SlideShare ist ein Scribd-Unternehmen logo
1 von 4
Downloaden Sie, um offline zu lesen
SHARED AUTHORITY BASED PRIVACY PRESERVING PROTOCOL
C. Pragna Bai1
, K. Kishore Kumar2
1
M.Tech., PG Scholar, Dept of CSE, Korm College of Engineering, Kadapa,Andhra Pradesh.
2
Assistant Professor, Dept of CSE,Korm College of Engineering, Kadapa, Andhra Pradesh.
Abstract- Cloud computing is emerging as a prevalent data
interactive paradigm to realize users’ data remotely stored in
an online cloud server. Cloud services provide great
conveniences for the users to enjoy the on-demand cloud
applications without considering the local infrastructure
limitations. During the data accessing, different users may be
in a collaborative relationship, and thus data sharing becomes
significant to achieve productive benefits. The existing security
solutions generally focus on authentication procedures where
a user’s private knowledge cannot be accessed without proper
authorization, however neglecting the privacy issue. This could
reveal user’s private information regardless of the information
access permissions being granted or not. Therefore, we can use
SAPA protocol in which shared access authority is achieved by
anonymous access request matching mechanism to handle the
privacy issue in cloud. Propose an authentication protocol to
enhance a user’s access request related privacy, and the shared
access authority is achieved by anonymous access request
matching mechanism. Apply cipher text-policy attribute based
access control to realize that a user can reliably access its own
data fields, and adopt the proxy re-encryption to provide temp
authorized data sharing among multiple users.
Keywords: Cloud computing, authorization authentication
protocol, security, privacy preservation, shared authority.
1.INTRODUCTION
Cloud computing is a popular IT architecture in the current trend,
which offers exclusive data storage with ondemand services and
network access round the clock. This architecture can be
witnessed as a service which could be software, infrastructure or
a platform available anytime anywhere for the users. Despite
being popular and powerful cloud computing faces downfall in
areas of privacy and security. Traditional approaches concentrate
on the authentication procedures to witness remote access of data
on demand. But eventually a user may want to access or share
data for better results, which in turn brings security and privacy
concerns in cloud storage. In order to overcome this, Shared
Authority based Privacy preserving Authentication protocol
(SAPA). This protocol is exclusively used for handling the
privacy issues in cloud storage. Shared access authority is
achieved by anonymous access request matching procedure with
four important attributes namely, User privacy, Authentication,
Forward Security and Anonymity [1].
User privacy is achieved when any unrelated user cannot wild
guess a user’s access interests. Only if they both possess a mutual
interest they will be allowed to share by the cloud server.
Authentication is achieved when a legal and registered user can
access his data and any other data cannot deceive him.
Anonymity is achieved when any unrelated entity cannot find out
the data transferred and communication state even by
interception through open communication channel. Forward
security is achieved when any miscreant cannot guess the previous
communications with the currently held data of any two sessions.
Attribute based access control is used to make sure that the users
can access only his data. Thus this protocol is well suited for multi-
user collaborative cloud applications since it does not compromise
the user’s private information.
An example is introduced to identify the main motivation. In the
cloud storage based supply chain management, there are various
interest groups (e.g., supplier, carrier, and retailer) in the system.
Each group owns its users which are permitted to access the
authorized data fields, and different users own relatively
independent access authorities. It means that any two users from
diverse groups should access different data fields of the same file.
There into, a supplier purposely may want to access a carrier’s data
fields, but it is not sure whether the carrier will allow its access
request. If the carrier refuses its request, the supplier’s access
desire will be revealed along with nothing obtained towards the
desired data fields. Actually, the supplier may not send the access
request or withdraw the unaccepted request in advance if it firmly
knows that its request will be refused by the carrier. It is
unreasonable to thoroughly disclose the supplier’s private
information without any privacy considerations. Fig. 1 illustrates
three revised cases to address above imperceptible privacy issue.
Securing Infrastructure as a Service The IaaS model lets users
lease compute, storage, network, and other resources in a
virtualized environment. The user doesn’t manage or control the
underlying cloud infrastructure but has control over the OS,
storage, deployed applications, and possibly certain networking
components. Amazon’s Elastic Compute Cloud (EC2) is a good
example of IaaS. At the cloud infrastructure level, CSPs can
enforce network security with intrusion-detection systems (IDSs),
firewalls, antivirus programs, distributed denial-of-service
(DDoS) defenses, and so on. Securing Platform as a Service
Cloud platforms are built on top of IaaS with system integration
and virtualization middleware support. Such platforms let users
deploy user-built software applications onto the cloud
infrastructure using provider-supported programming languages
and software tools
II LITERATURE SURVEY
Literature survey is the most important step in software
development process. Before developing the tool it is necessary to
determine the time factor, economy n company strength. Once
these things r satisfied, ten next steps are to determine which
operating systemand language can be used for developing the tool.
Once the programmers start building the tool the programmers
ISBN-13: 978-1537584836
www.iaetsd.in
Proceedings of ICAER-2016
©IAETSD 201611
need lot of external support. This support can be obtained from
senior programmers, from book or from websites. Before
building the system the above consideration are taken into
account for developing the proposed system. Implementation:
We have implemented our basic approach on Amazon S3 which
is a popular cloud based storage service. The content
management consists of two tasks. First, the Owner encrypts the
data item sets based on the access control policies and uploads
the encrypted sets along with some meta-data. Then, authorized
users download the encrypted data items sets and meta-data from
the Cloud , and decrypt the data item sets using the secrets they
have. Now we illustrate the interactions of the Owner with
Amazon S3 as the Cloud . In our implementation, we have used
the REST API to communicate with Amazon S3. Figure 2 shows
the overall involvement of the Owner in the user and content
management process when uploading the data item sets to
Amazon S3. While the fine-grained access control is enforced by
encrypting using the keys generated through the AB-GKM
scheme, it is important to limit the access to even the encrypted
data item sets in order to minimize the bandwidth utilization. We
associate a hash-based message authentication code (HMAC)
with each encrypted data item sets such that only the users having
valid identity attributes can produce matching HMACs.Initially
the Owner creates a bucket , which is a logical container in S3, to
store encrypted data item sets as objects . Subsequently, the
Owner executes the following steps:1. The Owner generates the
symmetric keys using the AB-GKM’s KeyGen algorithm and
instantiates an encryption client. Note that the Owner generates a
unique symmetric key for each policy configuration.
Trust and security have prevented businesses from fully
accepting cloud platforms. To protect clouds, providers must first
secure virtualized data center resources, uphold user privacy, and
preserve data integrity. The authors suggest using a trust-overlay
network over multiple data centers to implement a reputation
system for establishing trust between service providers and data
owners. Data coloring and software watermarking techniques
protect shared data objects and massively distributed software
modules. These techniques safeguard multi-way authentications,
enable single sign-on in the cloud, and tighten access control for
sensitive data in both public and private clouds.
III. RELATED WORK
In [2] ENISA has proposed that “Complexity of risk
evaluation” is one of the major privacy challenges in cloud
computing. The complexity of the services gives rise to a
number of unidentified parameters. Service consumers and
providers are careful while providing and consuming services.
The real challenge encountered in this scenario is checking the
lifecycle of data processing and its conformity with officially
authorized frameworks. Some of the following questions are
needed to be answered in order to find the risks to privacy:
Who are the stakeholders involved?, Where the data is
stored?, How data is duplicated?, What are the stakeholder
roles and responsibilities?, What are the rules for data
processing?, How the service provider will reach the desired
level of privacy and security? They have suggested that every
user can have an apparent policy as how to the personal data
is to be processed and the stakeholders have to specify the
needs for cloud that meet the desired level of privacy. ENISA
in Europe suggest understanding the shift in balance in terms
of accountability and responsibility in key functions and
conformity with the laws [2]. In [3] authors suggest that
developing and implementing proactive strategies or measures
to promote better compliance with the laws of privacy
regarding the personal data processing. This can be done
through procedures that detect and prevent breaches in systems.
Literally, there is no accepted definition for PETs, but in
general we can consider technologies with the following
qualities are PETs, reduce privacy risks, data held about the
users are minimal, allow the users to have control over their
information. Therefore, by implementing the PETs the
requirements of the proactive measures could be met. And they
can protect the privacy over the personal data and prevent from
undesired processing. These PETs include tools like
anonymisation, encryption, pseudonymisation, transparency
enhancing tools. In [4] authors have proposed that “Client
Based Privacy Manager” helps in reducing the data leakage and
loss of privacy of the sensitive data. Some the major
characteristics of the privacy managers are:
Data Access: The Manager contains a separate module for
accessing personal information by the users in the cloud. This
is an auditing procedure that checks accuracy and privacy
violations.
Obfuscation: This is done by the users on the required fields
before being sent to the cloud using a user chosen key that the
service providers are not known of. Feedback: This module
keeps track of the data being transferred and data usage.
Preference Setting: Allows the users to set preferences over
their data thereby giving greater control. The major advantage
is that it solves automation and end user problems. The
disadvantages are, it requires full co-operation of the service
provider and sufficient computing resources for obfuscation. In
[5] authors have proposed that for Anonymous data sharing
between the parties an algorithm is developed to generate ID
numbers ranging from 1 to N. And the assignment of these ID’s
