Authentication & Key Agreement Based on Anonymous Identity for Peer to Peer Cloud || VIP || IEEE HYD
Автор: Venkat Innovative Projects
Загружено: 2025-10-08
Просмотров: 36
TO PURCHASE OUR PROJECTS IN ONLINE (OR) OFFLINE
CONTACT:VENKAT INNOVATIVE PROJECTS
NAME: VENKATARAO GANIPISETTY
Mobile & WhatsApp :+91 9966499110
Mobile & WhatsApp :+91 9573201550
Email :[email protected]
Email :[email protected]
website:https://venkatinnovativeprojects.com/
ABOUT PROJECT:
Now-a-days cloud services are using everywhere as it’s provide heavy storage and computation cost at cheaper cost. Data backup at cloud servers cannot be download when user change his mobile or laptop as cloud does not support migration to different providers. To overcome from this issue author of this paper employing Peer-to-Peer services which can be run by all cloud service providers. Peer of 1 cloud can communicate with peer of other cloud to access user data to support migration. During accessing of one cloud peer from other cloud peer can put cloud security at risk as it may leak cloud identity.
To overcome from above issue author employing Anonymous Identity Based Key Agreement and authentication protocol where different peers can communicate with anonymous key identities without leaking actual identity.
In propose work ECC algorithm is used to generate public and private keys and then Diffie Hellman algorithm is used to compute common secret shared between two different peers or parties by using their private and public keys. If both parties utilising same algorithm then same secret will be generated and authentication will get successful. Upon successful authentication both peers can share data between one and other.
To implement this project we have designed following modules
1) Peer1: Peer1 will be running using socket and can accept request from peer2 for authentication and then share each other files upon successful authentication
2) Peer2: Peer2 will be running using socket and can accept request from peer1 for authentication and then share each other files
3) New User Registration: this service will be run on cloud server where user can sign up with the application
4) User Login: user can login to system
5) Upload File 2 Cloud Peer: after login user can upload file to desired peer with the help of cloud
6) Access File Peer Key Authentication: user can download file from the peer and of file not available at source peer then it will authenticate with other peers using key exchange protocol, upon successful authentication both will exchange file and then send to cloud user for download
7) Computation Cost: using this module will plot communication cost graph between peers as all peers running on THREADS and search in their own memory so its search time will be less compare to single thread server which is searching entire memory for desired file.

Доступные форматы для скачивания:
Скачать видео mp4
-
Информация по загрузке: