Shared Authority Based
Privacy-preserving Authentication Protocol in Cloud Computing
ABSTRACT:
Cloud
computing is emerging as a prevalent data interactive paradigm to realize
users’ data remotely stored in an online cloud server. Cloud services provide
great conveniences for the users to enjoy the on-demand cloud applications
without considering the local infrastructure limitations. During the data
accessing, different users may be in a collaborative relationship, and thus
data sharing becomes significant to achieve productive benefits. The existing
security solutions mainly focus on the authentication to realize that a user’s
privative data cannot be unauthorized accessed, but neglect a subtle privacy
issue during a user challenging the cloud server to request other users for
data sharing. The challenged access request itself may reveal the user’s
privacy no matter whether or not it can obtain the data access permissions. In
this paper, we propose a shared authority based privacy-preserving authentication
protocol (SAPA) to address above privacy issue for cloud storage. In the SAPA,
1) shared access authority is achieved by anonymous access request matching
mechanism with security and privacy considerations (e.g., authentication, data
anonymity, user privacy, and forward security); 2) attribute based access
control is adopted to realize that the user can only access its own data
fields; 3) proxy re-encryption is applied by the cloud server to provide data
sharing among the multiple users. Meanwhile, universal composability (UC) model
is established to prove that the SAPA theoretically has the design correctness.
It indicates that the proposed protocol realizing privacy-preserving data
access authority sharing is attractive for multi-user collaborative cloud
applications.
EXISTING SYSTEM:
In
the cloud storage based supply chain management, there are various interest
groups (e.g., supplier, carrier, and retailer) in the system. Each group owns
its users which are permitted to access the authorized data fields, and
different users own relatively independent access authorities. It means that
any two users from diverse groups should access different data fields of the
same file. There into, a supplier purposely may want to access a carrier’s data
fields, but it is not sure whether the carrier will allow its access request.
If the carrier refuses its request, the supplier’s access desire will be
revealed along with nothing obtained towards the desired data fields. Actually,
the supplier may not send the access request or withdraw the unaccepted request
in advance if it firmly knows that its request will be refused by the carrier.
It is unreasonable to thoroughly disclose the supplier’s private information
without any privacy considerations.
DISADVANTAGES OF
EXISTING SYSTEM:
v Loss
of data’s.
v Does
not provide any privacy for private data’s.
v Authentication
time takes too long.
PROPOSED
SYSTEM:
In
this paper, we address the aforementioned privacy issue to propose a shared
authority based privacypreserving authentication protocol (SAPA) for the cloud
data storage, which realizes authentication and authorization without
compromising a user’s private information.
The
main contributions are as follows.
1)
Identify a new privacy challenge in cloud storage, and address a subtle privacy
issue during a user challenging the cloud server for data sharing, in which the
challenged request itself cannot reveal the user’s privacy no matter whether or
not it can obtain the access authority.
2)
Propose an authentication protocol to enhance a user’s access request related
privacy, and the shared access authority is achieved by anonymous access
request matching mechanism.
3)
Apply ciphertext-policy attribute based access control to realize that a user
can reliably access its own data fields, and adopt the proxy re-encryption to
provide temp authorized data sharing among multiple users.
ADVANTAGES OF PROPOSED
SYSTEM:
v
The scheme allows users to audit the
cloud storage with lightweight communication overloads and computation cost,
and the auditing result ensures strong cloud storage correctness and fast data
error localization.
v
During cloud data accessing, the user
autonomously interacts with the cloud server without external interferences and
is assigned with the full and independent authority on its own data fields.
SYSTEM CONFIGURATION:-
HARDWARE REQUIREMENTS:-
Processor - Pentium –IV
Speed - 1.1 Ghz
RAM - 512 MB(min)
Hard Disk - 40 GB
Key Board - Standard Windows Keyboard
Mouse - Two or Three Button Mouse
Monitor - LCD/LED
SOFTWARE REQUIREMENTS:
Operating
system : Windows XP.
Coding
Language : .Net
Data
Base : SQL Server 2005
Tool : VISUAL STUDIO 2008.
REFERENCE:
Hong
Liu, Huansheng Ning, Qingxu
Xiong and Laurence T. Yang,“Shared Authority Based Privacy-preserving
Authentication Protocol in Cloud Computing” IEEE TRANSACTIONS ON Parallel
and Distributed Systems, VOL. PP, NO. 99, 25 February 2014
No comments:
Post a Comment