PPT FOR IDBSDDS SCHEMES
-
Upload
sahithi-naraparaju -
Category
Career
-
view
234 -
download
1
Transcript of PPT FOR IDBSDDS SCHEMES
![Page 1: PPT FOR IDBSDDS SCHEMES](https://reader035.fdocuments.net/reader035/viewer/2022081602/555e3679d8b42aad058b48ae/html5/thumbnails/1.jpg)
IDENTITY BASED SECURE DISTRIBUTED DATA STORAGE SCHEMES
PRESENTED BY:N.SAHITHI
(12C11D5816)
UNDER GUIDANCE OFMr. J.NAGARAJU, (M.TECH)
![Page 2: PPT FOR IDBSDDS SCHEMES](https://reader035.fdocuments.net/reader035/viewer/2022081602/555e3679d8b42aad058b48ae/html5/thumbnails/2.jpg)
IBSDDS SCHEMES
ABSTRACT
Secure distributed data storage can shift the burden of maintaining a large number of
files from owner to proxy servers. Proxy servers can convert encrypted files for owner
to encrypted files for receiver without necessity of knowing the content of original
files. IBSDSS schemes uses 2 identity based secure distributed data storage schemes.
First scheme is secure against chosen plaintext attacks (CPA). Second scheme is
secure against chosen chipertext attacks (CCA). It is first identity based secure
distributed data storage schemes where access permissions is made by owner of file
and collusion attacks can be protected.
![Page 3: PPT FOR IDBSDDS SCHEMES](https://reader035.fdocuments.net/reader035/viewer/2022081602/555e3679d8b42aad058b48ae/html5/thumbnails/3.jpg)
IBSDDS SCHEMES
INTRODUCTION
Cloud computing provides users a convenient mechanism to manage their personal
files with notion called Database-As-Services (DAS).
Proxy servers can perform some functions on outsourced cipher texts without
knowing anything about original files.
This technique has not been employed due to confidentiality and integrity.
![Page 4: PPT FOR IDBSDDS SCHEMES](https://reader035.fdocuments.net/reader035/viewer/2022081602/555e3679d8b42aad058b48ae/html5/thumbnails/4.jpg)
IBSDDS SCHEMES
To address these issues IBSDDS scheme is proposed, which uses two schemes.
These schemes capture following properties :
i) The file owner can decide the access permission independently.
ii) For one query, a receiver can only access one file instead of all files of
the owner.
iii) Our schemes secure against the collusion attacks.
![Page 5: PPT FOR IDBSDDS SCHEMES](https://reader035.fdocuments.net/reader035/viewer/2022081602/555e3679d8b42aad058b48ae/html5/thumbnails/5.jpg)
IBSDDS SCHEMES
PROBLEM STATEMENT
Writing a problem statement helps to identify the purpose of the project clearly.
A problem statement consists of 3 parts namely:
1) Ideal
2) Reality
3) Consequences
1) Ideal : cloud computing provides users with a convenient mechanism to
manage their personal files with a notion called database-as-service (DAS).
In DAS schemes, user outsources his encrypted files to proxy server so, that the
burden of maintaining large amount of files on local system can be reduced.
![Page 6: PPT FOR IDBSDDS SCHEMES](https://reader035.fdocuments.net/reader035/viewer/2022081602/555e3679d8b42aad058b48ae/html5/thumbnails/6.jpg)
IBSDDS SCHEMES
2) Reality: Security and privacy are biggest concerns of each and every user.
Some user might feel uncomfortable in surrendering their personal data to a third
party.
No guarantee to files outsourced to proxy servers.
As the applications and services run on remote third party environments, users have
limited control over the function and execution of software and hardware.
3) Consequences: In response to above problem, Identity based secure distributed
datastorage schemes were proposed.
In this IBSDDS proxy server validates the outsourced cipher text and store them.
To prevent unauthorized access proxy validates user by his id and password.
![Page 7: PPT FOR IDBSDDS SCHEMES](https://reader035.fdocuments.net/reader035/viewer/2022081602/555e3679d8b42aad058b48ae/html5/thumbnails/7.jpg)
IBSDDS SCHEMES
LITERATURE SURVEY
Atomic proxy crypto system where a semi-trusted proxy server can transfer a
cipher text of the original decryptor to a cipher text for the designated decryptor
without knowing plain text. It is used in e-mail forwarding.
Identity based crypto system introduced by shamir. It is a system where the public
key can be arbitrary string and secret key is issued by trusted third party.
![Page 8: PPT FOR IDBSDDS SCHEMES](https://reader035.fdocuments.net/reader035/viewer/2022081602/555e3679d8b42aad058b48ae/html5/thumbnails/8.jpg)
IBSDDS SCHEMES
Identity-based proxy encryption (IBPE) was proposed by Ivan and Dodis .
