NANO SCIENTIFIC RESEARCH CENTRE
PVT.LTD., AMEERPET, HYD
JAVA
PROJECTS LIST--2013
JAVA 2013
IEEE PAPERS
Secure Overlay Cloud Storage with Access
Control and Assured Deletion
Abstract:
We can now outsource data
backups off-site to third-party cloud storage services so as to reduce data
management costs. However, we must provide security guarantees for the outsourced
data, which is now maintained by third parties. We design and implement FADE,
a secure overlay cloud storage system that achieves fine-grained, policy-based
access control and file assured deletion. It associates outsourced files with
file access policies, and assuredly deletes files to make them unrecoverable to
any one upon revocations of file access policies. To achieve such security
goals, FADE is built upon a set of cryptographic key operations that are
self-maintained by a quorum of key managers that are independent of third-party
clouds. In particular, FADE acts as an overlay system that works seamlessly
atop today’s cloud storage services. We implement a proof-of-concept prototype
of FADE atop Amazon S3, one of today’s cloud storage services. We conduct
extensive empirical studies, and demonstrate that FADE provides security protection
for outsourced data, while introducing only minimal performance and monetary
cost overhead. Our work provides insights of how to incorporate value-added
security features into today’s cloud storage services.
Existing System:
Ø
Cryptographic
protection on outsourced data storage.
•
Require
new protocol support on the cloud infrastructure
Ø
Security
solutions compatible with existing cloud.
•
No
guarantees of reliable deletion of data
Ø
Perlman’s
Euhemerize [NDSS’07]
o A file is encrypted with a data key
o The data key is further encrypted with a
time-based control key
o The control key is deleted when expiration
time is reached
o The control key is maintained by a separate
key manager (aka Euhemerize)
Ø
Weaknesses:
o Target only time-based assured deletion
§ No fine-grained control of different file
access policies
o No implementation
Ø
Vanish
[USENIX’09]
o Divide the data key into many key shares
o Store key shares in nodes of a deployed P2P
network
o Nodes remove key shares that reside in cache
for 8 hours
Ø
Weaknesses:
o Time-based, no fine-grained control
Proposed System:
Ø Design
of FADE:
•
work atop today’s cloud as an overlay
•
achieve protection from a cloud client’s perspective,
no changes on the cloud provider side
Ø Security
of FADE:
•
Fine-grained file assured deletion: files are
permanently inaccessible based on policies
Ø We
propose a new policy-based file assured deletion scheme that reliably deletes
files of revoked file access policies
Ø We
implement a working prototype of FADE atop Amazon S3
Ø We
empirically evaluate the performance overhead of FADE atop Amazon S3
Modules:
Ø
Admin Login
Ø
Client Login
Ø
File Upload
Ø
File Download
Ø
Policy Renewal
Ø
Policy Deletion
Software Requirement
Specification
Hardware Requirements:
·
SYSTEM : Pentium IV 2.4 GHz
·
HARD
DISK : 40 GB
·
RAM : 256 MB
Software Requirements:
·
Operating system : Windows XP Professional
·
Language used : JAVA
·
Data Base : Oracle10g
No comments:
Post a Comment