is anonymous so that the members do not know about it and
maximum care is taken to avoid collisions. These procedures
are carried out without a trusted third party. Newton’s identities
and strum theorem to develop secure sum. Usage of finite
polynomials enhances scalability and Markov chain finds the
required number of iterations. In [6] authors have proposed that
in recent years, the number of mobile users in the society has
risen dramatically. The privacy aware authentication scheme
provides security and flexibility to the users to make use of
various cloud services from various providers using a single
private key. A bilinear pairing cryptosystem and nonce
generation is used to enhance the security strength of the
scheme. In addition to it, it also provides user intractability,
mutual authentication, exchange of keys, anonymity and so on.
This scheme reduces the memory space usage on the respective
cloud service providers. The Smart card Generator serves as the
key distributor for providers and mobile clients or users. Also,
the scheme does not involve the SCG service in the user
authentication procedure. It also reduces the processing time of
the authentication process in terms of computation between
providers and TTP. Formal Performance analysis tasks are
conducted and the scheme is found to be efficient and secure.
In [7] authors have suggested that du e to the growing Security
needs in the world the mentioned security algorithms have been
surveyed and it is found that each has its own pros and cons.
But, out of them AES algorithm is found to be efficient. Some
of the Advantages are more secure, supports larger key size,
faster in terms of hardware and software, 128-bit key size
makes it less prone to attacks, suitable for cloud. Some of the
ISBN-13: 978-1537584836
www.iaetsd.in
Proceedings of ICAER-2016
©IAETSD 201612
Disadvantages of other algorithms are less secure, slow in
terms of speed, small and medium key size. In [8] authors
have suggested that due to the growth of cloud, security has
become a vital part of cloud computing. Malicious activities
and vulnerabilities are inevitable. The key purpose is to verify
if AES provides better security than other
algorithms. By implementing it, it is witnessed that it provides
less memory consumption and computation time. Some of the
Advantages are high performance, speedy key setup, key
agility, less memory, instruction level parallelism, no
cryptanalysis attacks have been proved. On comparing with
other algorithms, AES eliminates weak keys, which is found
is DES. During performance analysis it is found that AES has
an advantage over other algorithms in terms of execution time
[9]. Also over RC2, RC6 and blowfish with time consumption
[10].
IV.PROPOSEDWORK
The existing security solutions generally concentrates over the
authentication procedures which implies a user’s private
information cannot be accessed without proper authorization,
while neglecting privacy issue during the data sharing. During
the information accessing, different users can be in a mutual
relationship which stresses on the importance of knowledge
sharing in order to attain better performance. Due to
mentioned privacy issue, the user’s private information could
be revealed regardless the access permission being granted or
not. In a cloud storage based supply chain management, there
will be various interest groups in the system.
Each group has its own users who are permitted to access the
authorized data fields, and different users own relatively
independent access authorities. It means that any two users
from diverse groups should access different data fields of the
same file. For instance, consider two groups G1 and G2, if a
user from G1 requests data from the user in G2, and if his
request is rejected, the user’s access desire will be revealed
along with nothing obtained towards the desired data fields. A
user may not send the access request or withdraw the
unaccepted request in advance if he firmly knows that his
request will be rejected. Therefore, it is unreasonable to
thoroughly disclose a user’s private information without any
privacy considerations. In order to overcome the privacy issue
“shared authority based privacy preserving authentication”
protocol (SAPA) can be used for the cloud data storage, which
realizes authentication and authorization
without compromising a user’s private information.
Identifies a new privacy challenge in cloud storage, and
address a subtle privacy issue during a user challenging the
cloud server for data sharing, in which the challenged request
itself cannot reveal the user’s privacy no matter whether or not
it can obtain the access authority. And proposes an
authentication protocol to enhance a user’s access request
related privacy, and the shared access authority is achieved by
anonymous access request matching mechanism. Encryption
techniques are used to provide authorized data sharing among
multiple users. Shared authority is achieved by anonymous
request matching mechanism without compromising the
privacy. Also, attribute based access is used to allow only
authorized users to request information and proxy
reencryption is applied by the cloud server to allow
knowledge sharing among the multiple users. In order to
witness the SAPA protocol we have developed a simple “e-
library management system”. And we have hosted this system
on to the Azure cloud and have realized the efficient working
of SAPA.
IVMETHODOLOGY
In this paper, we address the aforementioned privacy issue to
propose a shared authority based privacy preserving
authentication protocol (SAPA) for the cloud data storage,
which realizes authentication and authorization without
compromising a user’s private information. The main
contributions are as follows.
 Identify a new privacy challenge in cloud storage, and
address a subtle privacy issue during a user challenging the
cloud server for data sharing, in which the challenged
request itself cannot reveal the user’s privacy no matter
whether or not it can obtain the access authority.
 Propose an authentication protocol to enhance a user’s
access request related privacy, and the shared access
authority is achieved by anonymous access request
matching mechanism.
 Apply cipher text-policy attribute based access control to
realize that a user can reliably access its own data fields,
and adopt the proxy re-encryption to provide temp
authorized data sharing among multiple users.
 Advantages Of Proposed System:
 The scheme allows users to audit the cloud storage with
lightweight communication overloads and computation
cost, and the auditing result ensures strong cloud storage
correctness and fast data error localization.
 During cloud data accessing, the user autonomously
interacts with the cloud server without external
interferences and is assigned with the full and independent
authority on its own data fields.
Identify a new privacy challenge in cloud storage, and address
a subtle privacy issue during a user challenging the cloud
server for data sharing, in which the challenged request itself
cannot reveal the user’s privacy no matter whether or not it
can obtain the access authority. Propose an authentication
protocol to enhance a user’s access request related privacy,
and the shared access authority is achieved by anonymous
access request matching mechanism. Apply cipher text-policy
attribute based access control to realize that a user can reliably
access its own data fields, and adopt the proxy re-encryption
to provide temp authorized data sharing among multiple users.
Fig 1: System Architecture
Implementation is the stage of the project when the theoretical
design is turned out into a working system. Thus it can be
considered to be the most critical stage in achieving a
successful new system and in giving the user, confidence that
ISBN-13: 978-1537584836
www.iaetsd.in
Proceedings of ICAER-2016
©IAETSD 201613
the new system will work and be effective. The
implementation stage involves careful planning,
investigation of the existing system and it’s constraints on
implementation, designing of methods to achieve
changeover and evaluation of changeover methods.
Implementation is the process of converting a new system
design into operation. It is the phase that focuses on user
training, site preparation and file conversion for installing a
candidate system. The important factor that should be
considered here is that the conversion should not disrupt the
functioning of the organization.
IV. CONCLUSION
In this work, we have identified a new privacy challenge
during data accessing in the cloud computing to achieve
privacy-preserving access authority sharing. Authentication is
established to guarantee data confidentiality and data
integrity. Data anonymity is achieved since the wrapped
values are exchanged during transmission. User privacy is
enhanced by anonymous access requests to privately inform
the cloud server about the users’ access desires. Forward
security is realized by the session identifiers to prevent the
session correlation. It indicates that the proposed scheme is
possibly applied for enhanced privacy preservation in cloud
applications.
REFERENCE
[1] J. Bethencourt, A. Sahai, and B. Waters. Ciphertext-policy
attribute-based encryption. In SP 2007: Proceedings of the
28th IEEE Symposium on Security and Privacy, pages 321–
334, 2007.
[2] J. Camenisch, M. Dubovitskaya, R. R. Enderlein, and G.
Neven. Oblivious transfer with hidden access control from
attribute-based encryption. In SCN 2012: Proceedings of the
8th International Conference on Security and Cryptography
for Networks, pages 559–579, 2012.
[3] D. Halevy and A. Shamir. The LSD broadcast encryption
scheme. In CRYPTO 2001: Proceedings of the 22nd Annual
International Cryptology Conference on Advances in
Cryptology, pages 47–60, 2002.
[4] J. Li and N. Li. OACerts: Oblivious attribute certificates.
IEEE Transactions on Dependable and Secure Computing,
3(4):340–352, 2006.
[5] M. Nabeel and E. Bertino. Towards attribute based group
key management. In CCS 2011: Proceedings of the 18th ACM
conference on Computer and communications security, 2011.
[6] M. Nabeel, N. Shang, and E. Bertino. Privacy preserving
policy based content sharing in public clouds. IEEE
Transactions on Knowledge and Data Engineering, 99, 2012.
[7] OpenID. http://openid.net/ [Last accessed: Oct. 14, 2012].
[8] T. Pedersen. Non-interactive and information-theoretic
secure verifiable secret sharing. In CRYPTO 1991:
Proceedings of the 11th Annual International Cryptology
Conference on Advances in Cryptology, pages 129–140,
1992.
[9] N. Shang, M. Nabeel, F. Paci, and E. Bertino. A privacy-
preserving approach to policy-based content dissemination. In
ICDE 2010: Proceedings of the 2010 IEEE 26th International
Conference on Data Engineering, 2010.
[10] S. Yu, C. Wang, K. Ren, and W. Lou. Attribute based data
sharing with attribute revocation. In ASIACCS 2010:
Proceedings of the 5th ACM Symposium on Information,
Computer and Communications Security, pages 261–270,
2010.
[11] S. Yu, C. Wang, K. Ren, and W. Lou. Achieving secure,
scalable, and fine-grained data access control in cloud
computing. In INFOCOM 2010: Proceedings of the 29th
conference on Information communications, pages 534–542,
2010.
[12] C. Collberg and C. Thomborson, ―Watermarking,
Tamper-Proofing, and Obfuscation-Tools for Software
Protection,‖ IEEE Trans. Software Eng., vol. 28, 2002, pp.
735–746.
[13] D. Li, C. Liu, and W. Gan, ―A New Cognitive Model:
Cloud Model,‖ Int’l J. Intelligent Systems, Mar. 2009, pp. 357–
375.
[14] D. Li and Y. Du, Artificial Intelligence with Uncertainty,
Chapman & Hall, 2008.
ISBN-13: 978-1537584836
www.iaetsd.in
Proceedings of ICAER-2016
©IAETSD 201614

