SlideShare uma empresa Scribd logo
1 de 42
IDENTITY BASED SECURE DISTRIBUTED DATA 
STORAGE SCHEMES 
PRESENTED BY: 
N.SAHITHI 
(12C11D5816) 
UNDER GUIDANCE OF 
Mr. J.NAGARAJU, (M.TECH)
ABSTRACT 
Secure distributed data storage can shift the burden of maintaining a large number of 
files from owner to proxy servers. Proxy servers can convert encrypted files for owner 
to encrypted files for receiver without necessity of knowing the content of original 
files. IBSDSS schemes uses 2 identity based secure distributed data storage schemes. 
First scheme is secure against chosen plaintext attacks (CPA). Second scheme is 
secure against chosen chipertext attacks (CCA). It is first identity based secure 
distributed data storage schemes where access permissions is made by owner of file 
and collusion attacks can be protected. 
IBSDDS SCHEMES
INTRODUCTION 
 Cloud computing provides users a convenient mechanism to manage their personal 
files with notion called Database-As-Services (DAS). 
 Proxy servers can perform some functions on outsourced cipher texts without 
knowing anything about original files. 
 This technique has not been employed due to confidentiality and integrity. 
IBSDDS SCHEMES
 To address these issues IBSDDS scheme is proposed, which uses two schemes. 
These schemes capture following properties : 
i) The file owner can decide the access permission independently. 
ii) For one query, a receiver can only access one file instead of all files of 
IBSDDS SCHEMES 
the owner. 
iii) Our schemes secure against the collusion attacks.
PROBLEM STATEMENT 
 Writing a problem statement helps to identify the purpose of the project clearly. 
A problem statement consists of 3 parts namely: 
IBSDDS SCHEMES 
1) Ideal 
2) Reality 
3) Consequences 
1) Ideal : cloud computing provides users with a convenient mechanism to 
manage their personal files with a notion called database-as-service (DAS). 
 In DAS schemes, user outsources his encrypted files to proxy server so, that the 
burden of maintaining large amount of files on local system can be reduced.
2) Reality: Security and privacy are biggest concerns of each and every user. 
 Some user might feel uncomfortable in surrendering their personal data to a third 
IBSDDS SCHEMES 
party. 
 No guarantee to files outsourced to proxy servers. 
 As the applications and services run on remote third party environments, users have 
limited control over the function and execution of software and hardware. 
3) Consequences: In response to above problem, Identity based secure distributed 
datastorage schemes were proposed. 
 In this IBSDDS proxy server validates the outsourced cipher text and store them. 
 To prevent unauthorized access proxy validates user by his id and password.
LITERATURE SURVEY 
 Atomic proxy crypto system where a semi-trusted proxy server can transfer a 
cipher text of the original decryptor to a cipher text for the designated decryptor 
without knowing plain text. It is used in e-mail forwarding. 
 Identity based crypto system introduced by shamir. It is a system where the public 
key can be arbitrary string and secret key is issued by trusted third party. 
IBSDDS SCHEMES
 Identity-based proxy encryption (IBPE) was proposed by Ivan and Dodis . 
 In these schemes, the master secret key which is used to extract secret keys for 
users is split into 2 parts one is sent to proxy server other is sent to user. 
 The user can decrypt cipher text with the help of proxy server, but these 
schemes are not secure against collusion attacks. 
 Identity- based proxy re-encryption proposed by green and ateniese. Where 
proxy server can transfer a cipher text of original decryptor to cipher text of 
designated decryptor after he gets a re-encryption key. 
IBSDDS SCHEMES
EXISTING SYSTEM 
 Cloud computing provides users with convenient mechanism to manage their 
personal files with notation called database as a service (DAS). 
 Proxy server can perform some functions on outsourced cipher texts without 
knowing anything about original files. 
 Therefore, how to guarantee the outsourced files are not accessed by users 
unauthorized users and not modified by proxy severs is an important problem that 
has been considered in data storage research community. 
IBSDDS SCHEMES
DISADVANTAGES OF EXISTING SYSTEM 
 Users are especially concerned on the confidentiality, integrity and query of 
outsourced files as cloud computing is complicated than local data storage systems, 
as cloud is managed by untrusted third party. 
 There is no guarantee that the outsourced files are not accessed by unauthorized 
users and not modified by proxy severs is an important problem. 
IBSDDS SCHEMES
PROPOSED SYSTEM 
 In proposed project for one query, the receiver can access one of the owner’s file 
instead of accessing all files. 
 An access permission is bound not only to the identity of receiver but also to the 
IBSDDS SCHEMES 
file. 
 The access permission can be decided by owner, instead of trusted third party. 
Proposed project is secure against collusion attacks.
ADVANTAGES OF PROPOSED SYSTEM 
 It has 2 schemes of security: 
i) the first scheme is secure against chosen plain text attacks (CPA). 
ii) the second scheme is secure against chosen cipher text attacks (CCA). 
 For one query, a receiver can access only one file , instead of all files of the owner. 
 To achieve stronger security and implement file based access control ,the owner 
must be online to authenticate requesters and also generate access permissions for 
them. 
IBSDDS SCHEMES
STEPS INVOLVED IN IBSDDS SCHEME IMPLEMENTATION ARE: 
STEP 1: 
The file owner encrypts his files under his identity prior to outsourcing a files to 
proxy servers. 
STEP 2: 
He (owner of file) sends cipher texts to proxy servers (as he encrypted his files 
under his identity in step1 so that cipher text is generated ). 
STEP 3 : 
Proxy server transforms a cipher text encrypted under identity of the owner to a 
cipher text encrypted under the identity of receiver, only after the receiver has 
obtained access permission from owner of the file (file owner). 
IBSDDS SCHEMES
REQUIREMENT SPECIFICATION 
HARDWARE REQUIREMENTS: 
 Hardware - Pentium IV 
 Speed - 1.1 GHz 
 RAM - 1GB 
 Monitor - SVGA 
IBSDDS SCHEMES
SOFTWARE REQUIREMENTS: 
 Operating System : Windows xp/ 7/8 
 Technology : Java 
 IDE : My Eclipse 
 Web Server : Tomcat 
 Database : My SQL 
 Java Version : JDK1.7 
IBSDDS SCHEMES
MODULES 
 IBSDDS scheme consists of 4 modules : 
i) Data Storage system 
ii) File system 
iii) Storage-based Intrusion detection system 
iv) Cryptographic File System 
IBSDDS SCHEMES
MODULE - 1 
1) Data Storage system : Data storage system enable user to store their data to 
external proxy server to enhance access and availability and reduce maintenance 
cost. 
IBSDDS SCHEMES
MODULE - 2 
2) File System: In these systems, proxy servers are assumed to be trusted. 
Proxy authenticate receivers and validate access permissions. 
 The interactions between the proxy servers and receivers are executed in a secure 
IBSDDS SCHEMES 
channel. 
 In these schemes, a receiver authenticates himself to the proxy server using his 
password
MODULE - 3 
Storage-based Intrusion Detection System: In this systems, an intrusion detection 
scheme is embedded in proxy servers or the file owner to detect the intruder’s 
behaviors, such as adding backdoors, inserting Trojan horses and tampering with 
audit logs. 
 These schemes can be classified into two types: 
i) Host-based system and 
ii) Network-based system. 
IBSDDS SCHEMES
MODULE - 4 
Cryptographic File System: In these systems, an end to-end security is provided 
by cryptographic protocols which are executed by the file owner to prevent proxy 
servers and unauthorized users from modifying and accessing the sensitive files. 
 These systems can be divided into two types: 
1) Shared file system and 
2) Non-shared system 
IBSDDS SCHEMES
CLASS DIAGRAM 
IBSDDS SCHEMES
USECASE DIAGRAM 
IBSDDS SCHEMES
SEQUENCE DIAGRAM 
IBSDDS SCHEMES
ACTIVITY DIAGRAM 
IBSDDS SCHEMES
TECHNOLOGIES 
IBSDDS SCHEMES 
 Java 
 MYSQL
SCREEN SHOTS 
Screen shot 1: Welcome page 
IBSDDS SCHEMES
Screen shot 2: Registration page 
IBSDDS SCHEMES
Screenshot 3: Login page 
IBSDDS SCHEMES
Screen shot 4: Data owner choosing a file from system to upload 
IBSDDS SCHEMES
Screenshot 5: Proxy server providing key 
IBSDDS SCHEMES
Screenshot 6: Proxy server user authentication page 
IBSDDS SCHEMES
Screen shot 7: Welcome page for authorized user 
IBSDDS SCHEMES
Screen shot 8:User enter’s secret key to view files 
IBSDDS SCHEMES
Screen shot 9: User chooses a file to view 
IBSDDS SCHEMES
Screen shot 10: Proxy server asks for random key to view file 
IBSDDS SCHEMES
Screen shot 11:Encrypted format file is accessed to user 
IBSDDS SCHEMES
Screen shot 12: Proxy server asks for random key (to decrypt file). 
IBSDDS SCHEMES
Screen shot 14: Decrypted File is accessed to user 
IBSDDS SCHEMES
CONCLUSION 
Distributed data storage schemes provide the users with convenience to outsource their files to 
untrusted proxy servers. Identity-based secure distributed data storage (IBSDDS) schemes are 
a special kind of distributed data storage schemes where users are identified by their identities 
and can communicate without the need of verifying the public key certificates. 
IBSDDS SCHEMES
FUTURE ENHANCEMENTS 
Future enhancements for identity-based secure distributed data storage (IBSDDS) are to allow 
user to upload PDF files and excel sheets. Future research will include advancements like 
uploading the pictures, images, videos in encrypted format for user convenience. 
IBSDDS SCHEMES
REFERENCES 
Jinguang Han, Student Member, IEEE, Willy Susilo, Senior Member, IEEE, and Yi Mu, 
Senior Member, IEEE-“Identity-Based Secure Distributed Data Storage Schemes”-IEEE 
TRANSACTIONS ON COMPUTERS, 2013. 
IBSDDS SCHEMES
THANK YOU 
IBSDDS SCHEMES

