Main Reference PaperAttribute-Based Access Control with Efficient Revocation in Data Outsourcing Systems, IEEE Transactions on Parallel and Distributed Systems, July 2011.
  • This project proposes data outsourcing systems that requires flexible access control policies. This project proposed an access control mechanism using cipher text-policy attribute-based encryption to enforce access control policies with efficient attribute and user revocation capability. This project also implements the optimized dynamic re-keying mechanism to reduce the storage cost as well as computational cost. This project constructs access table to maintain the access policies and the details of resources. The main aim of this table is used to avoid the duplicate data

+ Description
  • This project proposes data outsourcing systems that requires flexible access control policies. This project proposed an access control mechanism using cipher text-policy attribute-based encryption to enforce access control policies with efficient attribute and user revocation capability. This project also implements the optimized dynamic re-keying mechanism to reduce the storage cost as well as computational cost. This project constructs access table to maintain the access policies and the details of resources. The main aim of this table is used to avoid the duplicate data

  • To propose an access control mechanism using cipher text-policy attribute-based encryption to impose access control policies with efficient attribute capability.

  • To propose an optimized dynamic re-keying mechanism to reduce the storage cost as well as computational cost.

  • To Construct an access table to maintaining the access policies and reduces the data redundancy.

+ Aim & Objectives
  • To propose an access control mechanism using cipher text-policy attribute-based encryption to impose access control policies with efficient attribute capability.

  • To propose an optimized dynamic re-keying mechanism to reduce the storage cost as well as computational cost.

  • To Construct an access table to maintaining the access policies and reduces the data redundancy.

  • This mechanism uses a key server to maintains the keys and also maintains the frequent key updates when a user newly joins to the group or leave from this group. This server is also responsible for calculating the key length and comparing the new key length with the old one.

+ Contribution
  • This mechanism uses a key server to maintains the keys and also maintains the frequent key updates when a user newly joins to the group or leave from this group. This server is also responsible for calculating the key length and comparing the new key length with the old one.

  • Java JDK 1.8, MySQL 5.5.40

  • Netbeans 8.0.1, J2SE

+ Software Tools & Technologies
  • Java JDK 1.8, MySQL 5.5.40

  • Netbeans 8.0.1, J2SE

  • B.E / B.Tech / M.E / M.Tech

+ Project Recommended For
  • B.E / B.Tech / M.E / M.Tech

Professional Ethics: We S-Logix would appreciate the students those who willingly contribute with atleast a line of thinking of their own while preparing the project with us. It is advised that the project given by us be considered only as a model project and be applied with confidence to contribute your own ideas through our expert guidance and enrich your knowledge.