Sunday, 13 July 2014

Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Computing



Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Computing
ABSTRACT:

Cloud computing is emerging as a prevalent data interactive paradigm to realize users’ data remotely stored in an online cloud server. Cloud services provide great conveniences for the users to enjoy the on-demand cloud applications without considering the local infrastructure limitations. During the data accessing, different users may be in a collaborative relationship, and thus data sharing becomes significant to achieve productive benefits. The existing security solutions mainly focus on the authentication to realize that a user’s privative data cannot be unauthorized accessed, but neglect a subtle privacy issue during a user challenging the cloud server to request other users for data sharing. The challenged access request itself may reveal the user’s privacy no matter whether or not it can obtain the data access permissions. In this paper, we propose a shared authority based privacy-preserving authentication protocol (SAPA) to address above privacy issue for cloud storage. In the SAPA, 1) shared access authority is achieved by anonymous access request matching mechanism with security and privacy considerations (e.g., authentication, data anonymity, user privacy, and forward security); 2) attribute based access control is adopted to realize that the user can only access its own data fields; 3) proxy re-encryption is applied by the cloud server to provide data sharing among the multiple users. Meanwhile, universal composability (UC) model is established to prove that the SAPA theoretically has the design correctness. It indicates that the proposed protocol realizing privacy-preserving data access authority sharing is attractive for multi-user collaborative cloud applications.
EXISTING SYSTEM:
In the cloud storage based supply chain management, there are various interest groups (e.g., supplier, carrier, and retailer) in the system. Each group owns its users which are permitted to access the authorized data fields, and different users own relatively independent access authorities. It means that any two users from diverse groups should access different data fields of the same file. There into, a supplier purposely may want to access a carrier’s data fields, but it is not sure whether the carrier will allow its access request. If the carrier refuses its request, the supplier’s access desire will be revealed along with nothing obtained towards the desired data fields. Actually, the supplier may not send the access request or withdraw the unaccepted request in advance if it firmly knows that its request will be refused by the carrier. It is unreasonable to thoroughly disclose the supplier’s private information without any privacy considerations.
DISADVANTAGES OF EXISTING SYSTEM:
v Loss of data’s.
v Does not provide any privacy for private data’s.
v Authentication time takes too long.

PROPOSED SYSTEM:
In this paper, we address the aforementioned privacy issue to propose a shared authority based privacypreserving authentication protocol (SAPA) for the cloud data storage, which realizes authentication and authorization without compromising a user’s private information.
The main contributions are as follows.
1) Identify a new privacy challenge in cloud storage, and address a subtle privacy issue during a user challenging the cloud server for data sharing, in which the challenged request itself cannot reveal the user’s privacy no matter whether or not it can obtain the access authority.
2) Propose an authentication protocol to enhance a user’s access request related privacy, and the shared access authority is achieved by anonymous access request matching mechanism.
3) Apply ciphertext-policy attribute based access control to realize that a user can reliably access its own data fields, and adopt the proxy re-encryption to provide temp authorized data sharing among multiple users.


ADVANTAGES OF PROPOSED SYSTEM:
v The scheme allows users to audit the cloud storage with lightweight communication overloads and computation cost, and the auditing result ensures strong cloud storage correctness and fast data error localization.
v During cloud data accessing, the user autonomously interacts with the cloud server without external interferences and is assigned with the full and independent authority on its own data fields.


SYSTEM ARCHITECTURE:

SYSTEM CONFIGURATION:-

HARDWARE REQUIREMENTS:-

Processor                  -        Pentium –IV

Speed                        -        1.1 Ghz
RAM                         -        512 MB(min)
Hard Disk                 -        40 GB
Key Board                -        Standard Windows Keyboard
Mouse                       -        Two or Three Button Mouse
Monitor                     -        LCD/LED
SOFTWARE REQUIREMENTS:
Operating system      :         Windows XP.
Coding Language      :         .Net
Data Base                 :         SQL Server 2005
Tool                          :         VISUAL STUDIO 2008.

REFERENCE:
Hong Liu, Huansheng Ning, Qingxu Xiong and Laurence T. Yang,“Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Computing” IEEE TRANSACTIONS ON Parallel and Distributed Systems, VOL. PP, NO. 99, 25 February 2014

No comments:

Post a Comment