20-12-2012, 06:27 PM
HASBE: A Hierarchical Attribute-Based Solution for Flexible and Scalable Access Control in Cloud Computing
1A Hierarchical.ppt (Size: 73 KB / Downloads: 137)
Aim
The main aim of this project is to increase the performance of cloud based on Attribute Based Solution concepts and to provide additional security for cloud using ASBE.
ABSTRACT
This new computing technology requires users to entrust their valuable data to cloud providers, there have been increasing security and privacy concerns on outsourced data.
Several schemes employing attribute-based encryption (ABE) have been proposed for access control of outsourced data in cloud computing
To overcome inflexibility in implementing complex access control policies. In order to realize scalable, flexible, and fine-grained access control of outsourced data in cloud computing.
We propose hierarchical attribute-set-based encryption (HASBE) by extending cipher text-policy attribute-set-based encryption (ASBE) with a hierarchical structure of users.
The proposed scheme not only achieves scalability due to its hierarchical structure,but also inherits flexibility and fine-grained access control in supporting compound attributes of ASBE.
Existing System
Software had to be installed in an infrastructure close to end users.
In existing system, don’t have security for data’s. In case any of the corruption
Might be happened on cloud mean we can’t get the original information’s everything going to be lost.
There is no privilege for end users, data owner and data consumer.
Proposed System
This Proposed system Customize Hierarchical Attribute Based Solution.
We provide a security for data’s based on public key and master key with the
help of Domain Authority and Trusted Authority.
Here we are giving Attribute based privileges for data owners and data consumers.
Shared resources and Trusted Authority
The trusted authority acts as the root of trust and authorizes the top-level domain authorities.
A domain authority is trusted by its subordinate domain authorities or users that it administrates, but may try to get the private keys of users outside its domain. Users may try to access data files either within or outside the scope of their access privileges, so malicious users may collude with each other to get sensitive files beyond their privileges.
The trusted authority is responsible for generating and distributing system parameters and root master keys as well as authorizing the top-level domain authorities.
A domain authority is responsible for delegating keys to subordinate domain authorities at the next level or users in its domain. Each user in the system is assigned a key structure which specifies the attributes associated with the user’s decryption key.