Weitere ähnliche Inhalte

Was ist angesagt?

A study on security issues in cloud based e learning
A study on security issues in cloud based e learningA study on security issues in cloud based e learning
A study on security issues in cloud based e learningManimaran A
 
Augmenting Publish/Subscribe System by Identity Based Encryption (IBE) Techni...
Augmenting Publish/Subscribe System by Identity Based Encryption (IBE) Techni...Augmenting Publish/Subscribe System by Identity Based Encryption (IBE) Techni...
Augmenting Publish/Subscribe System by Identity Based Encryption (IBE) Techni...IJCERT JOURNAL
 
Shared authority based privacy preserving authentication protocol in cloud co...
Shared authority based privacy preserving authentication protocol in cloud co...Shared authority based privacy preserving authentication protocol in cloud co...
Shared authority based privacy preserving authentication protocol in cloud co...Pvrtechnologies Nellore
 
SHARED AUTHORITY BASED PRIVACY-PRESERVING AUTHENTICATION PROTOCOL IN CLOUD CO...
SHARED AUTHORITY BASED PRIVACY-PRESERVING AUTHENTICATION PROTOCOL IN CLOUD CO...SHARED AUTHORITY BASED PRIVACY-PRESERVING AUTHENTICATION PROTOCOL IN CLOUD CO...
SHARED AUTHORITY BASED PRIVACY-PRESERVING AUTHENTICATION PROTOCOL IN CLOUD CO...I3E Technologies
 
5.[40 44]enhancing security in cloud computing
5.[40 44]enhancing security in cloud computing5.[40 44]enhancing security in cloud computing
5.[40 44]enhancing security in cloud computingAlexander Decker
 
A Survey on Different Techniques Used in Decentralized Cloud Computing
A Survey on Different Techniques Used in Decentralized Cloud ComputingA Survey on Different Techniques Used in Decentralized Cloud Computing
A Survey on Different Techniques Used in Decentralized Cloud ComputingEditor IJCATR
 
Attribute-Based Data Sharing
Attribute-Based Data SharingAttribute-Based Data Sharing
Attribute-Based Data SharingIJERA Editor
 
Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Co...
Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Co...Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Co...
Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Co...Migrant Systems
 
A Novel Information Accountability Framework for Cloud Computing
A Novel Information Accountability Framework for Cloud ComputingA Novel Information Accountability Framework for Cloud Computing
A Novel Information Accountability Framework for Cloud ComputingIJMER
 
IRJET- Security Enhancement for Sharing Data within Group Members in Cloud
IRJET- Security Enhancement for Sharing Data within Group Members in CloudIRJET- Security Enhancement for Sharing Data within Group Members in Cloud
IRJET- Security Enhancement for Sharing Data within Group Members in CloudIRJET Journal
 
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...IJNSA Journal
 
Shared authority based privacy preserving authentication protocol in cloud co...
Shared authority based privacy preserving authentication protocol in cloud co...Shared authority based privacy preserving authentication protocol in cloud co...
Shared authority based privacy preserving authentication protocol in cloud co...Papitha Velumani
 
Cloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkCloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkIDES Editor
 
Public integrity auditing for shared dynamic cloud data with group user revoc...
Public integrity auditing for shared dynamic cloud data with group user revoc...Public integrity auditing for shared dynamic cloud data with group user revoc...
Public integrity auditing for shared dynamic cloud data with group user revoc...Pvrtechnologies Nellore
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
Carrying out safe exploration short of the actual data of codes and trapdoors
Carrying out safe exploration short of the actual data of codes and trapdoorsCarrying out safe exploration short of the actual data of codes and trapdoors
Carrying out safe exploration short of the actual data of codes and trapdoorsIaetsd Iaetsd
 

Was ist angesagt? (19)

A study on security issues in cloud based e learning
A study on security issues in cloud based e learningA study on security issues in cloud based e learning
A study on security issues in cloud based e learning
 
Augmenting Publish/Subscribe System by Identity Based Encryption (IBE) Techni...
Augmenting Publish/Subscribe System by Identity Based Encryption (IBE) Techni...Augmenting Publish/Subscribe System by Identity Based Encryption (IBE) Techni...
Augmenting Publish/Subscribe System by Identity Based Encryption (IBE) Techni...
 
Shared authority based privacy preserving authentication protocol in cloud co...
Shared authority based privacy preserving authentication protocol in cloud co...Shared authority based privacy preserving authentication protocol in cloud co...
Shared authority based privacy preserving authentication protocol in cloud co...
 
SHARED AUTHORITY BASED PRIVACY-PRESERVING AUTHENTICATION PROTOCOL IN CLOUD CO...
SHARED AUTHORITY BASED PRIVACY-PRESERVING AUTHENTICATION PROTOCOL IN CLOUD CO...SHARED AUTHORITY BASED PRIVACY-PRESERVING AUTHENTICATION PROTOCOL IN CLOUD CO...
SHARED AUTHORITY BASED PRIVACY-PRESERVING AUTHENTICATION PROTOCOL IN CLOUD CO...
 
5.[40 44]enhancing security in cloud computing
5.[40 44]enhancing security in cloud computing5.[40 44]enhancing security in cloud computing
5.[40 44]enhancing security in cloud computing
 
A Survey on Different Techniques Used in Decentralized Cloud Computing
A Survey on Different Techniques Used in Decentralized Cloud ComputingA Survey on Different Techniques Used in Decentralized Cloud Computing
A Survey on Different Techniques Used in Decentralized Cloud Computing
 
Attribute-Based Data Sharing
Attribute-Based Data SharingAttribute-Based Data Sharing
Attribute-Based Data Sharing
 
Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Co...
Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Co...Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Co...
Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Co...
 
A Novel Information Accountability Framework for Cloud Computing
A Novel Information Accountability Framework for Cloud ComputingA Novel Information Accountability Framework for Cloud Computing
A Novel Information Accountability Framework for Cloud Computing
 
IRJET- Security Enhancement for Sharing Data within Group Members in Cloud
IRJET- Security Enhancement for Sharing Data within Group Members in CloudIRJET- Security Enhancement for Sharing Data within Group Members in Cloud
IRJET- Security Enhancement for Sharing Data within Group Members in Cloud
 
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
 
Shared authority based privacy preserving authentication protocol in cloud co...
Shared authority based privacy preserving authentication protocol in cloud co...Shared authority based privacy preserving authentication protocol in cloud co...
Shared authority based privacy preserving authentication protocol in cloud co...
 
Cloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkCloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability Framework
 
Public integrity auditing for shared dynamic cloud data with group user revoc...
Public integrity auditing for shared dynamic cloud data with group user revoc...Public integrity auditing for shared dynamic cloud data with group user revoc...
Public integrity auditing for shared dynamic cloud data with group user revoc...
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
Carrying out safe exploration short of the actual data of codes and trapdoors
Carrying out safe exploration short of the actual data of codes and trapdoorsCarrying out safe exploration short of the actual data of codes and trapdoors
Carrying out safe exploration short of the actual data of codes and trapdoors
 
Cloud Security Mechanisms
Cloud Security MechanismsCloud Security Mechanisms
Cloud Security Mechanisms
 
I42024349
I42024349I42024349
I42024349
 
J018145862
J018145862J018145862
J018145862
 

Andere mochten auch

High efficient carry skip adder in various multiplier structures
High efficient carry skip adder in various multiplier structuresHigh efficient carry skip adder in various multiplier structures
High efficient carry skip adder in various multiplier structuresIaetsd Iaetsd
 
Iaetsd finger print recognition by cordic algorithm and pipelined fft
Iaetsd finger print recognition by cordic algorithm and pipelined fftIaetsd finger print recognition by cordic algorithm and pipelined fft
Iaetsd finger print recognition by cordic algorithm and pipelined fftIaetsd Iaetsd
 
Iirdem experimental investigation on self compacting fiber reinforced concret...
Iirdem experimental investigation on self compacting fiber reinforced concret...Iirdem experimental investigation on self compacting fiber reinforced concret...
Iirdem experimental investigation on self compacting fiber reinforced concret...Iaetsd Iaetsd
 
iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...
iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...
iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...Iaetsd Iaetsd
 
