8/18/2019 secure self destruction scheme in cloud computing
1/27
A SECURE DATA SELF-DESTRUCTION
SCHEME IN CLOUD COMPUTING
MANU THOMAS - 12cs22
BTECH – IV Year / VIII Semester
DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING
VIMAL JYOTHI ENGINEERING COLLEGE CHEM!ERI
U"#er t$e G%a"ce '( Mr. JILSON P JOSE
Asst)!r'(ess'r *e+artme"t '( C'm+%ter Sc&e"ce , E"&"eer&"
VIMAL JYOTHI ENGINEERING COLLEGE CHEM!ERI
SEMINAR
8/18/2019 secure self destruction scheme in cloud computing
2/27
Table of Content
• I"tr'#%ct&'"
• M't&.at&'"
• !-TSABE sc$eme
•S0stem m'#e '( !-TSABE
• 'rma m'#e '( !-TSABE
• S0stem #escr&+t&'" '( t$e !-TSABE
• C'"c%s&'"
• Re(ere"ces
4/27/16 2
8/18/2019 secure self destruction scheme in cloud computing
3/27
Intro!"#t$on
• C'%# c'm+%t&" &s c'"sere# as t$e "e3t ste+ &" t$e
e.'%t&'" '( '"-#ema"# &"('rmat&'" tec$"''0)
• It c'm4&"es a set '( e3&st&" a"# "e5 tec$"&6%es (r'm researc$
areas s%c$ as ser.&ce-'r&e"te# arc$&tect%res 7SOA8 a"#
.&rt%a&9at&'")
• T$e s$are# #ata &" c'%# ser.ers $'5e.er %s%a0 c'"ta&"s
%sers: se"s&t&.e &"('rmat&'" a"# "ee#s t' 4e 5e +r'tecte#)
4/27/16 3
8/18/2019 secure self destruction scheme in cloud computing
4/27
Intro!"#t$on %#ont!'
• S$'%# s%++'rt %ser-#e(&"e# a%t$'r&9at&'" +er&'# a"# t'
+r'.e (&"e-ra&"e# access c'"tr' #%r&" t$&s +er&'#)
Tra!$t$on ("bl$# )e* en#r*(t$on
O"e '( t$e met$'#s t' ae.&ate t$e +r'4ems &s t' st're
#ata as a c'mm'" e"cr0+te# ('rm)
!$a!+anta,e
T$e %ser ca""'t s$are $&s/$er e"cr0+te# #ata at a (&"era&"e# e.e)
4/27/16 4
8/18/2019 secure self destruction scheme in cloud computing
5/27
Intro!"#t$on %#ont!'
Attr$b"te-bae! en#r*(t$on %AE'
Ac$&e.e 4't$ #ata sec%r&t0 a"# (&"e-ra&"e# access
c'"tr'
5& &"tr'#%ce +r'4ems 5&t$ rear# t' t&me s+ec&(&c
c'"stra&"t a"# se(-#estr%ct&'"
T$e!-releae en#r*(t$on %TRE'
Ass'c&ate# 5&t$ a +re#e(&"e# reease t&me
Rece&.er ca" '"0 c'"str%ct t$e c'rres+'"#&"
#ecr0+t&'" ;e0 &" t$&s t&me &"sta"ce
4/27/16 5
8/18/2019 secure self destruction scheme in cloud computing
6/27
8/18/2019 secure self destruction scheme in cloud computing
7/27
Mot$+at$on
• SSDD a"# F"llPP #'es "'t c'"ser t$e &ss%e '( #es&re#
reease t&me '( t$e se"s&t&.e #ata
• T$e e3+&rat&'" t&me '( 4't$ SS** a"# 't$er sc$emes are
&m&te# 40 t$e *HT "et5'r; a"# ca""'t 4e #eter-m&"e# 40 t$e
%ser)
• *e+e"#e"t '" t$e ea ass%m+t&'" '(
8/18/2019 secure self destruction scheme in cloud computing
8/27
/P-TSAE SCHEME
•
!-TSABE sc$eme &s a "'.e sec%re se(-#estr%ct&" sc$eme
('r #ata s$ar&" &" c'%# c'm+%t&"
• A#.a"taes?
