Professional Documents
Culture Documents
Cloud security is one of most important issues that have attracted a lot of
research and development effort in past few years. Decentralized access control ensures
secure data storage in cloud using access policy. Access policy placed in cloud space
provides secure data storage by allowing only valid users with matched role can
decrypt the cipher text. Since access policy is placed in the cloud premise itself. Upon
failure of cloud, the access policy is lost, so that the recovery of the access policy
becomes difficult. This system also supports anonymous authentication in which data
owner uploads the data without revealing their identity. This is achieved by generating
signature. In the proposed system, a separate certificate authority is created in which
access policy and certificates
policy information during the failure time. Data availability and recovery is ensures
using Proxy compression technique. This technique includes a backup and a separate
structure file. Backup contains the data stored in cloud which avoids duplication of files
and stores only single original copy. This ensures efficient memory usage. The
structure file stores only the structure of the file location which restores the original
format of the data during recovery.
Keywords-
compression.
iii
ACKNOWLEDEGMENT
With pleasure I express my gratitude to all the authorities who were
instrumental in making this project successful.
I express my profound gratitude to Dr.G.Gunasekaran, M.E., Ph.D, Principal,
Meenakshi College of Engineering for having provided plenty of resources.
I would like to express my earnest thanks to Ms.J.C.Kavitha, Head of the
Department (In-Charge), Department of CSE, Meenakshi College of Engineering for
her valuable guidance, suggestions and constant encouragement paved way for the
successful completion of the work.
I would like to thank my internal guide Mrs. S. Anitha Angayarkanni,
Assistant Professor, Department of CSE, Meenakshi College of Engineering for her
constant supervision, advice and motivation.
I express my sincere thanks and deep sense of gratitude to my faculty members,
Non-teaching staffs and friends for their support and encouragement
iv
TABLE OF CONTENTS
CHAPTER NO
2.
TITLE
PAGE
NO
ABSTRACT
iii
LIST OF FIGURES
vii
LIST OF ABBREVIATIONS
viii
INTRODUCTION
1.1 Overview
1.5 Conclusion
SYSTEM ANALYSIS
stored in cloud
2.1.2 Outsourcing the Decryption of ABE
Cipher texts
2.1.3 DACC: Distributed Access Control in
Clouds
6
7
7
8
SYSTEM DESIGN
10
10
11
11
12
authority
3.2.4 Backup using proxy compression
technique
4.
5.
14
14
3.3 Conclusion
14
IMPLEMENTATION
15
15
15
15
17
4.5 Conclusion
17
CONCLUSION
23
APPENDIX
19
APPENDIX 1-SCREENSHOTS
19
vi
23
REFERENCES
27
LIST OF FIGURES
Figure No
Figure Name
Page No
1.1
Types Of Cloud
3.1
3.2
10
11
12
Fig.A1.1
19
Fig.A1.2
20
Fig.A1.3
21
Fig.A1.4
21
Fig.A1.5
22
vii
LIST OF ABBREVIATIONS
KDC
PK
Public Key
SK
Secret Key
AWS
IaaS
Infrastructure-as-a-Service
PaaS
Platform-as-a-Service
SaaS
Software-as-a-Service
NaaS
Network as a Service
Caas
Communication as a Service
viii