SlideShare a Scribd company logo
www.lemenizinfotech.com
LeMeniz Infotech
LeMeniz Infotech 
LeMeniz Infotech a Leading Software Concern in Pondicherry Stepping in IEEE Projects 2014- 
2015. We are Proud to Presents Android App for IEEE Projects Titles 2014-2015. 
Download From : www.ieeeprojectspondicherrry.weebly.com 
Student Benefits: 
=>No False Commitment 
=>Real Time Implementation 
->27 X 7 Online Supports 
=>Individual Attention 
=>100% Satisfaction 
In Project Based Implementation we give maximum 
exposure to students in 
=>Project Requirement Specification 
=>Software Requirement Specification 
=>Coding Techniques 
=>Project flow Diagram 
=>Project Documentation 
=>Project Testing 
=>PPT preparation 
=>Project Based viva questions 
=>Project Based Interview questions for Placements
Projects Technology 
@LeMeniz Infotech 
LeMeniz Infotech 
For More IEEE Projects Titles 
Visit : www.lemenizinfotech.com
LeMeniz Infotech 
Projects Domains 
@LeMeniz Infotech 
For More IEEE Projects Titles 
Visit : www.lemenizinfotech.com
Decentralized Access Control with Anonymous 
Authentication of Data Stored in Clouds - Parallel 
Distributed Systems 
@LeMeniz Infotech
Abstract 
We propose a new decentralized access control scheme for secure data 
storage in clouds that supports anonymous authentication. In the proposed 
scheme, the cloud verifies the authenticity of the series without knowing 
the user's identity before storing data. Our scheme also has the added 
feature of access control in which only valid users are able to decrypt the 
stored information. The scheme prevents replay attacks and supports 
creation, modification, and reading data stored in the cloud. We also 
address user revocation. Moreover, our authentication and access control 
scheme is decentralized and robust, unlike other access control schemes 
designed for clouds which are centralized. The communication, 
computation, and storage overheads are comparable to centralized 
approaches.
Introduction 
The user should authenticate itself before initiating any transaction, and on the other 
hand, it must be ensured that the cloud does not tamper with the data that is 
outsourced. User privacy is also required so that the cloud or other users do not know 
the identity of the user. The cloud can hold the user accountable for the data it 
outsources, and likewise, the cloud is itself accountable for the services it provides. 
The validity of the user who stores the data is also verified. Apart from the technical 
solutions to ensure security and privacy, there is also a need for law enforcement.
EXISTING SYSTEM 
On access control in cloud are centralized in nature. Except and all other 
schemes use attribute based encryption. The scheme in uses a symmetric 
key approach and does not support authentication. The schemes do not 
support authentication as well. Earlier work by Zhao. How ever, the authors 
take a centralized approach where a single key distribution center 
distributes secret keys and attributes to all users. Unfortunately, a single 
KDC is not only a single point of failure but difficult to maintain because of 
large number of users that are supported in cloud environment. We 
emphasize that clouds should take a decentralized approach while 
distributing secret keys and attributes to users.
Disadvantages 
• Did not provide user authentication. 
• User can create and store a file and other users can only read the file. 
Write access was not permitted to users other than the creator.
PROPOSED SYSTEM 
The protocol that we propose here computes a parameterized family of 
functions, which we call threshold functions, in which the two extreme cases 
correspond to the problems of computing the union and intersection of private 
subsets. 
Those are in fact general-purpose protocols that can be used in other contexts 
as well. Another problem of secure multiparty computation that we solve here 
as part of our discussion is the set inclusion problem; namely, the problem 
where Alice holds a private subset of some round set, and Bob holds an 
element in the ground set, and they wish to determine whether Bob’s element 
is within Alice’s subset, without revealing to either of them information about 
the other party’s input beyond the above described inclusion.
Advantages 
• Decentralized access control technique with anonymous. 
• authentication which provides user revocation and 
prevents replay attack. 
• The cloud does not know the identity of the user who 
stores information, but only verifies the user’s credentials. 
Key distribution is done in a decentralized way. One 
limitation is that the cloud knows the access policy for each 
record stored in the cloud
Reference 
S. Ruj, M. Stojmenovic and A. Nayak, “Privacy Preserving 
Access Control with Authentication for Securing Data in 
Clouds”, IEEE/ACM International Symposium on Cluster, Cloud 
and Grid Computing, pp. 556–563, 2012.
Hardware Specification 
Processor : Any Processor above 500 MHz. 
Ram : 128Mb. 
Hard Disk : 10 Gb. 
Compact Disk : 650 Mb. 
Input device : Standard Keyboard and Mouse. 
Output device : VGA and High Resolution Monitor.
Software Specification 
Operating System : Windows Family. 
Programming Language : ASP.NET, C#.Net. 
Database : SQL Server 2005
Decentralized Access Control with Anonymous 
Authentication of Data Stored in Clouds - Parallel 
Distributed Systems 
To Get this Project with 
Complete Document 
Reach Us : 
LeMeniz Infotech 
36, 100 Feet Road, 
Natesan Nagar, 
Near Indira Gandhi Statue, 
Pondicherry-605 005. 
Call: 0413-4205444, 
+91 99625 88976, 
95663 55386. 
We Are Ready for You 
For More Project Title Call Us Rafee 
9962588976 / 9566355386 
Mail : projects@lemenizinfotech.com

