HASBE: A Hierarchical Attribute-Based Solution For Flexible and Scalable Access Control in Cloud Computing

Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 4

HASBE: A Hierarchical Attribute-Based Solution for

Flexible and Scalable


Access Control in Cloud Computing

ABSTRACT

Cloud computing has emerged as one of the most important


paradigms in the IT industry in recent years. Since this new computing technology
requires users to trust their valuable data to cloud providers, there have been
increasing security and privacy concerns on outsourced data. Several schemes
employing attribute-based encryption (ABE) have been designed for access control
of outsourced data in cloud computing; however, most of them suffer from
hardness in implementing complex access control policies.

EXISTING SYSTEM

One of the major security concerns is data security and


privacy in cloud computing due to its Internet- based data storage and
management. In cloud computing, users have to give up their data to the cloud
service provider for storage and business operations, while the cloud service
provider is usually a profitable enterprise which cannot be totally trusted. Data
represents an extremely important benefit for any organization, and enterprise
users will face serious confidentiality if its confidential data is disclosed to their
business competitors or the public.
Disadvantage:

 The cloud service provider is usually a commercial enterprise which cannot


be totally trusted.
 Data represents a extreme important asset for any organization, and
enterprise users will face serious consequences
 Hacking of data is possible to third parties.

PROPOSED SYSTEM

We propose a hierarchical attribute-set-based encryption


(HASBE) scheme for access control in cloud computing. HASBE extends the
cipher text-policy attribute-set-based encryption scheme with a hierarchical
structure of system users, so as to achieve scalable, flexible and fine-grained access
control.
We formally prove the security of the proposed scheme based on the security of the
CP-ABE scheme by Bettencourt and evaluate its performance in terms of
computational overhead. Lastly, we implement HASBE and conduct complete
experiments for performance evaluation, and our experiment demonstrate that
HASBE has fitting performance.

Advantage:

 HASBE inherits the advantage of ASBE in efficient user revocation.


 The HASBE scheme flawlessly incorporates a hierarchical structure of
system users by applying a delegation algorithm to ASBE.
 We formally proved security for HASBE through CP-ABE.
 HASBE supports multiple value assignment for each attributes.
FUTURE ENHANCEMENT

We formally proved the security of HASBE based


on the security of CP-ABE by Bettencourt. Finally, we implemented the proposed
scheme, and conducted comprehensive performance analysis and evaluation,
which showed its efficiency and advantages over existing schemes.

SYSTEM SPECIFICATION

HARDWARE SPECIFICATION:

The hardware used for the development of the project is:

PROCESSOR : PENTIUM III 866 MHz

RAM : 128 MD SD RAM

HARD DISK : 20 GB

SOFTWARE SPECIFICATION:

The software used for the development of the project is:

OPERATING SYSTEM : Windows 2000 Professional

ENVIRONMENT : Visual Studio .NET 2003/asp .Net

.NET FRAMEWORK : Version 1.1

LANGUAGE : C#.NET

WEB TECHNOLOGY : Active Server Pages.NET

WEB SERVER : Internet Information Server 5.0

REPORTS : Web Form Data Grid control


BACK END : MS-SQL-Server 2005

You might also like