Iirdem design and analysis of a smart helmet gsm based system against drunken...
Iirdem design and analysis of a smart helmet gsm based system against drunken...Iirdem design and analysis of a smart helmet gsm based system against drunken...
Iirdem design and analysis of a smart helmet gsm based system against drunken...Iaetsd Iaetsd
 
Improving thrpoughput and energy efficiency by pctar protocol in wireless
Improving thrpoughput and energy efficiency by pctar protocol in wirelessImproving thrpoughput and energy efficiency by pctar protocol in wireless
Improving thrpoughput and energy efficiency by pctar protocol in wirelessIaetsd Iaetsd
 
iirdem Surveillance aided robotic bird
iirdem Surveillance aided robotic birdiirdem Surveillance aided robotic bird
iirdem Surveillance aided robotic birdIaetsd Iaetsd
 
iirdem Growing India Time Monopoly – The Key to Initiate Long Term Rapid Growth
iirdem Growing India Time Monopoly – The Key to Initiate Long Term Rapid Growthiirdem Growing India Time Monopoly – The Key to Initiate Long Term Rapid Growth
iirdem Growing India Time Monopoly – The Key to Initiate Long Term Rapid GrowthIaetsd Iaetsd
 
iaetsdv Blue eyes a revolution
iaetsdv Blue eyes   a revolutioniaetsdv Blue eyes   a revolution
iaetsdv Blue eyes a revolutionIaetsd Iaetsd
 
iaetsd Controlling data deuplication in cloud storage
iaetsd Controlling data deuplication in cloud storageiaetsd Controlling data deuplication in cloud storage
iaetsd Controlling data deuplication in cloud storageIaetsd Iaetsd
 
Iaetsd low power flip flops for vlsi applications
Iaetsd low power flip flops for vlsi applicationsIaetsd low power flip flops for vlsi applications
Iaetsd low power flip flops for vlsi applicationsIaetsd Iaetsd
 
Iaetsd study on optimum utilization of sludge from sewage treatment plants
Iaetsd study on optimum utilization of sludge from sewage treatment plantsIaetsd study on optimum utilization of sludge from sewage treatment plants
Iaetsd study on optimum utilization of sludge from sewage treatment plantsIaetsd Iaetsd
 
Proximate and ultimate analysis of cotton pod used in the updraft gasifier
Proximate and ultimate analysis of cotton pod used in the updraft gasifierProximate and ultimate analysis of cotton pod used in the updraft gasifier
Proximate and ultimate analysis of cotton pod used in the updraft gasifierIaetsd Iaetsd
 
Iaetsd modelling and controller design of cart inverted pendulum system using...
Iaetsd modelling and controller design of cart inverted pendulum system using...Iaetsd modelling and controller design of cart inverted pendulum system using...
Iaetsd modelling and controller design of cart inverted pendulum system using...Iaetsd Iaetsd
 
Iirdem performance enhancement of vapour compression refrigeration system by ...
Iirdem performance enhancement of vapour compression refrigeration system by ...Iirdem performance enhancement of vapour compression refrigeration system by ...
Iirdem performance enhancement of vapour compression refrigeration system by ...Iaetsd Iaetsd
 
Iaetsd wireless electronic notice board using gsm
Iaetsd wireless electronic notice board using gsmIaetsd wireless electronic notice board using gsm
Iaetsd wireless electronic notice board using gsmIaetsd Iaetsd
 
Iaetsd extending sensor networks into the cloud using tpss and lbss
Iaetsd extending sensor networks into the cloud using tpss and lbssIaetsd extending sensor networks into the cloud using tpss and lbss
Iaetsd extending sensor networks into the cloud using tpss and lbssIaetsd Iaetsd
 
Iaetsd io t of bridges
Iaetsd io t of bridgesIaetsd io t of bridges
Iaetsd io t of bridgesIaetsd Iaetsd
 
Iaetsd vlsi architecture of fm0 manchester encoding using sols technique for ...
Iaetsd vlsi architecture of fm0 manchester encoding using sols technique for ...Iaetsd vlsi architecture of fm0 manchester encoding using sols technique for ...
Iaetsd vlsi architecture of fm0 manchester encoding using sols technique for ...Iaetsd Iaetsd
 

Andere mochten auch (19)

High efficient carry skip adder in various multiplier structures
High efficient carry skip adder in various multiplier structuresHigh efficient carry skip adder in various multiplier structures
High efficient carry skip adder in various multiplier structures
 
Iaetsd finger print recognition by cordic algorithm and pipelined fft
Iaetsd finger print recognition by cordic algorithm and pipelined fftIaetsd finger print recognition by cordic algorithm and pipelined fft
Iaetsd finger print recognition by cordic algorithm and pipelined fft
 
Iirdem experimental investigation on self compacting fiber reinforced concret...
Iirdem experimental investigation on self compacting fiber reinforced concret...Iirdem experimental investigation on self compacting fiber reinforced concret...
Iirdem experimental investigation on self compacting fiber reinforced concret...
 
iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...
iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...
iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...
 
Iirdem design and analysis of a smart helmet gsm based system against drunken...
Iirdem design and analysis of a smart helmet gsm based system against drunken...Iirdem design and analysis of a smart helmet gsm based system against drunken...
Iirdem design and analysis of a smart helmet gsm based system against drunken...
 
Improving thrpoughput and energy efficiency by pctar protocol in wireless
Improving thrpoughput and energy efficiency by pctar protocol in wirelessImproving thrpoughput and energy efficiency by pctar protocol in wireless
Improving thrpoughput and energy efficiency by pctar protocol in wireless
 
iirdem Surveillance aided robotic bird
iirdem Surveillance aided robotic birdiirdem Surveillance aided robotic bird
iirdem Surveillance aided robotic bird
 
iirdem Growing India Time Monopoly – The Key to Initiate Long Term Rapid Growth
iirdem Growing India Time Monopoly – The Key to Initiate Long Term Rapid Growthiirdem Growing India Time Monopoly – The Key to Initiate Long Term Rapid Growth
iirdem Growing India Time Monopoly – The Key to Initiate Long Term Rapid Growth
 
iaetsdv Blue eyes a revolution
iaetsdv Blue eyes   a revolutioniaetsdv Blue eyes   a revolution
iaetsdv Blue eyes a revolution
 
iaetsd Controlling data deuplication in cloud storage
iaetsd Controlling data deuplication in cloud storageiaetsd Controlling data deuplication in cloud storage
iaetsd Controlling data deuplication in cloud storage
 
Iaetsd low power flip flops for vlsi applications
Iaetsd low power flip flops for vlsi applicationsIaetsd low power flip flops for vlsi applications
Iaetsd low power flip flops for vlsi applications
 
Iaetsd study on optimum utilization of sludge from sewage treatment plants
Iaetsd study on optimum utilization of sludge from sewage treatment plantsIaetsd study on optimum utilization of sludge from sewage treatment plants
Iaetsd study on optimum utilization of sludge from sewage treatment plants
 
Proximate and ultimate analysis of cotton pod used in the updraft gasifier
Proximate and ultimate analysis of cotton pod used in the updraft gasifierProximate and ultimate analysis of cotton pod used in the updraft gasifier
Proximate and ultimate analysis of cotton pod used in the updraft gasifier
 
Iaetsd modelling and controller design of cart inverted pendulum system using...
Iaetsd modelling and controller design of cart inverted pendulum system using...Iaetsd modelling and controller design of cart inverted pendulum system using...
Iaetsd modelling and controller design of cart inverted pendulum system using...
 
Iirdem performance enhancement of vapour compression refrigeration system by ...
Iirdem performance enhancement of vapour compression refrigeration system by ...Iirdem performance enhancement of vapour compression refrigeration system by ...
Iirdem performance enhancement of vapour compression refrigeration system by ...
 
Iaetsd wireless electronic notice board using gsm
Iaetsd wireless electronic notice board using gsmIaetsd wireless electronic notice board using gsm
Iaetsd wireless electronic notice board using gsm
 
Iaetsd extending sensor networks into the cloud using tpss and lbss
Iaetsd extending sensor networks into the cloud using tpss and lbssIaetsd extending sensor networks into the cloud using tpss and lbss
Iaetsd extending sensor networks into the cloud using tpss and lbss
 
Iaetsd io t of bridges
Iaetsd io t of bridgesIaetsd io t of bridges
Iaetsd io t of bridges
 
Iaetsd vlsi architecture of fm0 manchester encoding using sols technique for ...
Iaetsd vlsi architecture of fm0 manchester encoding using sols technique for ...Iaetsd vlsi architecture of fm0 manchester encoding using sols technique for ...
Iaetsd vlsi architecture of fm0 manchester encoding using sols technique for ...
 

