SlideShare a Scribd company logo
Decentralized Access Control with Anonymous 
Authentication of Data Stored in Clouds 
ABSTRACT: 
We propose a new decentralized access control scheme for secure data storage in 
clouds that supports anonymous authentication. In the proposed scheme, the cloud 
verifies the authenticity of the series without knowing the user’s identity before 
storing data. Our scheme also has the added feature of access control in which only 
valid users are able to decrypt the stored information. The scheme prevents replay 
attacks and supports creation, modification, and reading data stored in the cloud. 
We also address user revocation. Moreover, our authentication and access control 
scheme is decentralized and robust, unlike other access control schemes designed 
for clouds which are centralized. The communication, computation, and storage 
overheads are comparable to centralizedapproaches. 
EXISTING SYSTEM: 
 Existing work on access control in cloud are centralized in nature. Except 
and, all other schemes use ABE. The scheme in uses a symmetric key
approach and does not support authentication. The schemes do not support 
authentication as well. 
 It provides privacy preserving authenticated access control in cloud. 
However, the authors take a centralized approach where a single key 
distribution center (KDC) distributes secret keys and attributes to all users. 
DISADVANTAGES OF EXISTING SYSTEM: 
 The scheme in uses asymmetric key approach and does not support 
authentication. 
 Difficult to maintain because of the large number of users that are supported 
in a cloud environment. 
PROPOSED SYSTEM: 
 We propose a new decentralized access control scheme for secure data 
storage in clouds that supports anonymous authentication. 
 In the proposed scheme, the cloud verifies the authenticity of the series 
without knowing the user’s identity before storing data.
 Our scheme also has the added feature of access control in which only valid 
users are able to decrypt the stored information. 
 The scheme prevents replay attacks and supports creation, modification, and 
reading data stored in the cloud. 
ADVANTAGES OF PROPOSED SYSTEM: 
 Distributed access control of data stored in cloud so that only authorized 
users with valid attributes can access them. 
 Authentication of users who store and modify their data on the cloud. 
 The identity of the user is protected from the cloud during authentication.
SYSTEM ARCHITECTURE: 
SYSTEM REQUIREMENTS: 
HARDWARE REQUIREMENTS: 
 System : Pentium IV 2.4 GHz. 
 Hard Disk : 40 GB. 
 Floppy Drive : 1.44 Mb.
 Monitor : 15 VGA Colour. 
 Mouse : Logitech. 
 Ram : 512 Mb. 
SOFTWARE REQUIREMENTS: 
 Operating system : Windows XP/7. 
 Coding Language : JAVA/J2EE 
 IDE : Netbeans 7.4 
 Database : MYSQL 
REFERENCE: 
Sushmita Ruj, Milos Stojmenovic, and Amiya Nayak, “Decentralized Access 
Control with Anonymous Authentication of Data Stored in Clouds”, IEEE 
TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 
25, NO. 2, FEBRUARY 2014

More Related Content

What's hot (20)

DOCX
decentralized access control with anonymous authentication of data stored in ...
swathi78
 
PPSX
Final year presentation
Abhishek Jain
 
DOCX
Privacy preserving delegated access control in public clouds
IEEEFINALYEARPROJECTS
 
PPTX
Secure data sharing for dynamic groups in multi-owner using cloud
Sagar Dhanake
 
PDF
A Privacy Preserving Attribute Based Access Control Mechanism In Distributed ...
Editor IJCATR
 
PDF
Secure Data Sharing in Cloud Computing using Revocable Storage Identity- Base...
rahulmonikasharma
 
PPTX
secure multi-owner data sharing for dynamic groups
Suchithra Balan
 
DOCX
Privacy preserving delegated access control in public clouds
LeMeniz Infotech
 
PPTX
Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based...
Yashwanth Reddy
 
PDF
Privacy preserving delegated access control in public cloud
Aswathy Rajan
 
PDF
Psdot 12 a secure erasure code-based cloud storage
ZTech Proje
 
PDF
SMONA: Secure Multi Owner Data Sharing for Dynamic Groups in the Cloud
ijsrd.com
 
PPT
Mona secure multi owner data sharing for dynamic groups in the cloud-ppt
Krushna Panda
 
