ABSTRACT:
We propose a new
decentralized access control scheme for secure data storage in clouds that
supports anonymous authentication. In the proposed scheme, the cloud verifies
the authenticity of the series without knowing the user’s identity before
storing data. Our scheme also has the added feature of access control in which
only valid users are able to decrypt the stored information. The scheme
prevents replay attacks and supports creation, modification, and reading data
stored in the cloud. We also address user revocation. Moreover, our
authentication and access control scheme is decentralized and robust, unlike
other access control schemes designed for clouds which are centralized. The
communication, computation, and storage overheads are comparable to centralized
approaches.
EXISTING SYSTEM:
Ø Existing work on access control in cloud are
centralized in nature. Except and, all other schemes use ABE. The scheme in
uses a symmetric key approach and does not support authentication. The schemes
do not support authentication as well.
Ø It provides privacy preserving authenticated access
control in cloud. However, the authors take a centralized approach where a
single key distribution center (KDC) distributes secret keys and attributes to
all users.
DISADVANTAGES
OF EXISTING SYSTEM:
Ø The scheme in uses asymmetric key approach and does
not support authentication.
Ø Difficult to maintain because of the large number of
users that are supported in a cloud environment.
PROPOSED SYSTEM:
Ø We propose a new decentralized access control scheme
for secure data storage in clouds that supports anonymous authentication.
Ø In the proposed
scheme, the cloud verifies the authenticity of the series without knowing the
user’s identity before storing data.
Ø Our scheme also has the added feature of access
control in which only valid users are able to decrypt the stored information.
Ø The scheme
prevents replay attacks and supports creation, modification, and reading data
stored in the cloud.
ADVANTAGES
OF PROPOSED SYSTEM:
Ø Distributed access control of data stored in cloud so
that only authorized users with valid attributes can access them.
Ø Authentication of users who store and modify their
data on the cloud.
Ø The identity of the user is protected from the cloud
during authentication.
SYSTEM
ARCHITECTURE:
SYSTEM
REQUIREMENTS:
HARDWARE REQUIREMENTS:
Ø
System : Pentium IV 2.4 GHz.
Ø
Hard Disk :
40 GB.
Ø
Floppy Drive : 1.44
Mb.
Ø
Monitor : 15
VGA Colour.
Ø
Mouse :
Logitech.
Ø Ram : 512 Mb.
SOFTWARE REQUIREMENTS:
Ø Operating system : Windows
XP/7.
Ø Coding Language : JAVA/J2EE
Ø IDE : Netbeans 7.4
Ø Database : MYSQL
REFERENCE:
Sushmita Ruj, Milos
Stojmenovic, and Amiya Nayak, “Decentralized
Access Control with Anonymous Authentication of Data Stored in Clouds”, IEEE TRANSACTIONS ON PARALLEL AND
DISTRIBUTED SYSTEMS, VOL. 25, NO. 2, FEBRUARY 2014
ieee projects in chennai, ieee projects in pondicherry, bulk ieee projects, ns2 projects, n2 projects in chennai, android ieee projects, journal publication guidance