Ähnlich wie iaetsd Shared authority based privacy preserving protocol

Secure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted CloudSecure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted CloudIJERA Editor
 
A cloud storage system for sharing data securely with privacy preservation an...
A cloud storage system for sharing data securely with privacy preservation an...A cloud storage system for sharing data securely with privacy preservation an...
A cloud storage system for sharing data securely with privacy preservation an...eSAT Journals
 
Security for Effective Data Storage in Multi Clouds
Security for Effective Data Storage in Multi CloudsSecurity for Effective Data Storage in Multi Clouds
Security for Effective Data Storage in Multi CloudsEditor IJCATR
 
Security Check in Cloud Computing through Third Party Auditor
Security Check in Cloud Computing through Third Party AuditorSecurity Check in Cloud Computing through Third Party Auditor
Security Check in Cloud Computing through Third Party Auditorijsrd.com
 
Paper id 212014106
Paper id 212014106Paper id 212014106
Paper id 212014106IJRAT
 
Security threats in cloud computing
Security threats  in cloud computingSecurity threats  in cloud computing
Security threats in cloud computingPuneet Arora
 
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage SecurityEnhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage SecurityEditor IJMTER
 
Insuring Security for Outsourced Data Stored in Cloud Environment
Insuring Security for Outsourced Data Stored in Cloud EnvironmentInsuring Security for Outsourced Data Stored in Cloud Environment
Insuring Security for Outsourced Data Stored in Cloud EnvironmentEditor IJCATR
 
Ieeepro techno solutions 2011 ieee dotnet project -secure role based data
Ieeepro techno solutions   2011 ieee dotnet project -secure role based dataIeeepro techno solutions   2011 ieee dotnet project -secure role based data
Ieeepro techno solutions 2011 ieee dotnet project -secure role based dataASAITHAMBIRAJAA
 
An efficient and secure data storage in cloud computing using modified RSA pu...
An efficient and secure data storage in cloud computing using modified RSA pu...An efficient and secure data storage in cloud computing using modified RSA pu...
An efficient and secure data storage in cloud computing using modified RSA pu...IJECEIAES
 
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generationImprove HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generationEditor IJMTER
 
Data Stream Controller for Enterprise Cloud Application
Data Stream Controller for Enterprise Cloud ApplicationData Stream Controller for Enterprise Cloud Application
Data Stream Controller for Enterprise Cloud ApplicationIJSRD
 
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...IJCNCJournal
 
ENHANCING SECURITY IN CLOUD COMPUTING BY COMBINING DYNAMIC BROADCAST ENCRYPTI...
ENHANCING SECURITY IN CLOUD COMPUTING BY COMBINING DYNAMIC BROADCAST ENCRYPTI...ENHANCING SECURITY IN CLOUD COMPUTING BY COMBINING DYNAMIC BROADCAST ENCRYPTI...
ENHANCING SECURITY IN CLOUD COMPUTING BY COMBINING DYNAMIC BROADCAST ENCRYPTI...pharmaindexing
 
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...Editor IJCATR
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) ijceronline
 
Preserving Privacy Policy- Preserving public auditing for data in the cloud
	Preserving Privacy Policy- Preserving public auditing for data in the cloud	Preserving Privacy Policy- Preserving public auditing for data in the cloud
Preserving Privacy Policy- Preserving public auditing for data in the cloudinventionjournals
 
Accountability in Distributed Environment For Data Sharing in the Cloud
Accountability in Distributed Environment For Data Sharing in the CloudAccountability in Distributed Environment For Data Sharing in the Cloud
Accountability in Distributed Environment For Data Sharing in the CloudEditor IJCATR
 

Ähnlich wie iaetsd Shared authority based privacy preserving protocol (20)

Secure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted CloudSecure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted Cloud
 
A cloud storage system for sharing data securely with privacy preservation an...
A cloud storage system for sharing data securely with privacy preservation an...A cloud storage system for sharing data securely with privacy preservation an...
A cloud storage system for sharing data securely with privacy preservation an...
 
Security for Effective Data Storage in Multi Clouds
Security for Effective Data Storage in Multi CloudsSecurity for Effective Data Storage in Multi Clouds
Security for Effective Data Storage in Multi Clouds
 
Security Check in Cloud Computing through Third Party Auditor
Security Check in Cloud Computing through Third Party AuditorSecurity Check in Cloud Computing through Third Party Auditor
Security Check in Cloud Computing through Third Party Auditor
 
Paper id 212014106
Paper id 212014106Paper id 212014106
Paper id 212014106
 
Security threats in cloud computing
Security threats  in cloud computingSecurity threats  in cloud computing
Security threats in cloud computing
 
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage SecurityEnhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
 
Insuring Security for Outsourced Data Stored in Cloud Environment
Insuring Security for Outsourced Data Stored in Cloud EnvironmentInsuring Security for Outsourced Data Stored in Cloud Environment
Insuring Security for Outsourced Data Stored in Cloud Environment
 
Ieeepro techno solutions 2011 ieee dotnet project -secure role based data
Ieeepro techno solutions   2011 ieee dotnet project -secure role based dataIeeepro techno solutions   2011 ieee dotnet project -secure role based data
Ieeepro techno solutions 2011 ieee dotnet project -secure role based data
 
An efficient and secure data storage in cloud computing using modified RSA pu...
An efficient and secure data storage in cloud computing using modified RSA pu...An efficient and secure data storage in cloud computing using modified RSA pu...
An efficient and secure data storage in cloud computing using modified RSA pu...
 
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generationImprove HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
 
Data Stream Controller for Enterprise Cloud Application
Data Stream Controller for Enterprise Cloud ApplicationData Stream Controller for Enterprise Cloud Application
Data Stream Controller for Enterprise Cloud Application
 
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...
 
1784 1788
1784 17881784 1788
1784 1788
 
1784 1788
1784 17881784 1788
1784 1788
 
ENHANCING SECURITY IN CLOUD COMPUTING BY COMBINING DYNAMIC BROADCAST ENCRYPTI...
ENHANCING SECURITY IN CLOUD COMPUTING BY COMBINING DYNAMIC BROADCAST ENCRYPTI...ENHANCING SECURITY IN CLOUD COMPUTING BY COMBINING DYNAMIC BROADCAST ENCRYPTI...
ENHANCING SECURITY IN CLOUD COMPUTING BY COMBINING DYNAMIC BROADCAST ENCRYPTI...
 
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Preserving Privacy Policy- Preserving public auditing for data in the cloud
	Preserving Privacy Policy- Preserving public auditing for data in the cloud	Preserving Privacy Policy- Preserving public auditing for data in the cloud
Preserving Privacy Policy- Preserving public auditing for data in the cloud
 
Accountability in Distributed Environment For Data Sharing in the Cloud
Accountability in Distributed Environment For Data Sharing in the CloudAccountability in Distributed Environment For Data Sharing in the Cloud
Accountability in Distributed Environment For Data Sharing in the Cloud
 

Mehr von Iaetsd Iaetsd

iaetsd Survey on cooperative relay based data transmission
iaetsd Survey on cooperative relay based data transmissioniaetsd Survey on cooperative relay based data transmission
iaetsd Survey on cooperative relay based data transmissionIaetsd Iaetsd
 
iaetsd Software defined am transmitter using vhdl
iaetsd Software defined am transmitter using vhdliaetsd Software defined am transmitter using vhdl
iaetsd Software defined am transmitter using vhdlIaetsd Iaetsd
 
iaetsd Health monitoring system with wireless alarm
iaetsd Health monitoring system with wireless alarmiaetsd Health monitoring system with wireless alarm
iaetsd Health monitoring system with wireless alarmIaetsd Iaetsd
 
iaetsd Equalizing channel and power based on cognitive radio system over mult...
iaetsd Equalizing channel and power based on cognitive radio system over mult...iaetsd Equalizing channel and power based on cognitive radio system over mult...
iaetsd Equalizing channel and power based on cognitive radio system over mult...Iaetsd Iaetsd
 
iaetsd Economic analysis and re design of driver’s car seat
iaetsd Economic analysis and re design of driver’s car seatiaetsd Economic analysis and re design of driver’s car seat
iaetsd Economic analysis and re design of driver’s car seatIaetsd Iaetsd
 
iaetsd Design of slotted microstrip patch antenna for wlan application
iaetsd Design of slotted microstrip patch antenna for wlan applicationiaetsd Design of slotted microstrip patch antenna for wlan application
iaetsd Design of slotted microstrip patch antenna for wlan applicationIaetsd Iaetsd
 
REVIEW PAPER- ON ENHANCEMENT OF HEAT TRANSFER USING RIBS
REVIEW PAPER- ON ENHANCEMENT OF HEAT TRANSFER USING RIBSREVIEW PAPER- ON ENHANCEMENT OF HEAT TRANSFER USING RIBS
REVIEW PAPER- ON ENHANCEMENT OF HEAT TRANSFER USING RIBSIaetsd Iaetsd
 
A HYBRID AC/DC SOLAR POWERED STANDALONE SYSTEM WITHOUT INVERTER BASED ON LOAD...
A HYBRID AC/DC SOLAR POWERED STANDALONE SYSTEM WITHOUT INVERTER BASED ON LOAD...A HYBRID AC/DC SOLAR POWERED STANDALONE SYSTEM WITHOUT INVERTER BASED ON LOAD...
A HYBRID AC/DC SOLAR POWERED STANDALONE SYSTEM WITHOUT INVERTER BASED ON LOAD...Iaetsd Iaetsd
 
Fabrication of dual power bike
Fabrication of dual power bikeFabrication of dual power bike
Fabrication of dual power bikeIaetsd Iaetsd
 
