SlideShare a Scribd company logo
1 of 17
Attribute Based Encryption
with Privacy Preserving In
Clouds
Presented By:
Shrihari C S
1CG11IS080
๏‚— Introduction
๏‚— Existing System
๏‚— Secure cloud storage model
๏‚— Proposed work
๏‚— Secure Hash Algorithm
๏‚— Paillier Algorithm
๏‚— Conclusion
OVERVIEW
INTRODUCTION
๏‚— A new decentralized access control schema.
๏‚— Distributed access control so that only users with
valid attributes can access them.
๏‚— Support the creation, modification and reading the
data stored in the cloud
EXISTING SYSTEM
๏‚— The existing access control in cloud are centralized in
nature.
๏‚— This scheme uses a symmetric key approach.
๏‚— This approach does not support the authentication.
SECURE CLOUD STORAGE MODEL
PROPOSED WORK
A. Creation of KDC
Create KDC
KDC Password KDC Password
Add User
B. KDC Authentication
KDC User
User Registration process
Data Stored in
Database
C. Trustee and User Accessibility
Database
Request Token
User id
Trustee Verifying
Provide Token
D. Creation of access policy
Access policies
KDC
Cloud
Token
Creation of access policy
C
C
KDC
User Token
Public key Private key
File Download
G. File Accessing
File Recovery Technique
Recovery File
Corrupted File
F. File Restoration
F. Secure Hash Algorithm
H. Paillier Algorithm
Key generation
Step 1: Choose two large prime numbers p and q randomly and
independently of each other such that gcd (pq, (p-1)(q-1))=1.
This property is assured if both primes are of equal length.
Step 2: Compute n=pq and ฮป=lcm(p-1,q-1).
Step 3: Select random integer g where gZ*n2.
Step 4: Ensure n divides the order of g by checking the existence
of the following modular multiplicative inverse
ฮผ= (L(gฮป mod n2))-1mod n.
where function L is defined as L(u)= (u-1)/n.
Encryption
โ€ข Let m be a message to be encrypted where m Zn.
โ€ข Select random r where r Z*n.
โ€ข Compute cipher text as: c= ek (x; r ) = gm.rn mod n2
Decryption
โ€ข Cipher text: cZ*n2.
โ€ข Compute message: m=dk(y)= (L(yฮป mod n2 ))/((L(gฮป
mod n2 )) mod n.
Contd โ€ฆ
CONCLUSION
โ€ข A decentralized access control technique with anonymous
authentication.
โ€ข Provides user revocation.
โ€ข The cloud does not know the identity of the user who stores
information, but only verifies the userโ€™s credentials.
โ€ข One limitation is that the cloud knows the access policy for
each record stored in the cloud.
Future Work
๏‚— In future, using SQL queries for hide the attributes and
access policy of a user.
๏‚— Files stored in cloud can be corrupted. So for this issue
using the file recovery technique to recover the corrupted
file successfully and to hide the access policy and the user
attributes
THANK YOU