– !-TSABE s%++'rts t$e (%"ct&'" '( %ser #e(&"e# a%t$'r&9at&'" +er&'#
– E"s%res t$at t$e se"s&t&.e #ata ca""'t 4e rea# 4't$ 4e('re &ts #es&re#
reease t&me a"# a(ter &ts e3+&rat&'")
– !-TSABE #'es "'t re6%&re t$e ea ass%m+t&'" '(
8/18/2019 secure self destruction scheme in cloud computing
9/27
/P-TSAE SCHEME
– !-TSABE &s a4e t' &m+eme"t (&"e-ra&"e# access
c'"tr' #%r&" t$e a%t$'r&9at&'" +er&'#
– Ma;es t$e se"s&t&.e #ata se(-#estr%ct&'" a(ter e3+&rat&'"
5&t$'%t a"0 $%ma" &"ter.e"t&'")
– !-TSABE &s +r'.e" t' 4e sec%re %"#er t$e sta"#ar#m'#e 40 %s&" t$e -4&&"ear *&((&eHema" &".ers&'"
ass%m+t&'")
4/27/16 9
8/18/2019 secure self destruction scheme in cloud computing
10/27
/P-TSAE SCHEME
• Eac$ #ata &tem &s ass'c&ate# 5&t$ a set '( attr&4%tes
• E.er0 attr&4%te &s ass'c&ate# 5&t$ a s+ec&(&cat&'" '( t&me
&"ter.a
•&rst t' s%++'rt scaa4e a"# e((&c&e"t +r&.ac0 +reser.&" +%4&c st'rae a%#&t&" &" c'%#)
4/27/16 10
8/18/2019 secure self destruction scheme in cloud computing
11/27
/P-TSAE SCHEME
CONCEPTS• A"t0or$1at$on (er$o!) It &s a t&me &"ter.a +re#e(&"e# 40 a
#ata '5"er start&" (r'm t$e #es&re# reease t&me a"# e"#&" at
t$e e3+&rat&'" t&me)
• E2($rat$on t$e) It &s a t$res$'# t&me &"sta"t +re#e(&"e# 40
t$e '5"er) T$e s$are# #ata ca" '"0 4e accesse# 40 t$e %ser
4e('re t$&s t&me &"sta"t)
• F"ll l$fe#*#le) It &s a t&me &"ter.a (r'm t$e creat&'" '( t$e
s$are# #ata a%t$'r&9at&'" +er&'# t' e3+&rat&'" t&me)
4/27/16 11
8/18/2019 secure self destruction scheme in cloud computing
12/27
S3STEM MODEL OF /P-TSAE
T$e s0stem m'#e &s #e(&"e# 40 #&.&" t$e !-TSABE sc$eme&"t' t$e (''5&" s&3 e"t&t&es
• Data O4ner) *ata '5"er ca" +r'.e #ata 'r (&es t$at c'"ta&"
s'me se"s&t&.e &"('rmat&'" 5$&c$ are %se# ('r s$ar&" 5&t$$&s/$er (r&e"#s 7#ata %sers8) A t$ese s$are# #ata are
'%ts'%rce# t' t$e c'%# ser.ers t' st're)
• A"t0or$t*) It &s a" &"#&s+e"sa4e e"t&t0 5$&c$ &s res+'"s&4e('r e"erat&" #&str&4%t&" a"# ma"a&" a t$e +r&.ate ;e0s
a"# &s tr%ste# 40 a t$e 't$er e"t&t&es &".'.e# &" t$e s0stem)
4/27/16 12
8/18/2019 secure self destruction scheme in cloud computing
13/27
S3STEM MODEL OF /P-TSAE
T$e Ser+er. It &s a t&me re(ere"ce ser.er 5&t$'%t a"0 &"teract&'"5&t$ 't$er e"t&t&es &".'.e# &" t$e s0stem) It &s res+'"s&4e ('r a
+rec&se reease t&me s+ec&(&cat&'")
Data Uer. *ata %sers are s'me +e'+es 5$' +asse# t$e e"t&t0a%t$e"t&cat&'" a"# access t' t$e #ata '%ts'%rce# 40 t$e #ata
'5"er) N't&ce t$at t$e s$are# #ata ca" '"0 4e accesse# 40 t$e
a%t$'r&9e# %sers #%r&" &ts a%t$'r&9at&'" +er&'#)
4/27/16 13
8/18/2019 secure self destruction scheme in cloud computing
14/27
S3STEM MODEL OF /P-TSAE
Clo"! Ser+er. It c'"ta&"s am'st %"&m&te# st'rae s+ace 5$&c$&s a4e t' st're a"# ma"ae a t$e #ata 'r (&es &" t$e s0stem)