Blue brain technology
Blue brain technologyBlue brain technology
Blue brain technologyIaetsd Iaetsd
 
iirdem The Livable Planet – A Revolutionary Concept through Innovative Street...
iirdem The Livable Planet – A Revolutionary Concept through Innovative Street...iirdem The Livable Planet – A Revolutionary Concept through Innovative Street...
iirdem The Livable Planet – A Revolutionary Concept through Innovative Street...Iaetsd Iaetsd
 
iirdem Design of Efficient Solar Energy Collector using MPPT Algorithm
iirdem Design of Efficient Solar Energy Collector using MPPT Algorithmiirdem Design of Efficient Solar Energy Collector using MPPT Algorithm
iirdem Design of Efficient Solar Energy Collector using MPPT AlgorithmIaetsd Iaetsd
 
iirdem CRASH IMPACT ATTENUATOR (CIA) FOR AUTOMOBILES WITH THE ADVOCATION OF M...
iirdem CRASH IMPACT ATTENUATOR (CIA) FOR AUTOMOBILES WITH THE ADVOCATION OF M...iirdem CRASH IMPACT ATTENUATOR (CIA) FOR AUTOMOBILES WITH THE ADVOCATION OF M...
iirdem CRASH IMPACT ATTENUATOR (CIA) FOR AUTOMOBILES WITH THE ADVOCATION OF M...Iaetsd Iaetsd
 
iaetsd Secured multiple keyword ranked search over encrypted databases
iaetsd Secured multiple keyword ranked search over encrypted databasesiaetsd Secured multiple keyword ranked search over encrypted databases
iaetsd Secured multiple keyword ranked search over encrypted databasesIaetsd Iaetsd
 
iaetsd Robots in oil and gas refineries
iaetsd Robots in oil and gas refineriesiaetsd Robots in oil and gas refineries
iaetsd Robots in oil and gas refineriesIaetsd Iaetsd
 
iaetsd Modeling of solar steam engine system using parabolic
iaetsd Modeling of solar steam engine system using paraboliciaetsd Modeling of solar steam engine system using parabolic
iaetsd Modeling of solar steam engine system using parabolicIaetsd Iaetsd
 
iaetsd Isolation of cellulose from non conventional source and its chemical m...
iaetsd Isolation of cellulose from non conventional source and its chemical m...iaetsd Isolation of cellulose from non conventional source and its chemical m...
iaetsd Isolation of cellulose from non conventional source and its chemical m...Iaetsd Iaetsd
 
iaetsd Effect of superconducting fault current limiter (sfcl) on triumphant i...
iaetsd Effect of superconducting fault current limiter (sfcl) on triumphant i...iaetsd Effect of superconducting fault current limiter (sfcl) on triumphant i...
iaetsd Effect of superconducting fault current limiter (sfcl) on triumphant i...Iaetsd Iaetsd
 
iaetsd Co extracting opinion targets and opinion words from online reviews ba...
iaetsd Co extracting opinion targets and opinion words from online reviews ba...iaetsd Co extracting opinion targets and opinion words from online reviews ba...
iaetsd Co extracting opinion targets and opinion words from online reviews ba...Iaetsd Iaetsd
 
iaetsd Automation of batching plant using plc and scada
iaetsd Automation of batching plant using plc and scadaiaetsd Automation of batching plant using plc and scada
iaetsd Automation of batching plant using plc and scadaIaetsd Iaetsd
 

Mehr von Iaetsd Iaetsd (20)

iaetsd Survey on cooperative relay based data transmission
iaetsd Survey on cooperative relay based data transmissioniaetsd Survey on cooperative relay based data transmission
iaetsd Survey on cooperative relay based data transmission
 
iaetsd Software defined am transmitter using vhdl
iaetsd Software defined am transmitter using vhdliaetsd Software defined am transmitter using vhdl
iaetsd Software defined am transmitter using vhdl
 
iaetsd Health monitoring system with wireless alarm
iaetsd Health monitoring system with wireless alarmiaetsd Health monitoring system with wireless alarm
iaetsd Health monitoring system with wireless alarm
 
iaetsd Equalizing channel and power based on cognitive radio system over mult...
iaetsd Equalizing channel and power based on cognitive radio system over mult...iaetsd Equalizing channel and power based on cognitive radio system over mult...
iaetsd Equalizing channel and power based on cognitive radio system over mult...
 
iaetsd Economic analysis and re design of driver’s car seat
iaetsd Economic analysis and re design of driver’s car seatiaetsd Economic analysis and re design of driver’s car seat
iaetsd Economic analysis and re design of driver’s car seat
 
iaetsd Design of slotted microstrip patch antenna for wlan application
iaetsd Design of slotted microstrip patch antenna for wlan applicationiaetsd Design of slotted microstrip patch antenna for wlan application
iaetsd Design of slotted microstrip patch antenna for wlan application
 
REVIEW PAPER- ON ENHANCEMENT OF HEAT TRANSFER USING RIBS
REVIEW PAPER- ON ENHANCEMENT OF HEAT TRANSFER USING RIBSREVIEW PAPER- ON ENHANCEMENT OF HEAT TRANSFER USING RIBS
REVIEW PAPER- ON ENHANCEMENT OF HEAT TRANSFER USING RIBS
 
A HYBRID AC/DC SOLAR POWERED STANDALONE SYSTEM WITHOUT INVERTER BASED ON LOAD...
A HYBRID AC/DC SOLAR POWERED STANDALONE SYSTEM WITHOUT INVERTER BASED ON LOAD...A HYBRID AC/DC SOLAR POWERED STANDALONE SYSTEM WITHOUT INVERTER BASED ON LOAD...
A HYBRID AC/DC SOLAR POWERED STANDALONE SYSTEM WITHOUT INVERTER BASED ON LOAD...
 
Fabrication of dual power bike
Fabrication of dual power bikeFabrication of dual power bike
Fabrication of dual power bike
 
Blue brain technology
Blue brain technologyBlue brain technology
Blue brain technology
 
iirdem The Livable Planet – A Revolutionary Concept through Innovative Street...
iirdem The Livable Planet – A Revolutionary Concept through Innovative Street...iirdem The Livable Planet – A Revolutionary Concept through Innovative Street...
iirdem The Livable Planet – A Revolutionary Concept through Innovative Street...
 
iirdem Design of Efficient Solar Energy Collector using MPPT Algorithm
iirdem Design of Efficient Solar Energy Collector using MPPT Algorithmiirdem Design of Efficient Solar Energy Collector using MPPT Algorithm
iirdem Design of Efficient Solar Energy Collector using MPPT Algorithm
 
iirdem CRASH IMPACT ATTENUATOR (CIA) FOR AUTOMOBILES WITH THE ADVOCATION OF M...
iirdem CRASH IMPACT ATTENUATOR (CIA) FOR AUTOMOBILES WITH THE ADVOCATION OF M...iirdem CRASH IMPACT ATTENUATOR (CIA) FOR AUTOMOBILES WITH THE ADVOCATION OF M...
iirdem CRASH IMPACT ATTENUATOR (CIA) FOR AUTOMOBILES WITH THE ADVOCATION OF M...
 
iaetsd Secured multiple keyword ranked search over encrypted databases
iaetsd Secured multiple keyword ranked search over encrypted databasesiaetsd Secured multiple keyword ranked search over encrypted databases
iaetsd Secured multiple keyword ranked search over encrypted databases
 
iaetsd Robots in oil and gas refineries
iaetsd Robots in oil and gas refineriesiaetsd Robots in oil and gas refineries
iaetsd Robots in oil and gas refineries
 
iaetsd Modeling of solar steam engine system using parabolic
iaetsd Modeling of solar steam engine system using paraboliciaetsd Modeling of solar steam engine system using parabolic
iaetsd Modeling of solar steam engine system using parabolic
 
iaetsd Isolation of cellulose from non conventional source and its chemical m...
iaetsd Isolation of cellulose from non conventional source and its chemical m...iaetsd Isolation of cellulose from non conventional source and its chemical m...
iaetsd Isolation of cellulose from non conventional source and its chemical m...
 
iaetsd Effect of superconducting fault current limiter (sfcl) on triumphant i...
iaetsd Effect of superconducting fault current limiter (sfcl) on triumphant i...iaetsd Effect of superconducting fault current limiter (sfcl) on triumphant i...
iaetsd Effect of superconducting fault current limiter (sfcl) on triumphant i...
 
iaetsd Co extracting opinion targets and opinion words from online reviews ba...
iaetsd Co extracting opinion targets and opinion words from online reviews ba...iaetsd Co extracting opinion targets and opinion words from online reviews ba...
iaetsd Co extracting opinion targets and opinion words from online reviews ba...
 
iaetsd Automation of batching plant using plc and scada
iaetsd Automation of batching plant using plc and scadaiaetsd Automation of batching plant using plc and scada
iaetsd Automation of batching plant using plc and scada
 

Kürzlich hochgeladen

AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdfankushspencer015
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfKamal Acharya
 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...SUHANI PANDEY
 
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Bookingroncy bisnoi
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfJiananWang21
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptDineshKumar4165
 
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Standamitlee9823
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VDineshKumar4165
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...ranjana rawat
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTbhaskargani46
 