More Related Content

What's hot

6. cryptography
6. cryptography6. cryptography
6. cryptography7wounders
ย 
Introduction to Public Key Infrastructure
Introduction to Public Key InfrastructureIntroduction to Public Key Infrastructure
Introduction to Public Key InfrastructureTheo Gravity
ย 
Triple Data Encryption Standard (t-DES)
Triple Data Encryption Standard (t-DES) Triple Data Encryption Standard (t-DES)
Triple Data Encryption Standard (t-DES) Hardik Manocha
ย 
public key infrastructure
public key infrastructurepublic key infrastructure
public key infrastructurevimal kumar
ย 
Digital Signature Standard
Digital Signature StandardDigital Signature Standard
Digital Signature StandardSou Jana
ย 
Steganography
SteganographySteganography
SteganographyPREMKUMAR
ย 
PGP S/MIME
PGP S/MIMEPGP S/MIME
PGP S/MIMESou Jana
ย 
13 asymmetric key cryptography
13   asymmetric key cryptography13   asymmetric key cryptography
13 asymmetric key cryptographydrewz lin
ย 
Paillier-ElGamal cryptosystem presentation
Paillier-ElGamal cryptosystem presentationPaillier-ElGamal cryptosystem presentation
Paillier-ElGamal cryptosystem presentationGauthamSK4
ย 
Diffie-hellman algorithm
Diffie-hellman algorithmDiffie-hellman algorithm
Diffie-hellman algorithmComputer_ at_home
ย 
Watermarking
WatermarkingWatermarking
WatermarkingPushkar Dutt
ย 
Symmetric and Asymmetric Encryption.ppt
Symmetric and Asymmetric Encryption.pptSymmetric and Asymmetric Encryption.ppt
Symmetric and Asymmetric Encryption.pptHassanAli980906
ย 
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITYCS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITYKathirvel Ayyaswamy
ย 
Lightweight cryptography
Lightweight cryptographyLightweight cryptography
Lightweight cryptographyShivam Singh
ย 
MAC-Message Authentication Codes
MAC-Message Authentication CodesMAC-Message Authentication Codes
MAC-Message Authentication CodesDarshanPatil82
ย 
Data Encryption Standard
Data Encryption StandardData Encryption Standard
Data Encryption StandardAdri Jovin
ย 
Cryptographic algorithms
Cryptographic algorithmsCryptographic algorithms
Cryptographic algorithmsAnamika Singh
ย 
Block Cipher Modes of Operation And Cmac For Authentication
Block Cipher Modes of Operation And Cmac For AuthenticationBlock Cipher Modes of Operation And Cmac For Authentication
Block Cipher Modes of Operation And Cmac For AuthenticationVittorio Giovara
ย 
ElGamal Encryption in Go
ElGamal Encryption in GoElGamal Encryption in Go
ElGamal Encryption in GoNapier University
ย 

What's hot (20)

6. cryptography
6. cryptography6. cryptography
6. cryptography
ย 
Introduction to Public Key Infrastructure
Introduction to Public Key InfrastructureIntroduction to Public Key Infrastructure
Introduction to Public Key Infrastructure
ย 
Triple Data Encryption Standard (t-DES)
Triple Data Encryption Standard (t-DES) Triple Data Encryption Standard (t-DES)
Triple Data Encryption Standard (t-DES)
ย 
public key infrastructure
public key infrastructurepublic key infrastructure
public key infrastructure
ย 
Digital Signature Standard
Digital Signature StandardDigital Signature Standard
Digital Signature Standard
ย 
Steganography
SteganographySteganography
Steganography
ย 
PGP S/MIME
PGP S/MIMEPGP S/MIME
PGP S/MIME
ย 
DES
DESDES
DES
ย 
13 asymmetric key cryptography
13   asymmetric key cryptography13   asymmetric key cryptography
13 asymmetric key cryptography
ย 
Paillier-ElGamal cryptosystem presentation
Paillier-ElGamal cryptosystem presentationPaillier-ElGamal cryptosystem presentation
Paillier-ElGamal cryptosystem presentation
ย 
Diffie-hellman algorithm
Diffie-hellman algorithmDiffie-hellman algorithm
Diffie-hellman algorithm
ย 
Watermarking
WatermarkingWatermarking
Watermarking
ย 
Symmetric and Asymmetric Encryption.ppt
Symmetric and Asymmetric Encryption.pptSymmetric and Asymmetric Encryption.ppt
Symmetric and Asymmetric Encryption.ppt
ย 
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITYCS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
ย 
Lightweight cryptography
Lightweight cryptographyLightweight cryptography
Lightweight cryptography
ย 
MAC-Message Authentication Codes
MAC-Message Authentication CodesMAC-Message Authentication Codes
MAC-Message Authentication Codes
ย 
Data Encryption Standard
Data Encryption StandardData Encryption Standard
Data Encryption Standard
ย 
Cryptographic algorithms
Cryptographic algorithmsCryptographic algorithms
Cryptographic algorithms
ย 
Block Cipher Modes of Operation And Cmac For Authentication
Block Cipher Modes of Operation And Cmac For AuthenticationBlock Cipher Modes of Operation And Cmac For Authentication
Block Cipher Modes of Operation And Cmac For Authentication
ย 
ElGamal Encryption in Go
ElGamal Encryption in GoElGamal Encryption in Go
ElGamal Encryption in Go
ย 

