MCA PROJECT PRESENTATION KALAI SELVAN (1).pptx

SAJITHABANUS 11 views 41 slides Sep 25, 2024
Slide 1
Slide 1 of 41
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17
Slide 18
18
Slide 19
19
Slide 20
20
Slide 21
21
Slide 22
22
Slide 23
23
Slide 24
24
Slide 25
25
Slide 26
26
Slide 27
27
Slide 28
28
Slide 29
29
Slide 30
30
Slide 31
31
Slide 32
32
Slide 33
33
Slide 34
34
Slide 35
35
Slide 36
36
Slide 37
37
Slide 38
38
Slide 39
39
Slide 40
40
Slide 41
41

About This Presentation

ppt-project


Slide Content

On the security of Data access control for Multi authority cloud storage system Submitted by, K.Kalai selvan 911517621001 III MCA,MSEC, Kilakarai . Submitted to, Ms.S.Sajithabanu M.Tech.,(Ph.D)., Assistant Professor Dept.of MCA , MSEC,Kilakarai .

Abstract Data access control has becoming a challenging issue in cloud storage systems. Some techniques have been proposed to achieve the secure data access control in a semitrusted cloud storage system. In existing proposed a basic Data Access Control scheme for Multi Authority Cloud Storage system (DAC-MACS) and an Extensive Data Access Control Scheme (EDAC-MACS). I propose a new extensive DAC-MACS scheme (NEDAC-MACS) to withstand the above two attacks so as to guarantee more secure attribute revocatio n

Introduction Cloud computing can help enterprises improve the creation and delivery of IT solutions by providing them with access to services in a cost-effective and flexible manner. Clouds can be classified into three categories, depending on their accessibility restrictions and the deployment model. They are: Public Cloud Private Cloud Hybrid Cloud

Existing System DAC-MACS could achieve efficient decryption and immediate revocation and the EDAC-MACS could also achieve these goals even though non revoked users reveal their Key Update Keys to the revoked user. However, through our cryptanalysis, the revocation security of both schemes cannot be guaranteed .

Disadvantages First attack, the revoked user can eavesdrop to obtain other users Key Update Keys to update its Secret Key, and then it can obtain proper Token to decrypt any secret information as a non revoked user. In addition, by the second attack, the revoked user can intercept Cipher text Update Key to retrieve its ability to decrypt any secret information as a non revoked user.

Proposed System I propose a new extensive DAC-MACS scheme (NEDAC-MACS) to withstand the above two attacks so as to guarantee more secure attribute revocation. Then, formal cryptanalysis of NEDAC-MACS is presented to prove the security goals of the scheme. Finally, the performance comparison among NEDAC-MACS and related schemes is given to demonstrate that the performance of NEDAC-MACS is superior to that of DACC, and relatively same as that of DAC-MACS

Literature Survey Title Author Description Issues A survey on security issues in service delivery models of cloud computing S. Subashini Cloud Computing holds the potential to eliminate the requirements for setting up of high-cost computing infrastructure for the IT-based solutions and services that the industry uses . a survey of the different security risks that pose a threat to the cloud is presented. This paper is a survey more specific to the different security issues that has emanated due to the nature of the service delivery models of a cloud computing   system.

Literature Survey Title Author Description Issues DAC-MACS: Effective data access control for multi authority cloud storage systems K.Yang Data access control is an effective way to ensure the data security in the cloud. However, due to data outsourcing and untrusted cloud servers, the data access control becomes a challenging issue in cloud storage systems. DAC-MACS: Effective data access control for multi-authority cloud storage systems.

System Specification Software Requirements Operating System : Windows 7/8/10 Platform : Java Language Application Software : Net beans IDE Front End : Java Back End : MySQL

Hardware Requirements Processor : Core i3 RAM : 6 GB RAM Hard Disk : 250GB Hard Disk

Dataflow diagram Start Registration Key Generation Login & Verification Authentication File Uploading Cryptographic Process Stop Download

Use case diagram Register/Login Key Generation Download Verification Authentication File Uploading Cryptographic Process

System Architecture

Activity Diagram

Sequence Diagram

Modules 1.Intialization Of User 2.Key Generation 3.File Uploading To Cloud With (Key) 4.File Request 5.Multiauthority Verification With Key 6.File Download

Initialization of User In Initialization of User , user enter the personal information to register into application. After register the information , user can login into the process through the username and password.

Key Generation Secret key exposure can happen in this system model. An auditing protocol with key exposure resilience is composed by five algorithms (Sys Setup ,Key Update, Auth Gen, ProofGen, Proof Verify), Current security model considers the notion of the forward security and data possession property. The cloud is allowed to get the client’s secret key for cloud storage auditing .

File uploading to cloud with (key) In file uploading , after login into the account, user upload the file for cloud process. The client produces files and uploads these files along with corresponding authenticators to the cloud. The cloud stores these files for the client and provides download service if the client requires. Dynamic data operations for audit services are also attended in order to make auditing more flexible.

File Request The cloud stores these files for the client and provides download service if the client requires. Each file is further more divided into multiple blocks. For the simplicity of description, The client can periodically audit whether his files in cloud are correct.

Auditing the key and file and file download The client will update his secret keys for cloud storage auditing in the end of each time period, but the public key is always unchanged. The cloud is allowed to get the client’s secret key for cloud storage auditing in one certain time period. It means the secret key exposure can happen in this system model. The auditing protocol achieves key-exposure resilience while satisfying current efficiency requirements

SCREEN SHOTS

User login

User Registers For Cloud Storage

CA Login page

.

User Login

Activation Process

.

Active Process

TOTP

.

User Credentials

File upload process

Download file

Download

Conclusion we first give two attacks on DAC-MACS and EDAC-MACS for their backward revocation security. Then, a new effective data access control scheme for multi authority cloud storage systems (NEDAC-MACS) is proposed to withstand the two vulnerabilities and thus to enhance the revocation security. NEDACMACS can withstand the two vulnerabilities even though the non revoked users reveal their received key update keys to the revoked user. In NEDAC-MACS, the revoked user has no chance to decrypt any objective cipher text even if it actively eavesdrop to obtain an arbitrary number of non revoked users’ Key Update Keys KUK or collude with some non revoked users or obtain any transmitted information.

Future Enhancement This system is found tested and examined for its successful processing. Future change in the environment or processing can be easily adopted by having simple change in coding. It is very user friendly, cost effective, feature rich and it provides very high level of security evocation . The cloud does not know the identity of the user who stores information, but only verifies the user’s credentials. Key distribution is done in a decentralized way.

References K. Yang, X. Jia, and K. Ren, “DAC-MACS: Effective data access control for multi authority cloud storage systems,” IEEE Trans. Information Forensics and Security, vol. 8, no. 11, pp. 1790-1801, Nov. 2013 Ken Yang and Xiao Hua Jia , "Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage," IEEE Trans. Parallel and Distributed Systems, vol.25, no.7, pp.1735-1744, July 2014 A. Sahai and B. Waters, “Fuzzy identity-based encryption.

THANK YOU