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELLPVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELLManishPatel169454
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringmulugeta48
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfRagavanV2
 
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...tanu pandey
 

Kürzlich hochgeladen (20)

Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
 
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
 
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELLPVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineering
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdf
 
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
 

iaetsd Shared authority based privacy preserving protocol

  • 1. SHARED AUTHORITY BASED PRIVACY PRESERVING PROTOCOL C. Pragna Bai1 , K. Kishore Kumar2 1 M.Tech., PG Scholar, Dept of CSE, Korm College of Engineering, Kadapa,Andhra Pradesh. 2 Assistant Professor, Dept of CSE,Korm College of Engineering, Kadapa, Andhra Pradesh. Abstract- Cloud computing is emerging as a prevalent data interactive paradigm to realize users’ data remotely stored in an online cloud server. Cloud services provide great conveniences for the users to enjoy the on-demand cloud applications without considering the local infrastructure limitations. During the data accessing, different users may be in a collaborative relationship, and thus data sharing becomes significant to achieve productive benefits. The existing security solutions generally focus on authentication procedures where a user’s private knowledge cannot be accessed without proper authorization, however neglecting the privacy issue. This could reveal user’s private information regardless of the information access permissions being granted or not. Therefore, we can use SAPA protocol in which shared access authority is achieved by anonymous access request matching mechanism to handle the privacy issue in cloud. Propose an authentication protocol to enhance a user’s access request related privacy, and the shared access authority is achieved by anonymous access request matching mechanism. Apply cipher text-policy attribute based access control to realize that a user can reliably access its own data fields, and adopt the proxy re-encryption to provide temp authorized data sharing among multiple users. Keywords: Cloud computing, authorization authentication protocol, security, privacy preservation, shared authority. 1.INTRODUCTION Cloud computing is a popular IT architecture in the current trend, which offers exclusive data storage with ondemand services and network access round the clock. This architecture can be witnessed as a service which could be software, infrastructure or a platform available anytime anywhere for the users. Despite being popular and powerful cloud computing faces downfall in areas of privacy and security. Traditional approaches concentrate on the authentication procedures to witness remote access of data on demand. But eventually a user may want to access or share data for better results, which in turn brings security and privacy concerns in cloud storage. In order to overcome this, Shared Authority based Privacy preserving Authentication protocol (SAPA). This protocol is exclusively used for handling the privacy issues in cloud storage. Shared access authority is achieved by anonymous access request matching procedure with four important attributes namely, User privacy, Authentication, Forward Security and Anonymity [1]. User privacy is achieved when any unrelated user cannot wild guess a user’s access interests. Only if they both possess a mutual interest they will be allowed to share by the cloud server. Authentication is achieved when a legal and registered user can access his data and any other data cannot deceive him. Anonymity is achieved when any unrelated entity cannot find out the data transferred and communication state even by interception through open communication channel. Forward security is achieved when any miscreant cannot guess the previous communications with the currently held data of any two sessions. Attribute based access control is used to make sure that the users can access only his data. Thus this protocol is well suited for multi- user collaborative cloud applications since it does not compromise the user’s private information. An example is introduced to identify the main motivation. In the cloud storage based supply chain management, there are various interest groups (e.g., supplier, carrier, and retailer) in the system. Each group owns its users which are permitted to access the authorized data fields, and different users own relatively independent access authorities. It means that any two users from diverse groups should access different data fields of the same file. There into, a supplier purposely may want to access a carrier’s data fields, but it is not sure whether the carrier will allow its access request. If the carrier refuses its request, the supplier’s access desire will be revealed along with nothing obtained towards the desired data fields. Actually, the supplier may not send the access request or withdraw the unaccepted request in advance if it firmly knows that its request will be refused by the carrier. It is unreasonable to thoroughly disclose the supplier’s private information without any privacy considerations. Fig. 1 illustrates three revised cases to address above imperceptible privacy issue. Securing Infrastructure as a Service The IaaS model lets users lease compute, storage, network, and other resources in a virtualized environment. The user doesn’t manage or control the underlying cloud infrastructure but has control over the OS, storage, deployed applications, and possibly certain networking components. Amazon’s Elastic Compute Cloud (EC2) is a good example of IaaS. At the cloud infrastructure level, CSPs can enforce network security with intrusion-detection systems (IDSs), firewalls, antivirus programs, distributed denial-of-service (DDoS) defenses, and so on. Securing Platform as a Service Cloud platforms are built on top of IaaS with system integration and virtualization middleware support. Such platforms let users deploy user-built software applications onto the cloud infrastructure using provider-supported programming languages and software tools II LITERATURE SURVEY Literature survey is the most important step in software development process. Before developing the tool it is necessary to determine the time factor, economy n company strength. Once these things r satisfied, ten next steps are to determine which operating systemand language can be used for developing the tool. Once the programmers start building the tool the programmers ISBN-13: 978-1537584836 www.iaetsd.in Proceedings of ICAER-2016 ©IAETSD 201611
  • 2. need lot of external support. This support can be obtained from senior programmers, from book or from websites. Before building the system the above consideration are taken into account for developing the proposed system. Implementation: We have implemented our basic approach on Amazon S3 which is a popular cloud based storage service. The content management consists of two tasks. First, the Owner encrypts the data item sets based on the access control policies and uploads the encrypted sets along with some meta-data. Then, authorized users download the encrypted data items sets and meta-data from the Cloud , and decrypt the data item sets using the secrets they have. Now we illustrate the interactions of the Owner with Amazon S3 as the Cloud . In our implementation, we have used the REST API to communicate with Amazon S3. Figure 2 shows the overall involvement of the Owner in the user and content management process when uploading the data item sets to Amazon S3. While the fine-grained access control is enforced by encrypting using the keys generated through the AB-GKM scheme, it is important to limit the access to even the encrypted data item sets in order to minimize the bandwidth utilization. We associate a hash-based message authentication code (HMAC) with each encrypted data item sets such that only the users having valid identity attributes can produce matching HMACs.Initially the Owner creates a bucket , which is a logical container in S3, to store encrypted data item sets as objects . Subsequently, the Owner executes the following steps:1. The Owner generates the symmetric keys using the AB-GKM’s KeyGen algorithm and instantiates an encryption client. Note that the Owner generates a unique symmetric key for each policy configuration. Trust and security have prevented businesses from fully accepting cloud platforms. To protect clouds, providers must first secure virtualized data center resources, uphold user privacy, and preserve data integrity. The authors suggest using a trust-overlay network over multiple data centers to implement a reputation system for establishing trust between service providers and data owners. Data coloring and software watermarking techniques protect shared data objects and massively distributed software modules. These techniques safeguard multi-way authentications, enable single sign-on in the cloud, and tighten access control for sensitive data in both public and private clouds. III. RELATED WORK In [2] ENISA has proposed that “Complexity of risk evaluation” is one of the major privacy challenges in cloud computing. The complexity of the services gives rise to a number of unidentified parameters. Service consumers and providers are careful while providing and consuming services. The real challenge encountered in this scenario is checking the lifecycle of data processing and its conformity with officially authorized frameworks. Some of the following questions are needed to be answered in order to find the risks to privacy: Who are the stakeholders involved?, Where the data is stored?, How data is duplicated?, What are the stakeholder roles and responsibilities?, What are the rules for data processing?, How the service provider will reach the desired level of privacy and security? They have suggested that every user can have an apparent policy as how to the personal data is to be processed and the stakeholders have to specify the needs for cloud that meet the desired level of privacy. ENISA in Europe suggest understanding the shift in balance in terms of accountability and responsibility in key functions and conformity with the laws [2]. In [3] authors suggest that developing and implementing proactive strategies or measures to promote better compliance with the laws of privacy regarding the personal data processing. This can be done through procedures that detect and prevent breaches in systems. Literally, there is no accepted definition for PETs, but in general we can consider technologies with the following qualities are PETs, reduce privacy risks, data held about the users are minimal, allow the users to have control over their information. Therefore, by implementing the PETs the requirements of the proactive measures could be met. And they can protect the privacy over the personal data and prevent from undesired processing. These PETs include tools like anonymisation, encryption, pseudonymisation, transparency enhancing tools. In [4] authors have proposed that “Client Based Privacy Manager” helps in reducing the data leakage and loss of privacy of the sensitive data. Some the major characteristics of the privacy managers are: Data Access: The Manager contains a separate module for accessing personal information by the users in the cloud. This is an auditing procedure that checks accuracy and privacy violations. Obfuscation: This is done by the users on the required fields before being sent to the cloud using a user chosen key that the service providers are not known of. Feedback: This module keeps track of the data being transferred and data usage. Preference Setting: Allows the users to set preferences over their data thereby giving greater control. The