Similar to Attribute Based Encryption with Privacy Preserving In Clouds

Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...IGEEKS TECHNOLOGIES
ย 
Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...Vasanth Mca
ย 
IRJET- Audit Free Cloud Via Deniable Attribute based Encryption
IRJET- Audit Free Cloud Via Deniable Attribute based EncryptionIRJET- Audit Free Cloud Via Deniable Attribute based Encryption
IRJET- Audit Free Cloud Via Deniable Attribute based EncryptionIRJET Journal
ย 
Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...B Navya
ย 
IEEE paper 2014 abstract
IEEE paper 2014 abstractIEEE paper 2014 abstract
IEEE paper 2014 abstractSenthilvel S
ย 
Secure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy PreservingSecure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy PreservingIRJET Journal
ย 
Access control in decentralized online social networks applying a policy hidi...
Access control in decentralized online social networks applying a policy hidi...Access control in decentralized online social networks applying a policy hidi...
Access control in decentralized online social networks applying a policy hidi...IGEEKS TECHNOLOGIES
ย 
Enhancing Privacy in Cloud Service Provider Using Cryptographic Algorithm
Enhancing Privacy in Cloud Service Provider Using Cryptographic AlgorithmEnhancing Privacy in Cloud Service Provider Using Cryptographic Algorithm
Enhancing Privacy in Cloud Service Provider Using Cryptographic AlgorithmIOSR Journals
ย 
A SECURITY MODEL FOR PRESERVING THE PRIVACY OF MEDICAL BIG DATA IN A HEALTHCA...
A SECURITY MODEL FOR PRESERVING THE PRIVACY OF MEDICAL BIG DATA IN A HEALTHCA...A SECURITY MODEL FOR PRESERVING THE PRIVACY OF MEDICAL BIG DATA IN A HEALTHCA...
A SECURITY MODEL FOR PRESERVING THE PRIVACY OF MEDICAL BIG DATA IN A HEALTHCA...asambhavishya
ย 
IRJET- Secure Data on Multi-Cloud using Homomorphic Encryption
IRJET- Secure Data on Multi-Cloud using Homomorphic EncryptionIRJET- Secure Data on Multi-Cloud using Homomorphic Encryption
IRJET- Secure Data on Multi-Cloud using Homomorphic EncryptionIRJET Journal
ย 
Certificate less key management scheme in
Certificate less key management scheme inCertificate less key management scheme in
Certificate less key management scheme inIJNSA Journal
ย 
CERTIFICATE LESS KEY MANAGEMENT SCHEME IN MANET USING THRESHOLD CRYPTOGRAPHY
CERTIFICATE LESS KEY MANAGEMENT SCHEME IN MANET USING THRESHOLD CRYPTOGRAPHYCERTIFICATE LESS KEY MANAGEMENT SCHEME IN MANET USING THRESHOLD CRYPTOGRAPHY
CERTIFICATE LESS KEY MANAGEMENT SCHEME IN MANET USING THRESHOLD CRYPTOGRAPHYIJNSA Journal
ย 
IJSRED-V2I2P10
IJSRED-V2I2P10IJSRED-V2I2P10
IJSRED-V2I2P10IJSRED
ย 
An efficient certificateless encryption for data sharing on public cloud
An efficient certificateless encryption for data sharing on public cloudAn efficient certificateless encryption for data sharing on public cloud
An efficient certificateless encryption for data sharing on public cloudAbhijeet Patil
ย 
Cryptography Final Presentation.pptx
Cryptography Final Presentation.pptxCryptography Final Presentation.pptx
Cryptography Final Presentation.pptxGaneshBagul8
ย 
Securing Text Messages Application Using MED
Securing Text Messages Application Using MEDSecuring Text Messages Application Using MED
Securing Text Messages Application Using MEDZatulNadia
ย 
Attaining data security in cloud computing
Attaining data security in cloud computingAttaining data security in cloud computing
Attaining data security in cloud computingGopinath Muthusamy
ย 
Key aggregate cryptosystem for scalable data sharing in cloud storage
Key aggregate cryptosystem for scalable data sharing in cloud storageKey aggregate cryptosystem for scalable data sharing in cloud storage
Key aggregate cryptosystem for scalable data sharing in cloud storageShruthi Iyer
ย 
Improving Efficiency of Security in Multi-Cloud
Improving Efficiency of Security in Multi-CloudImproving Efficiency of Security in Multi-Cloud
Improving Efficiency of Security in Multi-CloudIJTET Journal
ย 

