Crypt-DAC: Cryptographically Enforced Dynamic Access Control in the Cloud
Crypt-DAC: Cryptographically Enforced Dynamic Access Control in the Cloud
Project Title: | Crypt-DAC: Cryptographically Enforced Dynamic Access Control in the Cloud. |
Implementation: | Java,MYSQL |
Project Cost: (In Indian Rupees) | Rs.3000/ |
Project Buy Link: | Buy Link |
IEEE BASE PAPER ABSTRACT:
Enabling cryptographically enforced access controls for data hosted in untrusted cloud is attractive for many users and organizations. However, designing efficient cryptographically enforced dynamic access control system in the cloud is still challenging. In this paper, we propose Crypt-DAC, a system that provides practical cryptographic enforcement of dynamic access control. Crypt-DAC revokes access permissions by delegating the cloud to update encrypted data. In Crypt-DAC, a file is encrypted by a symmetric key list which records a file key and a sequence of revocation keys. In each revocation, a dedicated administrator uploads a new revocation key to the cloud and requests it to encrypt the file with a new layer of encryption and update the encrypted key list accordingly. Crypt-DAC proposes three key techniques to constrain the size of key list and encryption layers. As a result, Crypt-DAC enforces dynamic access control that provides efficiency, as it does not require expensive decryption/reencryption and uploading/re-uploading of large data at the administrator side, and security, as it immediately revokes access permissions. We use formalization framework and system implementation to demonstrate the security and efficiency of our construction.
PROJECT OUTPUT VIDEO:
EXISTING SYSTEM:
-
Garrison et al. proposed two revocation schemes. The first scheme requires an administrator to re-encrypt file with new keys as discussed above. Instead, the second scheme delegates users to re-encrypt the file when they need to modify the file, relieving the administrator from re-encrypting file data by itself.
-
Wang et al. proposed another revocation scheme, in which the symmetric homomorphic encryption scheme is used to encrypt the file. Such a design enables the cloud to directly re-encrypt file without decryption.
DISADVANTAGES OF EXISTING SYSTEM:
-
This scheme incurs a considerable communication overhead.
-
This scheme, however, comes with a security penalty as the revocation operation is delayed to the next user’s modification to the file. As a result, a newly revoked user can still access the file before the next writing operation.
-
This scheme incurs expensive file read/write overhead as the encryption/decryption operation involves comparable overhead with the public key encryption schemes
PROPOSED SYSTEM:
-
We present Crypt-DAC, a cryptographically enforced dynamic access control system on untrusted cloud. Crypt-DAC delegates the cloud to update encrypted files in permission revocations. In Crypt-DAC, a file is encrypted by a symmetric key list which records a file key and a sequence of revocation keys. In a revocation, the administrator uploads a new revocation key to the cloud, which encrypts the file with a new layer of encryption and updates the encrypted key list accordingly
-
First, Crypt-DAC proposes delegation-aware encryption strategy to delegate the cloud to update policy data.
-
Second, Crypt-DAC proposes adjustable onion encryption strategy to delegate the cloud to update file data.
ADVANTAGES OF PROPOSED SYSTEM:
-
Crypt-DAC achieves efficient revocation, efficient file access and immediate revocation simultaneously.
-
For revocation efficiency, Crypt-DAC incurs lightweight communication overhead at the administrator side as it does not need to download and re-upload file data.
-
For immediate revocation, the permissions of users are immediately revoked as the files are re-encrypted. For file access efficiency, the files are still encrypted by symmetric keys
-
Crypt-DAC periodically removes the bounded encryption layers of files while amortizing the burden to a large number of writing users.
SYSTEM REQUIREMENTS:
HARDWARE REQUIREMENTS:
-
System : Pentium Dual Core.
-
Hard Disk : 120 GB.
-
Monitor : 15’’ LED
-
Input Devices : Keyboard, Mouse
-
Ram : 1 GB
SOFTWARE REQUIREMENTS:
-
Operating system : Windows 10.
-
Coding Language : JAVA.
-
Tool : Netbeans 7.2.1
-
Database : MYSQL
REFERENCE:
Saiyu Qi, Yuanqing Zheng, “Crypt-DAC: Cryptographically Enforced Dynamic Access Control in the Cloud”, IEEE Transactions on Dependable and Secure Computing, 2021.