0% found this document useful (0 votes)
66 views9 pages

An Efficient Secure Multiparty Authentication (SMA) Algorithm For Data Sharing in Secure Communication

This document summarizes a research paper that proposes an efficient secure multiparty authentication (SMA) algorithm for data sharing in secure cloud communication. The algorithm allows for authentication between data accessing clients and distributed storage in a multiparty group using secure multiparty authentication calculations. It encrypts data to protect it from unauthorized access while enabling efficient data sharing capabilities in the cloud. The challenges of data sharing in cloud include privacy, security and access control issues that this algorithm aims to address through multiparty authentication and encryption techniques.

Uploaded by

JREAS JOURNAL
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
66 views9 pages

An Efficient Secure Multiparty Authentication (SMA) Algorithm For Data Sharing in Secure Communication

This document summarizes a research paper that proposes an efficient secure multiparty authentication (SMA) algorithm for data sharing in secure cloud communication. The algorithm allows for authentication between data accessing clients and distributed storage in a multiparty group using secure multiparty authentication calculations. It encrypts data to protect it from unauthorized access while enabling efficient data sharing capabilities in the cloud. The challenges of data sharing in cloud include privacy, security and access control issues that this algorithm aims to address through multiparty authentication and encryption techniques.

Uploaded by

JREAS JOURNAL
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 9

Journal of research in engineering and its applications

Vol. 1, Issue. 1, (2018), pp.56-65

An Efficient Secure Multiparty Authentication (SMA) Algorithm


For Data Sharing In Secure Communication
Mehek Sharma1, Reyansh Dhruv2

Research Scholar, Department of Computer science and Engineering, BIMS Institute of Technology and
Management Gujarat.

Email: [email protected]

Assistant Professor, Chaitanya Bharathi Institute of Technology, Hyderabad.

Email: [email protected]

Abstract
Data sharing in the cloud is a method that enables clients to helpfully get to information over the cloud. The
information proprietor outsources their information in the cloud because of cost lessening and the colossal comforts gave by
cloud administrations. Information proprietor can't control over their information, since cloud specialist co-op is an
outsider supplier. The primary emergency with information partaking in the cloud is the protection and security issues.
Different strategies are accessible to help client protection and secure information sharing. In this paper, we examining
about security verification between information getting to clients and distributed storage by utilizing secure multiparty
validation calculation.

Keywords: Data sharing, Secure Communication, Renewal policy, Authentication

INTRODUCTION
It's apparent as a differentiating alternative to ordinary information advancement [1] on account of its
natural resource sharing and low-bolster properties. In appropriated registering, the cloud authority associations
(CSPs, for instance, Amazon, can pass on various organizations to cloud customers with the help of extreme
server ranches. By moving the adjacent data organization systems into cloud servers, customers can value first
rate organizations and extra tremendous theories on their neighbourhood establishments.
Cloud computing is a worldview that gives monstrous calculation limit and gigantic memory space
with ease [2]. It empowers clients to get proposed benefits independent of time and area over various stages
(e.g., cell phones, PCs), and in this way conveys extraordinary accommodation to cloud clients. Relationship
with a low spending arrangement would now have the capacity to utilize high enrolling and limit organizations
without enthusiastically placing assets into system and upkeep. In any case, the loss of control over data and
figuring raises various security stresses for affiliations, irritating the wide flexibility of the all inclusive
community cloud. The loss of control over data and the limit arrange also impels cloud customers to keep up the
passageway control over data (solitary data and the data shared among a social affair of customers through the
all inclusive community cloud)[3].
Cloud frameworks can be utilized to empower information sharing capacities and this can give a few
advantages to the client and association when the information partook in cloud. Since numerous clients from
different associations contribute their information to the Cloud, the time and cost will be less contrasted with
physically trade of information. Google Docs gives information sharing abilities as gatherings of understudies or
groups taking a shot at a venture can share reports and can collaborate with each other effectively. This permits
higher profitability contrasted with past techniques for as often as possible sending refreshed adaptations of a
record to individuals from the gathering by means of email connections. Individuals are expecting information
sharing ability on their PCs, telephones and PC and so on. Individuals love to impart their data to others, for
example, family, partners, companions or the world. Understudies likewise get advantage when chipping away
at gather ventures, as they can collaborate with individuals and complete work effectively [4].