Similar to Attribute Based Encryption with Privacy Preserving In Clouds (20)

Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...
ย 
Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...
ย 
IRJET- Audit Free Cloud Via Deniable Attribute based Encryption
IRJET- Audit Free Cloud Via Deniable Attribute based EncryptionIRJET- Audit Free Cloud Via Deniable Attribute based Encryption
IRJET- Audit Free Cloud Via Deniable Attribute based Encryption
ย 
Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...
ย 
IEEE paper 2014 abstract
IEEE paper 2014 abstractIEEE paper 2014 abstract
IEEE paper 2014 abstract
ย 
Secure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy PreservingSecure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy Preserving
ย 
Access control in decentralized online social networks applying a policy hidi...
Access control in decentralized online social networks applying a policy hidi...Access control in decentralized online social networks applying a policy hidi...
Access control in decentralized online social networks applying a policy hidi...
ย 
Enhancing Privacy in Cloud Service Provider Using Cryptographic Algorithm
Enhancing Privacy in Cloud Service Provider Using Cryptographic AlgorithmEnhancing Privacy in Cloud Service Provider Using Cryptographic Algorithm
Enhancing Privacy in Cloud Service Provider Using Cryptographic Algorithm
ย 
A SECURITY MODEL FOR PRESERVING THE PRIVACY OF MEDICAL BIG DATA IN A HEALTHCA...
A SECURITY MODEL FOR PRESERVING THE PRIVACY OF MEDICAL BIG DATA IN A HEALTHCA...A SECURITY MODEL FOR PRESERVING THE PRIVACY OF MEDICAL BIG DATA IN A HEALTHCA...
A SECURITY MODEL FOR PRESERVING THE PRIVACY OF MEDICAL BIG DATA IN A HEALTHCA...
ย 
IRJET- Secure Data on Multi-Cloud using Homomorphic Encryption
IRJET- Secure Data on Multi-Cloud using Homomorphic EncryptionIRJET- Secure Data on Multi-Cloud using Homomorphic Encryption
IRJET- Secure Data on Multi-Cloud using Homomorphic Encryption
ย 
Certificate less key management scheme in
Certificate less key management scheme inCertificate less key management scheme in
Certificate less key management scheme in
ย 
CERTIFICATE LESS KEY MANAGEMENT SCHEME IN MANET USING THRESHOLD CRYPTOGRAPHY
CERTIFICATE LESS KEY MANAGEMENT SCHEME IN MANET USING THRESHOLD CRYPTOGRAPHYCERTIFICATE LESS KEY MANAGEMENT SCHEME IN MANET USING THRESHOLD CRYPTOGRAPHY
CERTIFICATE LESS KEY MANAGEMENT SCHEME IN MANET USING THRESHOLD CRYPTOGRAPHY
ย 
IJSRED-V2I2P10
IJSRED-V2I2P10IJSRED-V2I2P10
IJSRED-V2I2P10
ย 
An efficient certificateless encryption for data sharing on public cloud
An efficient certificateless encryption for data sharing on public cloudAn efficient certificateless encryption for data sharing on public cloud
An efficient certificateless encryption for data sharing on public cloud
ย 
D017433134
D017433134D017433134
D017433134
ย 
Cryptography Final Presentation.pptx
Cryptography Final Presentation.pptxCryptography Final Presentation.pptx
Cryptography Final Presentation.pptx
ย 
Securing Text Messages Application Using MED
Securing Text Messages Application Using MEDSecuring Text Messages Application Using MED
Securing Text Messages Application Using MED
ย 
Attaining data security in cloud computing
Attaining data security in cloud computingAttaining data security in cloud computing
Attaining data security in cloud computing
ย 
Key aggregate cryptosystem for scalable data sharing in cloud storage
Key aggregate cryptosystem for scalable data sharing in cloud storageKey aggregate cryptosystem for scalable data sharing in cloud storage
Key aggregate cryptosystem for scalable data sharing in cloud storage
ย 
Improving Efficiency of Security in Multi-Cloud
Improving Efficiency of Security in Multi-CloudImproving Efficiency of Security in Multi-Cloud
Improving Efficiency of Security in Multi-Cloud
ย 