More Related Content

What's hot (20)

DOCX
decentralized access control with anonymous authentication of data stored in ...
swathi78
 
PDF
Secure Data Sharing in Cloud Computing using Revocable Storage Identity- Base...
rahulmonikasharma
 
PPT
Secure Data Sharing in Cloud (SDSC)
Jishnu Pradeep
 
PPTX
Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based...
Yashwanth Reddy
 
PDF
Secure data sharing in cloud computing using revocable storage identity-based...
Shakas Technologies
 
PDF
A Privacy Preserving Attribute Based Access Control Mechanism In Distributed ...
Editor IJCATR
 
PPTX
Ensuring Distributed Accountability in the Cloud
Suraj Mehta
 
PDF
Attribute based encryption with privacy preserving in clouds
Swathi Rampur
 
PPTX
Secure data sharing for dynamic groups in multi-owner using cloud
Sagar Dhanake
 
PDF
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
Editor IJCATR
 
PPT
PPT FOR IDBSDDS SCHEMES
Sahithi Naraparaju
 
PPTX
Ensuring Distributed Accountability for Data Sharing in the Cloud
Swapnil Salunke
 
PPTX
Attribute Based Encryption with Privacy Preserving In Clouds
Swathi Rampur
 
DOC
Oruta privacy preserving public auditing
Papitha Velumani
 
PPSX
Final year presentation
Abhishek Jain
 
DOCX
Privacy preserving delegated access control in public clouds
IEEEFINALYEARPROJECTS
 
DOCX
Privacy preserving delegated access control in public clouds
LeMeniz Infotech
 
PPTX
secure multi-owner data sharing for dynamic groups
Suchithra Balan
 
PDF
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
IJCERT JOURNAL
 
PPT
Ppt 1
shanmugamsara
 
decentralized access control with anonymous authentication of data stored in ...
swathi78
 
Secure Data Sharing in Cloud Computing using Revocable Storage Identity- Base...
rahulmonikasharma
 
Secure Data Sharing in Cloud (SDSC)
Jishnu Pradeep
 
Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based...
Yashwanth Reddy
 
Secure data sharing in cloud computing using revocable storage identity-based...
Shakas Technologies
 
A Privacy Preserving Attribute Based Access Control Mechanism In Distributed ...
Editor IJCATR
 
Ensuring Distributed Accountability in the Cloud
Suraj Mehta
 
Attribute based encryption with privacy preserving in clouds
Swathi Rampur
 
Secure data sharing for dynamic groups in multi-owner using cloud
Sagar Dhanake
 
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
Editor IJCATR
 
PPT FOR IDBSDDS SCHEMES
Sahithi Naraparaju
 
Ensuring Distributed Accountability for Data Sharing in the Cloud
Swapnil Salunke
 