1
Journal of research in engineering and its applications
Vol. 1, Issue. 1, (2018), pp.56-65

A cloud makes it workable for its clients to get to their data in the cloud from anyplace, whenever
through the Internet. Then again clients don't have to stress over the support and accessibility of assets, because
of the way that it is the obligation of the CSP. All the more critically distributed computing is an on request
benefit, where clients are charged just in view of their asset utilization. Due to such advantages, distributed
computing has turned out to be increasingly mainstream among business substances.
The security necessities will include mystery correspondence, message confirmation a security
protection, remote access logging and cryptography. One of the essential Difficulties here is to develop a normal
level of security top needs of this edge work is to offer procedure to complete secure course of action exchange.
Cryptographic exercises provider the architect the ability to ensure order, uprightness and realness of message
exchanged between peers. The cryptography part gives limits, for instance, key storing and age, uneven and
symmetric encryption, underwriting and stamp endorsement, remote organization realness endorsement and
puzzle sharing to various portions. All cryptographic computation (beside puzzle sharing) are configurable and
tradable without having a change the source code for approval is one of the huge issues in organize security [5].
The proposed show is utilized to secure verification while getting to the information in multiparty gathering and
give security to the distributed storage. Encryption shields information from any unapproved get to. Data
sharing is a basic handiness in conveyed capacity. For example, bloggers can allow their friends to see a subset
of their private pictures; a wander may permit their laborers access to a fragment of fragile data. The testing
issue is the methods by which to suitably share encoded data.
Clearly customers can download the mixed data from the limit, interpret them, by then send them to others for
sharing, yet it loses the estimation of conveyed stockpiling. Customers should have the ability to relegate the
passageway benefits of the sharing data to others so they can get to these data from the server direct. In any
case, finding a capable and secure way to deal with share data in conveyed capacity is imperative.

2. LITERATURE REVIEW
Sonia [6] addresses a promising way to deal with relieve the security chances in Online Social
Networks (OSNs) is to move get to control requirement from the OSN supplier to the client by methods for
encryption. In any case, this makes the test of key administration to help complex arrangements associated with
OSNs and dynamic gatherings.
To address this, we propose EaSieR (encryption-based access control in informal communities with
proficient denial), a design that backings fine-grained get to control approaches and dynamic gathering
participation by utilizing quality based encryption. Less demanding [6] engineering and development, give
execution assessment, and model utilization of our approach on Facebook. Tentative arrangements incorporate
an examination concerning exchange CP-ABE (Ciphertext Attribute Based Encryption) builds to be utilized
with Easier so as to accomplish more grounded security ensures.
Melissa Chase [7] depicts an identity based encryption plot, each customer is perceived by an extraordinary
character string. A quality based encryption plot (ABE), strikingly, is an arrangement in which each customer is
perceived by a game plan of properties, and some limit of those credits is used to choose unscrambling limit
with regards to each ciphertext. Sahai and Waters displayed a singular master trademark encryption design and
left open the theme of whether an arrangement could be worked in which different pros were allowed to scatter
qualities [SW05]. We answer this request in the certifiable. Our arrangement allows any polynomial number of
free authorities to screen properties and circle secret keys.

Our arrangement can bear a self-self-assured number of worsen masters. We moreover show to apply
our strategies to achieve a multi-pro adjustment of the tremendous universe fine grained get the opportunity to
control ABE showed by Gopal et al. [GPSW06]. Sherman S.M. Chow and seek after [8] looking at the Multi-
authority quality based encryption enables a more sensible game plan of attribute based access control, with the
true objective that unmistakable specialists are accountable for issuing various courses of action of properties.
The main plan by Chase uses a place stock in central master and the usage of an overall identifier for each
customer, which suggests the mystery, depends in a general sense on the security of the central authority and the
customer insurance depends upon the genuine lead of the trademark specialists. We propose an answer which
clears the place stock in central master, and guarantees the customers' security by shielding the specialists from

2
Journal of research in engineering and its applications
Vol. 1, Issue. 1, (2018), pp.56-65

pooling their information on particular customers, in this way making ABE more usable for all intents and
purposes and a baffling key issuing tradition which works for both existing plans and for our new advancement.
Ramamoorthy and Saravanan [9] propose a safe multi-proprietor data sharing arrangement. It derives that any
customer in the get-together can securely give data to others by the untrusted cloud. The proposed plot can
support dynamic social affairs adequately. Specifically, new permitted customers can direct unscramble data
records exchanged before their speculation without coming to with data proprietors. We give secure and
assurance sparing access control to customers, which guarantees any part in a social affair to anonymously
utilize the cloud resource. The limit overhead and the encryption estimation cost are relentless [9].