More from Swathi Rampur

Top 10 smart phones in the range 10k-25k
Top 10 smart phones in the range 10k-25kTop 10 smart phones in the range 10k-25k
Top 10 smart phones in the range 10k-25kSwathi Rampur
ย 
Amcat syllabus
Amcat syllabusAmcat syllabus
Amcat syllabusSwathi Rampur
ย 
applications of cloud computing for agricultural sector
applications of cloud computing for agricultural sectorapplications of cloud computing for agricultural sector
applications of cloud computing for agricultural sectorSwathi Rampur
ย 
how to overcome failure
how to overcome failurehow to overcome failure
how to overcome failureSwathi Rampur
ย 
genetic paper
genetic papergenetic paper
genetic paperSwathi Rampur
ย 
task scheduling in cloud datacentre using genetic algorithm
task scheduling in cloud datacentre using genetic algorithmtask scheduling in cloud datacentre using genetic algorithm
task scheduling in cloud datacentre using genetic algorithmSwathi Rampur
ย 
techgigbluemix
techgigbluemixtechgigbluemix
techgigbluemixSwathi Rampur
ย 
Dss notes[1cg11is092]
Dss notes[1cg11is092]Dss notes[1cg11is092]
Dss notes[1cg11is092]Swathi Rampur
ย 
Privacy preserving multi-keyword ranked search over encrypted cloud data 2
Privacy preserving multi-keyword ranked search over encrypted cloud data 2Privacy preserving multi-keyword ranked search over encrypted cloud data 2
Privacy preserving multi-keyword ranked search over encrypted cloud data 2Swathi Rampur
ย 
Toward Ubiquitous Healthcare Services With a Novel Efficient Cloud Platform
Toward Ubiquitous Healthcare Services With a Novel Efficient Cloud PlatformToward Ubiquitous Healthcare Services With a Novel Efficient Cloud Platform
Toward Ubiquitous Healthcare Services With a Novel Efficient Cloud PlatformSwathi Rampur
ย 
healthcare application using cloud platform
healthcare  application using cloud platformhealthcare  application using cloud platform
healthcare application using cloud platformSwathi Rampur
ย 
WORKING OF HEAT PUMPS WITH (CO2) REFRIGERANT
WORKING OF HEAT PUMPS WITH (CO2) REFRIGERANT WORKING OF HEAT PUMPS WITH (CO2) REFRIGERANT
WORKING OF HEAT PUMPS WITH (CO2) REFRIGERANT Swathi Rampur
ย 
Attribute based encryption with privacy preserving in clouds
Attribute based encryption with privacy preserving in cloudsAttribute based encryption with privacy preserving in clouds
Attribute based encryption with privacy preserving in cloudsSwathi Rampur
ย 
Application of cloud computing to agriculture
Application of cloud computing to agriculture Application of cloud computing to agriculture
Application of cloud computing to agriculture Swathi Rampur
ย 
Secure cross cloud single sign-on (sso) using eid's
Secure cross cloud single sign-on (sso) using eid'sSecure cross cloud single sign-on (sso) using eid's
Secure cross cloud single sign-on (sso) using eid'sSwathi Rampur
ย 

More from Swathi Rampur (17)

