0% found this document useful (0 votes)
125 views10 pages

d1 PDF

This document summarizes a research paper that proposes a secure data sharing system in cloud computing using Revocable-Storage Identity-Based Encryption (RS-IBE). The system aims to provide backward and forward secrecy so that revoked users cannot access previously or subsequently shared data. It introduces RS-IBE, which provides ciphertext security and supports user revocation functionalities through ciphertext updates. The system is designed to achieve secure, efficient and flexible data access control for cloud computing by leveraging the properties of identity-based encryption and revocable encryption techniques.

Uploaded by

Narmadha
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
125 views10 pages

d1 PDF

This document summarizes a research paper that proposes a secure data sharing system in cloud computing using Revocable-Storage Identity-Based Encryption (RS-IBE). The system aims to provide backward and forward secrecy so that revoked users cannot access previously or subsequently shared data. It introduces RS-IBE, which provides ciphertext security and supports user revocation functionalities through ciphertext updates. The system is designed to achieve secure, efficient and flexible data access control for cloud computing by leveraging the properties of identity-based encryption and revocable encryption techniques.

Uploaded by

Narmadha
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 10

International Journal of Pure and Applied Mathematics

Volume 119 No. 10 2018, 1617-1625


ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version)
url: http://www.ijpam.eu
Special Issue
ijpam.eu

Secure Data Sharing in Cloud Computing Using


Revocable-Storage Identity-Based Encryption
Ms.Kiruba J, N. Angala Eswari , M. Kavipraba , A. Mugilarasi , G. Nithya

Department of Computer Science and Engineering, Karpagam College Of Engineering

Coimbatore.

ABSTRACT- Cloud computing is a paradigm I.INTRODUCTION


that provides massive computation capacity and
huge memory space at a low cost. It enables Cloud computing is a paradigm in
users to get intended services irrespective of Technology of information(IT) that provides
time and location across multiple platforms (e.g., ubiquitous access to shared pools of
mobile devices, personal computers), and thus configurable system resources and often
over the internet,Service of higher-level
brings great convenience to cloud users.
with minimal management effort can be
However, it also suffers from several security
rapidly provisioned[4][5][6]. Cloud
threats, which are the primary concerns of cloud
computing relies on sharing of resources to
users[1]. Thus, in order to share the data secure
achieve coherence and economy of scale,
cryptographically access control is necessary. similar to a utility.ID-based encryption,
Identity-based encryption is used to build data or identity-based encryption (IBE), is an
sharing system[1]. In order, access control is important primitive of ID-based
not static. It means that when authorization of cryptography. Because a type of public-key
some users is expired, the system should remove encryption user of public key has some
his (or) him. By that the removed user cannot unique information about the user identity
access both forward and backward data. For this (e.g. email address of user). This means that
we use a concept called revocable-storage a sender who has access to the public
identity-based encryption (RS-IBE), which parameters of the system can encrypt a
provide security of cipher text for message using e.g. the text-value of the
forward/backward data by introducing the user receiver's name or email address as a
revocation functionalities and simultaneous key.From the central authority the
update of cipher text. We provide a detailed decryption keys are obtained to the receiver
structure of RS-IBE, which certifies its secrecy , which needs to be trusted as it generates
in the described security model[1][3]. The
secret keys for every user.By knowing the
ASCII string in system of Identity Based
realistic and cost-effective system of data
allow to generate a public key by known
sharing is achieved by this RS-IBE scheme
identity value by any party[6]. A
which has tremendous benefits of operability
corresponding private keys are generated by
and capability. Certainly, we provide trusted third party, called the Private Key
implementation outcome of this suggested Generator (PKG) . In order to
scheme to define its feasibility. corresponding private key are to be obtain,
identity ID contacts the PKG used by the
party authorized , to generate the private key

1617
International Journal of Pure and Applied Mathematics Special Issue

for identity ID which uses the master private Backward secrecy:


key. Secrecy on Backword means , when
the authority of user’s was expired, or
secret key of user was compromised,
Peviously accessed data by him/her should
be prevented from accessing the plain text of
shared data by under identity of his/her the
subsequently shared data of plain text are
still encrypted[12] .