Kavya and jagannathan reddy [10] proposed a security sparing data sharing in multi get-togethers. In
one of a kind social affairs the data can be shared by collect people inside the get-together or one get-together to
another get-together. Entire social occasion customers convey blemishes on messages just with a predictable
riddle key. It is similarly possible to accomplish phenomenal security on messages. Here, a homomorphic
authenticable social event stamp supports. In this way, we can regardless extra correspondence and estimation
cost for customers. Data sharing is proficient in multi-groups by making bundle signature on messages just with
a commonplace secret key. It is also possible to achieve character security on messages. As needs be, we can
even now save correspondence and count cost for customers.

Gulzar and padmavathi [11] layout a powerful open key encryption plot which supports versatile task
as in any subset of the ciphertexts (conveyed by the encryption plan) is decryptable by a consistent size
unscrambling key (created by the proprietor of the ace riddle key). We clear up this issue by demonstrating a
specific kind of open key encryption which we call key aggregate cryptosystem (KAC). By and by KAC,
customers scramble a message not simply underneath an open key, other than underneath an identifier of figure
content named class. That suggests the ciphertexts are more considered into dissimilar classes

3. RESEARCH METHODOLOGY
The main aim of this research is to provide a security for sharing a multi group users’ data which is
providing the privacy policies using policy renewal data accessing mechanism. It proposes the secure multiparty
authentication algorithm for sharing users’ data in the group by means of providing security and privacy
consideration for authentication, data anonymity, user privacy, and forward security.

3.1 POLICY RENEWAL MECHANISM:


Arrangement restoration is a repetitive method to manage the energizing of the procedure of a record
set away on the cloud. Here we execute one additional key called as energize key, which is used to reestablish
the approach of the record set away on the cloud. The restore enter is secured in the client itself.

Request new
Renew Key
Request for
Renew Key Client
Renew Key
Renewal

Old
Key Renewa
l
New New process
Renew key
Key
Renew
Key

Attach new Renew key


Figure 1. Policy Renewal With Key

3
Journal of research in engineering and its applications
Vol. 1, Issue. 1, (2018), pp.56-65

3.2 SECURE MULTIPARTY AUTHENTICATION (SMA) ALGORITHM


Confirmation can be master from multiple points of view. The significance of choosing a situation
reasonable Authentication Method is possibly the most central choice in planning secure frameworks.
Secure multi-party calculation (otherwise called secure calculation or multi-party calculation/MPC) is
to empower gatherings to do such clients can share their information to others in a safe way. It is utilized to
store the information remotely in an online cloud server.
Amid the information getting to, in excess of one client may contact the relationship with the goal that
information partaking in multi gather winds up wasteful.
Two imperative necessities on any protected calculation convention are security and rightness.
• The security essential communicates that nothing should be acknowledged past what is absolutely
fundamental; more exactly, social affairs should take in their yield and that is it.
• The rightness need communicates that each social event should get its correct yield. In like manner, the
adversary must not have the ability to influence the delayed consequence of the count to get sidetracked from
the limit that the social affairs had set out to enroll.
Secure multiparty computation incorporates endeavors as clear as coin-throwing and convey, and as
unusual as electronic voting, electronic offer offs, electronic cash designs, contract checking, puzzling trades,
and private information recuperation designs. Consider for a moment the assignments of voting and deals. The
security essential for a race tradition ensures that no get-togethers get anything about the individual votes of
various social events; the rightness need ensures that no coalition of get-togethers can affect the consequence of
the race past basically voting for their favored rival.

Properties of Secure multiparty calculation are:


• Privacy: No get-together should get the hang of much else other than its supported yield. In particular, the
primary information that should be gotten some answers concerning other social occasions' data sources is the
thing that can be gotten from the yield itself. For example, in a bargaining where the principle offer revealed is
that of the most hoisted bidder, it is clearly possible to verify that each and every other offer were lower than the
triumphant offer. In any case, this should be the primary information revealed about the losing offers.

• Correctness: Each get-together is guaranteed that the yield that it gets is correct. To continue with the instance
of a deal, this surmises the social affair with the most hoisted offer is guaranteed to win, and no get-together
including the barker can alter this.