In these schemes, the master secret key which is used to extract secret keys for
users is split into 2 parts one is sent to proxy server other is sent to user.
The user can decrypt cipher text with the help of proxy server, but these
schemes are not secure against collusion attacks.
Identity- based proxy re-encryption proposed by green and ateniese. Where
proxy server can transfer a cipher text of original decryptor to cipher text of
designated decryptor after he gets a re-encryption key.
![Page 9: PPT FOR IDBSDDS SCHEMES](https://reader035.fdocuments.net/reader035/viewer/2022081602/555e3679d8b42aad058b48ae/html5/thumbnails/9.jpg)
IBSDDS SCHEMES
EXISTING SYSTEM Cloud computing provides users with convenient mechanism to manage their
personal files with notation called database as a service (DAS).
Proxy server can perform some functions on outsourced cipher texts without
knowing anything about original files.
Therefore, how to guarantee the outsourced files are not accessed by users
unauthorized users and not modified by proxy severs is an important problem that
has been considered in data storage research community.
![Page 10: PPT FOR IDBSDDS SCHEMES](https://reader035.fdocuments.net/reader035/viewer/2022081602/555e3679d8b42aad058b48ae/html5/thumbnails/10.jpg)
IBSDDS SCHEMES
DISADVANTAGES OF EXISTING SYSTEM
Users are especially concerned on the confidentiality, integrity and query of
outsourced files as cloud computing is complicated than local data storage systems,
as cloud is managed by untrusted third party.
There is no guarantee that the outsourced files are not accessed by unauthorized
users and not modified by proxy severs is an important problem.
![Page 11: PPT FOR IDBSDDS SCHEMES](https://reader035.fdocuments.net/reader035/viewer/2022081602/555e3679d8b42aad058b48ae/html5/thumbnails/11.jpg)
IBSDDS SCHEMES
PROPOSED SYSTEM
In proposed project for one query, the receiver can access one of the owner’s file
instead of accessing all files.
An access permission is bound not only to the identity of receiver but also to the
file.
The access permission can be decided by owner, instead of trusted third party.
Proposed project is secure against collusion attacks.
![Page 12: PPT FOR IDBSDDS SCHEMES](https://reader035.fdocuments.net/reader035/viewer/2022081602/555e3679d8b42aad058b48ae/html5/thumbnails/12.jpg)
IBSDDS SCHEMES
ADVANTAGES OF PROPOSED SYSTEM
It has 2 schemes of security:
i) the first scheme is secure against chosen plain text attacks (CPA).
ii) the second scheme is secure against chosen cipher text attacks (CCA).
For one query, a receiver can access only one file , instead of all files of the owner.
To achieve stronger security and implement file based access control ,the owner
must be online to authenticate requesters and also generate access permissions for
them.
![Page 13: PPT FOR IDBSDDS SCHEMES](https://reader035.fdocuments.net/reader035/viewer/2022081602/555e3679d8b42aad058b48ae/html5/thumbnails/13.jpg)
IBSDDS SCHEMES
STEPS INVOLVED IN IBSDDS SCHEME IMPLEMENTATION ARE:
STEP 1:
The file owner encrypts his files under his identity prior to outsourcing a files to
proxy servers.
STEP 2:
He (owner of file) sends cipher texts to proxy servers (as he encrypted his files
under his identity in step1 so that cipher text is generated ).
STEP 3 :
Proxy server transforms a cipher text encrypted under identity of the owner to a
cipher text encrypted under the identity of receiver, only after the receiver has
obtained access permission from owner of the file (file owner).
![Page 14: PPT FOR IDBSDDS SCHEMES](https://reader035.fdocuments.net/reader035/viewer/2022081602/555e3679d8b42aad058b48ae/html5/thumbnails/14.jpg)
IBSDDS SCHEMES
REQUIREMENT SPECIFICATION
HARDWARE REQUIREMENTS:
Hardware - Pentium IV
Speed - 1.1 GHz
RAM - 1GB
Monitor - SVGA
![Page 15: PPT FOR IDBSDDS SCHEMES](https://reader035.fdocuments.net/reader035/viewer/2022081602/555e3679d8b42aad058b48ae/html5/thumbnails/15.jpg)
IBSDDS SCHEMES
SOFTWARE REQUIREMENTS:
Operating System : Windows xp/ 7/8
Technology : Java
IDE : My Eclipse
Web Server : Tomcat
Database : My SQL
Java Version : JDK1.7
![Page 16: PPT FOR IDBSDDS SCHEMES](https://reader035.fdocuments.net/reader035/viewer/2022081602/555e3679d8b42aad058b48ae/html5/thumbnails/16.jpg)
IBSDDS SCHEMES
MODULES IBSDDS scheme consists of 4 modules :
i) Data Storage system
ii) File system
iii) Storage-based Intrusion detection system
iv) Cryptographic File System
![Page 17: PPT FOR IDBSDDS SCHEMES](https://reader035.fdocuments.net/reader035/viewer/2022081602/555e3679d8b42aad058b48ae/html5/thumbnails/17.jpg)
IBSDDS SCHEMES
MODULE - 1
1) Data Storage system : Data storage system enable user to store their data to
external proxy server to enhance access and availability and reduce maintenance
cost.