Mais conteúdo relacionado

Mais procurados

Identity based distributed provable data possession in multi-cloud storage
Identity based distributed provable data possession in multi-cloud storageIdentity based distributed provable data possession in multi-cloud storage
Identity based distributed provable data possession in multi-cloud storagePapitha Velumani
 
Secure Data Sharing in Cloud Computing using Revocable Storage Identity- Base...
Secure Data Sharing in Cloud Computing using Revocable Storage Identity- Base...Secure Data Sharing in Cloud Computing using Revocable Storage Identity- Base...
Secure Data Sharing in Cloud Computing using Revocable Storage Identity- Base...rahulmonikasharma
 
Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...IGEEKS TECHNOLOGIES
 
Identity based secure distributed data storage
Identity based secure distributed data storageIdentity based secure distributed data storage
Identity based secure distributed data storageIEEEFINALYEARPROJECTS
 
Decentralized access control with authentication anonymous of data stored in ...
Decentralized access control with authentication anonymous of data stored in ...Decentralized access control with authentication anonymous of data stored in ...
Decentralized access control with authentication anonymous of data stored in ...Guellord Mpia
 
Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...Adz91 Digital Ads Pvt Ltd
 
Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...LeMeniz Infotech
 
Identity based secure distributed data storage schemes
Identity based secure distributed data storage schemesIdentity based secure distributed data storage schemes
Identity based secure distributed data storage schemesJPINFOTECH JAYAPRAKASH
 
Secure data sharing in cloud computing using revocable storage identity-based...
Secure data sharing in cloud computing using revocable storage identity-based...Secure data sharing in cloud computing using revocable storage identity-based...
Secure data sharing in cloud computing using revocable storage identity-based...Shakas Technologies
 
Identity based distributed provable data possession in multi-cloud storage
Identity based distributed provable data possession in multi-cloud storageIdentity based distributed provable data possession in multi-cloud storage
Identity based distributed provable data possession in multi-cloud storageShakas Technologies
 
Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...LeMeniz Infotech
 
Authentication on Cloud using Attribute Based Encryption
Authentication on Cloud using Attribute Based EncryptionAuthentication on Cloud using Attribute Based Encryption
Authentication on Cloud using Attribute Based EncryptionAnkit Raj
 
Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based...
Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based...Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based...
Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based...Yashwanth Reddy
 
Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...Nexgen Technology
 
Attribute Based Encryption with Privacy Preserving In Clouds
Attribute Based Encryption with Privacy Preserving In Clouds Attribute Based Encryption with Privacy Preserving In Clouds
Attribute Based Encryption with Privacy Preserving In Clouds Swathi Rampur
 
Accessing secured data in cloud computing environment
Accessing secured data in cloud computing environmentAccessing secured data in cloud computing environment
Accessing secured data in cloud computing environmentIJNSA Journal
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) ijceronline
 
Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...Papitha Velumani
 
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...Editor IJCATR
 

Mais procurados (20)

Identity based distributed provable data possession in multi-cloud storage
Identity based distributed provable data possession in multi-cloud storageIdentity based distributed provable data possession in multi-cloud storage
Identity based distributed provable data possession in multi-cloud storage
 
Secure Data Sharing in Cloud Computing using Revocable Storage Identity- Base...
Secure Data Sharing in Cloud Computing using Revocable Storage Identity- Base...Secure Data Sharing in Cloud Computing using Revocable Storage Identity- Base...
Secure Data Sharing in Cloud Computing using Revocable Storage Identity- Base...
 
Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...
 
Identity based secure distributed data storage
Identity based secure distributed data storageIdentity based secure distributed data storage
Identity based secure distributed data storage
 
Decentralized access control with authentication anonymous of data stored in ...
Decentralized access control with authentication anonymous of data stored in ...Decentralized access control with authentication anonymous of data stored in ...
Decentralized access control with authentication anonymous of data stored in ...
 
Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...
 
Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...
 
Identity based secure distributed data storage schemes
Identity based secure distributed data storage schemesIdentity based secure distributed data storage schemes
Identity based secure distributed data storage schemes
 
Secure data sharing in cloud computing using revocable storage identity-based...
Secure data sharing in cloud computing using revocable storage identity-based...Secure data sharing in cloud computing using revocable storage identity-based...
Secure data sharing in cloud computing using revocable storage identity-based...
 
Identity based distributed provable data possession in multi-cloud storage
Identity based distributed provable data possession in multi-cloud storageIdentity based distributed provable data possession in multi-cloud storage
Identity based distributed provable data possession in multi-cloud storage
 
Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...
 
Authentication on Cloud using Attribute Based Encryption
Authentication on Cloud using Attribute Based EncryptionAuthentication on Cloud using Attribute Based Encryption
Authentication on Cloud using Attribute Based Encryption
 
Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based...
Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based...Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based...
Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based...
 
Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 
Attribute Based Encryption with Privacy Preserving In Clouds
Attribute Based Encryption with Privacy Preserving In Clouds Attribute Based Encryption with Privacy Preserving In Clouds
Attribute Based Encryption with Privacy Preserving In Clouds
 
Accessing secured data in cloud computing environment
Accessing secured data in cloud computing environmentAccessing secured data in cloud computing environment
Accessing secured data in cloud computing environment
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...
 
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
 

Destaque

Encryption-Based Multilevel Model for DBMS
Encryption-Based Multilevel Model for DBMSEncryption-Based Multilevel Model for DBMS
Encryption-Based Multilevel Model for DBMSAmna Magzoub
 
Oruta privacy preserving public auditing for shared data in the cloud
Oruta privacy preserving public auditing for shared data in the cloud Oruta privacy preserving public auditing for shared data in the cloud
Oruta privacy preserving public auditing for shared data in the cloud Adz91 Digital Ads Pvt Ltd
 
Identity based proxy-oriented data uploading and remote data integrity checki...
Identity based proxy-oriented data uploading and remote data integrity checki...Identity based proxy-oriented data uploading and remote data integrity checki...
Identity based proxy-oriented data uploading and remote data integrity checki...Shakas Technologies
 
Privacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storagePrivacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storageMustaq Syed
 
PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD COMPUTING
PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGESECURITY IN CLOUD COMPUTINGPRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGESECURITY IN CLOUD COMPUTING
PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD COMPUTINGKayalvizhi Selvaraj
 
Scalable and secure sharing of public health record using attribute based Enc...
Scalable and secure sharing of public health record using attribute based Enc...Scalable and secure sharing of public health record using attribute based Enc...
Scalable and secure sharing of public health record using attribute based Enc...shreyank byadagi
 
A basic introduction to open cv for image processing
A basic introduction to open cv for image processingA basic introduction to open cv for image processing
A basic introduction to open cv for image processingChu Lam
 
Privacy Preserving Public Auditing for Data Storage Security in Cloud.ppt
Privacy Preserving Public Auditing for Data Storage Security in Cloud.pptPrivacy Preserving Public Auditing for Data Storage Security in Cloud.ppt
Privacy Preserving Public Auditing for Data Storage Security in Cloud.pptGirish Chandra
 
CLOUD CPOMPUTING SECURITY
CLOUD CPOMPUTING SECURITYCLOUD CPOMPUTING SECURITY
CLOUD CPOMPUTING SECURITYShivananda Rai
 
Image encryption using aes key expansion
Image encryption using aes key expansionImage encryption using aes key expansion
Image encryption using aes key expansionSreeda Perikamana
 
Image Processing (General Topic)
Image Processing (General Topic)Image Processing (General Topic)
Image Processing (General Topic)mcc.jeppiaar
 
Spandana image processing and compression techniques (7840228)
Spandana   image processing and compression techniques (7840228)Spandana   image processing and compression techniques (7840228)
Spandana image processing and compression techniques (7840228)indianspandana
 
Image encryption and decryption
Image encryption and decryptionImage encryption and decryption
Image encryption and decryptionAashish R
 

Destaque (20)

Encryption-Based Multilevel Model for DBMS
Encryption-Based Multilevel Model for DBMSEncryption-Based Multilevel Model for DBMS
Encryption-Based Multilevel Model for DBMS
 
Oruta privacy preserving public auditing for shared data in the cloud
Oruta privacy preserving public auditing for shared data in the cloud Oruta privacy preserving public auditing for shared data in the cloud
Oruta privacy preserving public auditing for shared data in the cloud
 
Identity based proxy-oriented data uploading and remote data integrity checki...
Identity based proxy-oriented data uploading and remote data integrity checki...Identity based proxy-oriented data uploading and remote data integrity checki...
Identity based proxy-oriented data uploading and remote data integrity checki...
 
Oruta ppt
Oruta pptOruta ppt
Oruta ppt
 
Privacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storagePrivacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storage
 
Cloud Storage and Security
Cloud Storage and SecurityCloud Storage and Security
Cloud Storage and Security
 
PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD COMPUTING
PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGESECURITY IN CLOUD COMPUTINGPRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGESECURITY IN CLOUD COMPUTING
PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD COMPUTING
 
Scalable and secure sharing of public health record using attribute based Enc...
Scalable and secure sharing of public health record using attribute based Enc...Scalable and secure sharing of public health record using attribute based Enc...
Scalable and secure sharing of public health record using attribute based Enc...
 
A basic introduction to open cv for image processing
A basic introduction to open cv for image processingA basic introduction to open cv for image processing
A basic introduction to open cv for image processing
 
Final review presentation
Final review presentationFinal review presentation
Final review presentation
 
Privacy Preserving Public Auditing for Data Storage Security in Cloud.ppt
Privacy Preserving Public Auditing for Data Storage Security in Cloud.pptPrivacy Preserving Public Auditing for Data Storage Security in Cloud.ppt
Privacy Preserving Public Auditing for Data Storage Security in Cloud.ppt
 
CLOUD CPOMPUTING SECURITY
CLOUD CPOMPUTING SECURITYCLOUD CPOMPUTING SECURITY
CLOUD CPOMPUTING SECURITY
 
Image encryption using aes key expansion
Image encryption using aes key expansionImage encryption using aes key expansion
Image encryption using aes key expansion
 
Image Processing (General Topic)
Image Processing (General Topic)Image Processing (General Topic)
Image Processing (General Topic)
 
Spandana image processing and compression techniques (7840228)
Spandana   image processing and compression techniques (7840228)Spandana   image processing and compression techniques (7840228)
Spandana image processing and compression techniques (7840228)
 
Image Encryption in java ppt.
Image Encryption in java ppt.Image Encryption in java ppt.
Image Encryption in java ppt.
 