Attribute Based Encryption with Privacy Preserving In Clouds
Swathi Rampur
 
Oruta privacy preserving public auditing
Papitha Velumani
 
Final year presentation
Abhishek Jain
 
Privacy preserving delegated access control in public clouds
IEEEFINALYEARPROJECTS
 
Privacy preserving delegated access control in public clouds
LeMeniz Infotech
 
secure multi-owner data sharing for dynamic groups
Suchithra Balan
 
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
IJCERT JOURNAL
 

Viewers also liked (19)

PDF
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...
Migrant Systems
 
DOCX
Attribute Based Encryption
UT, San Antonio
 
PDF
Decentralization and Local Autonomy
Jo Balucanag - Bitonio
 
PPTX
Question 5
amandalang123
 
PPTX
STEPS Home Care ppt_New
Shan Wade
 
PDF
Optimum power allocation in sensor network for active radar application
LeMeniz Infotech
 
PDF
Sản xuất thiết bị điện công nghiệp vattuthietbidien.vn ống luồn dây điện thé...
nguyencvl
 
PPSX
Inplant training in pondicherry | Technology Workshops
LeMeniz Infotech
 
PPTX
Miss Robinson Eng AA Art Interpretations
MissRobinson
 
PDF
Bd ca m big data for context-aware monitoring - a personalized knowledge disc...
LeMeniz Infotech
 
PDF
Covert compositional analysis of android inter app permission leakage
LeMeniz Infotech
 
PPTX
Navegadores.
GusTavo1793
 
PDF
Jus' IPad
JustyC
 
PPTX
4th Etherum Meetup Vienna: The connection between reputation, sharing economy...
Alexander Hirner
 
PDF
Delay dependent stability of single-loop controlled grid-connected inverters ...
LeMeniz Infotech
 
PPTX
My Pitch
danieljacksonmedia
 
PDF
Hazmat suits and content zero: How I learned to study digital marketing like ...
Jessica Hale
 
PPTX
Nelliampathi Hill Station
Kerala Honeymoon Packages
 
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...
Migrant Systems
 
Attribute Based Encryption
UT, San Antonio
 
Decentralization and Local Autonomy
Jo Balucanag - Bitonio
 
Question 5
amandalang123
 
STEPS Home Care ppt_New
Shan Wade
 
Optimum power allocation in sensor network for active radar application
LeMeniz Infotech
 
Sản xuất thiết bị điện công nghiệp vattuthietbidien.vn ống luồn dây điện thé...
nguyencvl
 
Inplant training in pondicherry | Technology Workshops
LeMeniz Infotech
 
Miss Robinson Eng AA Art Interpretations
MissRobinson
 
Bd ca m big data for context-aware monitoring - a personalized knowledge disc...
LeMeniz Infotech
 
Covert compositional analysis of android inter app permission leakage
LeMeniz Infotech
 
Navegadores.
GusTavo1793
 
Jus' IPad
JustyC
 
4th Etherum Meetup Vienna: The connection between reputation, sharing economy...
Alexander Hirner
 
Delay dependent stability of single-loop controlled grid-connected inverters ...
LeMeniz Infotech
 
Hazmat suits and content zero: How I learned to study digital marketing like ...
Jessica Hale
 
Nelliampathi Hill Station
Kerala Honeymoon Packages
 
Ad

Similar to Decentralized access control with anonymous authentication of data stored in clouds parallel distributed systems (20)

PDF
The Recent Trend: Vigorous unidentified validation access control system with...
IJERA Editor
 
DOC
Decentralized access control with anonymous authentication of data stored in ...
Vasanth Mca
 
PDF
Ieeepro techno solutions 2014 ieee java project - decentralized access cont...
hemanthbbc
 
PDF
Ieeepro techno solutions 2014 ieee dotnet project - decentralized access co...
ASAITHAMBIRAJAA
 
PDF
Ieeepro techno solutions 2014 ieee dotnet project - decentralized access co...
ASAITHAMBIRAJAA
 
