Monday, February 28, 2011

Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing




Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing

Abstract
Abstract
—Cloud computing is an emerging computing paradigm in which resources of the computing infrastructure challenges that, if not well resolved, may impede its fast are provided as services over the Internet. As promising as it is, growth. Data security, as it exists in many other applications, this paradigm also brings forth many new challenges for data is among these challenges that would raise great concerns
security and access control when users outsource sensitive data from users when they store sensitive information on cloud for sharing on cloud servers, which are not within the same servers. These concerns originate from the fact that cloud trusted domain as data owners. To keep sensitive user data confidential against untrusted servers, existing solutions usually servers are usually operated by commercial providers which apply cryptographic methods by disclosing data decryption keys are very likely to be outside of the trusted domain of the users. only to authorized users. However, in doing so, these solutions Data confidential against cloud servers is hence frequently inevitably introduce a heavy computation overhead on the data desired when users outsource data for storage in the cloud. In owner for key distribution and data management when fine- some practical application systems, data confidentiality is not grained data access control is desired, and thus do not scale well. The problem of simultaneously achieving fine-grainedness,
only a security/privacy issue, but also of juristic concerns. For scalability, and data confidentiality of access control actually still example, in healthcare application scenarios use and disclosure
remains unresolved. This paper addresses this challenging open of protected health information (PHI) should meet the require- issue by, on one hand, defining and enforcing access policies basedments of Health Insurance Portability and Accountability Act on data attributes, and, on the other hand, allowing the data
(HIPAA) [5], and keeping user data confidential against the  owner to delegate most of the computation tasks involved in fine- grained data access control to untrusted cloud servers without storage servers is not just an option, but a requirement.disclosing the underlying data contents. We achieve this goal by
Furthermore, we observe that there are also cases in which exploiting and uniquely combining techniques of attribute-based cloud users themselves are content providers. They publish encryption (ABE), proxy re-encryption, and lazy re-encryption. data on cloud servers for sharing and need fine-grained data
Our proposed scheme also has salient properties of user access access control in terms of which user (data consumer) has the privilege confidentiality and user secret key accountability. Extensive analysis shows that our proposed scheme is highly efficient access privilege to which types of data. In the healthcare case,
and provably secure under existing security models.

19 comments:

  1. can i have the code for the project?

    ReplyDelete
  2. SURE I WILL POST IT. FOLLOW ME TO GET IT!

    ReplyDelete
  3. Dude.. I have selected this project as my final year project.. also selected a project center so that we could get this project made by them..

    My final review is on monday and till now they haven't started working on it..

    Could you please give me the source code and documentation as well.. it would be a great help from you

    ReplyDelete
  4. can i have some more description of the project and can i get the code for this project

    ReplyDelete
  5. ashwini,i will be mail u d details

    ReplyDelete
  6. i want more information about this paper

    ReplyDelete
  7. i want this project ..please send to this mail subramaniashiva2009@gmail.com

    ReplyDelete
  8. can u send me the source code of this project to this mail id plz : awati.sunny@gmail.com

    ReplyDelete
  9. please can u send me the source code of this paper. Thanks,
    yousef_afag@yahoo.com

    ReplyDelete
  10. hi frnd
    please send me the source code of this project as soon as possible; send to sudarshan205@gmail com

    ReplyDelete
  11. can i have the source code for this project because
    i am doing my final year project related to this project so i need a reference .

    please send me the source code to
    aishuanna10@gmail.com

    ReplyDelete
  12. Dude can I get the source code of this project???
    It'll help me out a lot in ocmpleting my project ,that is based on this project.

    My mail id is : yourfriendbharath@gmail.com

    ReplyDelete
    Replies
    1. can u post source code for this project?

      Delete
  13. Dude can I get the source code of this project???
    It'll help me out a lot in ocmpleting my project ,that is based on this project.

    My mail id is : yourfriendbharath@gmail.com

    ReplyDelete
  14. Gudevng frndz i selectd achieving secure,scalable and fine graind data access control in cloud computing as my major project can any one send code for it to my mail
    coolsai.krishna014@gmail.com

    ReplyDelete
  15. Gudevng frndz i selectd achieving secure,scalable and fine graind data access control in cloud computing as my major project can any one send code for it to my mail
    coolsai.krishna014@gmail.com

    ReplyDelete
  16. can u please send me this source code...divyak1113@gmail.com

    ReplyDelete
  17. can u please send me this source code...divyak1113@gmail.com

    ReplyDelete