Image Compression
Image CompressionImage Compression
Image Compression
 
Image encryption and decryption
Image encryption and decryptionImage encryption and decryption
Image encryption and decryption
 
Contouring
ContouringContouring
Contouring
 
Ppt 1
Ppt 1Ppt 1
Ppt 1
 

Semelhante a PPT FOR IDBSDDS SCHEMES

Psdot 12 a secure erasure code-based cloud storage
Psdot 12 a secure erasure code-based cloud storagePsdot 12 a secure erasure code-based cloud storage
Psdot 12 a secure erasure code-based cloud storageZTech Proje
 
IJSRED-V2I2P10
IJSRED-V2I2P10IJSRED-V2I2P10
IJSRED-V2I2P10IJSRED
 
Data Sharing: Ensure Accountability Distribution in the Cloud
Data Sharing: Ensure Accountability Distribution in the CloudData Sharing: Ensure Accountability Distribution in the Cloud
Data Sharing: Ensure Accountability Distribution in the CloudSuraj Mehta
 
Srs document for identity based secure distributed data storage schemes
Srs document for identity based secure distributed data storage schemesSrs document for identity based secure distributed data storage schemes
Srs document for identity based secure distributed data storage schemesSahithi Naraparaju
 
[Toroman/Kranjac] Red Team vs. Blue Team in Microsoft Cloud
[Toroman/Kranjac] Red Team vs. Blue Team in Microsoft Cloud[Toroman/Kranjac] Red Team vs. Blue Team in Microsoft Cloud
[Toroman/Kranjac] Red Team vs. Blue Team in Microsoft CloudEuropean Collaboration Summit
 
Secure Redundant Data Avoidance over Multi-Cloud Architecture.
Secure Redundant Data Avoidance over Multi-Cloud Architecture. Secure Redundant Data Avoidance over Multi-Cloud Architecture.
Secure Redundant Data Avoidance over Multi-Cloud Architecture. IJCERT JOURNAL
 
Achieving Secure, sclable and finegrained Cloud computing report
Achieving Secure, sclable and finegrained Cloud computing reportAchieving Secure, sclable and finegrained Cloud computing report
Achieving Secure, sclable and finegrained Cloud computing reportKiran Girase
 
Paper id 712019116
Paper id 712019116Paper id 712019116
Paper id 712019116IJRAT
 
A robust and verifiable threshold multi authority access control system in pu...
A robust and verifiable threshold multi authority access control system in pu...A robust and verifiable threshold multi authority access control system in pu...
A robust and verifiable threshold multi authority access control system in pu...IJARIIT
 
IRJET - A Secure Access Policies based on Data Deduplication System
IRJET - A Secure Access Policies based on Data Deduplication SystemIRJET - A Secure Access Policies based on Data Deduplication System
IRJET - A Secure Access Policies based on Data Deduplication SystemIRJET Journal
 
Providing user security guarantees in public infrastructure clouds
Providing user security guarantees in public infrastructure cloudsProviding user security guarantees in public infrastructure clouds
Providing user security guarantees in public infrastructure cloudsKamal Spring
 
Secure Data Storage in Cloud Using Encryption and Steganography
Secure Data Storage in Cloud Using Encryption and SteganographySecure Data Storage in Cloud Using Encryption and Steganography
Secure Data Storage in Cloud Using Encryption and Steganographyiosrjce
 
File transfer using cryptography techniques
File transfer using cryptography techniquesFile transfer using cryptography techniques
File transfer using cryptography techniquesmiteshkumar82
 

Semelhante a PPT FOR IDBSDDS SCHEMES (20)

Psdot 12 a secure erasure code-based cloud storage
Psdot 12 a secure erasure code-based cloud storagePsdot 12 a secure erasure code-based cloud storage
Psdot 12 a secure erasure code-based cloud storage
 
IJSRED-V2I2P10
IJSRED-V2I2P10IJSRED-V2I2P10
IJSRED-V2I2P10
 
Data Sharing: Ensure Accountability Distribution in the Cloud
Data Sharing: Ensure Accountability Distribution in the CloudData Sharing: Ensure Accountability Distribution in the Cloud
Data Sharing: Ensure Accountability Distribution in the Cloud
 
Srs document for identity based secure distributed data storage schemes
Srs document for identity based secure distributed data storage schemesSrs document for identity based secure distributed data storage schemes
Srs document for identity based secure distributed data storage schemes
 
[Toroman/Kranjac] Red Team vs. Blue Team in Microsoft Cloud
[Toroman/Kranjac] Red Team vs. Blue Team in Microsoft Cloud[Toroman/Kranjac] Red Team vs. Blue Team in Microsoft Cloud
[Toroman/Kranjac] Red Team vs. Blue Team in Microsoft Cloud
 
Secure Redundant Data Avoidance over Multi-Cloud Architecture.
Secure Redundant Data Avoidance over Multi-Cloud Architecture. Secure Redundant Data Avoidance over Multi-Cloud Architecture.
Secure Redundant Data Avoidance over Multi-Cloud Architecture.
 
Pp1t
Pp1tPp1t
Pp1t
 
pp1t
pp1tpp1t
pp1t
 
Pp1t
Pp1tPp1t
Pp1t
 
Achieving Secure, sclable and finegrained Cloud computing report
Achieving Secure, sclable and finegrained Cloud computing reportAchieving Secure, sclable and finegrained Cloud computing report
Achieving Secure, sclable and finegrained Cloud computing report
 
Phase1
Phase1Phase1
Phase1
 
Paper id 712019116
Paper id 712019116Paper id 712019116
Paper id 712019116
 
A robust and verifiable threshold multi authority access control system in pu...
A robust and verifiable threshold multi authority access control system in pu...A robust and verifiable threshold multi authority access control system in pu...
A robust and verifiable threshold multi authority access control system in pu...
 
