance.
DISADVANTAGE
It
is very difficult to control and manage the city traffic.
A robust and efficient password-based conditional privacy
preserving authentication and group-key agreement protocol
for VANETs
This Internet connection can provide facility to other vehicles to send traffic related messages,
collisions, infotainment messages other useful safety alerts.
METHODOLOGY
A NETs will also make use of short-distance communication methods, such as Dedicated Short-
Range Communications (DSRC) and Wireless Fidelity (Wi-Fi).
ADVANTAGE
Data integrity to messages which is suitably required for VANETs.
DISADVANTAGE
High computational cost.
An Efficient Certificateless Encryption for Secure
Data Sharing in Public Clouds
The proposed mCL-PKE scheme without pairing operations and provided its formal security. Our mCL-PKE
METHODOLOGY
Mediated
certificateless public key encryption (mCL-PKE)
ADVANTGAE
Assure
the confidentiality of data stored in public clouds while enforcing access control requirements
DISADVANTAGE
Here
could not solve the key revocation problem. In public key cryptography, we should consider scenarios
compromised.
CL-PRE: a Certificateless Proxy Re-Encryption
Scheme for Secure Data Sharing with Public Cloud
The proposed new construction for certificateless proxy re-encryption scheme and give the
corresponding security model. The scheme has chosen plaintext security in the random oracle
METHODOLOGY
CL-PRE, a certificateless proxy re-encryption scheme for secure data sharing with public
cloud.
ADVANTGAE
DISADVANTAGE
Incremental proxy re-encryption scheme for mobile
cloud computing environment
The proposed incremental proxy re-encryption scheme and compared with the existing proxy re
encryption scheme on the basis of turnaround time, energy consumption, CPU utilization, and
METHODOLOGY
ADVANTGAE
Energy consumption, CPU utilization, and memory consumption Security operations on mobile
device.
DISADVANTAGE
Encryption and decryption, are executed using the limited computational power of mobile device.
Efficient and Provably-Secure Group Key Management
Scheme Using Key Derivation
The proposed efficient and provably secure GKM scheme using key derivation The scheme is
suitable in practical scenarios with frequent group key updates. They have an efficient rekey
mechanism for a reconnected member who may miss group key updates in his off-line period.
METHODOLOGY
RSA-based GKM scheme.
Efficient and provably-secure GKM scheme using the key derivation method
ADVANTGAE
Secure based on the pseudorandom function family assumption and one-way property of a hash
function
DISADVANTAGE
A member does not update the keys assigned to him after he joined the system.
Security and privacy for storage and computation in cloud
computing
The proposed SecCloud, a privacy-cheating discouragement and secure-computation auditing
protocol 560 for data security in the cloud. To the best of our knowledge, it is the first work that
jointly considers both of data storage 561 security and computation auditing security in the cloud.
METHODOLOGY
ADVANTGAE
Better effectiveness
and efficiency
DISADVANTAGE
Data Decrypted
Stop the user to
proceed for further
BLOCK DIAGRAM
Cloud
Upload to cloud
Decrypt content
Using secure key
DATAFLOW DIAGRAM
User
Upload to cloud
Upload Download
secret Key
Decrypt content
Using secret key
USE CASE Diagram
SQUENCE DIAGRAM
ACTIVITY DIAGRAM
MODULES
MODULES
System Model
Key Generation
Encryption
Aggregate Key Transfer
System Model:
Data Owner: In this module we executed by the data owner to setup an account on
an untrusted server. On input a security level parameter 1 λ and the number of
ciphertext classes n (i.e., class index should be an integer bounded by 1 and n), it
outputs the public system parameter param, which is omitted from the input of the
other algorithms for brevity.
Key Generation
Encryption keys also come with two flavours symmetric key or asymmetric
(public) key. Using symmetric encryption, when Alice wants the data to be
originated from a third party, she has to give the encrypted her secret key;
KeyGen.
REFERENCES
C. Zhang, B. DeCleene, J. Kurose, and D. Towsley"Comparison of inter-area
rekeying algorithms for securewireless group communications," Performance
Evaluationvol. 49, pp. 1-20, 9//.
M. Kellil, Olivereau, J. C. A., and P. Janneteau, "Rekeyingin secure mobile
multicast communications," United StatesPatent Application Publications.
L. M. Kiah and K. M. Martin, "Host Mobility Protocol forSecure Group
Communication in Wireless MobileEnvironments," in Future Generation
Communication andNetworking.
THANK YOU