International Research Journal of Engineering and Technology (IRJET) Volume: 04 Issue: 04 | Apr -2017
www.irjet.net
e-ISSN: 2395 -0056 p-ISSN: 2395-0072
Privacy and Shoulder Surfing Attack Preserving Anonymous Attribute Based Encryption Scheme Shital S.Salokhe1, N. N. Patil2 1PG
Student, Ashokrao Mane group of institution, Vathar Professor, Ashokrao Mane group of institution, Vathar ---------------------------------------------------------------------***--------------------------------------------------------------------2Associate
Abstract Cloud services provide great opportunity for the users to enjoy the on-demand cloud applications without considering the local infrastructure limitations. Several schemes have been proposed for access control of outsourced data in cloud computing. Despite the tremendous benefits, security is the primary obstacle that prevents the wide adoption of this promising computing model. Identity-based encryption (IBE) is the sender of a message can specify an identity such that only a receiver with matching identity can decrypt it. In the KP-ABE, a ciphertext is associated with a set of attributes, and a private key is associated with a monotonic tree, which describes this user’s identity. A user can decrypt the ciphertext if and only if the access tree in his private key is satisfied by the attributes in the ciphertext. However, the encrypter does not have entire control over the encryption policy. Furthermore, when a re-encryption occurs, all of the users in the same system must have their private keys re-issued so as to gain access to the re-encrypted files, and this process causes considerable problems in implementation. All problems and overhead are solved in the CP-ABE. In this, ciphertexts are created with an access structure, which specifies the encryption policy, and private keys are generated according to users’ attributes. A user can decrypt the ciphertext if and only if his attributes in the private key satisfy the access tree specified in the ciphertext. Hence the encrypter holds the encryption policy. Also, issued private keys will not be modified till the whole system reboots. Index Terms— Cloud computing, shoulder surfing, privacy preserving, anonymous attribute based encryption. I. INTRODUCTION Now a day’s focus on the authentication to realize that a user’s private data cannot be unauthorized accessed, but neglect a subtle privacy issue during a user challenging the cloud server to request other users for data sharing. The challenged access request itself may reveal the users privacy. The existing systems define shared authority based privacy-preserving authentication protocol which allows security and privacy in the cloud storage. Shared access authority is achieved by anonymous access request matching mechanism with security and privacy considerations. Attribute based access control is adopted to realize that the user can only access its own data fields; proxy re-encryption is applied by the cloud server to provide data sharing among the multiple users. All problems and overhead are solved in the CP-ABE. In this, cipher texts are created with an access structure, which specifies the encryption policy, and private keys are generated according to users’ attributes. A user can decrypt the ciphertext if and only if his attributes in the private key satisfy the access tree specified in the ciphertext. Hence the encrypter holds the encryption policy. Also, issued private keys will not be modified till the whole system reboots. II.RELETED WORK Techo Jung, Xiang-Yang. [1], proposed a semi-anonymous attribute-based privilege control scheme AnonyControl and fullyanonymous attribute-based privilege control scheme Anony Control-F to address the user privacy problem in a cloud storage server. In this paper author proposed schemes achieve not only fine-grained privilege control but also identity information. Muhammad Yasir Shabir, Asif Iqbal, Zahid Mahammad, and Ataullah Ghafoor. [6], proposed a Attribute-Based Encryption(ABE) is public key cryptographic technique that works in a one-to-many fashion and is also called fuzzy encryption. Public key encryption methods store encrypted data on third party servers, while distributing decryption keys to authorized users. L. A. Dunning and R. Kresman. [14],Trusted third party an optional and neutral entity, which has advanced capabilities on behalf of the users, to perform data public auditing and dispute arbitration.
© 2017, IRJET
|
Impact Factor value: 5.181
|
ISO 9001:2008 Certified Journal
|
Page 498