DOC
IEEE paper 2014 abstract
Senthilvel S
 
DOC
Decentralized access control with anonymous authentication of data stored in ...
B Navya
 
PDF
Control Cloud Data Access Privilege and Anonymity with Fully Anonymous Attrib...
1crore projects
 
PDF
Control Cloud Data Access Privilege and Anonymity with Fully Anonymous Attrib...
1crore projects
 
PDF
Hierarchal attribute based cryptographic model to handle security services in...
IJECEIAES
 
PDF
Enforcing multi user access policies in cloud computing
IAEME Publication
 
PDF
A Survey on Different Techniques Used in Decentralized Cloud Computing
Editor IJCATR
 
PDF
Achieving Secure, sclable and finegrained Cloud computing report
Kiran Girase
 
PDF
Secure Data Sharing In an Untrusted Cloud
IJERA Editor
 
PDF
Paper2
Vikas Khairnar
 
PDF
Cloud Computing Environment using Secured Access Control Technique
IRJET Journal
 
PDF
Decentralized access control with anonymous authentication of data stored in ...
Shakas Technologies
 
DOCX
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Privacy preserving delegated access con...
IEEEGLOBALSOFTTECHNOLOGIES
 
PDF
Ieeepro techno solutions 2011 ieee java project -secure role based data
hemanthbbc
 
PDF
Ieeepro techno solutions 2011 ieee dotnet project -secure role based data
ASAITHAMBIRAJAA
 
The Recent Trend: Vigorous unidentified validation access control system with...
IJERA Editor
 
Decentralized access control with anonymous authentication of data stored in ...
Vasanth Mca
 
Ieeepro techno solutions 2014 ieee java project - decentralized access cont...
hemanthbbc
 
Ieeepro techno solutions 2014 ieee dotnet project - decentralized access co...
ASAITHAMBIRAJAA
 
Ieeepro techno solutions 2014 ieee dotnet project - decentralized access co...
ASAITHAMBIRAJAA
 
IEEE paper 2014 abstract
Senthilvel S
 
Decentralized access control with anonymous authentication of data stored in ...
B Navya
 
Control Cloud Data Access Privilege and Anonymity with Fully Anonymous Attrib...
1crore projects
 
Control Cloud Data Access Privilege and Anonymity with Fully Anonymous Attrib...
1crore projects
 
Hierarchal attribute based cryptographic model to handle security services in...
IJECEIAES
 
Enforcing multi user access policies in cloud computing
IAEME Publication
 
A Survey on Different Techniques Used in Decentralized Cloud Computing
Editor IJCATR
 
Achieving Secure, sclable and finegrained Cloud computing report
Kiran Girase
 
Secure Data Sharing In an Untrusted Cloud
IJERA Editor
 
Cloud Computing Environment using Secured Access Control Technique
IRJET Journal
 
Decentralized access control with anonymous authentication of data stored in ...
Shakas Technologies
 
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Privacy preserving delegated access con...
IEEEGLOBALSOFTTECHNOLOGIES
 
Ieeepro techno solutions 2011 ieee java project -secure role based data
hemanthbbc
 
Ieeepro techno solutions 2011 ieee dotnet project -secure role based data
ASAITHAMBIRAJAA
 
Ad

More from LeMeniz Infotech (20)

PDF
A fast acquisition all-digital delay-locked loop using a starting-bit predict...
LeMeniz Infotech
 
PDF
A fast fault tolerant architecture for sauvola local image thresholding algor...
LeMeniz Infotech
 
PDF
A dynamically reconfigurable multi asip architecture for multistandard and mu...
LeMeniz Infotech
 
PDF
Interleaved digital power factor correction based on the sliding mode approach
LeMeniz Infotech
 
PDF
Bumpless control for reduced thd in power factor correction circuits
LeMeniz Infotech
 
PDF
A bidirectional single stage three phase rectifier with high-frequency isolat...
LeMeniz Infotech
 
PDF
A bidirectional three level llc resonant converter with pwam control
LeMeniz Infotech
 