Forward secrecy:
Secrecy on forward means , when
the authority of user’s was expired, or
secret key of user was compromised,
Peviously accessed data by him/her should
Fig:1.1 be prevented from accessing the plain text of
shared data by now . Under identity of
Outsourcing data to cloud server implies that his/her the subsequently shared data of plain
data is out control of users. This may cause text are still encrypted[1] .
users’ hesitation since the outsourced data
usually contain valuable and sensitive RIBE OPERATION
information[5]. Even worse, cloud server The identity-based encryption concept is
itself may reveal users’ data for illegal introduced by Shamir , and conveniently
profit. Data sharing is not static. When the instantiated by Boneh and Franklin
authorization of user is expired, he/she could
not aceess the previously and subsequently II .SYSTEM ANALYSIS
shared data[9]. Therefore, while outsourcing
data to cloud server, users also want to EXISTING SYSTEM:
control access to these data such that only
those currently authorized users can share Non revoked users are proposed in IBE from
the outsourced data[11].
the way of natural revocation in which the
A solution to overcome the problem is to
use access control such as identity-based private keys are periodically received all
encryption (IBE).
time from key authority. Since , the solution
CLOUD SECURITY is not stable, the non –revoked users
Identity-based access control placed on the
requires the authorization of key to perform
shared data should meet the following
security goals: linear work[14]. In order, to transmit new
Data confidentiality:
keys and for authorization of key secure
Plaintext of the shared data stored in
the cloud server should be prevented from channel is essential.
accessing the data by unauthorized users .
Natural revocation way for IBE is
first proposed by Franklin and Boneh
. The ciphertext current time period

1618
International Journal of Pure and Applied Mathematics Special Issue

was appended by them, and ADVANTAGES OF PROPOSED


Authorization of key was produced SYSTEM:
The procedure of ciphertext update
non-revoked users periodically in the
only needs public information.
form of private keys.
By the forward secrecy additional
To achieve efficient revocation an
approach was produced by Goyal , computation and storage complexity
Boldyreva and Kumar. They used a
was brought.
binary tree to manage identity such
that their RIBE scheme reduces the III. RELATED WORK
complexity of key revocation to
logarithmic (instead of linear) in the Revocable identity-based encryption
maximum number of system
users[10]. Public key and private key are used to
encryption and decryption respectively in
DISADVANTAGES OF EXISTING this paper, AES algorithm as well as
SYSTEM: KUNode algorithm is used. Normally
It’s not scalable. forward secrecy or backward secrecy
provided for security. In this paper, Forward
It’s not secure.
secrecy is used for advanced security.
Revoke user can’t access the previous or
PROPOSED SYSTEM: subsequent data so that revocable identity
To overcome the existing system based encryption technique is used. Data
introduce a approach a notion called providers upload the files into storage server
revocable storage identity-based encryption using the encryption technique. For the
(RS-IBE) in order to build data sharing encryption key is used and this key provide
system by cost effective that fulfills the by the key authority. Key authority is
three security goals. responsible for sending the key to data
• We provide formal definitions for RS-IBE provider[11]. In this paper, random function
and its corresponding security model[10]. used for generating the key to encryption as
• We present a concrete construction of RS- well as decryption. Storage server stores the
IBE. The proposed scheme can provide files which are uploaded by data provider.
confidentiality and backward/forward2 And users download or access the file as per
secrecy simultaneously. their need. Download the file is done
• By using the ℓ-Bilinear Diffie-Hellman through decryption process. In this paper,
Exponent (ℓ-BDHE) dimension , we prove time quantum also provided for
the security for the proposed model. In downloading the data.
order, the proposed scheme can withstand
decryption key exposure. Key Authority

Firstly for downloading file key will be


send and this key is send again key

1619
International Journal of Pure and Applied Mathematics Special Issue

authority. If key will be match between data paper, extra security for data sharing in
provider and user then user will authorized cloud computing should be provided. There
to download the data. Else key does not for sharing data through cloud computing is
match then the user cannot download the securely[11].
file. After matching key OTP will be send to
the user. At this stage, time limit should be
provided because of more security for IV. MODULES
accessing the data using cloud computing.
Within a time period user can type the OTP. System Construction Module:
If OTP is type within time then user can
In this first module, the proposed system
access this file. Else time period is expired
was developed with the required entities for
then user cannot access this file. And one
the evaluation of the proposed model. The
more condition is that, if OTP is wrong then
user was frist decided by the data provider
user enters into revoke list[9][11].In this
who can share the data. Then, Data provider
paper, extra mechanism provided for the
encrypts the data under the identities user,
secure data sharing in cloud computing.
and uploads shared data of cipher text to the
System Architecture In this system first data
cloud server. When users wants to get the
provider upload the file. And upload file
shared data, she/ he can download and
convert into the encrypted format using key
decrypt the corresponding ciphertext.
encryption algorithm. I.e. AES algorithm.
However, for an unauthorized user and the
Then storage server responsible not only
cloud server, the plaintext of the shared data
storing the data or files but, also give
is not available[1].
permission for unrevoked user to access the
data or files through cloud computing. User Data Provider:
send request for accessing data permission
to data provider via storage server[8]. Then In the second module, Data Provider
key authority generates the key as per user module was developed. The development of
requested data. These generated key is send data provider module is for which the new
to user. After receiving key, data provider users will Signup first and then Login for
key and user key will be match. If key will authentication. By here the data provider
be match then user is authorized to module provides the option of uploading
download the data. Else it cannot the file. the file to the Cloud Server[6]. By using
After matching of key again OTP will be Identity-based encryption format the
send to user for extra security. User can process of File Uploading to the cloud
write the OTP within time period. Again Server is undergone . He / she can check the
user will write the OTP within a time period. progress status of uploading the file . Data
Then user can download the required file Provider provided with the features of
successfully. Else it cannot download the Revocation and Ciphertext update the file.
needed file. This whole process provide Once the process is completed , the Data
large security in cloud computing. In this Provider can logouts the session.

