ISSN (ONLINE): 2349-7084
GLOBAL IMPACT FACTOR 0.238
ISRA JIF 0.351
INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING IN RESEARCH TRENDS
VOLUME 2, ISSUE 4, APRIL 2015, PP 260-263
An Intensify approach of Data owner Dominant
Model for Safeguard Data security in Cloud
Maninder Singh Bajwa, Himani
Abstract Cloud computing is the innovative trendy technology which diversified their role in whole world business but demerits of
cloud become an obstacle to opt this technology, So frequent enhancements are required to make this technology worthy. The vital
concerns are data security, data privacy, data leakage, integrity and data confidentiality due to which this mechanization lacks behind. To
solve these problems we proposed a model which intensifies data security and is based on data owner dominance. Encryption,
Obfuscation, HMAC and Dual authentication and access management techniques have been used which make this model trustworthy
and efficient for usage.
Index Terms Cloud Computing, Data Owner Dominant, Data Security, Hash Code, Encryption, Obfuscation.
1 INTRODUCTION
C LOUD Computing set up pervasive, convenient, on-
demand network access to a shared pool of configura-
ble computing resources (e.g., networks, servers, sto-
cloud computing environment, because it is crucial to assure
that only authorized access is sanctioned and protected be-
haviour is accepted.
rage, applications, and services) that can be immediately Any kind of security and privacy contravention is critical
provision and released with essential efforts for manage- and can produce crucial results. As soon as the strict regula-
ment or service provider interaction. Its main objective is to tions and policies are taken against privacy in cloud, more
deliver quick, secure, convenient data storage and net com- and more personnel will feel save to adopt cloud computing.
puting service, with all computing resources envision as A client may be individual or a big organization but all are
services and delivered over the Internet. having same concern i.e. data security, so data security is
A number of computing concepts and technologies are dire consequence. Data security at different levels is the vital
combined in Cloud Computing to satisfy the computing matter of this technology; it can be categorized into two cat-
needs of users, it provides common business applications egories: Security at External level and Security at Internal
online through web browsers, while their data and soft- Level. Security at External level states that data is unsecure
wares are stored on the servers. This is an approach that is opposed to third party, cloud service provider or network
used to maximize the scope or step up capabilities robustly intruder. Security at Internal level states that data is unse-
without investing in new infrastructure, sustenance new cure opposed to authorized users or employee of an organi-
personnel or licensing new software. It provides tremendous zation.
storage for data and rapid computing to customers over the Section II discusses the related work done in the field of data
internet. security in cloud. Section III describes the gaps in existing
Data security is one of the aspects of the cloud which pro- literature. Section IV desirable the proposed model Section V we
hibit users from using cloud services. There is fear between conclude with our work.
the data owners especially in large organizations that their
2 RELATED WORK
data possibly misuse by the cloud provider without their
knowledge. Data security of the users can be ensured by There are numerous work carried in the field of data pro-
using the concept of virtual private networks, firewalls, and tection at cloud. Many models, schemes and techniques are
by enforcing other security policies within its own circumfe- proposed for data security.
rences. Security is consequently an extensive element in any M. Sugumaran et al [10] illustrates a couple of techniques
that resolves the security of the data and proposes architec-
ture to safeguard the data in cloud. In proposed architecture
the encrypted data is stored in cloud using cryptography
Maninder Singh Bajwa is pursuing M.Tech in Computer Science &
Engineering in GIMET, Amritsar, Punjab, India.
technique i.e. located on block cipher. Cindhamani.J et al [3]
E-mail:
[email protected] proposed an enhanced frame work for data security in cloud
Himani is working as Asst. Prof. in Department of Computer Science & which follows the security polices such as integrity, confi-
Engineering in GIMET, Amritsar, Punjab, India. dentiality and availability. Parameters they used are 128 bit
E-mail:
[email protected] encryption, RSA algorithm and Trusted Party Auditor
(TPA). Before storing the data into the cloud, the data owner
assigns the privileges that who will access the data. After
IJCERT2015 260
www.ijcert.org
ISSN (ONLINE): 2349-7084
GLOBAL IMPACT FACTOR 0.238
ISRA JIF 0.351
INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING IN RESEARCH TRENDS
VOLUME 2, ISSUE 4, APRIL 2015, PP 260-263
assigning the privileges they encrypt the data and stores into authentication is used. To overcome the load of data owner
the cloud. Dharmendra [4] proposed the unified data en- the concept of third party is evolved.
