SlideShare a Scribd company logo
1 of 12
Decentralized Access 
Control with 
Anonymous 
Authentication of Data
PRESENTED BY
ABSTRACT 
• We propose a new decentralized access control 
scheme for secure data storage in clouds that 
supports anonymous authentication. 
• In the proposed scheme, the cloud verifies the 
authenticity of the series without knowing the user’s 
identity before storing data. 
• Our scheme also has the added feature of access 
control in which only valid users are able to decrypt 
the stored information.
EXISTING SYSTEM 
• Existing work on access control in cloud are 
centralized in nature. Except and , all other schemes 
use ABE. The scheme in uses a symmetric key 
approach and does not support authentication. The 
schemes do not support authentication as well. 
• It provides privacy preserving authenticated access 
control in cloud. However, the authors take a 
centralized approach where a single key distribution 
center (KDC) distributes secret keys and attributes to 
all users.
DISADVANTAGES OF EXISTING 
SYSTEM 
• The scheme in uses asymmetric key 
approach and does not support 
authentication. 
• Difficult to maintain because of the 
large number of users that are 
supported in a cloud environment.
PROPOSED SYSTEM 
• We propose a new decentralized access control 
scheme for secure data storage in clouds that 
supports anonymous authentication. 
• In the proposed scheme, the cloud verifies the 
authenticity of the series without knowing the 
user’s identity before storing data. 
• Our scheme also has the added feature of access 
control in which only valid users are able to decrypt 
the stored information. 
• The scheme prevents replay attacks and supports 
creation, modification, and reading data stored in 
the cloud.
ADVANTAGES OF PROPOSED 
SYSTEM 
• Distributed access control of data 
stored in cloud so that only authorized 
users with valid attributes can access 
them. 
• Authentication of users who store and 
modify their data on the cloud. 
• The identity of the user is protected 
from the cloud during authentication.
SYSTEM ARCHITECTURE
HARDWARE REQUIREMENTS 
• System : Pentium IV 2.4 
GHz. 
• Hard Disk : 40 GB. 
• Floppy Drive : 1.44 Mb. 
• Monitor : 15 VGA Colour. 
• Mouse : Logitech. 
• Ram : 512 Mb.
SOFTWARE REQUIREMENTS 
• Operating system : Windows XP/7. 
• Coding Language : JAVA/J2EE 
• IDE :Netbeans 7.4 
• Database :MYSQL
REFERENCES 
• Sushmita Ruj,Milos Stojmenovic, 
and Amiya Nayak,“Decentralized 
Access Control with Anonymous 
Authentication of Data Stored in 
Clouds”,VOL. 25, NO. 2, FEBRUARY 
2014.
TO THIS PROJECT CONTACT

More Related Content

Viewers also liked

Cults, Biker Gangs, Sports Teams
Cults, Biker Gangs, Sports Teams Cults, Biker Gangs, Sports Teams
Cults, Biker Gangs, Sports Teams BOLO Conference
 
First fare 2011 website design for frc teams
First fare 2011 website design for frc teamsFirst fare 2011 website design for frc teams
First fare 2011 website design for frc teamsOregon FIRST Robotics
 
Audience and narrative concept presentation
Audience and narrative concept presentationAudience and narrative concept presentation
Audience and narrative concept presentationTafi123
 
Is Bullying A Silent Epidemic Among Kids? - Facts & Infographic
Is Bullying A Silent Epidemic Among Kids? - Facts & InfographicIs Bullying A Silent Epidemic Among Kids? - Facts & Infographic
Is Bullying A Silent Epidemic Among Kids? - Facts & InfographicMaps of World
 
Protecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperProtecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperJPINFOTECH JAYAPRAKASH
 
Are Pro Sports Fixed?
Are Pro Sports Fixed?Are Pro Sports Fixed?
Are Pro Sports Fixed?Maps of World
 
First fare 2010 website 101 for frc teams
First fare 2010 website 101 for frc teamsFirst fare 2010 website 101 for frc teams
First fare 2010 website 101 for frc teamsOregon FIRST Robotics
 
Moses supporting and enforcing security profiles on smartphones
Moses supporting and enforcing security profiles on smartphonesMoses supporting and enforcing security profiles on smartphones
Moses supporting and enforcing security profiles on smartphonesJPINFOTECH JAYAPRAKASH
 
Green droid automated diagnosis of energy inefficiency for smartphone applica...
Green droid automated diagnosis of energy inefficiency for smartphone applica...Green droid automated diagnosis of energy inefficiency for smartphone applica...
Green droid automated diagnosis of energy inefficiency for smartphone applica...JPINFOTECH JAYAPRAKASH
 
Wordcamp 2012 riaan knoetze - how to hijack a themeshop
Wordcamp 2012   riaan knoetze - how to hijack a themeshopWordcamp 2012   riaan knoetze - how to hijack a themeshop
Wordcamp 2012 riaan knoetze - how to hijack a themeshopWordCamp Cape Town
 
Take off for exploration
Take off for explorationTake off for exploration
Take off for explorationSandipan Dhar
 
Should School Lunch Be Regulated? Facts & Infographic
Should School Lunch Be Regulated?  Facts & InfographicShould School Lunch Be Regulated?  Facts & Infographic
Should School Lunch Be Regulated? Facts & InfographicMaps of World
 

Viewers also liked (16)

Cults, Biker Gangs, Sports Teams
Cults, Biker Gangs, Sports Teams Cults, Biker Gangs, Sports Teams
Cults, Biker Gangs, Sports Teams
 
First fare 2011 website design for frc teams
First fare 2011 website design for frc teamsFirst fare 2011 website design for frc teams
First fare 2011 website design for frc teams
 
Audience and narrative concept presentation
Audience and narrative concept presentationAudience and narrative concept presentation
Audience and narrative concept presentation
 
Is Bullying A Silent Epidemic Among Kids? - Facts & Infographic
Is Bullying A Silent Epidemic Among Kids? - Facts & InfographicIs Bullying A Silent Epidemic Among Kids? - Facts & Infographic
Is Bullying A Silent Epidemic Among Kids? - Facts & Infographic
 
Protecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperProtecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropper
 
Are Pro Sports Fixed?
Are Pro Sports Fixed?Are Pro Sports Fixed?
Are Pro Sports Fixed?
 
