International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 11 Issue: 05 | May 2024
www.irjet.net
p-ISSN: 2395-0072
SecureCloud Access: Enhanced Data Control and Expressive Data Management using crypto+ Sri Varsha Shwetha M1 ,Dhanushya M2, Preethi N3, Roshni R4,Soniya J 5 1 Assistant Professor,Dept of Information of Technology,Meenakshi College Of Engineering 2,3,4,5 Students of ,Dept of Information of Technology,Meenakshi College Of Engineering
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - Secure cloud storage, which is an emerging
auditor will process the data owners request and concludes that who is the guilty.
cloud service, is designed to protect the confidentiality of outsourced data but also to provide flexible data access for cloud users whose data is out of physical control. Cipher text Policy Attribute-Based Encryption (CP-ABE) is regarded as one of the most promising techniques that may be leveraged to secure the guarantee of the service. However, the use of CP-ABE may yield an inevitable security breach which is known as the misuse of access credential (i.e. decryption rights),due to the intrinsic “all-or-nothing” decryption feature of CP-ABE. In this paper, we investigate the two main cases of access credential misuse: one is on the semi-trusted authority side, and the other is on the side of cloud user. To mitigate the misuse, we propose the first accountable authority and revocable CP-ABE based cloud storage system with white-box traceability and auditing, referred to as Crypt Cloud. We also present the security analysis and further demonstrate the utility of our system via experiments.
1. Organization profile creation & Key Generation User has an initial level Registration Process at the web end. The users provide their own personal information for this process. The server in turn stores the information in its database. Now the Accountable STA (semi-trusted Authority) generates decryption keys to the users based on their Attributes Set (e.g. name, mail-id, contact number etc..,). User gets the provenance to access the Organization data after getting decryption keys from Accountable STA
Key Words: Secure cloud storage, CP-ABE (CiphertextPolicy Attribute-Based Encryption), authority, Whitebox, Auditing, CryptCloud+
1.INTRODUCTION Data owners will store their data in public cloud along with encryption and particular set of attributes to access control on the cloud data. While uploading the data into public cloud they will assign some attribute set to their data. If any authorized cloud user wants to download their data they should enter that particular attribute set to perform further actions on data owner’s data. A cloud user wants to register their details under cloud organization to access the data owner’s data. Users want to submit their details as attributes along with their designation. Based on the user details SemiTrusted Authority generates decryption keys to get control on owner’s data. An user can perform a lot of operations over the cloud data. If the user wants to read the cloud data he needs to be entering some read related attributes, and if he wants to write the data he needs to be entering write related attributes. For each and every action user in an organization would be verified with their unique attribute set. These attributes would be shared by the admins to the authorized users in cloud organization. These attributes will be stored in the policy files in a cloud. If any user leaks their unique decryption key to the any malicious user data owners wants to trace by sending audit request to auditor and
© 2024, IRJET
|
Impact Factor value: 8.226
Fig.1 Organization profile creation & Key Generation
2. Data Owners File Upload The data owners create their accounts under the public cloud and upload their data into public cloud. While uploading the files into public cloud data owners will
|
ISO 9001:2008 Certified Journal
|
Page 1334