cryption architecture which ensures the data security and The proposed model is divided into two categories i.e.
privacy with reasonable performance overhead of compu- Case-1(uploading)
ting system. It is based on multilevel identity encryption Case-2(downloading)
approach with two level/factor identity verification process. And involved four entities i.e. - data owner, CSP, third party
Dr. L. Arockiam et al [5] achieves the data confidentiality in and user.
cloud storage with two different techniques i.e. encryption
and obfuscation. Encryption encrypts the alpha-numeric and 4.1 Case -1 (Uploading)
alpha data while obfuscation encrypts the numeric data.
4.1.1 Key Generation and maintenance
Both are done on user side. First, the user has to encrypt the
data using any technique then he stores the data into cloud For key generation and storage the third party acts as a
storage. Taeho Jung et al [14] use two schemes to control the key management infrastructure. The third party generates
data privacy and the identity privacy. One is the AnonyCon- the keys and handover these keys to the data owner for
trol scheme i.e. semianonymous privilege control scheme further processes. Data owner splits the key into two parts, in
which not only addresses the data privacy but also the user which he uses the one part for encryption and other for
identity privacy in extant access control schemes. It decen- corresponding user verification. Before sending these keys
tralizes the central authority to restraint the identity leakage back to third party for management, the data owner encrypts
and thus achieves semianonymity. Another is the Anony- these two keys by passcode. Third party kept these key
Control-F scheme that controls the identity leakage and pieces and is taken from whenever required.
achieves the full anonymity. Eman M.Mohamed et al [6] Ex-
hibits the data security model that is based on the analysis of
cloud architecture and implemented software to intensify
endeavor in data security model for cloud computing. Hu
Shuijing [7] described the enormous essentials in cloud
computing, such as security key technology, regulation and
standard etc and discussed manner in which they are ad-
dressed.
In this Proposed model data is protected against all
threats i.e. internal and external, thread during, transits as
well as when data at rest.
3 GAPS IN EXISTING LITERATURE
The gaps that exit in the literature of the dissertation are:
Focus on data security but not able to provide full secu-
rity at different levels.
There are some questions which are unanswered such as
Figure 3.1. Key Generation and maintenance
Is data at cloud is in secure hand, during transit data is
secure and if any third party is involved then can we
trust that party. 4.1.2 Classification of data
There are numerous techniques, models and schemes The data can be classified into two types i.e. type 0 and type 1
have been proposed in this field of data security but still Type 1:- when the classified data is of alpha numeric type.
some more enhancements are required so that data Type 0:- when the classified data is of numeric type.
owner feel free to use cloud.
4.1.3 Encipher and Indexing
On the basis of classified data, corresponding encipher
4 PROPOSED MODEL technique is used. The type of data is identified by the data
In proposed model, data security at cloud is the main owner itself. Encryption is taken place when the data is
responsibility of the data owner as he is the only person who classified 1 otherwise obfuscation is performed. Before
can handle the data more securely than any of the encipher techniques, indexing is performed. Thereafter the
organization. For data security; encryption and obfuscation data is uploaded to cloud.
techniques are used to protect the data while transits as well
as at rest. During traversing of data, Data integrity plays
crucial role hence for data integrity hash based message
IJCERT2015 261
www.ijcert.org
ISSN (ONLINE): 2349-7084
GLOBAL IMPACT FACTOR 0.238
ISRA JIF 0.351
INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING IN RESEARCH TRENDS
VOLUME 2, ISSUE 4, APRIL 2015, PP 260-263
user id and handover the corresponding key piece to user.
After getting the key the user will be able to decrypt the data.
Figure 3.4 Dual User Authentication
Figure 3.2 Encipher and Indexing
4.2.2 HMAC verification
HMAC is used to check the data integrity and for this it is
4.2.4 Data Integrity
regenerated by the user and matched with original HMAC
Before uploading the data to cloud, hash based message produced before the data is uploaded to cloud i.e.
authentication code (HMAC) is generated in order to check
data privacy during traversing of data to cloud. In the same HMAC (Uploading) =HMAC (downloading)
way as data is encrypted, HMAC is also encrypted after it is If both HMAC are not same then user has to report to data
generated and uploaded to cloud. owner and if same then data is not tempered.