Igate
IgateIgate
Igate
ย 
Top 10 smart phones in the range 10k-25k
Top 10 smart phones in the range 10k-25kTop 10 smart phones in the range 10k-25k
Top 10 smart phones in the range 10k-25k
ย 
Amcat syllabus
Amcat syllabusAmcat syllabus
Amcat syllabus
ย 
applications of cloud computing for agricultural sector
applications of cloud computing for agricultural sectorapplications of cloud computing for agricultural sector
applications of cloud computing for agricultural sector
ย 
how to overcome failure
how to overcome failurehow to overcome failure
how to overcome failure
ย 
genetic paper
genetic papergenetic paper
genetic paper
ย 
task scheduling in cloud datacentre using genetic algorithm
task scheduling in cloud datacentre using genetic algorithmtask scheduling in cloud datacentre using genetic algorithm
task scheduling in cloud datacentre using genetic algorithm
ย 
techgigbluemix
techgigbluemixtechgigbluemix
techgigbluemix
ย 
techcss
techcsstechcss
techcss
ย 
Dss notes[1cg11is092]
Dss notes[1cg11is092]Dss notes[1cg11is092]
Dss notes[1cg11is092]
ย 
Privacy preserving multi-keyword ranked search over encrypted cloud data 2
Privacy preserving multi-keyword ranked search over encrypted cloud data 2Privacy preserving multi-keyword ranked search over encrypted cloud data 2
Privacy preserving multi-keyword ranked search over encrypted cloud data 2
ย 
Toward Ubiquitous Healthcare Services With a Novel Efficient Cloud Platform
Toward Ubiquitous Healthcare Services With a Novel Efficient Cloud PlatformToward Ubiquitous Healthcare Services With a Novel Efficient Cloud Platform
Toward Ubiquitous Healthcare Services With a Novel Efficient Cloud Platform
ย 
healthcare application using cloud platform
healthcare  application using cloud platformhealthcare  application using cloud platform
healthcare application using cloud platform
ย 
WORKING OF HEAT PUMPS WITH (CO2) REFRIGERANT
WORKING OF HEAT PUMPS WITH (CO2) REFRIGERANT WORKING OF HEAT PUMPS WITH (CO2) REFRIGERANT
WORKING OF HEAT PUMPS WITH (CO2) REFRIGERANT
ย 
Attribute based encryption with privacy preserving in clouds
Attribute based encryption with privacy preserving in cloudsAttribute based encryption with privacy preserving in clouds
Attribute based encryption with privacy preserving in clouds
ย 
Application of cloud computing to agriculture
Application of cloud computing to agriculture Application of cloud computing to agriculture
Application of cloud computing to agriculture
ย 
Secure cross cloud single sign-on (sso) using eid's
Secure cross cloud single sign-on (sso) using eid'sSecure cross cloud single sign-on (sso) using eid's
Secure cross cloud single sign-on (sso) using eid's
ย 

Recently uploaded

Call Now โ‰ฝ 9953056974 โ‰ผ๐Ÿ” Call Girls In New Ashok Nagar โ‰ผ๐Ÿ” Delhi door step de...
Call Now โ‰ฝ 9953056974 โ‰ผ๐Ÿ” Call Girls In New Ashok Nagar  โ‰ผ๐Ÿ” Delhi door step de...Call Now โ‰ฝ 9953056974 โ‰ผ๐Ÿ” Call Girls In New Ashok Nagar  โ‰ผ๐Ÿ” Delhi door step de...
Call Now โ‰ฝ 9953056974 โ‰ผ๐Ÿ” Call Girls In New Ashok Nagar โ‰ผ๐Ÿ” Delhi door step de...9953056974 Low Rate Call Girls In Saket, Delhi NCR
ย 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . pptDineshKumar4165
ย 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)simmis5
ย 
Call Girls In Bangalore โ˜Ž 7737669865 ๐Ÿฅต Book Your One night Stand
Call Girls In Bangalore โ˜Ž 7737669865 ๐Ÿฅต Book Your One night StandCall Girls In Bangalore โ˜Ž 7737669865 ๐Ÿฅต Book Your One night Stand
Call Girls In Bangalore โ˜Ž 7737669865 ๐Ÿฅต Book Your One night Standamitlee9823
ย 
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Bookingroncy bisnoi
ย 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VDineshKumar4165
ย 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptMsecMca
ย 
Call Girls in Ramesh Nagar Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
Call Girls in Ramesh Nagar Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort ServiceCall Girls in Ramesh Nagar Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
Call Girls in Ramesh Nagar Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service9953056974 Low Rate Call Girls In Saket, Delhi NCR
ย 
Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01KreezheaRecto
ย 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXssuser89054b
ย 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueBhangaleSonal
ย 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
ย 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdfKamal Acharya
ย 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
ย 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfRagavanV2
ย 
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
ย 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptDineshKumar4165
ย 
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...tanu pandey
ย 

Recently uploaded (20)