262 265
262 265262 265
262 265
 
IRJET - A Secure Access Policies based on Data Deduplication System
IRJET - A Secure Access Policies based on Data Deduplication SystemIRJET - A Secure Access Policies based on Data Deduplication System
IRJET - A Secure Access Policies based on Data Deduplication System
 
Providing user security guarantees in public infrastructure clouds
Providing user security guarantees in public infrastructure cloudsProviding user security guarantees in public infrastructure clouds
Providing user security guarantees in public infrastructure clouds
 
Paper2
Paper2Paper2
Paper2
 
J017236366
J017236366J017236366
J017236366
 
Secure Data Storage in Cloud Using Encryption and Steganography
Secure Data Storage in Cloud Using Encryption and SteganographySecure Data Storage in Cloud Using Encryption and Steganography
Secure Data Storage in Cloud Using Encryption and Steganography
 
File transfer using cryptography techniques
File transfer using cryptography techniquesFile transfer using cryptography techniques
File transfer using cryptography techniques
 

Mais de Sahithi Naraparaju

SYSTEM ARCHITECTURE / UML DIAGRAMS FOR IDENTITY BASED SECURE DISTRIBUTED DATA...
SYSTEM ARCHITECTURE / UML DIAGRAMS FOR IDENTITY BASED SECURE DISTRIBUTED DATA...SYSTEM ARCHITECTURE / UML DIAGRAMS FOR IDENTITY BASED SECURE DISTRIBUTED DATA...
SYSTEM ARCHITECTURE / UML DIAGRAMS FOR IDENTITY BASED SECURE DISTRIBUTED DATA...Sahithi Naraparaju
 
literature survey for identity based secure distributed data storage
literature survey for identity based secure distributed data storage literature survey for identity based secure distributed data storage
literature survey for identity based secure distributed data storage Sahithi Naraparaju
 
66913017 java-ring-1217949449014046-9 (1)
66913017 java-ring-1217949449014046-9 (1)66913017 java-ring-1217949449014046-9 (1)
66913017 java-ring-1217949449014046-9 (1)Sahithi Naraparaju
 
Self protecteion in clustered distributed system new
Self protecteion in clustered distributed system newSelf protecteion in clustered distributed system new
Self protecteion in clustered distributed system newSahithi Naraparaju
 
CONSTANTS, VARIABLES & DATATYPES IN C
CONSTANTS, VARIABLES & DATATYPES IN CCONSTANTS, VARIABLES & DATATYPES IN C
CONSTANTS, VARIABLES & DATATYPES IN CSahithi Naraparaju
 
constants, variables and datatypes in C
constants, variables and datatypes in Cconstants, variables and datatypes in C
constants, variables and datatypes in CSahithi Naraparaju
 
Steps for Developing a 'C' program
 Steps for Developing a 'C' program Steps for Developing a 'C' program
Steps for Developing a 'C' programSahithi Naraparaju
 
Self protecteion in clustered distributed system new
Self protecteion in clustered distributed system newSelf protecteion in clustered distributed system new
Self protecteion in clustered distributed system newSahithi Naraparaju
 
A Batch-authenticated And Key Agreement Framework For P2p-based Online Social...
A Batch-authenticated And Key AgreementFramework For P2p-based Online Social...A Batch-authenticated And Key AgreementFramework For P2p-based Online Social...
A Batch-authenticated And Key Agreement Framework For P2p-based Online Social...Sahithi Naraparaju
 

Mais de Sahithi Naraparaju (13)

SYSTEM ARCHITECTURE / UML DIAGRAMS FOR IDENTITY BASED SECURE DISTRIBUTED DATA...
SYSTEM ARCHITECTURE / UML DIAGRAMS FOR IDENTITY BASED SECURE DISTRIBUTED DATA...SYSTEM ARCHITECTURE / UML DIAGRAMS FOR IDENTITY BASED SECURE DISTRIBUTED DATA...
SYSTEM ARCHITECTURE / UML DIAGRAMS FOR IDENTITY BASED SECURE DISTRIBUTED DATA...
 
over view of viruses
over view of virusesover view of viruses
over view of viruses
 
literature survey for identity based secure distributed data storage
literature survey for identity based secure distributed data storage literature survey for identity based secure distributed data storage
literature survey for identity based secure distributed data storage
 
66913017 java-ring-1217949449014046-9 (1)
66913017 java-ring-1217949449014046-9 (1)66913017 java-ring-1217949449014046-9 (1)
66913017 java-ring-1217949449014046-9 (1)
 
Self protecteion in clustered distributed system new
Self protecteion in clustered distributed system newSelf protecteion in clustered distributed system new
Self protecteion in clustered distributed system new
 
OVERVIEW OF ‘C’ PROGRAM
OVERVIEW OF ‘C’ PROGRAMOVERVIEW OF ‘C’ PROGRAM
OVERVIEW OF ‘C’ PROGRAM
 
CONSTANTS, VARIABLES & DATATYPES IN C
CONSTANTS, VARIABLES & DATATYPES IN CCONSTANTS, VARIABLES & DATATYPES IN C
CONSTANTS, VARIABLES & DATATYPES IN C
 
constants, variables and datatypes in C
constants, variables and datatypes in Cconstants, variables and datatypes in C
constants, variables and datatypes in C
 
Steps for Developing a 'C' program
 Steps for Developing a 'C' program Steps for Developing a 'C' program
Steps for Developing a 'C' program
 
pre processor directives in C
pre processor directives in Cpre processor directives in C
pre processor directives in C
 
Self protecteion in clustered distributed system new
Self protecteion in clustered distributed system newSelf protecteion in clustered distributed system new
Self protecteion in clustered distributed system new
 
A Batch-authenticated And Key Agreement Framework For P2p-based Online Social...
A Batch-authenticated And Key AgreementFramework For P2p-based Online Social...A Batch-authenticated And Key AgreementFramework For P2p-based Online Social...
A Batch-authenticated And Key Agreement Framework For P2p-based Online Social...
 
Haptic technology
Haptic technologyHaptic technology
Haptic technology
 

Último

Most Inspirational Leaders Empowering the Educational Sector, 2024.pdf
Most Inspirational Leaders Empowering the Educational Sector, 2024.pdfMost Inspirational Leaders Empowering the Educational Sector, 2024.pdf
Most Inspirational Leaders Empowering the Educational Sector, 2024.pdfTheKnowledgeReview2
 
办澳洲詹姆斯库克大学毕业证成绩单pdf电子版制作修改
办澳洲詹姆斯库克大学毕业证成绩单pdf电子版制作修改办澳洲詹姆斯库克大学毕业证成绩单pdf电子版制作修改
办澳洲詹姆斯库克大学毕业证成绩单pdf电子版制作修改yuu sss
 
定制(NYIT毕业证书)美国纽约理工学院毕业证成绩单原版一比一
定制(NYIT毕业证书)美国纽约理工学院毕业证成绩单原版一比一定制(NYIT毕业证书)美国纽约理工学院毕业证成绩单原版一比一
定制(NYIT毕业证书)美国纽约理工学院毕业证成绩单原版一比一2s3dgmej
 
