Digital Data Encryption Using Cloud

Page 1

IJSTE - International Journal of Science Technology & Engineering | Volume 2 | Issue 09 | March 2016 ISSN (online): 2349-784X

Digital Data Encryption using Cloud Amruta Mane Department of Computer Engineering Trinity College of Engineering and Research

Neha More Department of Computer Engineering Trinity College of Engineering and Research

Shraddha Khamkar Department of Computer Engineering Trinity College of Engineering and Research

Poonam Kolate Department of Computer Engineering Trinity College of Engineering and Research

Abstract Main aim of Identity -Based Access Control project is to store the important data from cloud. This mechanism is to carry out the rating system for preventing specific digital content like (audio, video, images etc) from being obtained by appropriate users. We introduce an access-control technique that we refer to as attribute-based encryption (ABE). An extension of the cryptographic technique of identity-based encryption (IBE), our proposed ABE scheme can serve as the basis of an access-control architecture where interaction is not require for entities with a trusted authority in order to gain access to sensitive data.In this paper, we proposed an identity based access control approach for digital content based on cipher text-policy attribute-based encryption. Only one copy of encrypted digital content is required to share with multiple users. In this paper we represent a system for realizing complex access control on encrypted data that we call Cipher text-Policy Attribute-Based Encryption. By using such techniques encrypted data can be kept confidential even if the storage server is untrusted; Previous Attribute- Based Encryption systems used attributes to describe the encrypted data and built policies into user’s keys; while in our system attributes are used for describing a user’s credentials, and a party for encrypting data determines a policy for who can decrypt. We present a ne w methodology for realizing Cipher-text Policy Attribute Encryption (CP-ABE) under concrete and non-interactive cryptographic assumptions in the standard model. Our solutions allow any encrypt to specify access control in terms of any access formula over the attributes in the system.As shown in our performance analysis with respect of security, space complexity, and time complexity, identity-based access control outperforms the traditional access control list based and encryption-based access control approaches. Keywords: Identity-based; access control; rating system; cipher text-policy attribute-based encryption ________________________________________________________________________________________________________ I.

INTRODUCTION

Various multimedia content, such as audio, video, images, text messages and so on, is digitalized. As the rapid development of cloud computing, digital content is easily spread out on TV and Internet. A simple and straightforward mechanism is applying the access control on the trusted content server. In cloud environments, the digital content is possible to be duplicated to another content server which may not provide access control .If the traditional encryption is applied to provide access control, there must be multiple copies of the same digital content for multiple users. This will result in the waste of resources. The project provides the authentication for the data in digital format. In the era of cloud computing, safe keeping of the digital data is challenge i.e. implementing the rating system is to provide an identity-based access control mechanism for these rated digital contents. It provides the control over authority, content provider and content user. The encryption of the data is done with the help of 3 keys 1 public key,1 private key and one master key. Content provider is one who attempts to distribute digital content in the compliance with corresponding rating system. Content user is one who attempts to access digital content. Hence total identity based access control is achieved. II. MATHEMATICAL MODEL Set Theory Analysis: a. Let S be the Identity based access control as the final set S =f........ Identify the inputs as P, R S = fP, R, D P= fP1, P2,...jP gives the security parameters g R=fR1, R2,...jR is the User attributes g D= fD1, D2,..jD data in transfer g

All rights reserved by www.ijste.org

116


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.