ISSN (ONLINE): 2454-9762
ISSN (PRINT): 2454-9762
Available online at www.ijarmate.com
International Journal of Advanced Research in Management, Architecture, Technology
and Engineering (IJARMATE)
Vol. 1, Issue 5, December 2015
Accessing Data from Cloud using Cryptography
Preeti Jain1, Dr. BarjeshKochar2
Research Scholar, JNU, Jaipur1
Professor, IT Dept., JIMS, Rohini, New Delhi2
Abstract: The aura of cloud computing has
been touching hearts of many companies
and organization day by day. Being
flexible, scalable and easy to use plug in
play services, customers are getting
addicted to various cloud services. The
paper presents cryptography system that
uses encryption technique for assessing
data securely from public cloud
environment. Encryption involves transfer
of data into some coded cipher form that is
not understandable by local users located
on public clouds. Only data owner can
provide access to different users by
decrypting it with its unique password on
key.
access data any time without taking
Keywords: Cryptography, Encryption,
Decryption, public cloud and Hash
function
solution to this concern is described in
1. INTRODUCTION
decryption). In this process, data owner
With
tremendous
increase
in
latest
permission, then it is called private cloud.
If data center is accessed and managed by
cloud services providers like Google,
Amazon and usersare willing to use their
services by asking for permission then it is
called as public cloud. Hybrid cloud is
combination of either private or public
cloud. Ensuring data confidentiality and
authentication are one of major concerns
for public cloud environment. Customers
always suffer from fear that their data may
be accessed by intruders or attackers. The
following paper that employs use of
cryptographic process (encryption and
has
its
key
that
updates
data
technology trends, the consumption of
(encryption)and for accessing that data,
resources has been increase to great height.
users are required to enter decryption key.
Users are acquiring resources provided by
The remaining paper is organized as
cloud providers in order to perform task
follows. Section 2 presents previous
faster and increased efficiency rate. In
studies in context of cloud computing.
addition to this, cloud deployment models
Section
also exist that has some features. If data
cryptographic system. Section 4 presents
center is owned and managed by some
list of related works that have been done in
3deals
whit
proposed
community or customer and users can
All Rights Reserved 2015 IJARMATE
12
ISSN (ONLINE): 2454-9762
ISSN (PRINT): 2454-9762
Available online at www.ijarmate.com
International Journal of Advanced Research in Management, Architecture, Technology
and Engineering (IJARMATE)
Vol. 1, Issue 5, December 2015
order to prove our system better. Section 5
concludes the given paper.
3. Comparison of existing works
Study
Features
2. LITERATURE SURVEY
System
Various studies have been lead by
researchers in context of security issue and
Ruj
et.al
[6]
schemes for achieving confidentiality.
Song et.al [1] revised encryption method
for securing data. They analyzed text by
text and encrypt them using key at client
site as well as server site. It is very time
consuming
process.
Proposed
Brinkman
et.al
[2]suggested idea of creating indexing on
Goikar
et.al
[18]
blocks of file and developed algorithm for
searching databases.Gohet.al [3] proposed
secure indexing model by using encryption
technique without involving use hash
Decentralized
process
to
access data.
No client
service
provider
awareness
Centralized
Uses
GPS
receiver
to
find location
of data and
decrypt it. If
location not
found,
then
data cannot be
accessed.
Uses
system
with
interoperability
between
and
client
service
providers.
hash
function
to
search for data
sequentially and
maps values to
different
locations.
function. Keu yang et.al [4] proposed data
data
access control mechanism for storing data
found at given
secured key. Alizarin et.al [5] have lead
location, then it
various studies in context of security issue
moves to next
of cloud computing. Ruj et.al [6] used
location
concept of decentralization in order to
than
access data from random users. But it may
process.
lead
to
risk
of
intruders
attackers.
Although cloud is best platform for storage
of resources but without its security it is of
Goh
et.al
[3]
no use. Cloud computing services must be
improved in legal protection also [7].
Boneh
et.al
Used trapdoor
to search for
data but not
suitable
for
multiple
keywords
search.
Performs
sequential
All Rights Reserved 2015 IJARMATE
is
If
not
rather
stopping
Handles
multiple
keyword
searches.
Performs
13
ISSN (ONLINE): 2454-9762
ISSN (PRINT): 2454-9762
Available online at www.ijarmate.com
International Journal of Advanced Research in Management, Architecture, Technology
and Engineering (IJARMATE)
Vol. 1, Issue 5, December 2015
[20]
search of data
by using bilinear maps.
