Professional Documents
Culture Documents
Presentation 1
Presentation 1
INTERNAL GUIDE
Mrs. D. Madhavi
Assistant Professor
Abstract
• CSPs are not fully trusted by users while the data files
stored in the cloud may be sensitive and confidential. To
address this issue, a basic solution is to encrypt data, and
then uploads the encrypted data into the cloud.
• However, the traditional encryption mechanisms are not
efficient or flexible for data sharing in the cloud.
• In order to achieve optimal usage of storage resources, it is
desirable to use advanced encryption mechanisms allowing
the data to be shared at a fine grained level.
Disadvantages
HARDWARE REQUIREMENTS
• System : Intel core i3 or above.
• Hard Disk : 500 GB.
• Monitor : 15 VGA Color.
• Ram : 4 GB.
SYSTEM REQUIREMENT SPECIFICATION
SOFTWARE REQUIREMENTS
• Operating system : Windows 7 or above.
• Programming Language : HTML,CSS,JAVA/J2EE
• IDE : Eclipse Oxygen 3.0
• Database : MYSQL 5.5.50
System Architecture
Modules
Class Diagram
Admin use case diagram
Data Owner use case diagram
End user use case diagram
Sequence Diagram
Activity Diagram
Algorithms
• In Attribute-based encryption (ABE) a user’s
private-key is associated with a set of attributes.
• A user will be able to decrypt a ciphertext, if and
only if his attributes satisfy the policy of the
respective ciphertext.
• Revocable attribute-based algorithm(RABE) is
used to revoke the user.
TESTING