Team Work

More and more clients would like to store their data to public cloud servers (PCSs) along with the rapid development of cloud computing. New security problems have to be solved in order to help more clients process their data in public cloud. When the client is restricted to access PCS, he will delegate its proxy to process his data and upload them. On the other hand, remote data integrity checking is also an important security problem in public cloud storage. It makes the clients check whether their outsourced data are kept intact without downloading the whole data. From the security problems, we propose a novel proxy-oriented data uploading and remote data integrity checking model in identity-based public key cryptography: identity-based proxy-oriented data uploading and remote data integrity checking in public cloud (ID-PUIC). We give the formal definition, system model, and security model. Then, a concrete ID-PUIC protocol is designed using the bilinear pairings. The proposed ID-PUIC protocol is provably secure based on the hardness of computational Diffie–Hellman problem. Our ID-PUIC protocol is also efficient and flexible. Based on the original client’s authorization, the proposed ID-PUIC protocol can realize private remote data integrity checking, delegated remote data integrity checking, and public remote data integrity checking.

EXISTING SYSTEM:

Guo et al. presented a non-interactive CPA (chosen-plaintext attack)-secure proxy re-encryption scheme, which is resistant to collusion attacks in forging re-encryption keys.

In public cloud environment, most clients upload their data to PCS and check their remote data’s integrity by Internet. When the client is an individual manager, some practical problems will happen. If the manager is suspected of being involved into the commercial fraud, he will be taken away by the police. During the period of investigation, the manager will be restricted to access the network in order to guard against collusion. But, the manager’s legal business will go on during the the period of investigation. When a large of data is generated, who can help him process these data? If these data cannot be processed just in time, the manager will face the lose of economic interest. In order to prevent the case happening, the manager has to delegate the proxy to process its data, for example, his secretary. But, the manager will not hope others have the ability to perform the remote data integrity checking.

Chen et al. proposed a proxy signature scheme and a threshold proxy signature scheme from the Weil pairing. By combining the proxy cryptography with encryption technique, some proxy re-encryption schemes are proposed. Liu et al. formalize and construct the attribute-based proxy signature.

DISADVANTAGES OF EXISTING SYSTEM:

PROPOSED SYSTEM:

ADVANTAGES OF PROPOSED SYSTEM:

The concrete ID-PUIC protocol is provably secure and efficient by using the formal security proof and efficiency analysis.

SYSTEM REQUIREMENTS

SOFTWARE REQUIREMENTS:

•           Web Technologies                               :           HTML, CSS, JS. JSP

•           Programming Language                      :           Java and J2EE

•           Database Connectivity                        :           JDBC

•           Backend Database                              :           MySQL

•           Operating System                               :           Windows 08/10

HARDWARE REQUIREMENTS:

Key Board                  :           Windows 08/10

Processor                     :           Core I3

RAM Capacity            :           2 GB

Hard Disk                   :           250 GB

Monitor                       :           15″ Color

Mouse                         :           Two or Three Button Mouse

Leave a Reply

Your email address will not be published. Required fields are marked *