Bi-linear
maps
has
disadvantage
that they may
point
to
multiple
locations with
same
time
periods.
sequential
search
using
The existing work employs use of
bi-linear maps to point data values
one-way
free
to different locations but at same
function
time. It leads to collision because it
that points to
may happen that second location is
multiple
already having data at same time.
collision
hash
locations
at
different
time
The generation of metadata has not
properly
utilized
as
it
lacks
encrypted data index file.
periods.
4. Flaws in the existing work
The existing work in context of accessing
5. PROPOSED
SYSTEM
data from cloud using cryptography
The system deals with owner/manager,
process has been mentioned in [3, 6, 18,
client
and 20]. The flaws in their works are as
(Google/yahoo). Client acts as interface
follows:
between owner and service provider. The
and
CRYPTOGRAPHIC
cloud
service
provider
proposed framework is required to keep
There is no centralized system
designed for interaction between
client and server and to prevent
data loss.
data protected from third parties and it
should reach at client site. Then client can
forward that data to cloud provider in
order to get original data. The detail layout
The process gets ceased if data is
is given below:-
not found or located at given
memory locations. It ceased due to
lack of one way hash function. It
would be better to employ use of
hash function for mapping data
values
at
different
memory
locations.
All Rights Reserved 2015 IJARMATE
14
ISSN (ONLINE): 2454-9762
ISSN (PRINT): 2454-9762
Available online at www.ijarmate.com
International Journal of Advanced Research in Management, Architecture, Technology
and Engineering (IJARMATE)
Vol. 1, Issue 5, December 2015
Fig 2: Process of Indexing
Blocks of data stored as indexes on given
locations now, encrypted data values are
stored in index field. This encrypted data
is being sent to cloud service provider
stores data to various remote locations
hosted by different data centers. As soon
as data reaches provider, it generates index
of encrypted data at its site. This encrypted
data is being searched by different clients
Fig 1: Layout of proposed work
that are requesting for data. Then client
uses decryption key provided by data
6. Working
owner and access that matched encrypted
The data owner has right to send, manage
data.
and access data any time. Firstly, data is
being put in query to be sent to service
provider. It has to undergone through
7. How proposed system overcomes
process of encryption before data is being
existing flaws or advantages of proposed
sent to provider. Data owner has its
system
secrete key (K) that is used as identifier to
generate cipher text (codedtext) using
sent
process of encryption (E). Indexing is
untrusted
the
sites
process
by
of
encryption.
can be done using hash function. Hash
a service provider.
from
involving
being done to access data in less time. It
function maps value to different locations
The system tests malicious data
The
process
of
encryption
generates cipher text that is not
understood by third parties except
All Rights Reserved 2015 IJARMATE
15
ISSN (ONLINE): 2454-9762
ISSN (PRINT): 2454-9762
Available online at www.ijarmate.com
International Journal of Advanced Research in Management, Architecture, Technology
and Engineering (IJARMATE)
Vol. 1, Issue 5, December 2015
data owner. Only data owner can
8. Conclusion and future scope
access that data because it has its
The paper presents a technique to achieve
own secret key (K).
secured
The system is centralized rather
environment.
than decentralized. It means client
that needs to be improved by cloud
and service providers maintain
standards. Various studies are going on
interoperability
regarding this. A cryptographic system has
securely.
If
to
access
system
is
data
made
data
from
public
cloud
Security is major concern
been proposed in following paper.
It
decentralized, then it might be
makes use of encryption when data is sent
possible that service providers keep
by owner to service provider at service
waiting for encrypted data which is
provider site. It uses one way hash
requested by client before.
function that helps in creating index of
The proposed system is able to
blocks of data at various remote location
handle multiple search keywords.
hosted by data centers for accessing this
If user enters two queries, they are
data,
being
for
maintains index of encrypted data at that
undergoing process of encryption.
time client request for data and if
Rather than generating hash index
searching data get matches with encrypted
for one query, it produces two hash
data, then client can access data using its
indices for two queries. If both
decryption key.
hash
put
into
functions
queue
map
to
same
locations in memory, then data at
that location is recorded with
different time period. Data with
earliest time is being accessed by
client firstly and its
cloud
service
provider
again
The proposed system can be made
interoperable with semantic web security
standards in which data can be accessed
using lightweight ontologys in machine
understandable format.
memory
location gets filled by other key
value.
All Rights Reserved 2015 IJARMATE
16
ISSN (ONLINE): 2454-9762
ISSN (PRINT): 2454-9762
Available online at www.ijarmate.com
International Journal of Advanced Research in Management, Architecture, Technology
and Engineering (IJARMATE)
Vol. 1, Issue 5, December 2015
[8]. Security and high availability in
9. REFERENCES
cloud computing environments , IBM
[1]. Song, D.; Wagner, D. & A. Perrig,
(2000) Practical Techniques for Searches
on Encrypted Data, in Proc. of the 2000
IEEE Symposium on Security and Privacy
(S&P 2000)
Global Technology Services Technical
[2]. Brinkman, R.; Feng, L.; Doumen,
J.M., Hartel, P.H. & W. Jonker, (2004)
Efficient Tree Search in Encrypted Data,
2nd International Workshop on R. Security
in Information Systems, April 2004.
