You are on page 1of 11

Computer Science & Engineering

OBJECTIVE
To reduce overhead on data owner
To provide fine-grained data access control

Computer Science & Engineering


EXISTING SYSTEM
Existing system uses cryptographic methods
Heavy overhead on the data owner

Disadvantages:
Software update/patches
Security concerns
Control

Computer Science & Engineering


PROPOSED SYSTEM
To provide secure, scalable, fine-grained data access
control on outsourced data in the cloud
Scheme Description:
System Setup
New File Creation
New User Grant
User Revocation
File Access
File Deletion

Computer Science & Engineering


MODULES
KP-ABE
Proxy Re-Encryption
Lazy Re-Encryption

Computer Science & Engineering


KP-ABE
Algorithms:
Setup Attributes
Encryption
Secret Key Generation
Decryption
Access Tree
Construction of Access Tree

Computer Science & Engineering


PROXY RE-ENCRYPTION
Divertible Protocols
(m, n)-Interactive Turing Machine
Atomic Proxy Cryptography
Categories of Proxy Scheme
Symmetric
Asymmetric
Active Asymmetric
Passive Asymmetric
Transparent
Translucent
Opaque

Computer Science & Engineering


LAZY RE-ENCRYPTION
Update secret keys
Update user attributes

Computer Science & Engineering


Login

Fig: System Architecture


Owner User
Check

no
Open file Exists

yes

Create account
Upl oad files to cloud server

Enter data to search

Maintainance of files and users

Encrypt and de crypt the data


End

Send to cloud server

yes no
If files e xists for data

Li st out the files Display s no datas in server

End

Open the required file

Wrong
Enter secret key Check Displays duplicate data

Correct

Displays ori ginal file

Computer Science & Engineering


CONCLUSION
One challenge is to achieve fine-grainedness,
data confidentiality, and scalability simultaneously,
which is not provided by current work

Computer Science & Engineering


Computer Science & Engineering

You might also like