PDF
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
IJCERT JOURNAL
 
PPTX
Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud
Shruthi Suresh
 
PPTX
Mona final review
sudheer kumar
 
PDF
Mona secure multi owner data sharing for dynamic groups in the cloud
Avinash K S
 
PDF
A secure anti collusion data sharing scheme for dynamic groups in the cloud
1crore projects
 
PDF
Privacy Preserving Delegated Access Control in Public Clouds
Md Uddin
 
DOCX
A secure-anti-collusion-data-sharing-scheme-for-dynamic-groups-in-the-cloud
Pvrtechnologies Nellore
 
decentralized access control with anonymous authentication of data stored in ...
swathi78
 
Final year presentation
Abhishek Jain
 
Privacy preserving delegated access control in public clouds
IEEEFINALYEARPROJECTS
 
Secure data sharing for dynamic groups in multi-owner using cloud
Sagar Dhanake
 
A Privacy Preserving Attribute Based Access Control Mechanism In Distributed ...
Editor IJCATR
 
Secure Data Sharing in Cloud Computing using Revocable Storage Identity- Base...
rahulmonikasharma
 
secure multi-owner data sharing for dynamic groups
Suchithra Balan
 
Privacy preserving delegated access control in public clouds
LeMeniz Infotech
 
Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based...
Yashwanth Reddy
 
Privacy preserving delegated access control in public cloud
Aswathy Rajan
 
Psdot 12 a secure erasure code-based cloud storage
ZTech Proje
 
SMONA: Secure Multi Owner Data Sharing for Dynamic Groups in the Cloud
ijsrd.com
 
Mona secure multi owner data sharing for dynamic groups in the cloud-ppt
Krushna Panda
 
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
IJCERT JOURNAL
 
Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud
Shruthi Suresh
 
Mona final review
sudheer kumar
 
Mona secure multi owner data sharing for dynamic groups in the cloud
Avinash K S
 
A secure anti collusion data sharing scheme for dynamic groups in the cloud
1crore projects
 
Privacy Preserving Delegated Access Control in Public Clouds
Md Uddin
 
A secure-anti-collusion-data-sharing-scheme-for-dynamic-groups-in-the-cloud
Pvrtechnologies Nellore
 

Similar to JPJ1405 Decentralized Access Control With Anonymous Authentication of Data Stored in Clouds (20)

DOC
IEEE paper 2014 abstract
Senthilvel S
 
DOC
Decentralized access control with anonymous authentication of data stored in ...
B Navya
 
PDF
The Recent Trend: Vigorous unidentified validation access control system with...
IJERA Editor
 
DOCX
Decentralized access control with anonymous authentication of data stored in ...
ieeepondy
 
DOC
Decentralized access control with anonymous authentication of data stored in ...
Vasanth Mca
 
DOCX
Control cloud data access privilege and
jpstudcorner
 
PPTX
cloud.pptx
Arun Nagarajan
 
DOCX
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Privacy preserving delegated access con...
IEEEGLOBALSOFTTECHNOLOGIES
 
PDF
Paper2
Vikas Khairnar
 
DOCX
Privacy preserving delegated access control in public clouds
JPINFOTECH JAYAPRAKASH
 
DOCX
Privacy preserving delegated access control in public clouds
JPINFOTECH JAYAPRAKASH
 
PDF
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...
Migrant Systems
 
PDF
Control Cloud Data Access Using Attribute-Based Encryption
paperpublications3
 
PDF
Control Cloud Data Access Privilege and Anonymity with Fully Anonymous Attrib...
1crore projects
 
PDF
Control Cloud Data Access Privilege and Anonymity with Fully Anonymous Attrib...
1crore projects
 
PDF
Ieeepro techno solutions 2014 ieee java project - decentralized access cont...
hemanthbbc
 
PDF
Ieeepro techno solutions 2014 ieee dotnet project - decentralized access co...
ASAITHAMBIRAJAA
 
PDF
Ieeepro techno solutions 2014 ieee dotnet project - decentralized access co...
ASAITHAMBIRAJAA
 
PDF
Decentralized access control with anonymous authentication of data stored in ...
Shakas Technologies
 
PDF
Attribute based encryption with privacy preserving in clouds
Swathi Rampur
 
IEEE paper 2014 abstract
Senthilvel S
 
Decentralized access control with anonymous authentication of data stored in ...
B Navya
 