![Page 18: PPT FOR IDBSDDS SCHEMES](https://reader035.fdocuments.net/reader035/viewer/2022081602/555e3679d8b42aad058b48ae/html5/thumbnails/18.jpg)
IBSDDS SCHEMES
MODULE - 2
2) File System: In these systems, proxy servers are assumed to be trusted.
Proxy authenticate receivers and validate access permissions.
The interactions between the proxy servers and receivers are executed in a secure
channel.
In these schemes, a receiver authenticates himself to the proxy server using his
password
![Page 19: PPT FOR IDBSDDS SCHEMES](https://reader035.fdocuments.net/reader035/viewer/2022081602/555e3679d8b42aad058b48ae/html5/thumbnails/19.jpg)
IBSDDS SCHEMES
MODULE - 3
Storage-based Intrusion Detection System: In this systems, an intrusion detection
scheme is embedded in proxy servers or the file owner to detect the intruder’s
behaviors, such as adding backdoors, inserting Trojan horses and tampering with
audit logs.
These schemes can be classified into two types:
i) Host-based system and
ii) Network-based system.
![Page 20: PPT FOR IDBSDDS SCHEMES](https://reader035.fdocuments.net/reader035/viewer/2022081602/555e3679d8b42aad058b48ae/html5/thumbnails/20.jpg)
IBSDDS SCHEMES
MODULE - 4
Cryptographic File System: In these systems, an end to-end security is provided
by cryptographic protocols which are executed by the file owner to prevent proxy
servers and unauthorized users from modifying and accessing the sensitive files.
These systems can be divided into two types:
1) Shared file system and
2) Non-shared system
![Page 21: PPT FOR IDBSDDS SCHEMES](https://reader035.fdocuments.net/reader035/viewer/2022081602/555e3679d8b42aad058b48ae/html5/thumbnails/21.jpg)
IBSDDS SCHEMES
CLASS DIAGRAM
![Page 22: PPT FOR IDBSDDS SCHEMES](https://reader035.fdocuments.net/reader035/viewer/2022081602/555e3679d8b42aad058b48ae/html5/thumbnails/22.jpg)
IBSDDS SCHEMES
USECASE DIAGRAM
![Page 23: PPT FOR IDBSDDS SCHEMES](https://reader035.fdocuments.net/reader035/viewer/2022081602/555e3679d8b42aad058b48ae/html5/thumbnails/23.jpg)
IBSDDS SCHEMES
SEQUENCE DIAGRAM
![Page 24: PPT FOR IDBSDDS SCHEMES](https://reader035.fdocuments.net/reader035/viewer/2022081602/555e3679d8b42aad058b48ae/html5/thumbnails/24.jpg)
IBSDDS SCHEMES
ACTIVITY DIAGRAM
![Page 25: PPT FOR IDBSDDS SCHEMES](https://reader035.fdocuments.net/reader035/viewer/2022081602/555e3679d8b42aad058b48ae/html5/thumbnails/25.jpg)
IBSDDS SCHEMES
TECHNOLOGIES
Java MYSQL
![Page 26: PPT FOR IDBSDDS SCHEMES](https://reader035.fdocuments.net/reader035/viewer/2022081602/555e3679d8b42aad058b48ae/html5/thumbnails/26.jpg)
IBSDDS SCHEMES
SCREEN SHOTS
Screen shot 1: Welcome page
![Page 27: PPT FOR IDBSDDS SCHEMES](https://reader035.fdocuments.net/reader035/viewer/2022081602/555e3679d8b42aad058b48ae/html5/thumbnails/27.jpg)
IBSDDS SCHEMES
Screen shot 2: Registration page
![Page 28: PPT FOR IDBSDDS SCHEMES](https://reader035.fdocuments.net/reader035/viewer/2022081602/555e3679d8b42aad058b48ae/html5/thumbnails/28.jpg)
IBSDDS SCHEMES
Screenshot 3: Login page
![Page 29: PPT FOR IDBSDDS SCHEMES](https://reader035.fdocuments.net/reader035/viewer/2022081602/555e3679d8b42aad058b48ae/html5/thumbnails/29.jpg)
IBSDDS SCHEMES
Screen shot 4: Data owner choosing a file from system to upload
![Page 30: PPT FOR IDBSDDS SCHEMES](https://reader035.fdocuments.net/reader035/viewer/2022081602/555e3679d8b42aad058b48ae/html5/thumbnails/30.jpg)