Issues in Cloud Computing Global
[3]. E. Goh, (2003) Building Secure
Indexes for Searching Efficiently on
Encrypted
Compressed
Data",
http://eprint.iacr.org/2003/216/
[10]. Meiko Jensen, JrgSchwenk, Nils
[4]. Yang ,Kan; Jia, Xiaohua; Ren, Kui&
Bo Zhang, (2013) DAC-MACS: Effective
data access control for multi-authority
cloud storage systems, INFOCOM, 2013
Proceedings IEEE , pp 2895 2903
White Paper ,IBM ,June 2011
[9]. V. Krishna Reddy, B. ThirumalRao,
Dr. L.S.S. Reddy, P.SaiKiran Research
Journal
ofComputer
Science
and
Technology, Volume 11,Issue 11, July
2011.
Gruschka, Luigi Lo Iacono, On Technical
Security Issues in Cloud Computing,
2009 IEEEInternational Conference on
Cloud Computing
[11]. Dai, J. & Q. Zhou, (2010) A PKI based Mechanism for Secure and Efficient
Access
to
Outsourced
Data,
2010
[5]. AlZain, M.A.; Soh, B. & E. Pardede,
(2013) A Survey on Data Security Issues
in Cloud Computing: From Single to
Multi-Clouds, Journal of Software, Vol.
8, No. 5, May 2013
International Conference on Networking
[6]. Ruj, S.; Stojmenovic, M. &A.Nayak,
(2014) Decentralized Access Control
with Anonymous Authentication of Data
Stored in Clouds), IEEE Transactions on
Parallel and Distributed Systems, pp 384
394.
Search Technique in Cloud Computing,
[7]. Michael Gregg, 10 Security Concerns
for Cloud Computing, Expert Reference
Series of White Papers, Global
Knowledge, 2010
and Digital Society
[12]. Kapse, Akshay D. &Piyush K.
Ingole, (2014) Secure and Efficient
Fourth
International
Conference
on
Communication Systems and Network
Technologies, pp 419 429
[13]. Yang, Ching-Nung&Jia-Bin Lai,
(2013) Protecting Data Privacy and
Security for Cloud Computing Based on
Secret Sharing, International Symposium
All Rights Reserved 2015 IJARMATE
17
ISSN (ONLINE): 2454-9762
ISSN (PRINT): 2454-9762
Available online at www.ijarmate.com
International Journal of Advanced Research in Management, Architecture, Technology
and Engineering (IJARMATE)
Vol. 1, Issue 5, December 2015
on Biometrics and Security Technologies
Threats,
(ISBAST), pp 259 266
computer
[14]. Bamiah, MervatAdib; Brohi, Sarfraz
Nawaz;
Chuprat,
lailAbManan,
Suriayati&Jamalul-
(2014)
Trusted
Cloud
International
Journal
Science
on
and
Engineering(IJCSE)2011
[18]. Goikaret.al , Improve Security of
data access in cloud computing using
Computing Framework For Healthcare
location,
Sector. Journal of Computer Science Vol.
Computer science and mobile computing
10, No 2, pp 240-250
(IJCSMC), Feb 2015, pp 331-340.
[15]. Meer Sohei l Abolghasemi, Mahdi
[19]. Y, Amanatullah, Ipung H.P., Juliandri
sefidab,
A, and Lim C. "Toward cloud computing
Reza
EbrahimiAtani,
Using
International
Journal
of
Location Based Encryption to Improve the
reference
Security
management perspective.". Jakarta: 2013,
of
Data
Access
in
Cloud
Computing, international conference on
advances in computing 2013
[16].
GurudattKulkarniet
architecture:
Cloud
service
pp. 1-4, 13-14 Jun. 2013
[20]. Boneh, D.; Crescenzo, G. D.;
al,
Cloud
Ostrovsky, R. & G. Persiano, (2004)
Security Challenges, 7th International
Public-key encryption
Conference
search, In: C. Cachin, editor, Proceedings
systems,
on
telecommunication
Services
and
Applications(TSSA),IEEE,2012
with keyword
of Eurocrypt 2004, LNCS, SpringerVerlag, May 2004
[17]. RajnishChoubey et al., A Survey on
Cloud Computing Security, Challenges,
All Rights Reserved 2015 IJARMATE
18