办理学位证(纽伦堡大学文凭证书)纽伦堡大学毕业证成绩单原版一模一样
办理学位证(纽伦堡大学文凭证书)纽伦堡大学毕业证成绩单原版一模一样办理学位证(纽伦堡大学文凭证书)纽伦堡大学毕业证成绩单原版一模一样
办理学位证(纽伦堡大学文凭证书)纽伦堡大学毕业证成绩单原版一模一样umasea
 
Ch. 9- __Skin, hair and nail Assessment (1).pdf
Ch. 9- __Skin, hair and nail Assessment (1).pdfCh. 9- __Skin, hair and nail Assessment (1).pdf
Ch. 9- __Skin, hair and nail Assessment (1).pdfJamalYaseenJameelOde
 
原版定制copy澳洲查尔斯达尔文大学毕业证CDU毕业证成绩单留信学历认证保障质量
原版定制copy澳洲查尔斯达尔文大学毕业证CDU毕业证成绩单留信学历认证保障质量原版定制copy澳洲查尔斯达尔文大学毕业证CDU毕业证成绩单留信学历认证保障质量
原版定制copy澳洲查尔斯达尔文大学毕业证CDU毕业证成绩单留信学历认证保障质量sehgh15heh
 
定制(SCU毕业证书)南十字星大学毕业证成绩单原版一比一
定制(SCU毕业证书)南十字星大学毕业证成绩单原版一比一定制(SCU毕业证书)南十字星大学毕业证成绩单原版一比一
定制(SCU毕业证书)南十字星大学毕业证成绩单原版一比一z xss
 
Escort Service Andheri WhatsApp:+91-9833363713
Escort Service Andheri WhatsApp:+91-9833363713Escort Service Andheri WhatsApp:+91-9833363713
Escort Service Andheri WhatsApp:+91-9833363713Riya Pathan
 
do's and don'ts in Telephone Interview of Job
do's and don'ts in Telephone Interview of Jobdo's and don'ts in Telephone Interview of Job
do's and don'ts in Telephone Interview of JobRemote DBA Services
 
LinkedIn Strategic Guidelines April 2024
LinkedIn Strategic Guidelines April 2024LinkedIn Strategic Guidelines April 2024
LinkedIn Strategic Guidelines April 2024Bruce Bennett
 
定制(Waikato毕业证书)新西兰怀卡托大学毕业证成绩单原版一比一
定制(Waikato毕业证书)新西兰怀卡托大学毕业证成绩单原版一比一定制(Waikato毕业证书)新西兰怀卡托大学毕业证成绩单原版一比一
定制(Waikato毕业证书)新西兰怀卡托大学毕业证成绩单原版一比一Fs
 
ME 205- Chapter 6 - Pure Bending of Beams.pdf
ME 205- Chapter 6 - Pure Bending of Beams.pdfME 205- Chapter 6 - Pure Bending of Beams.pdf
ME 205- Chapter 6 - Pure Bending of Beams.pdfaae4149584
 
Black and White Minimalist Co Letter.pdf
Black and White Minimalist Co Letter.pdfBlack and White Minimalist Co Letter.pdf
Black and White Minimalist Co Letter.pdfpadillaangelina0023
 
Application deck- Cyril Caudroy-2024.pdf
Application deck- Cyril Caudroy-2024.pdfApplication deck- Cyril Caudroy-2024.pdf
Application deck- Cyril Caudroy-2024.pdfCyril CAUDROY
 
Issues in the Philippines (Unemployment and Underemployment).pptx
Issues in the Philippines (Unemployment and Underemployment).pptxIssues in the Philippines (Unemployment and Underemployment).pptx
Issues in the Philippines (Unemployment and Underemployment).pptxJenniferPeraro1
 
Ethics of Animal Research Laika mission.ppt
Ethics of Animal Research Laika mission.pptEthics of Animal Research Laika mission.ppt
Ethics of Animal Research Laika mission.pptShafqatShakeel1
 
Gurgaon Call Girls: Free Delivery 24x7 at Your Doorstep G.G.N = 8377087607
Gurgaon Call Girls: Free Delivery 24x7 at Your Doorstep G.G.N = 8377087607Gurgaon Call Girls: Free Delivery 24x7 at Your Doorstep G.G.N = 8377087607
Gurgaon Call Girls: Free Delivery 24x7 at Your Doorstep G.G.N = 8377087607dollysharma2066
 
定制(UQ毕业证书)澳洲昆士兰大学毕业证成绩单原版一比一
定制(UQ毕业证书)澳洲昆士兰大学毕业证成绩单原版一比一定制(UQ毕业证书)澳洲昆士兰大学毕业证成绩单原版一比一
定制(UQ毕业证书)澳洲昆士兰大学毕业证成绩单原版一比一lvtagr7
 

Último (20)

Most Inspirational Leaders Empowering the Educational Sector, 2024.pdf
Most Inspirational Leaders Empowering the Educational Sector, 2024.pdfMost Inspirational Leaders Empowering the Educational Sector, 2024.pdf
Most Inspirational Leaders Empowering the Educational Sector, 2024.pdf
 
办澳洲詹姆斯库克大学毕业证成绩单pdf电子版制作修改
办澳洲詹姆斯库克大学毕业证成绩单pdf电子版制作修改办澳洲詹姆斯库克大学毕业证成绩单pdf电子版制作修改
办澳洲詹姆斯库克大学毕业证成绩单pdf电子版制作修改
 
定制(NYIT毕业证书)美国纽约理工学院毕业证成绩单原版一比一
定制(NYIT毕业证书)美国纽约理工学院毕业证成绩单原版一比一定制(NYIT毕业证书)美国纽约理工学院毕业证成绩单原版一比一
定制(NYIT毕业证书)美国纽约理工学院毕业证成绩单原版一比一
 
办理学位证(纽伦堡大学文凭证书)纽伦堡大学毕业证成绩单原版一模一样
办理学位证(纽伦堡大学文凭证书)纽伦堡大学毕业证成绩单原版一模一样办理学位证(纽伦堡大学文凭证书)纽伦堡大学毕业证成绩单原版一模一样
办理学位证(纽伦堡大学文凭证书)纽伦堡大学毕业证成绩单原版一模一样
 
Ch. 9- __Skin, hair and nail Assessment (1).pdf
Ch. 9- __Skin, hair and nail Assessment (1).pdfCh. 9- __Skin, hair and nail Assessment (1).pdf
Ch. 9- __Skin, hair and nail Assessment (1).pdf
 
Young Call~Girl in Pragati Maidan New Delhi 8448380779 Full Enjoy Escort Service
Young Call~Girl in Pragati Maidan New Delhi 8448380779 Full Enjoy Escort ServiceYoung Call~Girl in Pragati Maidan New Delhi 8448380779 Full Enjoy Escort Service
Young Call~Girl in Pragati Maidan New Delhi 8448380779 Full Enjoy Escort Service
 
