This action might not be possible to undo. Are you sure you want to continue?
To implement Fine Grained Data Access Control over a Distributed System Architecture using Key Policy-Attribute Based Encryption(ABE). The project will find its use in mission critical applications like e-healthcare and battlefields.
. It introduces the fine-grained data access control problem for the first time in WSNs. FDAC applies and tailors Key PolicyAttribute Based Encryption(KP-ABE) to WSNs for achieving fined-grained access control. The applicability of FDAC is demonstrated on the current generation of sensor nodes.
Sensor data is secure from strong attacks. In this paper a distributed data access control scheme that able to fulfill fine grained data access over sensor data and is resilient against strong attacks . Distributed sensor data storage and retrieval has gained increasing popularity in recent years for supporting various application. .
As is mentioned in the previous section. Compromising one sensor node does not give the adversary any assistance to obtain sensor data generated by other sensor nodes. Compromising the sensor node does not disclose the sensor data generated before the sensor is compromised. . fine-grained data access control is often desired by many mission-critical application scenarios.
Dedicated operator(user) for each sensor node. User monitoring is required. . A lot more coding work is required since each of the sensor nodes have their own encryption and decryption techniques.
While distributed architecture enjoys a more robust and fault-tolerant wireless sensor network (WSN). as sensor data are stored and maintained by individual sensors and unattended sensors are easily subject to strong attacks such as physical compromise. it is significantly harder to ensure data security. . such architecture also poses a number of security challenges especially when applied in mission-critical applications such as battle field and e-healthcare. First.
fine-grained data access control is a must as illegal access to the sensitive data may cause disastrous result and/or prohibited by the law. which limits the direct adoption of expensive cryptographic primitives . in many mission-critical applications. Last but not least. sensors usually are resourcescarce. Second.
fire sensor etc. •FDAC •The applicability of FDAC is demonstrated on the current generation sensor nodes like bomb sensor. applies and tailors Key Policy –Attribute Based Encryption(KP-ABE).Proposed System •It introduces the fine-grained data access control problem for the first time in WNs. .
TIME:PLACE: TIME:PLACE: BOMB FIRE SENSORS VILLAGE USERS USER NAME PASSWORD SUSBSCRIPTION .
BOMB FIRE SENSORS VILLAGE USERS .
6) IDE Eclipse 3.Non-Functional Requirements Software Requirements: Java 1.7 Windows XP or higher Microsoft access 2007 Hardware Requirements: Hard Disk -80GB RAM -512MB .6 or higher(JDK 1.
It can be used in many crisis management techniques used during natural calamities. . Added functionalities can make it useful in Mining Industry.
Introduction Data storage and access in WSNs mainly follows two approaches . we naturally shift our attention to Data Encryption • . namely :Centralized and :Distributed • For the purpose of finding a secure yet efficient solution for fine grained distributed data access control in WSNs.
•To achieve data encryption which would introduce :Symmetric Key Cryptography :Public Key Cryptography .
. •But if the attacker has compromised the sensor node.a natural solution is to divide the life time of each sensor into series of periods. •To avoid this kind of attacks .Symmetric Key Cryptography •In SKC based approaches. he able to read the sensor historical data. data encryption and decryption shares the same key.
.Fine grained data access control is hard to realize due to the complexity introduced in Key management 2. Collusion attacks are possible given an appropriate number of colliding users.Symmetric Key Cryptography •In SKC based approach has two major Drawbacks •1.
they can’t decrypt the msg due to lack of private keys . •In •In this approach a sensor nodes encrypt the data items with public keys. •Any msg encrypted using particular public key can be decrypted only with the corresponding secret key.Public Key Cryptography PKC –based approaches can provide better data access than their SKC –based peers. •Therefore if the attackers compromised with the sensors .
we analyzed a novel yet important issue of fine-grained data access control for distributed storage in WSNs. Our experiment shows that the system overload in FDAC is reasonable in practical scenarios. and each user is assigned an access structure which designates the access capability of the user. we are able to control data access precisely. The sensor data is encrypted under the attributes such that only the users with the intended access structure are able to decrypt. we proposed a scheme called FDAC in which each sensor node is assigned a set of attributes. As the access structure is extremely expressive. FDAC is able to provide security assurance such as resilience to user colluding and sensor compromising attacks as well as user revocability. An interesting future work of FDAC may be on its efficient implementation on WSNs with low-end sensor nodes. .Conclusion In this paper. Moreover. To address the problem. and thus achieve fine-grained access control.