PDF
Efficient single phase transformerless inverter for grid tied pvg system with...
LeMeniz Infotech
 
PDF
Highly reliable transformerless photovoltaic inverters with leakage current a...
LeMeniz Infotech
 
PDF
Grid current-feedback active damping for lcl resonance in grid-connected volt...
LeMeniz Infotech
 
PDF
Connection of converters to a low and medium power dc network using an induct...
LeMeniz Infotech
 
PDF
Stamp enabling privacy preserving location proofs for mobile users
LeMeniz Infotech
 
PDF
Sbvlc secure barcode based visible light communication for smartphones
LeMeniz Infotech
 
PDF
Read2 me a cloud based reading aid for the visually impaired
LeMeniz Infotech
 
PDF
Privacy preserving location sharing services for social networks
LeMeniz Infotech
 
PDF
Pass byo bring your own picture for securing graphical passwords
LeMeniz Infotech
 
PDF
Eplq efficient privacy preserving location-based query over outsourced encryp...
LeMeniz Infotech
 
PDF
Analyzing ad library updates in android apps
LeMeniz Infotech
 
PDF
An exploration of geographic authentication scheme
LeMeniz Infotech
 
PDF
Dotnet IEEE Projects 2016-2017 | Dotnet IEEE Projects Titles 2016-2017
LeMeniz Infotech
 
A fast acquisition all-digital delay-locked loop using a starting-bit predict...
LeMeniz Infotech
 
A fast fault tolerant architecture for sauvola local image thresholding algor...
LeMeniz Infotech
 
A dynamically reconfigurable multi asip architecture for multistandard and mu...
LeMeniz Infotech
 
Interleaved digital power factor correction based on the sliding mode approach
LeMeniz Infotech
 
Bumpless control for reduced thd in power factor correction circuits
LeMeniz Infotech
 
A bidirectional single stage three phase rectifier with high-frequency isolat...
LeMeniz Infotech
 
A bidirectional three level llc resonant converter with pwam control
LeMeniz Infotech
 
Efficient single phase transformerless inverter for grid tied pvg system with...
LeMeniz Infotech
 
Highly reliable transformerless photovoltaic inverters with leakage current a...
LeMeniz Infotech
 
Grid current-feedback active damping for lcl resonance in grid-connected volt...
LeMeniz Infotech
 
Connection of converters to a low and medium power dc network using an induct...
LeMeniz Infotech
 
Stamp enabling privacy preserving location proofs for mobile users
LeMeniz Infotech
 
Sbvlc secure barcode based visible light communication for smartphones
LeMeniz Infotech
 
Read2 me a cloud based reading aid for the visually impaired
LeMeniz Infotech
 
Privacy preserving location sharing services for social networks
LeMeniz Infotech
 
Pass byo bring your own picture for securing graphical passwords
LeMeniz Infotech
 
Eplq efficient privacy preserving location-based query over outsourced encryp...
LeMeniz Infotech
 
Analyzing ad library updates in android apps
LeMeniz Infotech
 
An exploration of geographic authentication scheme
LeMeniz Infotech
 
Dotnet IEEE Projects 2016-2017 | Dotnet IEEE Projects Titles 2016-2017
LeMeniz Infotech
 

Recently uploaded (20)

PDF
Achieving Consistent and Reliable AI Code Generation - Medusa AI
medusaaico
 
PPTX
Seamless Tech Experiences Showcasing Cross-Platform App Design.pptx
presentifyai
 
PPTX
OpenID AuthZEN - Analyst Briefing July 2025
David Brossard
 
PPTX
MuleSoft MCP Support (Model Context Protocol) and Use Case Demo
shyamraj55
 
PDF
Smart Trailers 2025 Update with History and Overview
Paul Menig
 
PDF
Jak MŚP w Europie Środkowo-Wschodniej odnajdują się w świecie AI
dominikamizerska1
 
