Digital Data Encryption Using Cloud
Digital Data Encryption Using Cloud
Neha More
Department of Computer Engineering
Trinity College of Engineering and Research
Shraddha Khamkar
Department of Computer Engineering
Trinity College of Engineering and Research
Poonam Kolate
Department of Computer Engineering
Trinity College of Engineering and Research
Abstract
Main aim of Identity -Based Access Control project is to store the important data from cloud. This mechanism is to carry out the
rating system for preventing specific digital content like (audio, video, images etc) from being obtained by appropriate users. We
introduce an access-control technique that we refer to as attribute-based encryption (ABE). An extension of the cryptographic
technique of identity-based encryption (IBE), our proposed ABE scheme can serve as the basis of an access-control architecture
where interaction is not require for entities with a trusted authority in order to gain access to sensitive data.In this paper, we
proposed an identity based access control approach for digital content based on cipher text-policy attribute-based encryption.
Only one copy of encrypted digital content is required to share with multiple users. In this paper we represent a system for
realizing complex access control on encrypted data that we call Cipher text-Policy Attribute-Based Encryption. By using such
techniques encrypted data can be kept confidential even if the storage server is untrusted; Previous Attribute- Based Encryption
systems used attributes to describe the encrypted data and built policies into users keys; while in our system attributes are used
for describing a users credentials, and a party for encrypting data determines a policy for who can decrypt. We present a ne w
methodology for realizing Cipher-text Policy Attribute Encryption (CP-ABE) under concrete and non-interactive cryptographic
assumptions in the standard model. Our solutions allow any encrypt to specify access control in terms of any access formula over
the attributes in the system.As shown in our performance analysis with respect of security, space complexity, and time
complexity, identity-based access control outperforms the traditional access control list based and encryption-based access
control approaches.
Keywords: Identity-based; access control; rating system; cipher text-policy attribute-based encryption
________________________________________________________________________________________________________
I.
INTRODUCTION
Various multimedia content, such as audio, video, images, text messages and so on, is digitalized. As the rapid development of
cloud computing, digital content is easily spread out on TV and Internet.
A simple and straightforward mechanism is applying the access control on the trusted content server. In cloud environments,
the digital content is possible to be duplicated to another content server which may not provide access control .If the traditional
encryption is applied to provide access control, there must be multiple copies of the same digital content for multiple users. This
will result in the waste of resources. The project provides the authentication for the data in digital format. In the era of cloud
computing, safe keeping of the digital data is challenge i.e. implementing the rating system is to provide an identity-based access
control mechanism for these rated digital contents. It provides the control over authority, content provider and content user. The
encryption of the data is done with the help of 3 keys 1 public key,1 private key and one master key. Content provider is one who
attempts to distribute digital content in the compliance with corresponding rating system. Content user is one who attempts to
access digital content. Hence total identity based access control is achieved.
II. MATHEMATICAL MODEL
Set Theory Analysis:
a. Let S be the Identity based access control as the final set
S =f........
Identify the inputs as P, R
S = fP, R, D
P= fP1, P2,...jP gives the security parameters g
R=fR1, R2,...jR is the User attributes g
D= fD1, D2,..jD data in transfer g
116
Signup Page:
After clicking signup or sign-in button user will proceed to new page where he/she can sign-up or sign-in For creating new
account user has to fill four fields:
117
i) First name ii) Last Name iii) College name i.e as we have made this system for university data purpose iv)email id After
filling up all the fields user can sign up for a new account .so he/she will have to click on apply for a new account button.
Admin Page:
After signing up successfully admin will have to approve/disapprove the user .Here all users that have signed-up will be seen
Admin will approve/disapprove user depending on whether information entered by the user is valid or not .If admin has approved
the user then email-id ,password, private-key will be send automatically to that particular users email address.
Login Page:
After getting email from admin containing email-id, password, private-key user will be able to login by entering his/her email-id
and password.
118
Uploading/Downloading Page:
By entering valid email-id and password user will see the following page where he/she will be able to upload/download the data.
All the uploaded data will be seen on this page
Here user will have to choose a file which he/she wish to share amongst all his/her friends, teachers etc. after choosing a file
user have to click on upload file button . Then after some time , file will be uploaded depending on the internet speed and file
size.
119
The process of converting the cloud to be a place for storing critical applications will be possible with the advent of newer
security features and algorithms in the terms of access control, cloud data encryption/decryption algorithms, auditing techniques
and digital signature for data integrity. Sahai and Waters [3] proposed the ABE system and it is the first scheme which achieved
the One-to-many public-key encryption .In this scheme, the cipher text and the users secret key are related with the set of
attributes and these set of attributes act as a access policy. Only when there is a match between the attributes of the decryption
key and cipher text, the users will be capable of decrypting the cipher text.
VI. PROPOSED WORK
Key Generation:
For each data user, the authority takes the attribute data user to generate secret key.