The Recent Trend: Vigorous unidentified validation access control system with...
IJERA Editor
 
Decentralized access control with anonymous authentication of data stored in ...
ieeepondy
 
Decentralized access control with anonymous authentication of data stored in ...
Vasanth Mca
 
Control cloud data access privilege and
jpstudcorner
 
cloud.pptx
Arun Nagarajan
 
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Privacy preserving delegated access con...
IEEEGLOBALSOFTTECHNOLOGIES
 
Privacy preserving delegated access control in public clouds
JPINFOTECH JAYAPRAKASH
 
Privacy preserving delegated access control in public clouds
JPINFOTECH JAYAPRAKASH
 
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...
Migrant Systems
 
Control Cloud Data Access Using Attribute-Based Encryption
paperpublications3
 
Control Cloud Data Access Privilege and Anonymity with Fully Anonymous Attrib...
1crore projects
 
Control Cloud Data Access Privilege and Anonymity with Fully Anonymous Attrib...
1crore projects
 
Ieeepro techno solutions 2014 ieee java project - decentralized access cont...
hemanthbbc
 
Ieeepro techno solutions 2014 ieee dotnet project - decentralized access co...
ASAITHAMBIRAJAA
 
Ieeepro techno solutions 2014 ieee dotnet project - decentralized access co...
ASAITHAMBIRAJAA
 
Decentralized access control with anonymous authentication of data stored in ...
Shakas Technologies
 
Attribute based encryption with privacy preserving in clouds
Swathi Rampur
 
Ad

More from chennaijp (20)

DOCX
JPEEE1440 Cascaded Two-Level Inverter-Based Multilevel STATCOM for High-Pow...
chennaijp
 
DOCX
JPN1423 Stars a Statistical Traffic Pattern
chennaijp
 
DOCX
JPN1422 Defending Against Collaborative Attacks by Malicious Nodes in MANETs...
chennaijp
 
DOCX
JPN1420 Joint Routing and Medium Access Control in Fixed Random Access Wire...
chennaijp
 
DOCX
JPN1418 PSR: A Lightweight Proactive Source Routing Protocol For Mobile Ad H...
chennaijp
 
DOCX
JPN1417 AASR: An Authenticated Anonymous Secure Routing Protocol for MANETs ...
chennaijp
 
DOCX
JPN1416 Sleep Scheduling for Geographic Routing in Duty-Cycled Mobile Sensor...
chennaijp
 
DOCX
JPN1415 R3E: Reliable Reactive Routing Enhancement for Wireless Sensor Netw...
chennaijp
 
DOCX
JPN1411 Secure Continuous Aggregation in Wireless Sensor Networks
chennaijp
 
DOCX
JPN1414 Distributed Deployment Algorithms for Improved Coverage in a Networ...
chennaijp
 
DOCX
JPN1413 An Energy-Balanced Routing Method Based on Forward-Aware Factor for...
chennaijp
 
DOCX
JPN1412 Transmission-Efficient Clustering Method for Wireless Sensor Networ...
chennaijp
 
DOCX
JPN1410 Secure and Efficient Data Transmission for Cluster-Based Wireless Se...
chennaijp
 
DOCX
JPN1409 Neighbor Table Based Shortcut Tree Routing in ZigBee Wireless Networks
chennaijp
 
DOCX
JPN1408 Hop-by-Hop Message Authentication and Source Privacy in Wireless Sen...
chennaijp
 
DOCX
JPN1406 Snapshot and Continuous Data Collection in Probabilistic Wireless S...
chennaijp
 
DOCX
JPN1405 RBTP: Low-Power Mobile Discovery Protocol through Recursive Binary T...
chennaijp
 
DOCX
JPN1404 Optimal Multicast Capacity and Delay Tradeoffs in MANETs
chennaijp
 
DOCX
JPM1410 Images as Occlusions of Textures: A Framework for Segmentation
chennaijp
 
DOCX
JPM1407 Exposing Digital Image Forgeries by Illumination Color Classification
chennaijp
 
JPEEE1440 Cascaded Two-Level Inverter-Based Multilevel STATCOM for High-Pow...
chennaijp
 
JPN1423 Stars a Statistical Traffic Pattern
chennaijp
 
JPN1422 Defending Against Collaborative Attacks by Malicious Nodes in MANETs...
chennaijp
 
