Secure File Sharing Using RSA and AES
Secure File Sharing Using RSA and AES
Modules
Data owner
The data owner encrypts his/her data with a symmetric encryption algorithm like AES then the
data owner encrypts the symmetric key under the RSA algorithm. After that, the owner sends the
whole encrypted data and the encrypted symmetric key (denoted as ciphertext CT) to the cloud
server to be stored in the cloud.
Data User
The user can freely get any interested encrypted data from the cloud server. However, the user
can decrypt the encrypted data with his/her private key if and only if that encrypted data is
encrypted by his/her public key, otherwise they cannot access it.
Key Generations
In this module data owner can generate public key and private key with RSA algorithm and share
them to authorized users.
Cloud Server
The cloud server provides a public platform for owners to store and share their encrypted data.
The cloud server doesn’t have data access control of owner data. The encrypted data stored in
the cloud server can be downloaded freely by any user.
Algorithms
RSA
RSA is an asymmetric (or public key) cryptographic algorithm invented by Rivest, Shamir and
Adleman of MIT. It is mostly used over the internet. RSA is capable to support encryption and
digital signatures. It gives the best security policy by encrypting the data which is confidential.
This is the reason why the big service providers like Google mail, Yahoo mail etc. are using this
algorithm to give their users the insurance of confidentiality in using their services.
AES:
Advanced Encryption Standard (AES) is symmetric cryptographic algorithm. It is one of the
most commonly used and most secure encryption algorithms available today. The algorithm is
based on several substitutions, permutations and linear transformations. It said that up until
today, no practicable attack against AES exists. Thus, governments, banks and high security
systems around the world are preferred using AES for the encryption standard.
Conclusion
A combination of asymmetric and symmetric encryption techniques (i.e. RSA and AES
encryption methods) was proposed in this approach to achieve the assurances of cloud data
security. The focus was on RSA encryption to provide difficulty for attackers as well as reducing
the time of information transmission by using AES encryption method. The process of sending
the files to the cloud and retrieving the files from the cloud was accomplished by symmetric and
asymmetric encryption respectively. The reason of using symmetric encryption in retrieving the
files from the cloud was because of the key distribution issue. On the other hand, it does provide
an optimum result because generating asymmetric keys is a time consuming. Consequently, the
encryption process becomes double and more if there is increment of the file size more than 254
byte. Another issue is the number of keys generated for each files. The number of keys will
become triple times for each amount of files stored in the cloud. Thus can be a big problem to
tackle for a large storage system. Moreover, the encryption and decryption process that done
twice for each files cause system overhead. Nevertheless, compared to existing method a hybrid
method of encryption such as this is more secure to use.
Future Scope:
The drawback of our proposed system is we unable to do group data sharing like one- many.
Because in this system for every user they got public key and private key individual so that we
can share the data one too one which means data can share individual. To overcome this system
we can implement CP-ABE (Ciphertext Policy-Attribute Based Encyrption) which can share one
resource to multiple users at a time by satisfy the access control.
REFERENCES
[1] S. S. Greene, Security policies and procedures: Principles and practices. Upper Saddle River,
N.J.: Pearson Prentice Hall, 2006.
[2] D. P. Gilliam, Managing information technology security risk. Software Security – Theories
and Systems, Springer Berlin Heidelberg, pp 296-317, 2004.
[3] S.K. Sood “A Combined Approach to Ensure Data Security in Cloud Computing,” Journal of
Network and Computer Applications, vol.35, no.6, pp. 1831-1838, 2012.
[4] C. Wang, Q. Wang, K. Ren, and W. Lou, "Ensuring data storage security in Cloud
Computing," in Proc. 17th International Workshop on Quality of Service (IWQoS), 2009,
Charleston, pp.1-9.
[5] S. Kamara, and K. Lauter, “Cryptographic cloud storage”, Financial Cryptography and Data
Security, Springer Berlin Heidelberg, pp. 136-149, 2010.
[6] S. S. M. Chow, C. Chu, and X Huang,”Dynamic secure cloud storage with provenance.”
Cryptography and Security: from Theory to Applications, LNCS, Springer, pp. 442-464, 2011.