Wednesday, 16 January 2013

Secure Overlay Cloud Storage with Access Control and Assured Deletion


NANO SCIENTIFIC RESEARCH CENTRE PVT.LTD.,  AMEERPET, HYD
WWW.NSRCNANO.COM, 09640648777, 09652926926



JAVA PROJECTS LIST--2013
JAVA 2013 IEEE PAPERS



 Secure Overlay Cloud Storage with Access
Control and Assured Deletion

Abstract:
We can now outsource data backups off-site to third-party cloud storage services so as to reduce data management costs. However, we must provide security guarantees for the outsourced data, which is now maintained by third parties. We design and implement FADE, a secure overlay cloud storage system that achieves fine-grained, policy-based access control and file assured deletion. It associates outsourced files with file access policies, and assuredly deletes files to make them unrecoverable to any one upon revocations of file access policies. To achieve such security goals, FADE is built upon a set of cryptographic key operations that are self-maintained by a quorum of key managers that are independent of third-party clouds. In particular, FADE acts as an overlay system that works seamlessly atop today’s cloud storage services. We implement a proof-of-concept prototype of FADE atop Amazon S3, one of today’s cloud storage services. We conduct extensive empirical studies, and demonstrate that FADE provides security protection for outsourced data, while introducing only minimal performance and monetary cost overhead. Our work provides insights of how to incorporate value-added security features into today’s cloud storage services.

Existing System:

Ø  Cryptographic protection on outsourced data storage.
         Require new protocol support on the cloud infrastructure
Ø  Security solutions compatible with existing cloud.
         No guarantees of reliable deletion of data
Ø  Perlman’s Euhemerize [NDSS’07]
o   A file is encrypted with a data key
o   The data key is further encrypted with a time-based control key
o   The control key is deleted when expiration time is reached
o   The control key is maintained by a separate key manager (aka Euhemerize)
Ø  Weaknesses:
o   Target only time-based assured deletion
§  No fine-grained control of different file access policies
o   No implementation

Ø  Vanish [USENIX’09]
o   Divide the data key into many key shares
o   Store key shares in nodes of a deployed P2P network
o   Nodes remove key shares that reside in cache for 8 hours
Ø  Weaknesses:
o   Time-based, no fine-grained control

Proposed System:
Ø  Design of FADE:
         work atop today’s cloud as an overlay
         achieve protection from a cloud client’s perspective, no changes on the cloud provider side
Ø  Security of FADE:
         Fine-grained file assured deletion: files are permanently inaccessible based on policies
Ø  We propose a new policy-based file assured deletion scheme that reliably deletes files of revoked file access policies
Ø  We implement a working prototype of FADE atop Amazon S3
Ø  We empirically evaluate the performance overhead of FADE atop Amazon S3

Modules:
Ø  Admin Login
Ø  Client Login
Ø  File Upload
Ø  File Download
Ø  Policy Renewal
Ø  Policy Deletion


Software Requirement Specification

Hardware Requirements:
·         SYSTEM                   :           Pentium IV 2.4 GHz
·         HARD DISK                        :           40 GB
·         RAM                         :           256 MB

Software Requirements:
·         Operating system       :           Windows XP Professional
·         Language used          :           JAVA
·         Data Base                  :           Oracle10g

No comments:

Post a Comment