5 CONCLUSION & FUTURE SCOPE
A prevailing trend shows that data security is an exten-
sive aspect of cloud which prohibits users from using cloud
services. There is fear between the users and data owners
especially in large organizations that there may be a possibil-
ity of data misuse by the cloud provider without their know-
ledge and hence, they hesitate to adopt this technology. To
resolve this problem a model has been proposed which in-
tensifies data security. It gives assurance that their data is
secure during transit as well as at rest. It also assists the us-
ers to fearlessly upload the data at cloud without being any
uncertainty that their data might be lost or stolen.
Figure 3.3. HMAC Generation for Data Integrity In future we implement this model to realistic project to
make this model trustworthy and efficient for usage. Further,
4.2 Case 2: Downloading more parameters can also be added for enhancement.
4.2.1 Dual Authentication and Access Management:-
REFERENCES
In this proposed model, dual verification exists so the
data is secured against unauthorized user. Here the data [1] Ayad F. Barsoum et al Provable Multicopy Dynamic Data
owner shares its user database with cloud. Authenticated Possession in Cloud Computing Systems, IEEE TRANSACTIONS
user login to cloud and get role base access to data. First data ON INFORMATION FORENSICS AND SECURITY, VOL. 10, NO.
owner verifies the user with digital signature and passes the 3, MARCH 2015.
user id details to third party. Then, third party verifies the
IJCERT2015 262
www.ijcert.org
ISSN (ONLINE): 2349-7084
GLOBAL IMPACT FACTOR 0.238
ISRA JIF 0.351
INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING IN RESEARCH TRENDS
VOLUME 2, ISSUE 4, APRIL 2015, PP 260-263
[2] Chang Liu et. al. MuR-DPA: Top-down Levelled Multi-replica
Merkle Hash Tree Based Secure Public Auditing for Dynamic Big
Data Storage on Cloud, IEEE TRANSACTIONS ON
COMPUTERS.
[3] Cindhamani.J et al An enhanced data security and trust
management enabled framework for cloud computing systems,
5th ICCCNT 2014.
[4] Dharmendra S. Raghuwanshi MS2: Practical Data Privacy and
Security Framework for Data at Rest in Cloud, 2014 IEEE.
[5] Dr. L. Arockiam et al Efficient Cloud Storage Confidentiality to
Ensure Data Security, 2014 International Conference on Computer
Communication and Informatics, ICCCI -2014.
[6] Eman M.Mohamed et al Enhanced Data Security Model for Cloud
Computing, The 8th International Conference on INFOrmatics
and Systems (INFOS2012) - 14-16 May, Cloud and Mobile
Computing Track.
[7] Hu Shuijing Data security: the challenges of cloud computing,
2014 Sixth International Conference on Measuring Technology and
Mechatronics Automation.
[8] Jingwei Li et.al. Secure Auditing and Deduplicating Data in
Cloud, 2015 IEEE Transactions on Computers.
[9] LiMa et. al. Chances and Challenges Confronting Securities
Industry and the Countermeasures in Big Data and Cloud
Computing Era, ICCSE 2014.
[10] M. Sugumaran et.al. An Architecture for Data Security in Cloud
Computing, 2014 World Congress on Computing and
Communication Technologies.
[11] Mazhar Ali et al SeDaSC: Secure Data Sharing in Clouds, IEEE
SYSTEMS JOURNAL 2015.
[12] Neelu Sinha et.al. Cloud Computing Security, Data, And
Performance Issues, WOCC 2014.
[13] Sandha et.al. Study on Data Security Mechanism in Cloud
Computing, 2nd International Conference on Current Trends in
Engineering and Technology, ICCTET14.
[14] Taeho Jung et. al Control Cloud Data Access Privilege and
Anonymity With Fully Anonymous Attribute-Based Encryption,
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND
SECURITY, VOL. 10, NO. 1, JANUARY 2015.
[15] Tao Jiang et al Public Integrity Auditing for Shared Dynamic
Cloud Data with Group User Revocation, 10.1109/TC.2015.238995
5, IEEE Transactions on Computers.
IJCERT2015 263
www.ijcert.org