major advantage is that it solves automation and end user problems. The disadvantages are, it requires full co-operation of the service provider and sufficient computing resources for obfuscation. In [5] authors have proposed that for Anonymous data sharing between the parties an algorithm is developed to generate ID numbers ranging from 1 to N. And the assignment of these ID’s is anonymous so that the members do not know about it and maximum care is taken to avoid collisions. These procedures are carried out without a trusted third party. Newton’s identities and strum theorem to develop secure sum. Usage of finite polynomials enhances scalability and Markov chain finds the required number of iterations. In [6] authors have proposed that in recent years, the number of mobile users in the society has risen dramatically. The privacy aware authentication scheme provides security and flexibility to the users to make use of various cloud services from various providers using a single private key. A bilinear pairing cryptosystem and nonce generation is used to enhance the security strength of the scheme. In addition to it, it also provides user intractability, mutual authentication, exchange of keys, anonymity and so on. This scheme reduces the memory space usage on the respective cloud service providers. The Smart card Generator serves as the key distributor for providers and mobile clients or users. Also, the scheme does not involve the SCG service in the user authentication procedure. It also reduces the processing time of the authentication process in terms of computation between providers and TTP. Formal Performance analysis tasks are conducted and the scheme is found to be efficient and secure. In [7] authors have suggested that du e to the growing Security needs in the world the mentioned security algorithms have been surveyed and it is found that each has its own pros and cons. But, out of them AES algorithm is found to be efficient. Some of the Advantages are more secure, supports larger key size, faster in terms of hardware and software, 128-bit key size makes it less prone to attacks, suitable for cloud. Some of the ISBN-13: 978-1537584836 www.iaetsd.in Proceedings of ICAER-2016 ©IAETSD 201612
  • 3. Disadvantages of other algorithms are less secure, slow in terms of speed, small and medium key size. In [8] authors have suggested that due to the growth of cloud, security has become a vital part of cloud computing. Malicious activities and vulnerabilities are inevitable. The key purpose is to verify if AES provides better security than other algorithms. By implementing it, it is witnessed that it provides less memory consumption and computation time. Some of the Advantages are high performance, speedy key setup, key agility, less memory, instruction level parallelism, no cryptanalysis attacks have been proved. On comparing with other algorithms, AES eliminates weak keys, which is found is DES. During performance analysis it is found that AES has an advantage over other algorithms in terms of execution time [9]. Also over RC2, RC6 and blowfish with time consumption [10]. IV.PROPOSEDWORK The existing security solutions generally concentrates over the authentication procedures which implies a user’s private information cannot be accessed without proper authorization, while neglecting privacy issue during the data sharing. During the information accessing, different users can be in a mutual relationship which stresses on the importance of knowledge sharing in order to attain better performance. Due to mentioned privacy issue, the user’s private information could be revealed regardless the access permission being granted or not. In a cloud storage based supply chain management, there will be various interest groups in the system. Each group has its own users who are permitted to access the authorized data fields, and different users own relatively independent access authorities. It means that any two users from diverse groups should access different data fields of the same file. For instance, consider two groups G1 and G2, if a user from G1 requests data from the user in G2, and if his request is rejected, the user’s access desire will be revealed along with nothing obtained towards the desired data fields. A user may not send the access request or withdraw the unaccepted request in advance if he firmly knows that his request will be rejected. Therefore, it is unreasonable to thoroughly disclose a user’s private information without any privacy considerations. In order to overcome the privacy issue “shared authority based privacy preserving authentication” protocol (SAPA) can be used for the cloud data storage, which realizes authentication and authorization without compromising a user’s private information. Identifies a new privacy challenge in cloud storage, and address a subtle privacy issue during a user challenging the cloud server for data sharing, in which the challenged request itself cannot reveal the user’s privacy no matter whether or not it can obtain the access authority. And proposes an authentication protocol to enhance a user’s access request related privacy, and the shared access authority is achieved by anonymous access request matching mechanism. Encryption techniques are used to provide authorized data sharing among multiple users. Shared authority is achieved by anonymous request matching mechanism without compromising the privacy. Also, attribute based access is used to allow only authorized users to request information and proxy reencryption is applied by the cloud server to allow knowledge sharing among the multiple users. In order to witness the SAPA protocol we have developed a simple “e- library management system”. And we have hosted this system on to the Azure cloud and have realized the efficient working of SAPA. IVMETHODOLOGY In this paper, we address the aforementioned privacy issue to propose a shared authority based privacy preserving authentication protocol (SAPA) for the cloud data storage, which realizes authentication and authorization without compromising a user’s private information. The main contributions are as follows.  Identify a new privacy challenge in cloud storage, and address a subtle privacy issue during a user challenging the cloud server for data sharing, in which the challenged request itself cannot reveal the user’s privacy no matter whether or not it can obtain the access authority.  Propose an authentication protocol to enhance a user’s access request related privacy, and the shared access authority is achieved by anonymous access request matching mechanism.  Apply cipher text-policy attribute based access control to realize that a user can reliably access its own data fields, and adopt the proxy re-encryption to provide temp authorized data sharing among multiple users.  Advantages Of Proposed System:  The scheme allows users to audit the cloud storage with lightweight communication overloads and computation cost, and the auditing result ensures strong cloud storage correctness and fast data error localization.  During cloud data accessing, the user autonomously interacts with the cloud server without external interferences and is assigned with the full and independent authority on its own data fields. Identify a new privacy challenge in cloud storage, and address a subtle privacy issue during a user challenging the cloud server for data sharing, in which the challenged request itself cannot reveal the user’s privacy no matter whether or not it can obtain the access authority. Propose an authentication protocol to enhance a user’s access request related privacy, and the shared access authority is achieved by anonymous access request matching mechanism. Apply cipher text-policy attribute based access control to realize that a user can reliably access its own data fields, and adopt the proxy re-encryption to provide temp authorized data sharing among multiple users. Fig 1: System Architecture Implementation is the stage of the project when the theoretical design is turned out into a working system. Thus it can be considered to be the most critical stage in achieving a successful new system and in giving the user, confidence that ISBN-13: 978-1537584836 www.iaetsd.in Proceedings of ICAER-2016 ©IAETSD 201613
  • 4. the new system will work and be effective. The implementation stage involves careful planning, investigation of the existing system and it’s constraints on implementation, designing of methods to achieve changeover and evaluation of changeover methods. Implementation is the process of converting a new system design into operation. It is the phase that focuses on user training, site preparation and file conversion for installing a candidate system. The important factor that should be considered here is that the conversion should not disrupt the functioning of the organization. IV. CONCLUSION In this work, we have identified a new privacy challenge during data accessing in the cloud computing to achieve privacy-preserving access authority sharing. Authentication is established to guarantee data confidentiality and data integrity. Data anonymity is achieved since the wrapped values are exchanged during transmission. User privacy is enhanced by anonymous access requests to privately inform the cloud server about the users’ access desires. Forward security is realized by the session identifiers to prevent the session correlation. It indicates that the proposed scheme is possibly applied for enhanced privacy preservation in cloud applications. REFERENCE [1] J. Bethencourt, A. Sahai, and B. Waters. Ciphertext-policy attribute-based encryption. In SP 2007: Proceedings of the 28th IEEE Symposium on Security and Privacy, pages 321– 334, 2007. [2] J. Camenisch, M. Dubovitskaya, R. R. Enderlein, and G. Neven. Oblivious transfer with hidden access control from attribute-based encryption. In SCN 2012: Proceedings of the 8th International Conference on Security and Cryptography for Networks, pages 559–579, 2012. [3] D. Halevy and A. Shamir. The LSD broadcast encryption scheme. In CRYPTO 2001: Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology, pages 47–60, 2002. [4] J. Li and N. Li. OACerts: Oblivious attribute certificates. IEEE Transactions on Dependable and Secure Computing, 3(4):340–352, 2006. [5] M. Nabeel and E. Bertino. Towards attribute based group key management. In CCS 2011: Proceedings of the 18th ACM conference on Computer and communications security, 2011. [6] M. Nabeel, N. Shang, and E. Bertino. Privacy preserving policy based content sharing in public clouds. IEEE Transactions on Knowledge and Data Engineering, 99, 2012. [7] OpenID. http://openid.net/ [Last accessed: Oct. 14, 2012]. [8] T. Pedersen. Non-interactive and information-theoretic secure verifiable secret sharing. In CRYPTO 1991: Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology, pages 129–140, 1992. [9] N. Shang, M. Nabeel, F. Paci, and E. Bertino. A privacy- preserving approach to policy-based content dissemination. In ICDE 2010: Proceedings of the 2010 IEEE 26th International Conference on Data Engineering, 2010. [10] S. Yu, C. Wang, K. Ren, and W. Lou. Attribute based data sharing with attribute revocation. In ASIACCS 2010: Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, pages 261–270, 2010. [11] S. Yu, C. Wang, K. Ren, and W. Lou. Achieving secure, scalable, and fine-grained data access control in cloud computing. In INFOCOM 2010: Proceedings of the 29th conference on Information communications, pages 534–542, 2010. [12] C. Collberg and C. Thomborson, ―Watermarking, Tamper-Proofing, and Obfuscation-Tools for Software Protection,‖ IEEE Trans. Software Eng., vol. 28, 2002, pp. 735–746. [13] D. Li, C. Liu, and W. Gan, ―A New Cognitive Model: Cloud Model,‖ Int’l J. Intelligent Systems, Mar. 2009, pp. 357– 375. [14] D. Li and Y. Du, Artificial Intelligence with Uncertainty, Chapman & Hall, 2008. ISBN-13: 978-1537584836 www.iaetsd.in Proceedings of ICAER-2016 ©IAETSD 201614