PDF
POV_ Why Enterprises Need to Find Value in ZERO.pdf
darshakparmar
 
PDF
"AI Transformation: Directions and Challenges", Pavlo Shaternik
Fwdays
 
PDF
Book industry state of the nation 2025 - Tech Forum 2025
BookNet Canada
 
PDF
Exolore The Essential AI Tools in 2025.pdf
Srinivasan M
 
PDF
New from BookNet Canada for 2025: BNC BiblioShare - Tech Forum 2025
BookNet Canada
 
PDF
Reverse Engineering of Security Products: Developing an Advanced Microsoft De...
nwbxhhcyjv
 
PDF
Newgen Beyond Frankenstein_Build vs Buy_Digital_version.pdf
darshakparmar
 
PPTX
AI Penetration Testing Essentials: A Cybersecurity Guide for 2025
defencerabbit Team
 
PDF
“NPU IP Hardware Shaped Through Software and Use-case Analysis,” a Presentati...
Edge AI and Vision Alliance
 
DOCX
Cryptography Quiz: test your knowledge of this important security concept.
Rajni Bhardwaj Grover
 
PPTX
Designing_the_Future_AI_Driven_Product_Experiences_Across_Devices.pptx
presentifyai
 
PDF
What’s my job again? Slides from Mark Simos talk at 2025 Tampa BSides
Mark Simos
 
PDF
Staying Human in a Machine- Accelerated World
Catalin Jora
 
DOCX
Python coding for beginners !! Start now!#
Rajni Bhardwaj Grover
 
Achieving Consistent and Reliable AI Code Generation - Medusa AI
medusaaico
 
Seamless Tech Experiences Showcasing Cross-Platform App Design.pptx
presentifyai
 
OpenID AuthZEN - Analyst Briefing July 2025
David Brossard
 
MuleSoft MCP Support (Model Context Protocol) and Use Case Demo
shyamraj55
 
Smart Trailers 2025 Update with History and Overview
Paul Menig
 
Jak MŚP w Europie Środkowo-Wschodniej odnajdują się w świecie AI
dominikamizerska1
 
POV_ Why Enterprises Need to Find Value in ZERO.pdf
darshakparmar
 
"AI Transformation: Directions and Challenges", Pavlo Shaternik
Fwdays
 
Book industry state of the nation 2025 - Tech Forum 2025
BookNet Canada
 
Exolore The Essential AI Tools in 2025.pdf
Srinivasan M
 
New from BookNet Canada for 2025: BNC BiblioShare - Tech Forum 2025
BookNet Canada
 
Reverse Engineering of Security Products: Developing an Advanced Microsoft De...
nwbxhhcyjv
 
Newgen Beyond Frankenstein_Build vs Buy_Digital_version.pdf
darshakparmar
 
AI Penetration Testing Essentials: A Cybersecurity Guide for 2025
defencerabbit Team
 
“NPU IP Hardware Shaped Through Software and Use-case Analysis,” a Presentati...
Edge AI and Vision Alliance
 
Cryptography Quiz: test your knowledge of this important security concept.
Rajni Bhardwaj Grover
 
Designing_the_Future_AI_Driven_Product_Experiences_Across_Devices.pptx
presentifyai
 
What’s my job again? Slides from Mark Simos talk at 2025 Tampa BSides
Mark Simos
 
Staying Human in a Machine- Accelerated World
Catalin Jora
 
Python coding for beginners !! Start now!#
Rajni Bhardwaj Grover
 

Decentralized access control with anonymous authentication of data stored in clouds parallel distributed systems

