1CP_RT_J030 Identity-Based Secure Distributed Data Storage
ABSTRACT:
Secure distributed data storage can shift the burden
of maintaining a large number of files from the owner to proxy servers. Proxy
servers can convert encrypted files for the owner to encrypted files for the
receiver without the
necessity of knowing the content of the original files. In practice, the
original files will be removed by the owner for the sake of space efficiency.
Hence, the issues on confidentiality and integrity of the outsourced data must
be addressed carefully. In this paper, we propose two identity-based secure
distributed data storage (IBSDDS) schemes. Our schemes can capture the
following properties: (1) The file owner can decide the access permission
independently without the help of the private key generator (PKG); (2) For one
query, a receiver can only access one file, instead of all files of the owner;
(3) Our schemes are secure against the collusion attacks, namely even if the
receiver can compromise the proxy servers, he cannot obtain the owner’s secret
key. Although the first scheme is only secure against the chosen plaintext
attacks (CPA), the second scheme is secure against the chosen cipher text
attacks (CCA). To the best of our knowledge, it is the first IBSDDS schemes where an access permissions is made
by the owner for an exact file and collusion attacks can be protected in the
standard model.
EXISTING SYSTEM:
Cloud computing provides users with a convenient
mechanism to manage their personal files with the notion called database-as-a-service
(DAS). In DAS schemes, a user can outsource his encrypted files to untrusted
proxy servers. Proxy servers can perform some functions on the outsourced
ciphertexts without knowing anything about the original files. Unfortunately,
this technique has not been employed extensively. The main reason lies in that
users are especially concerned on the confidentiality, integrity and query of
the outsourced files as cloud computing is a lot more complicated than the
local data storage systems, as the cloud is managed by an untrusted third
party. After outsorcing the files to proxy servers, the user will remove them
from his local machine. Therefore, how to guarantee the outsoured files are not
accessed by the unauthorized users and not modified by proxy servers is an
important problem that has been considered in the data storage research
community. Furthermore, how to guarantee that an authorized user can query the
outsourced files from proxy servers is another concern as the proxy server only
maintains the outsourced ciphertexts. Consequently, research around these
topics grows significantly.
DISADVANTAGES
OF EXISTING SYSTEM:
·
Users are especially concerned on the
confidentiality, integrity and query of the outsourced files as cloud computing
is a lot more complicated than the local data storage systems, as the cloud is
managed by an untrusted third party.
· The outsoured files are not accessed by
the unauthorized users and not modified by proxy servers is an important
problem that has been considered in the data storage research community.
PROPOSED SYSTEM:
In this paper, we propose two
identity-based secure distributed data storage (IBSDDS) schemes in standard
model where, for one query, the receiver can only access one of the owner’s
files, instead of all files. In other words, an access permission
(re-encryption key) is bound not only to the identity of the receiver but also
the file. The access permission can be decided by the owner, instead of the
trusted party (PKG). Furthermore, our schemes are secure against the collusion
attacks.
ADVANTAGES
OF PROPOSED SYSTEM:
Ø It
has two schemes of security,the first scheme is CPA secure, the second scheme
achieves CCA security.
Ø To
the best of our knowledge, it is the first IBSDDS schemes where an
access permission is made by the owner for an exact file and collusion attacks
can be protected in the standard model.
Ø To
achieve a stronger security and implement filebased access control, the owner
must be online to authenticate requesters and also to generate access
permissions for them. Therefore, the owner in our schemes needs do more
computations than that in PRE schemes. Although PRE schemes can provide the
similar functionalities of our schemes when the owner only has one file, these
are not flexible and practical.
MODULES:
1.
Data Owner
2.
Private key
Generator
3.
Proxy Server
4.
The Receiver Module
MODULES
DESCRIPTION:
1.
Data Owner:
In this module, first
the new data owner registers and then get a valid login credentials. After
logged in, the data owner has the permission to upload their file into the
Cloud Server. The data owner encrypts his data and outsources the ciphertexts
to the proxy servers.
2.
Private Key Generator:
In this module, the
private key generator (PKG) validates the users’ identities and issues secret
keys to them. The key is generated and sent to their respective mail id’s with
the file name and the corresponding key values.
3.
Proxy Server:
Proxy servers store the
encrypted data and transfer the cipher text for the owner to the cipher text
for the receiver when they obtain access permission (re-encryption key) from
the owner. In these systems, proxy servers are assumed to be trusted.
They authenticate receivers and validate access permissions. The interactions
between the proxy servers and receivers are executed in a secure channel.
Therefore, these systems cannot provide an end-to-end data security, namely
they cannot ensure the confidentiality of the data stored at the proxy server. In these schemes, a receiver authenticates
himself to the proxy server using his password. Then, the proxy server passes the authentication result to
the file owner. The owner will make access
permission according to the received information.
4.
Receiver Module:
The receiver
authenticates himself to the owner and decrypts the re-encrypted Ciphertext to
obtain the data. In these systems, an end to-end security is provided by
cryptographic protocols which are executed by the file owner to prevent proxy
servers and unauthorized users from modifying and accessing the sensitive
files. These systems can be divided into two types: shared file system and
non-shared system. In shared file systems the owner can share his files with a
group of users. Cryptographic techniques deployed in these systems are key
sharing, key agreement and key revocation. In non-shared file systems in order
to share a file with another user, the owner can compute an access key for the
user using his secret key. In these two systems, the integrity of the sensitive
files is provided by digital signature schemes and message authentication codes
(MAC).
SYSTEM CONFIGURATION:-
HARDWARE CONFIGURATION:-
ü Processor - Pentium –IV
ü Speed - 1.1
Ghz
ü RAM - 256
MB(min)
ü Hard Disk -
20 GB
ü Key Board -
Standard Windows Keyboard
ü Mouse - Two
or Three Button Mouse
ü Monitor - SVGA
SOFTWARE CONFIGURATION:-
ü Operating System : Windows XP
ü Programming Language :
JAVA/J2EE
ü Java Version :
JDK 1.6 & above.
ü Database :
MYSQL
CONTACT US
1 CRORE PROJECTS
Door No: 214/215,2nd Floor,
No. 172, Raahat Plaza, (Shopping Mall) ,Arcot Road, Vadapalani, Chennai,
Tamin Nadu, INDIA - 600 026
Email id: 1croreprojects@gmail.com
website:1croreprojects.com
Phone : +91 97518 00789 / +91 72999 51536
No comments:
Post a Comment