shared aythority ppt design [autosaved]
TRANSCRIPT
![Page 1: Shared aythority ppt design [autosaved]](https://reader030.vdocuments.us/reader030/viewer/2022032714/55ab6c0c1a28abc67a8b4724/html5/thumbnails/1.jpg)
PRESENTED BY
K RAJU
13621D5805
![Page 2: Shared aythority ppt design [autosaved]](https://reader030.vdocuments.us/reader030/viewer/2022032714/55ab6c0c1a28abc67a8b4724/html5/thumbnails/2.jpg)
ABSTRACT
Cloud computing is emerging as a prevalent data interactive paradigm to realize users’ data remotely stored in an online cloud server.
Cloud services provide great conveniences for the users to enjoy the on-demand cloud applications without considering the local infrastructure limitations.
During the data accessing, different users may be in a collaborative relationship, and thus data sharing becomes significant to achieve productive benefits.
In this paper, we propose a shared authority based privacy-preserving authentication protocol (SAPA) to address above privacy issue for cloud storage.
![Page 3: Shared aythority ppt design [autosaved]](https://reader030.vdocuments.us/reader030/viewer/2022032714/55ab6c0c1a28abc67a8b4724/html5/thumbnails/3.jpg)
EXISTING SYSTEM
Most previous researches focus on the authentication to realize that only a legal user can access its authorized data, which ignores the case that different users may want to access and share each other’s authorized data fields to achieve productive benefits
In this work, we aim to address a user’s sensitive access desire related privacy during data sharing in the cloud environments, and it is significant to design a humanistic security scheme to simultaneously achieve data access control, access authority sharing, and privacy preservation.
DISADVANTAGES: Existing work does not have the option of granting/revoking data access.
![Page 4: Shared aythority ppt design [autosaved]](https://reader030.vdocuments.us/reader030/viewer/2022032714/55ab6c0c1a28abc67a8b4724/html5/thumbnails/4.jpg)
PROPOSED SYSTEM:
shared authority based privacy preserving authentication protocol (SAPA) for the cloud data storage, which realizes authentication and authorization without compromising a user’s private information.
It identify a new privacy challenge in cloud storage, and address a subtle privacy issue during a user challenging the cloud server for data sharing, in which the challenged request itself cannot reveal the user’s privacy no matter whether or not it can obtain the access authority.
![Page 5: Shared aythority ppt design [autosaved]](https://reader030.vdocuments.us/reader030/viewer/2022032714/55ab6c0c1a28abc67a8b4724/html5/thumbnails/5.jpg)
It proposed an authentication protocol to enhance a user’s access request related privacy, and the shared access authority is achieved by anonymous access request matching mechanism.
It Applies cipher text-policy attribute based access control to realize that a user can reliably access its own data fields, and adopt the proxy re-encryption to provide temp authorized data sharing among multiple users.
ADVANTAGES: This secured system and data owner can decide whether the user can access the system or not
![Page 6: Shared aythority ppt design [autosaved]](https://reader030.vdocuments.us/reader030/viewer/2022032714/55ab6c0c1a28abc67a8b4724/html5/thumbnails/6.jpg)
HARDWARE REQUIREMENTS
Processor Type : Pentium IV
Speed : 2.4GHZ
RAM : 1GB
Hard disk : 80GB
SOFTWARE REQUIREMENTS
Operating System : Windows 7
Programming Package : Microsoft Visual Studio 2010
Coding Language : C#. Net
![Page 7: Shared aythority ppt design [autosaved]](https://reader030.vdocuments.us/reader030/viewer/2022032714/55ab6c0c1a28abc67a8b4724/html5/thumbnails/7.jpg)
Use case diagrams
![Page 8: Shared aythority ppt design [autosaved]](https://reader030.vdocuments.us/reader030/viewer/2022032714/55ab6c0c1a28abc67a8b4724/html5/thumbnails/8.jpg)
Sequence diagram
![Page 9: Shared aythority ppt design [autosaved]](https://reader030.vdocuments.us/reader030/viewer/2022032714/55ab6c0c1a28abc67a8b4724/html5/thumbnails/9.jpg)
![Page 10: Shared aythority ppt design [autosaved]](https://reader030.vdocuments.us/reader030/viewer/2022032714/55ab6c0c1a28abc67a8b4724/html5/thumbnails/10.jpg)
Collaboration diagram
![Page 11: Shared aythority ppt design [autosaved]](https://reader030.vdocuments.us/reader030/viewer/2022032714/55ab6c0c1a28abc67a8b4724/html5/thumbnails/11.jpg)
![Page 12: Shared aythority ppt design [autosaved]](https://reader030.vdocuments.us/reader030/viewer/2022032714/55ab6c0c1a28abc67a8b4724/html5/thumbnails/12.jpg)
Class diagram
![Page 13: Shared aythority ppt design [autosaved]](https://reader030.vdocuments.us/reader030/viewer/2022032714/55ab6c0c1a28abc67a8b4724/html5/thumbnails/13.jpg)
Object diagram
![Page 14: Shared aythority ppt design [autosaved]](https://reader030.vdocuments.us/reader030/viewer/2022032714/55ab6c0c1a28abc67a8b4724/html5/thumbnails/14.jpg)
State Chart diagram
![Page 15: Shared aythority ppt design [autosaved]](https://reader030.vdocuments.us/reader030/viewer/2022032714/55ab6c0c1a28abc67a8b4724/html5/thumbnails/15.jpg)
Activity diagram
![Page 16: Shared aythority ppt design [autosaved]](https://reader030.vdocuments.us/reader030/viewer/2022032714/55ab6c0c1a28abc67a8b4724/html5/thumbnails/16.jpg)
![Page 17: Shared aythority ppt design [autosaved]](https://reader030.vdocuments.us/reader030/viewer/2022032714/55ab6c0c1a28abc67a8b4724/html5/thumbnails/17.jpg)
![Page 18: Shared aythority ppt design [autosaved]](https://reader030.vdocuments.us/reader030/viewer/2022032714/55ab6c0c1a28abc67a8b4724/html5/thumbnails/18.jpg)
Component diagram
![Page 19: Shared aythority ppt design [autosaved]](https://reader030.vdocuments.us/reader030/viewer/2022032714/55ab6c0c1a28abc67a8b4724/html5/thumbnails/19.jpg)
Deployment diagram
![Page 20: Shared aythority ppt design [autosaved]](https://reader030.vdocuments.us/reader030/viewer/2022032714/55ab6c0c1a28abc67a8b4724/html5/thumbnails/20.jpg)