JPN1420 Joint Routing and Medium Access Control in Fixed Random Access Wire...
chennaijp
 
JPN1418 PSR: A Lightweight Proactive Source Routing Protocol For Mobile Ad H...
chennaijp
 
JPN1417 AASR: An Authenticated Anonymous Secure Routing Protocol for MANETs ...
chennaijp
 
JPN1416 Sleep Scheduling for Geographic Routing in Duty-Cycled Mobile Sensor...
chennaijp
 
JPN1415 R3E: Reliable Reactive Routing Enhancement for Wireless Sensor Netw...
chennaijp
 
JPN1411 Secure Continuous Aggregation in Wireless Sensor Networks
chennaijp
 
JPN1414 Distributed Deployment Algorithms for Improved Coverage in a Networ...
chennaijp
 
JPN1413 An Energy-Balanced Routing Method Based on Forward-Aware Factor for...
chennaijp
 
JPN1412 Transmission-Efficient Clustering Method for Wireless Sensor Networ...
chennaijp
 
JPN1410 Secure and Efficient Data Transmission for Cluster-Based Wireless Se...
chennaijp
 
JPN1409 Neighbor Table Based Shortcut Tree Routing in ZigBee Wireless Networks
chennaijp
 
JPN1408 Hop-by-Hop Message Authentication and Source Privacy in Wireless Sen...
chennaijp
 
JPN1406 Snapshot and Continuous Data Collection in Probabilistic Wireless S...
chennaijp
 
JPN1405 RBTP: Low-Power Mobile Discovery Protocol through Recursive Binary T...
chennaijp
 
JPN1404 Optimal Multicast Capacity and Delay Tradeoffs in MANETs
chennaijp
 
JPM1410 Images as Occlusions of Textures: A Framework for Segmentation
chennaijp
 
JPM1407 Exposing Digital Image Forgeries by Illumination Color Classification
chennaijp
 
Ad

Recently uploaded (20)

PPTX
265587293-NFPA 101 Life safety code-PPT-1.pptx
chandermwason
 
PDF
Introduction to Productivity and Quality
মোঃ ফুরকান উদ্দিন জুয়েল
 
PPTX
Introduction to Neural Networks and Perceptron Learning Algorithm.pptx
Kayalvizhi A
 
PPTX
GitOps_Repo_Structure for begeinner(Scaffolindg)
DanialHabibi2
 
PDF
Unified_Cloud_Comm_Presentation anil singh ppt
anilsingh298751
 
PPTX
Mechanical Design of shell and tube heat exchangers as per ASME Sec VIII Divi...
shahveer210504
 
PPTX
Shinkawa Proposal to meet Vibration API670.pptx
AchmadBashori2
 
PPTX
原版一样(Acadia毕业证书)加拿大阿卡迪亚大学毕业证办理方法
Taqyea
 
PDF
Biomechanics of Gait: Engineering Solutions for Rehabilitation (www.kiu.ac.ug)
publication11
 
PDF
Set Relation Function Practice session 24.05.2025.pdf
DrStephenStrange4
 
PPTX
Product Development & DevelopmentLecture02.pptx
zeeshanwazir2
 
PPTX
MobileComputingMANET2023 MobileComputingMANET2023.pptx
masterfake98765
 
PDF
MAD Unit - 2 Activity and Fragment Management in Android (Diploma IT)
JappanMavani
 
PPTX
Types of Bearing_Specifications_PPT.pptx
PranjulAgrahariAkash
 
PDF
Pressure Measurement training for engineers and Technicians
AIESOLUTIONS
 
PDF
Zilliz Cloud Demo for performance and scale
Zilliz
 
PPTX
Depth First Search Algorithm in 🧠 DFS in Artificial Intelligence (AI)
rafeeqshaik212002
 
PDF
Design Thinking basics for Engineers.pdf
CMR University
 
PPTX
Lecture 1 Shell and Tube Heat exchanger-1.pptx
mailforillegalwork
 
PPTX
GitOps_Without_K8s_Training_detailed git repository
DanialHabibi2
 
265587293-NFPA 101 Life safety code-PPT-1.pptx
chandermwason
 
Introduction to Productivity and Quality
মোঃ ফুরকান উদ্দিন জুয়েল
 
Introduction to Neural Networks and Perceptron Learning Algorithm.pptx
Kayalvizhi A
 