1620
International Journal of Pure and Applied Mathematics Special Issue

Cloud User :

In this module, Cloud User module was


developed . The Cloud user module is
developed such that the new users will
Signup initially and then Login for
authentication. The file search option will be
provided by the Cloud use[13]. Then cloud
user feature is added up for send the Request
to Auditor for the File access. After getting
decrypt key from the Auditor, he/she can
access to the File. The cloud user is also
enabled to download the File. After
completion of the process, the user logout
the session[1][5].

Key Authority (Auditor) :

Auditor's page will be log in by the auditor.


He/she will check the pending requests of
any of the above person. After accepting the
request from the above person, he/she will
generate master key for encrypt and secret
key for decrypt[5][8]. After the complete
process, the Auditor logout the session.

V.RESULT

The results show the graph of the proposed


system and the existing system[9][11]. And
it shows the time complexity of offline and
online encryption. And the result shows the
Cost of the Encryption.

1621
International Journal of Pure and Applied Mathematics Special Issue

VI. CONCLUSION

Cloud computing has many advantages such


as space of storage is increased and cost of
storage is reduced and decreases overheads
on cloud, storage security . Proving the
security to the data placed in cloud
computing has become major issue in this IT
platform[1]. This paper mainly concentrates
on security and privacy issues and also
discusses about the different techniques used
in existing cloud environments. Further,
these different techniques are used in
improving the security of the data stored and
also giving privacy to the
data[5][8][9].Cloud computing has the
potential to be a disruptive affected by the
force of technology uses.

1622
International Journal of Pure and Applied Mathematics Special Issue

VII. REFERENCE

1. Jianghong Wei, Wenfen Liu, Xuexian Hu-IEEE Transactions on Cloud


Computing ( Volume: PP, Issue: 99 ) March 2016
2. Amazon. (2014) Amazon simple storage service (amazon s3). [Online].
Available: http://aws.amazon.com/s3/
3. K. Chard, K. Bubendorfer, S. Caton, and O. F. Rana, “Social cloud computing: A
vision for socially motivated resource sharing,” Services Computing, IEEE
Transactions on, vol. 5, no. 4, pp. 551–563, 2012.
4. Kishore Babu V, 2R Amutha http://www.ijsdr.org/papers/IJSDR1706010.pdf
5. B. Wang, B. Li, and H. Li, ―Public auditing for shared data with efficient user
revocation in the cloud,‖ in INFOCOM, 2013Proceedings IEEE. IEEE, 2013, pp.
2904–2912.
6. DrAnanthi Sheshasaayee, 2R. Megala, “A Conceptual Framework For Resource
Utilization In Cloud Using Map Reduce Scheduler” International Journal of
Innovations in Scientific and Engineering Research (IJISER), Vol. 4, No.6,
pp.188-190, 2017.
7. S. Ruj, M. Stojmenovic, and A. Nayak, ―Decentralized accesscontrol with
anonymous authentication of data stored in clouds,‖ Parallel and Distributed
Systems, IEEE Transactions on, vol. 25, no. 2,pp. 384–394, 2014.
8. X. Huang, J. Liu, S. Tang, Y. Xiang, K. Liang, L. Xu, and J. Zhou, ―Cost-
effective authentic and anonymous data sharingwith forward security,‖
Computers, IEEE Transactions on, 2014, doi:10.1109/TC.2014.2315619.
9. Mohan, Prakash, and Ravichandran Thangavel. "ResourceSelection in Grid
Environment Based on Trust Evaluation usingFeedback and Performance."
American Journal of AppliedSciences 10.8 (2013): 924.
10. Prakash, M., and T. Ravichandran. "An Efficient ResourceSelection and Binding
Model for Job Scheduling in Grid."European Journal of Scientific Research 81.4
(2012): 450-458.
11. Jin Li (School of Computer Science, Guangzhou University,Guangzhou,
China),Wenjing Lou (Virginia Polytechnic Institute and State University,
Blacksburg) “Identity based encryption with outsourced revocation in cloud
computing” 2015.
12. Prakash, M., R. Farah Sayeed, S. Princey, and S. Priyanka."Deployment of
MultiCloud Environment with Avoidance of DDOS Attack and Secured Data
Privacy." International Journal of Applied Engineering Research 10, no. 9
(2015): 8121-8124.

1623
International Journal of Pure and Applied Mathematics Special Issue

13. Annamalai, R., J. Srikanth, and M. Prakash. "Integrity and Privacy Sustenance of
Shared Large Scale Images in the Cloud by Ring Signature." International
Journal of Computer

1624
1625
1626

You might also like