  • 3. LeMeniz Infotech LeMeniz Infotech a Leading Software Concern in Pondicherry Stepping in IEEE Projects 2014- 2015. We are Proud to Presents Android App for IEEE Projects Titles 2014-2015. Download From : www.ieeeprojectspondicherrry.weebly.com Student Benefits: =>No False Commitment =>Real Time Implementation ->27 X 7 Online Supports =>Individual Attention =>100% Satisfaction In Project Based Implementation we give maximum exposure to students in =>Project Requirement Specification =>Software Requirement Specification =>Coding Techniques =>Project flow Diagram =>Project Documentation =>Project Testing =>PPT preparation =>Project Based viva questions =>Project Based Interview questions for Placements
  • 4. Projects Technology @LeMeniz Infotech LeMeniz Infotech For More IEEE Projects Titles Visit : www.lemenizinfotech.com
  • 5. LeMeniz Infotech Projects Domains @LeMeniz Infotech For More IEEE Projects Titles Visit : www.lemenizinfotech.com
  • 6. Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds - Parallel Distributed Systems @LeMeniz Infotech
  • 7. Abstract We propose a new decentralized access control scheme for secure data storage in clouds that supports anonymous authentication. In the proposed scheme, the cloud verifies the authenticity of the series without knowing the user's identity before storing data. Our scheme also has the added feature of access control in which only valid users are able to decrypt the stored information. The scheme prevents replay attacks and supports creation, modification, and reading data stored in the cloud. We also address user revocation. Moreover, our authentication and access control scheme is decentralized and robust, unlike other access control schemes designed for clouds which are centralized. The communication, computation, and storage overheads are comparable to centralized approaches.
  • 8. Introduction The user should authenticate itself before initiating any transaction, and on the other hand, it must be ensured that the cloud does not tamper with the data that is outsourced. User privacy is also required so that the cloud or other users do not know the identity of the user. The cloud can hold the user accountable for the data it outsources, and likewise, the cloud is itself accountable for the services it provides. The validity of the user who stores the data is also verified. Apart from the technical solutions to ensure security and privacy, there is also a need for law enforcement.
  • 9. EXISTING SYSTEM On access control in cloud are centralized in nature. Except and all other schemes use attribute based encryption. The scheme in uses a symmetric key approach and does not support authentication. The schemes do not support authentication as well. Earlier work by Zhao. How ever, the authors take a centralized approach where a single key distribution center distributes secret keys and attributes to all users. Unfortunately, a single KDC is not only a single point of failure but difficult to maintain because of large number of users that are supported in cloud environment. We emphasize that clouds should take a decentralized approach while distributing secret keys and attributes to users.
  • 10. Disadvantages • Did not provide user authentication. • User can create and store a file and other users can only read the file. Write access was not permitted to users other than the creator.
  • 11. PROPOSED SYSTEM The protocol that we propose here computes a parameterized family of functions, which we call threshold functions, in which the two extreme cases correspond to the problems of computing the union and intersection of private subsets. Those are in fact general-purpose protocols that can be used in other contexts as well. Another problem of secure multiparty computation that we solve here as part of our discussion is the set inclusion problem; namely, the problem where Alice holds a private subset of some round set, and Bob holds an element in the ground set, and they wish to determine whether Bob’s element is within Alice’s subset, without revealing to either of them information about the other party’s input beyond the above described inclusion.
  • 12. Advantages • Decentralized access control technique with anonymous. • authentication which provides user revocation and prevents replay attack. • The cloud does not know the identity of the user who stores information, but only verifies the user’s credentials. Key distribution is done in a decentralized way. One limitation is that the cloud knows the access policy for each record stored in the cloud
  • 13. Reference S. Ruj, M. Stojmenovic and A. Nayak, “Privacy Preserving Access Control with Authentication for Securing Data in Clouds”, IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing, pp. 556–563, 2012.
  • 14. Hardware Specification Processor : Any Processor above 500 MHz. Ram : 128Mb. Hard Disk : 10 Gb. Compact Disk : 650 Mb. Input device : Standard Keyboard and Mouse. Output device : VGA and High Resolution Monitor.
  • 15. Software Specification Operating System : Windows Family. Programming Language : ASP.NET, C#.Net. Database : SQL Server 2005
  • 16. Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds - Parallel Distributed Systems To Get this Project with Complete Document Reach Us : LeMeniz Infotech 36, 100 Feet Road, Natesan Nagar, Near Indira Gandhi Statue, Pondicherry-605 005. Call: 0413-4205444, +91 99625 88976, 95663 55386. We Are Ready for You For More Project Title Call Us Rafee 9962588976 / 9566355386 Mail : [email protected]