2012-2013 IEEE PROJECT TITLES
2012-2013 IEEE PROJECT TITLES2012-2013 IEEE PROJECT TITLES
2012-2013 IEEE PROJECT TITLES
 
First fare 2010 website 101 for frc teams
First fare 2010 website 101 for frc teamsFirst fare 2010 website 101 for frc teams
First fare 2010 website 101 for frc teams
 
Moses supporting and enforcing security profiles on smartphones
Moses supporting and enforcing security profiles on smartphonesMoses supporting and enforcing security profiles on smartphones
Moses supporting and enforcing security profiles on smartphones
 
Green droid automated diagnosis of energy inefficiency for smartphone applica...
Green droid automated diagnosis of energy inefficiency for smartphone applica...Green droid automated diagnosis of energy inefficiency for smartphone applica...
Green droid automated diagnosis of energy inefficiency for smartphone applica...
 
Wordcamp 2012 riaan knoetze - how to hijack a themeshop
Wordcamp 2012   riaan knoetze - how to hijack a themeshopWordcamp 2012   riaan knoetze - how to hijack a themeshop
Wordcamp 2012 riaan knoetze - how to hijack a themeshop
 
CONSTITUCIÓN 1º y 2º
CONSTITUCIÓN  1º y 2ºCONSTITUCIÓN  1º y 2º
CONSTITUCIÓN 1º y 2º
 
Take off for exploration
Take off for explorationTake off for exploration
Take off for exploration
 
Should School Lunch Be Regulated? Facts & Infographic
Should School Lunch Be Regulated?  Facts & InfographicShould School Lunch Be Regulated?  Facts & Infographic
Should School Lunch Be Regulated? Facts & Infographic
 
Gerardi promo 31 12-2013
Gerardi promo 31 12-2013Gerardi promo 31 12-2013
Gerardi promo 31 12-2013
 
Promo Sistemi di pesatura
 Promo Sistemi di pesatura   Promo Sistemi di pesatura
Promo Sistemi di pesatura
 

Recently uploaded

Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsKarakKing
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Pooja Bhuva
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxCeline George
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfNirmal Dwivedi
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxJisc
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxPooja Bhuva
 
Plant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxPlant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxUmeshTimilsina1
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfSherif Taha
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Pooja Bhuva
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxDr. Ravikiran H M Gowda
 

Recently uploaded (20)

Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
 
Plant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxPlant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptx
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 

Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds

  • 1. Decentralized Access Control with Anonymous Authentication of Data
  • 3. ABSTRACT • We propose a new decentralized access control scheme for secure data storage in clouds that supports anonymous authentication. • In the proposed scheme, the cloud verifies the authenticity of the series without knowing the user’s identity before storing data. • Our scheme also has the added feature of access control in which only valid users are able to decrypt the stored information.
  • 4. EXISTING SYSTEM • Existing work on access control in cloud are centralized in nature. Except and , all other schemes use ABE. The scheme in uses a symmetric key approach and does not support authentication. The schemes do not support authentication as well. • It provides privacy preserving authenticated access control in cloud. However, the authors take a centralized approach where a single key distribution center (KDC) distributes secret keys and attributes to all users.
  • 5. DISADVANTAGES OF EXISTING SYSTEM • The scheme in uses asymmetric key approach and does not support authentication. • Difficult to maintain because of the large number of users that are supported in a cloud environment.
  • 6. PROPOSED SYSTEM • We propose a new decentralized access control scheme for secure data storage in clouds that supports anonymous authentication. • In the proposed scheme, the cloud verifies the authenticity of the series without knowing the user’s identity before storing data. • Our scheme also has the added feature of access control in which only valid users are able to decrypt the stored information. • The scheme prevents replay attacks and supports creation, modification, and reading data stored in the cloud.
  • 7. ADVANTAGES OF PROPOSED SYSTEM • Distributed access control of data stored in cloud so that only authorized users with valid attributes can access them. • Authentication of users who store and modify their data on the cloud. • The identity of the user is protected from the cloud during authentication.
  • 9. HARDWARE REQUIREMENTS • System : Pentium IV 2.4 GHz. • Hard Disk : 40 GB. • Floppy Drive : 1.44 Mb. • Monitor : 15 VGA Colour. • Mouse : Logitech. • Ram : 512 Mb.
  • 10. SOFTWARE REQUIREMENTS • Operating system : Windows XP/7. • Coding Language : JAVA/J2EE • IDE :Netbeans 7.4 • Database :MYSQL
  • 11. REFERENCES • Sushmita Ruj,Milos Stojmenovic, and Amiya Nayak,“Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds”,VOL. 25, NO. 2, FEBRUARY 2014.
  • 12. TO THIS PROJECT CONTACT