Professional Documents
Culture Documents
P. Vidhya Lakshmi1
Associate Professor
Department of Information Technology
2
National Engineering College,
ssganesa@yahoo.com
Abstract Cloud computing provides the facility to access shared resources and common support which contributes
services on demand over the network to perform operations that meet changing business needs. A cloud storage system,
consisting of a collection of storage servers, affords long-term storage services over the internet. Storing the data in a third
party cloud system cause serious concern over data confidentiality, without considering the local infrastructure limitations,
the cloud services allow the user to enjoy the cloud applications. As the different users may be working in the
collaborative relationship, the data sharing becomes significant to achieve productive benefit during the data accessing.
The existing security system only focuses on the authentication; it shows that users private data cannot be accessed by the
fake users. To address the above cloud storage privacy issue shared authority based privacy-preserving authentication
protocol is used. In the SAPA, the shared access authority is achieved by anonymous access request and privacy
consideration, attribute based access control allows the user to access their own data fields. To provide the data sharing
among the multiple users proxy re-encryption scheme is applied by the cloud server. The privacy-preserving data access
authority sharing is attractive for multi-user collaborative cloud applications.
Index Terms Authentication Protocol, Cloud computing, Privacy Preserving, Shared Authority
1 INTRODUCTION
Cloud computing is one of the emerging technologies [10]. The
cloud environment is a large open distributed system. Hence it is
important to preserve the data, as well as, privacy of users, without
considering the local infrastructure limitations; the cloud services
allow the user to enjoy the cloud applications. [3], [4]. The Cloud
is the default symbol of the internet in diagrams. The broader term of
Computing encompasses: computation, co-ordination logic,
storage. Fig. 1 describes that the cloud computing is a term used to
refer a model of computing the network, in which a program or
application runs on a connected servers rather than on a local
computing device such as a system, tablet or Smartphone.
Research in cloud computing is receiving a great deal of attention
from each educational and industrial worlds. In cloud computing,
users will source their compute and storage to servers (also called
clouds) exploitation web. This frees users from the hassles of
maintaining resources on-site. Clouds will give many varieties of
services, infrastructures and platforms assist developers write
applications (e.g., Amazons S3, Windows Azure) [5]. Since services
are outsourced to a foreign server, security and privacy are of huge
concern in cloud computing. In one hand, the user ought to evidence
itself before initiating any dealings, and on the opposite hand, it
should be ensured that the cloud will not tamper with the information
that's outsourced. User privacy is additionally required so the cloud
or different users don't apprehend the identity of the user. The cloud
will hold the user in control of the information it outsources, and
likewise, the cloud is itself in control of the services it provides. It
also verifies validity of the user who stores the information. Except
for the technical solutions to confirm security and privacy, there's
conjointly a necessity for enforcement. Efficient search is
additionally a very important concern in clouds.
135
2.1 Delegation
Delegations allow a message recipient (key holder) to generate a reencryption key based on his secret key based and the key of the
delegated user. This re-encryption key is used as input data to the reencryption function, which is finished as ciphertexts to the delegated
key for users. Asymmetric proxy re-encryption schemes come in bidirectional and unidirectional varieties.
2.2 Transitivity
Transitive proxy re-encryption schemes allow for a ciphertext to be
re-encrypted a various number of times. For example, a ciphertext of
the jack might be re-encrypted from Jack to Charlie, and then again
it was re-encrypted from Charlie to Ravi and so on. Non-transitive
schemes allow for only one (or a limited number) of re-encryptions
on a given ciphertext. Currently, there is no known Unidirectional,
transitive proxy re-encryption scheme.
3 PROPOSED WORK
Fig. 2 illustrates a system model for the cloud storage architecture.
The owner uploads the file in the server and it was in encrypted
format. If any user what the owner file, then user send the request to
the server for download. Then the server checks the file attributes
and policy. If the requested file attribute and stored files attributes
are matched, it will allow accessing the file. Otherwise, doesnt
allow accessing the file
3.1 Admin Login
136
The admin has a wider control over the data, since it is being shared
in the cloud. In order to provide security, access control is used. If
the admin allows the user to access the data, then he/she can access
it. If the access control is denied, then the user cannot download the
137
[7]
[8]
[9]
[10]
4 CONCLUSION
In this paper, to achieve a privacy preserving access authority
sharing in cloud computing. We identify a new privacy challenge
during data accessing. Data confidentiality and data integrity is
guaranteed by authentication. During the transmission the wrapped
values are exchanged hence data anonymity is achieved. Anonymous
access requests enhances the user privacy that privately inform the
cloud server about the user access desires. To prevent the session
correlation, the session identifiers realizes the forward security. This
shows that the proposed scheme can applied for enhanced privacy
preservation in cloud applications.
REFERENCES
[1]
[2]
[3]
[4]
[5]
[6]
138