Ot$er e"t&t&es 5&t$ &m&te# st'rae s+ace ca" st're t$e&r #ata t'
t$e c'%# ser.ers)
Potent$al A!+erar*. #ecares a" attr&4%te set a"# %se &t t'
e"erate re+eate# +r&.ate ;e0 a"# t&me &"sta"t &" attem+t t'
#ecr0+t t$e c0+$erte3t)
4/27/16 14
8/18/2019 secure self destruction scheme in cloud computing
15/27
S3STEM MODEL OF /P-TSAE
4/27/16 15
8/18/2019 secure self destruction scheme in cloud computing
16/27
FORMAL MODEL OF /P-TSAE
T$e !-TSABE sc$eme ca" 4e #escr&4e# as a c'ect&'" '( t$e
(''5&" ('%r a'r&t$ms? Set%+ E"cr0+t e0Ge" a"# *ecr0+t)
Set"( %5 6 U'7
• T$&s a'r&t$m &s r%" 40 t$e A%t$'r&t0
• Ta;es as &"+%t t$e sec%r&t0 +arameter a"# attr&4%te %"&.erse
U
• Ge"erates s0stem +%4&c +arameters +arams a"# t$e master
;e0 MS)
• T$e A%t$'r&t0 +%4&s$es +arams a"# ;ee+s MS secret t'
&tse()
4/27/16 16
8/18/2019 secure self destruction scheme in cloud computing
17/27
FORMAL MODEL OF /P-TSAE
En#r*(t %M6 (ara6 S6 TS'7
• G&.e" t$e +%4&c +arameters +arams t$e s$are# messae M
5$&c$ t$e '5"er 5a"ts t' e"cr0+t
• T$e attr&4%te set S a"# t$e set '( t&me &"ter.as TS &" 5$&c$
e.er0 eeme"t &" TS &s ass'c&ate# 5&t$ a c'rres+'"#&"
attr&4%te &" S)
• T$&s a'r&t$m e"erates t$e c&+$erte3t CT 5$&c$ &s
ass'c&ate# 5&t$ t$e (%990 attr&4%te set S)
4/27/16 17
8/18/2019 secure self destruction scheme in cloud computing
18/27
FORMAL MODEL OF /P-TSAE
/e*Gen %MS/6 86 T 9'7
• T$&s a'r&t$m ta;es as &"+%t t$e master ;e0 MS t$e access
tree @ a"# t$e t&me set T )
• E.er0 attr&4%te 3 &" @ &s ass'c&ate# 5&t$ a t&me &"sta"t T It∈
'%t+%ts a +r&.ate ;e0 S 5$&c$ c'"ta&"s @)
•
4/27/16 18
8/18/2019 secure self destruction scheme in cloud computing
19/27
FORMAL MODEL OF /P-TSAE
De#r*(t %CT6 S/'7
• T$&s a'r&t$m ta;es as &"+%t t$e c&+$erte3t CT a"# t$e
+r&.ate ;e0 S)
• $e" a set '( t&me-s+ec&(&c attr&4%tes sat&s(&es @ &t &s a4e t'
#ecr0+t t$e c&+$erte3t a"# ret%r" t$e +a&"te3t M)
4/27/16 19
8/18/2019 secure self destruction scheme in cloud computing
20/27
S3STEM DESCRIPTION
OF THE /P-TSAE
18 S*te et"(
I" t$e s0stem &"&t&a&9at&'" +$ase
• A #ata '5"er c$''ses a are sec%r&t0 +arameter a"#
attr&4%te %"&.erse U
• I".';es t$e a'r&t$m Set%+71; U8 t' e"erate s0stem
+arameters +arams a"# master ;e0 MS)
4/27/16 20
8/18/2019 secure self destruction scheme in cloud computing
21/27
S3STEM DESCRIPTION
OF THE /P-TSAE
2' En#r*(t$on 4$t0 t$e #ontra$nt
• *ata '5"er c$''ses a" attr&4%te set S ('r t$e s$are# messae
M
• *e(&"es a t&me &"ter.a set TS ('r S)
• *ata '5"er &".';es t$e a'r&t$m E"cr0+t7M +arams S TS 8
t' e"cr0+t M t' &ts c&+$erte3t CT 5$&c$ &s ass'c&ate# 5&t$ t$e
set S a"# TS)
• &"a0 CT &s se"t t' c'%# ser.ers
4/27/16 21
8/18/2019 secure self destruction scheme in cloud computing
22/27
S3STEM DESCRIPTION
OF THE /P-TSAE
D8 F$ne-,ra$ne! a##e #ontrol !"r$n, t0e a"t0or$1at$on(er$o!