Encryption:
Encryption is the process of converting original information like digital contents (video, audio, text, and image) into cipher text.
Also performs various substitutions and transformations on the plaintext.
Decryption:
Decryption is the process of transferring an encrypted digital contents like audio, video, text, images back into its normal form
Table 2
Notation Lists
Notation
Description
The Private Key Content
The Master Key Content
The Digital Content
The Secret Key Content
120
Authentication:
Authentication techniques are used to verify identity. The authentication of authorized users prevents unauthorized users from
gaining access to corporate information systems. Authentication method is of validating the identity of user, service or
application. Weak password recovery validation is when a website permits an attacker to illegally obtain, change or recover
another users password.
Authorization:
Authorization is a procedure of controlling the access of authenticated users to the system resources. An authorization system
provides each user with exactly those rights granted to them by the administrator.
IX. SHA-1 FUNCTION
The Secure Hash Algorithm is a family of cryptography and data integrity.
Cryptography:
Cryptography is the practice and study of techniques for secure communication in the presence of third parties. Cryptography is
the science of writing in secret code and is ancient art. Cryptography is not only protects data from theft but can also be used for
user authentication. There are, in general, three types of cryptographic schemes typically used to accomplish these goals: Secret
key cryptography, public key Cryptography, and hash function.
Data Integrity:
Integrity refers to the trustworthiness of information resources. Integrity should not be altered without detection. It also include
origin or source integrity that is, that the data actually came from the person or entity you think it did, rather than an
imposter. Integrity of an information system includes only preservation without corruption of whatever was transmitted or
entered into the system, right or wrong.
X. DATA-FLOW MODEL
1)
2)
3)
4)
5)
6)
121
Advantages :
Key premises for Hash Function
1) Impossible to re-create the message given a fingerprint.
2) Collision Free.
Public Key Algorithm
1) Password login
2) Encryption key management
3) 3.Digital Signature
Integrity Checking
1) Virus and malware scanning
Authentication
Secure web connections. (PGP, SSL, SSH, S/MIME)
XI. FUTURE WORK
The features of CP-ABE, iDAC has several advantages. The access control still works even the digital content is duplicated to
another content server with less or even no security protection. Less storage is required to share digital content with multiple
users. our performance analysis with respect of security, space complexity, and time complexity, iDAC out performs the
traditional access control list (ACL) based and encryption-based access control approaches. To provide identity-based access
control for digital content based on cipher text-policy with Attribute-Based Encryption. In the future, consider attribute-based
encryption systems with different types of expressibility. While, Key-Policy ABE and Cipher text-Policy ABE capture two
interesting and complimentary types of systems there certainly exist other types of systems.
ACKNOWLEDGMENTS
We would like to acknowledge and extend our heartfelt. Gratitude to our guide prof. Suchita Wankhade and Prof. Rakhi
Bhardwaj for encouragement and their support.
XII. CONCLUSION
In this paper, we proposed an identity-based access control approach for digital content based on cipher text-policy attributebased encryption (iDAC). Attribute based encryption is an extensively used technique for access control. It has been used to
refine users from accessing information .We created a system for Cipher text-Policy Attribute Based Encryption. Our system
allows with a new type of encrypted access control where users private keys are specified by a set of attributes and a party who
is encrypting data can specify a policy over these attributes specifying which users are able to decrypt. One limitation of our
system is that it is proved secure under the generic group heuristic
Utilization of storage due to duplication of data is avoided.
Security is increased because each time private and public key is require while uploading and downloading data.
REFERENCES
[1]
[2]
[3]
[4]
[5]
[6]
[7]
[8]
Vinoth Kumar P, Dr.P.D.R. Vijaya Kumar A Literature Survey On Revocable Multiauthority Cipher Text-Policy Attribute-Based Encryption(CPABE)Scheme For Cloud StorageInternational Journal of Advanced Research in Electronics and Communication Engineering (IJARECE) Volume 3, Issue
12, December 2014
Balamurugan B and Venkata Krishna Extensive Survey on Usage of Attribute Based Encryption in Cloud journal of emerging technologies in web
intelligence, vol. 6, no. 3, august 2014
Adi Shamir. Identity-based cryptosystems and signature schemes. In Proceedings of CRYPTO 84 on Advances in cryptology, pages 4753. SpringerVerlag New York, Inc., 1985.
[online]https://cloudsecurityalliance.org/download/cloud-computing-vulnerability-incidents-a-statistical-overview/
Identity-based Access Control for Digital Content based on Cipher text-Policy Attribute-Based Encryption Win-Bin Huang Wei-Tsung Su2015 IEEE
Secure Cryptographic Workflow in the Standard Model M. Barbosaand P. Farshim
Cipher text-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization Brent Waters
Cipher text-Policy Attribute-Based Encryption John Bethencourt, AmitSahai, Brent Waters
122