• Independence of Inputs: Undermined parties must pick their wellsprings of information self-governingly of the
reasonable social occasions' information sources. This property is critical in a settled deal, where offers are kept
secret and get-togethers must fix their offers uninhibitedly of others. We observe that self-sufficiency of
wellsprings of data isn't proposed by security. For example, it may be possible to deliver a higher offer without
knowing the estimation of the first. Such a strike should truly be possible on some encryption designs (i.e.,
given an encryption of $100, it is possible to deliver a honest to goodness encryption of $101, without knowing
the principal encoded regard).

4
Journal of research in engineering and its applications
Vol. 1, Issue. 1, (2018), pp.56-65

• Guaranteed Output Delivery: Ruined social occasions should not have the ability to shield honest to goodness
get-togethers from tolerating their yield. Toward the day's end, the adversary should not have the ability to
annoy the figuring by means of finishing a "foreswearing of organization" attack

• Fairness: Defiled social affairs should get their yields if and just if the authentic get-togethers similarly get
their yields. The setting where an undermined party gets yield and a reasonable social event should not be
affirmed to happen. This property can be essential, for example, because of understanding stamping.
Specifically, it would be incredibly unsafe if the degraded party got the stamped contract and the authentic party
did not.

The social events are bestow through secure approved channel, it can be faultless security i.e. information are
theoretic and unlimited security i.e. little screw up are probability.

4. EXECUTION ANALYSIS
The execution of this paper was investigated under different document sizes while sharing the
information in multi party gathering. At first the time execution of this paper is progressed for different record
sizes in perspective of the customer sharing. By then the cryptographic errand time is progressed. The primary
achievement of this paper is, it reinforces subjective time length for any size of records to download.

4.1 File sharing size:


The record sharing size is the extent of document which is utilized to transfer or download in the cloud.
Table 1: Time performance of file sharing Figure 2: File sharing
File size Upload Download
30
No. of Files
10byte 15 0
25
1kb 17 3
20
10kb 19 0 15 Upload

10 Download
100kb 20 7 Size of
5 the file in
1mb 22 7 bytes
0
10mb 24 8 10 1 10 100 1 10

4.2 Computational Speed:


In some consistent applications, it is fundamental that the encryption and unscrambling figuring’s rush
to meet progressing requirements.

5
Journal of research in engineering and its applications
Vol. 1, Issue. 1, (2018), pp.56-65

Table 2: Computational speed


Algorithm Speed analysis (ms)
CP-ABE 649
Rijandel 698
EaSieR 561
3DES 876
Proposed SMA 1014

Speed (ms) Speed analysis


1200

1000

800

600
Speed analysis
400

200

0
CP-ABE Rijandel EaSieR 3DES Proposed
SMA

Figure 3. Speed Analysis Comparison With Existing And Proposed System

4.3 Key Length Value :


In the encryption methodology the key organization is the fundamental edge that shows how the data is
encoded. The photo mishap the encryption extent relies upon this key length. The symmetric estimation uses a
variable key length which is of the more expanded. Subsequently, the key organization is a broad point in
encryption getting ready.

Table 3 For key length value


Algorithm Key size (bits) Block size (Bits)
CP-ABE 64 64
Rijandel 256 128
EaSieR 192 112
3DES 132 64
Proposed SMA 448 64

6
Journal of research in engineering and its applications
Vol. 1, Issue. 1, (2018), pp.56-65

No of bits
500
450
400
350
300 Key size
250 Block size
200
150
100
50
0
CP-ABE Rijandel EaSieR 3DES Proposed SMA

Figure 4 Key length value

4.4 Encryption and decoding Ratio:


The encryption extent is the measure of the measure of data that will be encoded. Encryption extent
should be constrained to lessen the diverse quality on figuring
Table 4 For Encryption Decryption Ratio
Algorithm Encryption Decryption Buffer size
ratio (sec) ratio (sec)
CP-ABE 4.1 5.1 157
Rijandel 7.0 6.4 100
EaSieR 10.0 8.9 162
3DES 2.7 6.7 198
Proposed SMA 1.2 2.0 265

Time (sec)
12

10

8
Encryption
6 Decryption
4

0
CP-ABE Rijandel EaSieR 3DES Proposed SMA

Figure 5 Encryption/ Decryption ratio

7
Journal of research in engineering and its applications
Vol. 1, Issue. 1, (2018), pp.56-65

6. CONCLUSION
With the development of cloud computing, the user does not need strong storage and achieving secure
and efficient communication among users recently becomes research hotspot. Data sharing in the Cloud is
available in the future as demands for data sharing continue to grow rapidly. Security becomes important
concern for communication in cloud. In this paper we provide the authentication for the users while share the
data in the multi party group.
Security authentication is given to the data which can be accessed by the user and also create methods
for party who are join to compute the input function which is user accessed, that can be kept secret from the
unauthorized party. Strategy restoration information getting to getting the chance to can be restore key is added
to the record. At whatever point the customer needs to restore the archives he/she may clearly download all re-
establish keys and took off enhancements to that keys, by then exchange the new energize keys to the records
set away in the cloud. The execution examination demonstrates the proficient and secured information sharing
between the multiparty gatherings.