原版定制copy澳洲查尔斯达尔文大学毕业证CDU毕业证成绩单留信学历认证保障质量
原版定制copy澳洲查尔斯达尔文大学毕业证CDU毕业证成绩单留信学历认证保障质量原版定制copy澳洲查尔斯达尔文大学毕业证CDU毕业证成绩单留信学历认证保障质量
原版定制copy澳洲查尔斯达尔文大学毕业证CDU毕业证成绩单留信学历认证保障质量
 
定制(SCU毕业证书)南十字星大学毕业证成绩单原版一比一
定制(SCU毕业证书)南十字星大学毕业证成绩单原版一比一定制(SCU毕业证书)南十字星大学毕业证成绩单原版一比一
定制(SCU毕业证书)南十字星大学毕业证成绩单原版一比一
 
Escort Service Andheri WhatsApp:+91-9833363713
Escort Service Andheri WhatsApp:+91-9833363713Escort Service Andheri WhatsApp:+91-9833363713
Escort Service Andheri WhatsApp:+91-9833363713
 
do's and don'ts in Telephone Interview of Job
do's and don'ts in Telephone Interview of Jobdo's and don'ts in Telephone Interview of Job
do's and don'ts in Telephone Interview of Job
 
LinkedIn Strategic Guidelines April 2024
LinkedIn Strategic Guidelines April 2024LinkedIn Strategic Guidelines April 2024
LinkedIn Strategic Guidelines April 2024
 
定制(Waikato毕业证书)新西兰怀卡托大学毕业证成绩单原版一比一
定制(Waikato毕业证书)新西兰怀卡托大学毕业证成绩单原版一比一定制(Waikato毕业证书)新西兰怀卡托大学毕业证成绩单原版一比一
定制(Waikato毕业证书)新西兰怀卡托大学毕业证成绩单原版一比一
 
ME 205- Chapter 6 - Pure Bending of Beams.pdf
ME 205- Chapter 6 - Pure Bending of Beams.pdfME 205- Chapter 6 - Pure Bending of Beams.pdf
ME 205- Chapter 6 - Pure Bending of Beams.pdf
 
Black and White Minimalist Co Letter.pdf
Black and White Minimalist Co Letter.pdfBlack and White Minimalist Co Letter.pdf
Black and White Minimalist Co Letter.pdf
 
Application deck- Cyril Caudroy-2024.pdf
Application deck- Cyril Caudroy-2024.pdfApplication deck- Cyril Caudroy-2024.pdf
Application deck- Cyril Caudroy-2024.pdf
 
Issues in the Philippines (Unemployment and Underemployment).pptx
Issues in the Philippines (Unemployment and Underemployment).pptxIssues in the Philippines (Unemployment and Underemployment).pptx
Issues in the Philippines (Unemployment and Underemployment).pptx
 
Students with Oppositional Defiant Disorder
Students with Oppositional Defiant DisorderStudents with Oppositional Defiant Disorder
Students with Oppositional Defiant Disorder
 
Ethics of Animal Research Laika mission.ppt
Ethics of Animal Research Laika mission.pptEthics of Animal Research Laika mission.ppt
Ethics of Animal Research Laika mission.ppt
 
Gurgaon Call Girls: Free Delivery 24x7 at Your Doorstep G.G.N = 8377087607
Gurgaon Call Girls: Free Delivery 24x7 at Your Doorstep G.G.N = 8377087607Gurgaon Call Girls: Free Delivery 24x7 at Your Doorstep G.G.N = 8377087607
Gurgaon Call Girls: Free Delivery 24x7 at Your Doorstep G.G.N = 8377087607
 
定制(UQ毕业证书)澳洲昆士兰大学毕业证成绩单原版一比一
定制(UQ毕业证书)澳洲昆士兰大学毕业证成绩单原版一比一定制(UQ毕业证书)澳洲昆士兰大学毕业证成绩单原版一比一
定制(UQ毕业证书)澳洲昆士兰大学毕业证成绩单原版一比一
 