Call Now โ‰ฝ 9953056974 โ‰ผ๐Ÿ” Call Girls In New Ashok Nagar โ‰ผ๐Ÿ” Delhi door step de...
Call Now โ‰ฝ 9953056974 โ‰ผ๐Ÿ” Call Girls In New Ashok Nagar  โ‰ผ๐Ÿ” Delhi door step de...Call Now โ‰ฝ 9953056974 โ‰ผ๐Ÿ” Call Girls In New Ashok Nagar  โ‰ผ๐Ÿ” Delhi door step de...
Call Now โ‰ฝ 9953056974 โ‰ผ๐Ÿ” Call Girls In New Ashok Nagar โ‰ผ๐Ÿ” Delhi door step de...
ย 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
ย 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
ย 
Call Girls In Bangalore โ˜Ž 7737669865 ๐Ÿฅต Book Your One night Stand
Call Girls In Bangalore โ˜Ž 7737669865 ๐Ÿฅต Book Your One night StandCall Girls In Bangalore โ˜Ž 7737669865 ๐Ÿฅต Book Your One night Stand
Call Girls In Bangalore โ˜Ž 7737669865 ๐Ÿฅต Book Your One night Stand
ย 
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
ย 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
ย 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
ย 
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
ย 
Call Girls in Ramesh Nagar Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
Call Girls in Ramesh Nagar Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort ServiceCall Girls in Ramesh Nagar Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
Call Girls in Ramesh Nagar Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
ย 
Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01
ย 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
ย 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
ย 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
ย 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
ย 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
ย 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdf
ย 
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
ย 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
ย 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
ย 
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
ย 

Attribute Based Encryption with Privacy Preserving In Clouds

  • 1. Attribute Based Encryption with Privacy Preserving In Clouds Presented By: Shrihari C S 1CG11IS080
  • 2. ๏‚— Introduction ๏‚— Existing System ๏‚— Secure cloud storage model ๏‚— Proposed work ๏‚— Secure Hash Algorithm ๏‚— Paillier Algorithm ๏‚— Conclusion OVERVIEW
  • 3. INTRODUCTION ๏‚— A new decentralized access control schema. ๏‚— Distributed access control so that only users with valid attributes can access them. ๏‚— Support the creation, modification and reading the data stored in the cloud
  • 4. EXISTING SYSTEM ๏‚— The existing access control in cloud are centralized in nature. ๏‚— This scheme uses a symmetric key approach. ๏‚— This approach does not support the authentication.
  • 6. PROPOSED WORK A. Creation of KDC Create KDC KDC Password KDC Password Add User
  • 7. B. KDC Authentication KDC User User Registration process Data Stored in Database
  • 8. C. Trustee and User Accessibility Database Request Token User id Trustee Verifying Provide Token
  • 9. D. Creation of access policy Access policies KDC Cloud Token Creation of access policy C C
  • 10. KDC User Token Public key Private key File Download G. File Accessing
  • 11. File Recovery Technique Recovery File Corrupted File F. File Restoration
  • 12. F. Secure Hash Algorithm
  • 13. H. Paillier Algorithm Key generation Step 1: Choose two large prime numbers p and q randomly and independently of each other such that gcd (pq, (p-1)(q-1))=1. This property is assured if both primes are of equal length. Step 2: Compute n=pq and ฮป=lcm(p-1,q-1). Step 3: Select random integer g where gZ*n2. Step 4: Ensure n divides the order of g by checking the existence of the following modular multiplicative inverse ฮผ= (L(gฮป mod n2))-1mod n. where function L is defined as L(u)= (u-1)/n.
  • 14. Encryption โ€ข Let m be a message to be encrypted where m Zn. โ€ข Select random r where r Z*n. โ€ข Compute cipher text as: c= ek (x; r ) = gm.rn mod n2 Decryption โ€ข Cipher text: cZ*n2. โ€ข Compute message: m=dk(y)= (L(yฮป mod n2 ))/((L(gฮป mod n2 )) mod n. Contd โ€ฆ
  • 15. CONCLUSION โ€ข A decentralized access control technique with anonymous authentication. โ€ข Provides user revocation. โ€ข The cloud does not know the identity of the user who stores information, but only verifies the userโ€™s credentials. โ€ข One limitation is that the cloud knows the access policy for each record stored in the cloud.
  • 16. Future Work ๏‚— In future, using SQL queries for hide the attributes and access policy of a user. ๏‚— Files stored in cloud can be corrupted. So for this issue using the file recovery technique to recover the corrupted file successfully and to hide the access policy and the user attributes