IBSDDS SCHEMES
Screenshot 5: Proxy server providing key
![Page 31: PPT FOR IDBSDDS SCHEMES](https://reader035.fdocuments.net/reader035/viewer/2022081602/555e3679d8b42aad058b48ae/html5/thumbnails/31.jpg)
IBSDDS SCHEMES
Screenshot 6: Proxy server user authentication page
![Page 32: PPT FOR IDBSDDS SCHEMES](https://reader035.fdocuments.net/reader035/viewer/2022081602/555e3679d8b42aad058b48ae/html5/thumbnails/32.jpg)
IBSDDS SCHEMES
Screen shot 7: Welcome page for authorized user
![Page 33: PPT FOR IDBSDDS SCHEMES](https://reader035.fdocuments.net/reader035/viewer/2022081602/555e3679d8b42aad058b48ae/html5/thumbnails/33.jpg)
IBSDDS SCHEMES
Screen shot 8:User enter’s secret key to view files
![Page 34: PPT FOR IDBSDDS SCHEMES](https://reader035.fdocuments.net/reader035/viewer/2022081602/555e3679d8b42aad058b48ae/html5/thumbnails/34.jpg)
IBSDDS SCHEMES
Screen shot 9: User chooses a file to view
![Page 35: PPT FOR IDBSDDS SCHEMES](https://reader035.fdocuments.net/reader035/viewer/2022081602/555e3679d8b42aad058b48ae/html5/thumbnails/35.jpg)
IBSDDS SCHEMES
Screen shot 10: Proxy server asks for random key to view file
![Page 36: PPT FOR IDBSDDS SCHEMES](https://reader035.fdocuments.net/reader035/viewer/2022081602/555e3679d8b42aad058b48ae/html5/thumbnails/36.jpg)
IBSDDS SCHEMES
Screen shot 11:Encrypted format file is accessed to user
![Page 37: PPT FOR IDBSDDS SCHEMES](https://reader035.fdocuments.net/reader035/viewer/2022081602/555e3679d8b42aad058b48ae/html5/thumbnails/37.jpg)
IBSDDS SCHEMES
Screen shot 12: Proxy server asks for random key (to decrypt file).
![Page 38: PPT FOR IDBSDDS SCHEMES](https://reader035.fdocuments.net/reader035/viewer/2022081602/555e3679d8b42aad058b48ae/html5/thumbnails/38.jpg)
IBSDDS SCHEMES
Screen shot 14: Decrypted File is accessed to user
![Page 39: PPT FOR IDBSDDS SCHEMES](https://reader035.fdocuments.net/reader035/viewer/2022081602/555e3679d8b42aad058b48ae/html5/thumbnails/39.jpg)
IBSDDS SCHEMES
CONCLUSION
Distributed data storage schemes provide the users with convenience to outsource their files to
untrusted proxy servers. Identity-based secure distributed data storage (IBSDDS) schemes are
a special kind of distributed data storage schemes where users are identified by their identities
and can communicate without the need of verifying the public key certificates.
![Page 40: PPT FOR IDBSDDS SCHEMES](https://reader035.fdocuments.net/reader035/viewer/2022081602/555e3679d8b42aad058b48ae/html5/thumbnails/40.jpg)
IBSDDS SCHEMES
FUTURE ENHANCEMENTS
Future enhancements for identity-based secure distributed data storage (IBSDDS) are to allow
user to upload PDF files and excel sheets. Future research will include advancements like
uploading the pictures, images, videos in encrypted format for user convenience.
![Page 41: PPT FOR IDBSDDS SCHEMES](https://reader035.fdocuments.net/reader035/viewer/2022081602/555e3679d8b42aad058b48ae/html5/thumbnails/41.jpg)
IBSDDS SCHEMES
REFERENCES
Jinguang Han, Student Member, IEEE, Willy Susilo, Senior Member, IEEE, and Yi Mu, Senior Member, IEEE-“Identity-Based Secure Distributed Data Storage Schemes”-IEEE TRANSACTIONS ON COMPUTERS, 2013.
![Page 42: PPT FOR IDBSDDS SCHEMES](https://reader035.fdocuments.net/reader035/viewer/2022081602/555e3679d8b42aad058b48ae/html5/thumbnails/42.jpg)
IBSDDS SCHEMES
THANK YOU