7. REFERENCE
1. M. Armbrust, A. Fox, R. Griffith, A.D. Joseph, R.H. Katz, A. Konwinski, G. Lee, D.A. Patterson, A.
Rabkin, I. Stoica, and M. Zaharia, “A View of Cloud Computing,” Comm. ACM, vol. 53, no. 4, pp. 50-58,
Apr. 2010.
2. L. M. Vaquero, L. Rodero-Merino, J. Caceres, and M. Lindner, ―A break in the clouds: towards a cloud
definition,‖ ACM SIGCOMM Computer Communication Review, vol. 39, no. 1, pp. 50–55, 2008.
3. L. Wei, H. Zhu, Z. Cao, Y. Chen, and A. V. Vasilakos, “Security and privacy for storage and computation
in cloud computing,” Inf. Sci., vol. 258, pp. 371–386, Feb. 2014
4. B.V.Varshini , M.Vigilson Prem , J.Geethapriya,” A Review on Secure Data Sharing in Cloud Computing
Environment” International Journal of Advanced Research in Computer Engineering & Technology
(IJARCET) Volume 6, Issue 3, March 2017, ISSN: 2278 – 1323.
5. Dr.K.Ravikumar1 , A.Udhayakumar,” Secure Multiparty Electronic Payments In Mobile Computing”
International Journal of Advanced Research in Computer and Communication Engineering Vol. 2, Issue 1,
January 2013

6. Melissa Chase “Multi-authority Attribute Based Encryption”, IEEE, 2011.


7. U. Padmavathi, C.Mohammad Gulzar “Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud
Storage” ,SSRG International Journal of Computer Science and Engineering (SSRG-IJCSE) – volume 2
issue 6 June 2015.
8. Melissa Chase and Sherman S.M. Chow “Improving Privacy and Security in Multi-Authority Attribute-Based
Encryption”, IEEE, 2010.
9. Sonia Jahid, Prateek Mittal and Nikita Borisov”EASiER: Encryption-based Access Control in Social
Networks with Efficient Revocation”, IEEE, 2011.
10. S.Ramamoorthy and R.Saravanan “sharing secure data in the cloud For the multiuser group” International
Journal of Emerging Trends & Technology in Computer Science (IJETTCS)Volume 3, Issue 1, January –
February 2014.
11. M.Kavya and M.V. Jagannatha Reddy,”Privacy Preserving Data Sharing in Multi Groups”, (IJCSIT)
International Journal of Computer Science and Information Technologies, Vol. 5 (6), 2014, 6926-6928.
12. M. Kavitha Margret, “Secure Policy Based Data Sharing for Dynamic Groups in the Cloud” International
Journal of Advanced Research in Computer Engineering and Technology (IJARCET) Volume 2, Issue 6,
June 2013.
13. Yunchuan Sun, Junsheng Zhang, Yongping Xiong, and Guangyu Zhu,” Data Security and Privacy in Cloud
Computing”, International Journal of Distributed Sensor Networks, 2014.
14. Taware Sangram, Zargad Ameya, Waghmare Raju, Ghodke Omkar, Prof.A.A. Chavan, “Secure Data Access
in Cloud Computing”, International Journal of Innovative Research in Computer and Communication
Engineering, Vol. 4, Issue 4, April 2016.

8
Journal of research in engineering and its applications
Vol. 1, Issue. 1, (2018), pp.56-65

15. Hong Liu, Huansheng Ning, Qingxu Xiong, and Laurence T. Yang,” Shared Authority Based Privacy-
preserving Authentication Protocol in Cloud Computing”, IEEE Transactions on Parallel and Distributed
Systems,2013.
16. R. Ranjith, D. Kayathri Devi, “Secure Cloud Storage using Decentralized Access Control with Anonymous
Authentication”, International Journal of Advanced Research in Computer and Communication
Engineering Vol. 2, Issue 11, November 2013.

You might also like