04-10-2016, 11:54 AM
1457629084-AsecureZeroKnowledgeFreeReAuthenticationMechanismin.pptx (Size: 152.86 KB / Downloads: 2)
ABSTRACT
Cloud computing is a revolutionary computing paradigm, which enables flexible, on-demand, and low-cost usage of computing resources.
The data is outsourced to some cloud servers and various privacy concerns emerge from it.
In the project a new decentralized access control scheme for secure data storage in clouds that supports anonymous authentication.
Re-Authentication Mechanism in AnonyControl Scheme is used for the user privacy and secured user details among other clients.
EXISTING SYSTEM
The existing work based on centralized approach where a single key distribution center (KDC) distributes secret keys and attributes to all users.
A single key distribution center (KDC) is not only a single point of failure but difficult to maintain because of the large number of users that are supported in a cloud environment.
It use a privilege access control scheme. it’s only to address the data privacy
It use a attribute based encryption (ABE) algorithm. The scheme in uses a symmetric key approach and does not support authentication.
DISADVANTAGES
Difficult to maintain the large number of users.
It does not support authentication.
User identity is not maintained secure.
PROPOSED SYSTEM
In the proposed system, a user revocation based on re-authentication approach used zero knowledge protocol .
This technique authenticate new users based on valid keys, user accessing the cloud through decentralized access control mechanism using anonyms.
Admin can create and store a file with encryption based and two server based users can only read the file and the sender identity is hidden. The new users access the cloud using two server clients.
The user process is left out from the cloud, server user provide secret key to authenticate cloud.
Using this key the user’s re-authentication process to access the cloud with zero knowledge protocol.
ADVANTAGES
Data and user identity is secure with AnonyControl Scheme.
Reduce the computational cost.
Performance is high.
It is easy to maintain the large number of user’s.
ALGORITHM
1)Triple DES Algorithm:
Triple DES algorithm uses three iterations of common DES cipher. It receives a secret 168-bit key, which is divided into three 56-bit keys.
Encryption process : -
Encryption using the first secret key
Decryption using the second secret key
Encryption using the third secret key
Encryption: c = E3 (D2 (E1 (m)))
Decryption process :-
Decryption using the third secret key
Encryption using the second secret key
Decryption using the first secret key
Decryption: m = D1 (E2 (D3©))
Anonycontrol scheme
Anonycontrol to address the user and data privacy problem in a cloud.
Setup→PK,MK
KeyGenerate(PK, MK) → SK
Encrypt(PK, SK,M, A) → CT
Decrypt(PK, SK, CT) → M or verification parameter
The performance and security analysis show that Anonycontrol is both secure and efficient for cloud computing environment.
Zero-knowledge protocol
zero-knowledge protocol is a method by which one party (the prover) can prove to another party (the verifier) that a given statement is true, without conveying any information apart from the fact that the statement is indeed true.
A zero-knowledge proof must satisfy three properties.
1)Completeness: if the statement is true, the honest verifier (that is, one following the protocol properly) will be convinced of this fact by an honest prover.
2)Soundness: if the statement is false, no cheating prover can convince the honest verifier that it is true, except with some small probability.