*ata %ser 5a"ts t' access t$e s$are# #ata M #%r&" &ts
a%t$'r&9at&'" +er&'#
M%st +ass t$e e"t&t0 a%t$e"t&cat&'" a"# s$'%# +er('rm t$e
(''5&" +r'cesses?
– &rst0 t$e c%rre"t t&me &"sta"t t3 &s +r'.e# 40 t$e t&me ser.er 5&t$ t3
T 5$&c$ &s ass'c&ate# 5&t$ eac$ attr&4%te 3)∈
– I( T TS a"# t$e attr&4%te set '( t$e %ser matc$es t$e access tree @)⊆
4/27/16 22
8/18/2019 secure self destruction scheme in cloud computing
23/27
S3STEM DESCRIPTION
OF THE /P-TSAE
– T$e" t$e A%t$'r&t0 r%"s t$e a'r&t$m e0Ge" 7MS @ T 8 t'e"erate t$e +r&.ate ;e0 S a"# se"#s &t t' t$e %ser)
– O"ce t$e %ser rece&.e# t$e S $e 5& et t$e CT (r'm t$e c'%#
ser.ers
– *ata %ser &".';es t$e a'r&t$m *ecr0+t 7CT S8 t' #ecr0+t CT t'
'4ta&" t$e s$are# #ata M)
– Beca%se eac$ attr&4%te 3 &s ass'c&ate# 5&t$ a c%rre"t t&me &"sta"t t3 &(
a"# '"0 &( t3 TS a"# attr&4%te set matc$es @ t$e %ser ca" '4ta&" t$e∈
c'rrect +r&.ate ;e0 S t' #ecr0+t CT)
4/27/16 23
8/18/2019 secure self destruction scheme in cloud computing
24/27
S3STEM DESCRIPTION
OF THE /P-TSAE
:' Data elf-!etr"#t$on after e2($rat$on
• O"ce t$e c%rre"t t&me &"sta"t tx 4ec'mes a(ter t$e t$res$'#
.a%e '( t$e .a t&me &"ter.a tR,x
• T$e %ser ca""'t '4ta&" t$e tr%e +r&.ate ;e0 S)
• T$ere('re t$e c0+$erte3t CT &s "'t a4e t' 4e #ecr0+te# &"
+'0"'m&a t&me)
• T$&s (ac&&tates t$e se(-#estr%ct&'" '( t$e s$are# #ata a(tere3+&rat&'")
4/27/16 24
8/18/2019 secure self destruction scheme in cloud computing
25/27
CONCLUSION
• !-TSABE sc$eme ac$&e.es t$e t&me-s+ec&(&e# c&+$erte3t &"
'r#er t' sec%re #eetet&'" '( '%ts'%rce# #ata st're# &" t$e
c'%# se.ers)
• It Im+eme"ts (e3&4e (&"e-ra&"e# access c'"tr' #%r&" t$e
a%t$'r&9at&'" +er&'# a"# t&me-c'"tr'a4e se(-#estr%ct&'"
a(ter e3+&rat&'"
4/27/16 25
8/18/2019 secure self destruction scheme in cloud computing
26/27
REFERENCES
• J) &'" ) L& J) Ma ) L&% F) Ya' a"# !) S) C$e" !eer t'-
!eer Net5'r;&" a"# A++&cat&'"s A.a&a4e?
$tt+?//#3)#'&)'r/1)1/s12D-1-2K-3
• ) L&% J) Ma J) &'" a"# G) L&% I"ter"at&'"a J'%r"a '( Net5'r; Sec%r&t0 .') 1 "') ++) D1–
D 21)
4/27/16 26
http://dx.doi.org/10.1007/s12083-014-0295-xhttp://dx.doi.org/10.1007/s12083-014-0295-x
8/18/2019 secure self destruction scheme in cloud computing
27/27
THAN/ 3OU
4/27/16 27
Top Related