Main Reference PaperAttribute-Based Access Control with Efficient Revocation in Data Outsourcing Systems, IEEE Transactions on Parallel and Distributed Systems, July 2011.
  • This work proposes data outsourcing systems that require flexible access control policies. This study provides an access control mechanism using cipher text-policy attribute-based encryption to enforce access control policies with efficient attribute and user revocation capability.Also, it implements the optimized dynamic re-keying mechanism to reduce the storage cost as well as computational cost. This project constructs access table to maintain the access policies and the details of resources to avoid the duplicate data.

+ Description
  • This work proposes data outsourcing systems that require flexible access control policies. This study provides an access control mechanism using cipher text-policy attribute-based encryption to enforce access control policies with efficient attribute and user revocation capability.Also, it implements the optimized dynamic re-keying mechanism to reduce the storage cost as well as computational cost. This project constructs access table to maintain the access policies and the details of resources to avoid the duplicate data.

  • To propose an access control mechanism using cipher text-policy attribute-based encryption to impose access control policies with efficient attribute capability.

  • To propose an optimized dynamic re-keying mechanism to reduce the storage cost as well as computational cost.

  • To Construct an access table to maintaining the access policies and reduces the data redundancy.

+ Aim & Objectives
  • To propose an access control mechanism using cipher text-policy attribute-based encryption to impose access control policies with efficient attribute capability.

  • To propose an optimized dynamic re-keying mechanism to reduce the storage cost as well as computational cost.

  • To Construct an access table to maintaining the access policies and reduces the data redundancy.

  • This mechanism uses a key server to maintains the keys and also maintains the frequent key updates when a user newly joins to the group or leave from this group. This server is also responsible for calculating the key length and comparing the new key length with the old one.

+ Contribution
  • This mechanism uses a key server to maintains the keys and also maintains the frequent key updates when a user newly joins to the group or leave from this group. This server is also responsible for calculating the key length and comparing the new key length with the old one.

  • Java JDK 1.8, MySQL 5.5.40

  • Netbeans 8.0.1, J2SE

+ Software Tools & Technologies
  • Java JDK 1.8, MySQL 5.5.40

  • Netbeans 8.0.1, J2SE

  • M.E / M.Tech / MS / Ph.D.- Customized according to the client requirements.

+ Project Recommended For
  • M.E / M.Tech / MS / Ph.D.- Customized according to the client requirements.

  • No Readymade Projects-Depending on the complexity of the project and requirements.

+ Order To Delivery
  • No Readymade Projects-Depending on the complexity of the project and requirements.

Professional Ethics: We S-Logix would appreciate the students those who willingly contribute with atleast a line of thinking of their own while preparing the project with us. It is advised that the project given by us be considered only as a model project and be applied with confidence to contribute your own ideas through our expert guidance and enrich your knowledge.