PPT FOR IDBSDDS SCHEMES

  • 1. IDENTITY BASED SECURE DISTRIBUTED DATA STORAGE SCHEMES PRESENTED BY: N.SAHITHI (12C11D5816) UNDER GUIDANCE OF Mr. J.NAGARAJU, (M.TECH)
  • 2. ABSTRACT Secure distributed data storage can shift the burden of maintaining a large number of files from owner to proxy servers. Proxy servers can convert encrypted files for owner to encrypted files for receiver without necessity of knowing the content of original files. IBSDSS schemes uses 2 identity based secure distributed data storage schemes. First scheme is secure against chosen plaintext attacks (CPA). Second scheme is secure against chosen chipertext attacks (CCA). It is first identity based secure distributed data storage schemes where access permissions is made by owner of file and collusion attacks can be protected. IBSDDS SCHEMES
  • 3. INTRODUCTION  Cloud computing provides users a convenient mechanism to manage their personal files with notion called Database-As-Services (DAS).  Proxy servers can perform some functions on outsourced cipher texts without knowing anything about original files.  This technique has not been employed due to confidentiality and integrity. IBSDDS SCHEMES
  • 4.  To address these issues IBSDDS scheme is proposed, which uses two schemes. These schemes capture following properties : i) The file owner can decide the access permission independently. ii) For one query, a receiver can only access one file instead of all files of IBSDDS SCHEMES the owner. iii) Our schemes secure against the collusion attacks.
  • 5. PROBLEM STATEMENT  Writing a problem statement helps to identify the purpose of the project clearly. A problem statement consists of 3 parts namely: IBSDDS SCHEMES 1) Ideal 2) Reality 3) Consequences 1) Ideal : cloud computing provides users with a convenient mechanism to manage their personal files with a notion called database-as-service (DAS).  In DAS schemes, user outsources his encrypted files to proxy server so, that the burden of maintaining large amount of files on local system can be reduced.
  • 6. 2) Reality: Security and privacy are biggest concerns of each and every user.  Some user might feel uncomfortable in surrendering their personal data to a third IBSDDS SCHEMES party.  No guarantee to files outsourced to proxy servers.  As the applications and services run on remote third party environments, users have limited control over the function and execution of software and hardware. 3) Consequences: In response to above problem, Identity based secure distributed datastorage schemes were proposed.  In this IBSDDS proxy server validates the outsourced cipher text and store them.  To prevent unauthorized access proxy validates user by his id and password.
  • 7. LITERATURE SURVEY  Atomic proxy crypto system where a semi-trusted proxy server can transfer a cipher text of the original decryptor to a cipher text for the designated decryptor without knowing plain text. It is used in e-mail forwarding.  Identity based crypto system introduced by shamir. It is a system where the public key can be arbitrary string and secret key is issued by trusted third party. IBSDDS SCHEMES
  • 8.  Identity-based proxy encryption (IBPE) was proposed by Ivan and Dodis .  In these schemes, the master secret key which is used to extract secret keys for users is split into 2 parts one is sent to proxy server other is sent to user.  The user can decrypt cipher text with the help of proxy server, but these schemes are not secure against collusion attacks.  Identity- based proxy re-encryption proposed by green and ateniese. Where proxy server can transfer a cipher text of original decryptor to cipher text of designated decryptor after he gets a re-encryption key. IBSDDS SCHEMES
  • 9. EXISTING SYSTEM  Cloud computing provides users with convenient mechanism to manage their personal files with notation called database as a service (DAS).  Proxy server can perform some functions on outsourced cipher texts without knowing anything about original files.  Therefore, how to guarantee the outsourced files are not accessed by users unauthorized users and not modified by proxy severs is an important problem that has been considered in data storage research community. IBSDDS SCHEMES
  • 10. DISADVANTAGES OF EXISTING SYSTEM  Users are especially concerned on the confidentiality, integrity and query of outsourced files as cloud computing is complicated than local data storage systems, as cloud is managed by untrusted third party.  There is no guarantee that the outsourced files are not accessed by unauthorized users and not modified by proxy severs is an important problem. IBSDDS SCHEMES
  • 11. PROPOSED SYSTEM  In proposed project for one query, the receiver can access one of the owner’s file instead of accessing all files.  An access permission is bound not only to the identity of receiver but also to the IBSDDS SCHEMES file.  The access permission can be decided by owner, instead of trusted third party. Proposed project is secure against collusion attacks.
  • 12. ADVANTAGES OF PROPOSED SYSTEM  It has 2 schemes of security: i) the first scheme is secure against chosen plain text attacks (CPA). ii) the second scheme is secure against chosen cipher text attacks (CCA).  For one query, a receiver can access only one file , instead of all files of the owner.  To achieve stronger security and implement file based access control ,the owner must be online to authenticate requesters and also generate access permissions for them. IBSDDS SCHEMES
  • 13. STEPS INVOLVED IN IBSDDS SCHEME IMPLEMENTATION ARE: STEP 1: The file owner encrypts his files under his identity prior to outsourcing a files to proxy servers. STEP 2: He (owner of file) sends cipher texts to proxy servers (as he encrypted his files under his identity in step1 so that cipher text is generated ). STEP 3 : Proxy server transforms a cipher text encrypted under identity of the owner to a cipher text encrypted under the identity of receiver, only after the receiver has obtained access permission from owner of the file (file owner). IBSDDS SCHEMES
  • 14. REQUIREMENT SPECIFICATION HARDWARE REQUIREMENTS:  Hardware - Pentium IV  Speed - 1.1 GHz  RAM - 1GB  Monitor - SVGA IBSDDS SCHEMES
  • 15. SOFTWARE REQUIREMENTS:  Operating System : Windows xp/ 7/8  Technology : Java  IDE : My Eclipse  Web Server : Tomcat  Database : My SQL  Java Version : JDK1.7 IBSDDS SCHEMES
  • 16. MODULES  IBSDDS scheme consists of 4 modules : i) Data Storage system ii) File system iii) Storage-based Intrusion detection system iv) Cryptographic File System IBSDDS SCHEMES
  • 17. MODULE - 1 1) Data Storage system : Data storage system enable user to store their data to external proxy server to enhance access and availability and reduce maintenance cost. IBSDDS SCHEMES
  • 18. MODULE - 2 2) File System: In these systems, proxy servers are assumed to be trusted. Proxy authenticate receivers and validate access permissions.  The interactions between the proxy servers and receivers are executed in a secure IBSDDS SCHEMES channel.  In these schemes, a receiver authenticates himself to the proxy server using his password
  • 19. MODULE - 3 Storage-based Intrusion Detection System: In this systems, an intrusion detection scheme is embedded in proxy servers or the file owner to detect the intruder’s behaviors, such as adding backdoors, inserting Trojan horses and tampering with audit logs.  These schemes can be classified into two types: i) Host-based system and ii) Network-based system. IBSDDS SCHEMES
  • 20. MODULE - 4 Cryptographic File System: In these systems, an end to-end security is provided by cryptographic protocols which are executed by the file owner to prevent proxy servers and unauthorized users from modifying and accessing the sensitive files.  These systems can be divided into two types: 1) Shared file system and 2) Non-shared system IBSDDS SCHEMES
  • 25. TECHNOLOGIES IBSDDS SCHEMES  Java  MYSQL
  • 26. SCREEN SHOTS Screen shot 1: Welcome page IBSDDS SCHEMES
  • 27. Screen shot 2: Registration page IBSDDS SCHEMES
  • 28. Screenshot 3: Login page IBSDDS SCHEMES
  • 29. Screen shot 4: Data owner choosing a file from system to upload IBSDDS SCHEMES
  • 30. Screenshot 5: Proxy server providing key IBSDDS SCHEMES
  • 31. Screenshot 6: Proxy server user authentication page IBSDDS SCHEMES
  • 32. Screen shot 7: Welcome page for authorized user IBSDDS SCHEMES
  • 33. Screen shot 8:User enter’s secret key to view files IBSDDS SCHEMES
  • 34. Screen shot 9: User chooses a file to view IBSDDS SCHEMES
  • 35. Screen shot 10: Proxy server asks for random key to view file IBSDDS SCHEMES
  • 36. Screen shot 11:Encrypted format file is accessed to user IBSDDS SCHEMES
  • 37. Screen shot 12: Proxy server asks for random key (to decrypt file). IBSDDS SCHEMES
  • 38. Screen shot 14: Decrypted File is accessed to user IBSDDS SCHEMES
  • 39. CONCLUSION Distributed data storage schemes provide the users with convenience to outsource their files to untrusted proxy servers. Identity-based secure distributed data storage (IBSDDS) schemes are a special kind of distributed data storage schemes where users are identified by their identities and can communicate without the need of verifying the public key certificates. IBSDDS SCHEMES
  • 40. FUTURE ENHANCEMENTS Future enhancements for identity-based secure distributed data storage (IBSDDS) are to allow user to upload PDF files and excel sheets. Future research will include advancements like uploading the pictures, images, videos in encrypted format for user convenience. IBSDDS SCHEMES
  • 41. REFERENCES Jinguang Han, Student Member, IEEE, Willy Susilo, Senior Member, IEEE, and Yi Mu, Senior Member, IEEE-“Identity-Based Secure Distributed Data Storage Schemes”-IEEE TRANSACTIONS ON COMPUTERS, 2013. IBSDDS SCHEMES
  • 42. THANK YOU IBSDDS SCHEMES