You are on page 1of 6

ABSTRACT

Cloud security is one of most important issues that have attracted a lot of
research and development effort in past few years. Decentralized access control ensures
secure data storage in cloud using access policy. Access policy placed in cloud space
provides secure data storage by allowing only valid users with matched role can
decrypt the cipher text. Since access policy is placed in the cloud premise itself. Upon
failure of cloud, the access policy is lost, so that the recovery of the access policy
becomes difficult. This system also supports anonymous authentication in which data
owner uploads the data without revealing their identity. This is achieved by generating
signature. In the proposed system, a separate certificate authority is created in which
access policy and certificates

of each user are maintained. This prevents the access

policy information during the failure time. Data availability and recovery is ensures
using Proxy compression technique. This technique includes a backup and a separate
structure file. Backup contains the data stored in cloud which avoids duplication of files
and stores only single original copy. This ensures efficient memory usage. The
structure file stores only the structure of the file location which restores the original
format of the data during recovery.

Keywords-

Access control, anonymous authentication, RSA encryption, proxy

compression.

iii

ACKNOWLEDEGMENT
With pleasure I express my gratitude to all the authorities who were
instrumental in making this project successful.
I express my profound gratitude to Dr.G.Gunasekaran, M.E., Ph.D, Principal,
Meenakshi College of Engineering for having provided plenty of resources.
I would like to express my earnest thanks to Ms.J.C.Kavitha, Head of the
Department (In-Charge), Department of CSE, Meenakshi College of Engineering for
her valuable guidance, suggestions and constant encouragement paved way for the
successful completion of the work.
I would like to thank my internal guide Mrs. S. Anitha Angayarkanni,
Assistant Professor, Department of CSE, Meenakshi College of Engineering for her
constant supervision, advice and motivation.
I express my sincere thanks and deep sense of gratitude to my faculty members,
Non-teaching staffs and friends for their support and encouragement

iv

TABLE OF CONTENTS
CHAPTER NO

2.

TITLE

PAGE
NO

ABSTRACT

iii

LIST OF FIGURES

vii

LIST OF ABBREVIATIONS

viii

INTRODUCTION

1.1 Overview

1.2 Scope of the Project

1.3 Cloud Computing

1.4 Organization of the Project

1.5 Conclusion

SYSTEM ANALYSIS

2.1 Literature Review

2.1.1 Decentralized access control with


Anonymous authentication data

stored in cloud
2.1.2 Outsourcing the Decryption of ABE

Cipher texts
2.1.3 DACC: Distributed Access Control in
Clouds

6
7

2.1.4 Decentralizing Attribute-Based


Encryption
2.1.5 Toward secure and dependable
storage services in cloud computing.

7
8

2.2 Existing System

2.3 Proposed System


2.4 Conclusion
3.

SYSTEM DESIGN

10

3.1 Overall System Architecture

10

3.2 Module Description

11

3.2.1 Anonymous authentication


using signature

11

3.2.2 Encryption /Decryption using RSA


3.2.3 Access policy using certificate

12

authority
3.2.4 Backup using proxy compression
technique

4.

5.

14
14

3.3 Conclusion

14

IMPLEMENTATION

15

4.1 Software Requirements

15

4.2 Hardware Requirements

15

4.3 Introduction to JAVA Architecture

15

4.4 SQL Server Management Studio

17

4.5 Conclusion

17

CONCLUSION

23

APPENDIX

19

APPENDIX 1-SCREENSHOTS

19

vi

APPENDIX 2-SAMPLE CODING

23

REFERENCES

27

LIST OF FIGURES

Figure No

Figure Name

Page No

1.1

Types Of Cloud

3.1

Architecture of Existing system

3.2

Architecture of decentralized access policy

10

using proxy compression technique

11
12

Fig.A1.1

19

Fig.A1.2

20

Fig.A1.3

21

Fig.A1.4

21

Fig.A1.5

22

vii

LIST OF ABBREVIATIONS

KDC

Key Distribution Center

PK

Public Key

SK

Secret Key

AWS

Amazon Web Services

IaaS

Infrastructure-as-a-Service

PaaS

Platform-as-a-Service

SaaS

Software-as-a-Service

NaaS

Network as a Service

Caas

Communication as a Service

viii

You might also like