GitOps_Repo_Structure for begeinner(Scaffolindg)
DanialHabibi2
 
Unified_Cloud_Comm_Presentation anil singh ppt
anilsingh298751
 
Mechanical Design of shell and tube heat exchangers as per ASME Sec VIII Divi...
shahveer210504
 
Shinkawa Proposal to meet Vibration API670.pptx
AchmadBashori2
 
原版一样(Acadia毕业证书)加拿大阿卡迪亚大学毕业证办理方法
Taqyea
 
Biomechanics of Gait: Engineering Solutions for Rehabilitation (www.kiu.ac.ug)
publication11
 
Set Relation Function Practice session 24.05.2025.pdf
DrStephenStrange4
 
Product Development & DevelopmentLecture02.pptx
zeeshanwazir2
 
MobileComputingMANET2023 MobileComputingMANET2023.pptx
masterfake98765
 
MAD Unit - 2 Activity and Fragment Management in Android (Diploma IT)
JappanMavani
 
Types of Bearing_Specifications_PPT.pptx
PranjulAgrahariAkash
 
Pressure Measurement training for engineers and Technicians
AIESOLUTIONS
 
Zilliz Cloud Demo for performance and scale
Zilliz
 
Depth First Search Algorithm in 🧠 DFS in Artificial Intelligence (AI)
rafeeqshaik212002
 
Design Thinking basics for Engineers.pdf
CMR University
 
Lecture 1 Shell and Tube Heat exchanger-1.pptx
mailforillegalwork
 
GitOps_Without_K8s_Training_detailed git repository
DanialHabibi2
 

JPJ1405 Decentralized Access Control With Anonymous Authentication of Data Stored in Clouds

  • 1. Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds ABSTRACT: We propose a new decentralized access control scheme for secure data storage in clouds that supports anonymous authentication. In the proposed scheme, the cloud verifies the authenticity of the series without knowing the user’s identity before storing data. Our scheme also has the added feature of access control in which only valid users are able to decrypt the stored information. The scheme prevents replay attacks and supports creation, modification, and reading data stored in the cloud. We also address user revocation. Moreover, our authentication and access control scheme is decentralized and robust, unlike other access control schemes designed for clouds which are centralized. The communication, computation, and storage overheads are comparable to centralizedapproaches. EXISTING SYSTEM:  Existing work on access control in cloud are centralized in nature. Except and, all other schemes use ABE. The scheme in uses a symmetric key
  • 2. approach and does not support authentication. The schemes do not support authentication as well.  It provides privacy preserving authenticated access control in cloud. However, the authors take a centralized approach where a single key distribution center (KDC) distributes secret keys and attributes to all users. DISADVANTAGES OF EXISTING SYSTEM:  The scheme in uses asymmetric key approach and does not support authentication.  Difficult to maintain because of the large number of users that are supported in a cloud environment. PROPOSED SYSTEM:  We propose a new decentralized access control scheme for secure data storage in clouds that supports anonymous authentication.  In the proposed scheme, the cloud verifies the authenticity of the series without knowing the user’s identity before storing data.
  • 3.  Our scheme also has the added feature of access control in which only valid users are able to decrypt the stored information.  The scheme prevents replay attacks and supports creation, modification, and reading data stored in the cloud. ADVANTAGES OF PROPOSED SYSTEM:  Distributed access control of data stored in cloud so that only authorized users with valid attributes can access them.  Authentication of users who store and modify their data on the cloud.  The identity of the user is protected from the cloud during authentication.
  • 4. SYSTEM ARCHITECTURE: SYSTEM REQUIREMENTS: HARDWARE REQUIREMENTS:  System : Pentium IV 2.4 GHz.  Hard Disk : 40 GB.  Floppy Drive : 1.44 Mb.
  • 5.  Monitor : 15 VGA Colour.  Mouse : Logitech.  Ram : 512 Mb. SOFTWARE REQUIREMENTS:  Operating system : Windows XP/7.  Coding Language : JAVA/J2EE  IDE : Netbeans 7.4  Database : MYSQL REFERENCE: Sushmita Ruj, Milos Stojmenovic, and Amiya Nayak, “Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds”, IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 25, NO. 2, FEBRUARY 2014