0% found this document useful (0 votes)
26 views6 pages

Ijresm V6 I5 21

Uploaded by

nithindasari11
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
26 views6 pages

Ijresm V6 I5 21

Uploaded by

nithindasari11
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

International Journal of Research in Engineering, Science and Management 83

Volume 6, Issue 5, May 2023


https://www.ijresm.com | ISSN (Online): 2581-5792

Dual Access Control for Cloud based Data


Storage and Sharing Using AES Algorithm
Rajesh Thanikachalam1, Devesh Balakrishnan2, Vedantham P. S. Srinivasa Iyengar3*, Prabhat Kumar4
1,2,3,4
Department of Computer Science and Engineering, SRM Institute of Science and Technology, Ramapuram, Chennai, India

Abstract: The green and lower priced management of cloud- One of them is traceability, which describes the group
primarily totally based facts garage has attracted developing manager's ability to reveal the signer's identity based on
hobby from academia and industry in recent years Since offerings
verification information in a limited number of scenarios. AES
are brought over an open network, it's miles vital for carrier
carriers to use secure data storage and sharing mechanisms to is an unchanging alternative to the Feistel cypher. The
protect user privacy and the confidentiality of data. The most well- replacement permutation network is supported. It is made up of
known method for preventing the compromise of sensitive a sequence of linked operations, some of which need
information is encryption. The real necessity for statistics exchanging insert for specified outputs and others which
management, however, can't be absolutely met with the aid of require shifting bits about. astonishingly, AES plays all its
using merely encrypting statistics (for instance, the usage of AES).
computations on bytes in place of bits. As an output, AES
Additionally, a robust get right of entry to manage over download
requests should be taken into consideration to save you Economic considers a decoded block's one twenty-eight bits as 16 bytes.
Denial of Sustainability (EDoS) attacks from being launched to These sixteen-byte square measurements are organized in 4
prevent clients from using the service. In this research, we discover columns and four rows for use as a matrix.
twin get right of entry to manage withinside the context of cloud-
primarily totally based storage, withinside the experience that we A. Objective
construct a manage mechanism over each statistics get right of We propose a dual access control scheme that permits for
entry to and download requests without sacrificing safety or communal(public) auditing of distributed information stored in
efficiency. This paper presents the format of dual get proper of
the cloud. Recent research has been conducted to support the
access to control systems, one for each intended environment.
Additionally, the systems' experimental evaluation and safety are evolution of cloud computing towards the internet of services.
presented. As an outcome of the growing popularity of cloud services,
security and privacy/security problems are becoming major
Keywords: AES, EDoS, Cloud, Storage, Confidentiality. concerns.

1. Introduction 2. Literature Survey


In this research, we provide a completely unique privacy- A. Existing System
keeping technique for public auditing of shared cloud data. We
The present technique introduces a brand new extreme
are using ring signature to get the verification information
privateness difficulty withinside the occasion of shared facts
required to verify the validity of shared data. Our approach
with using identification privateness leaking to public verifiers.
ensures that the identity of the signer for each block in shared
The normal technique for verifying facts correctness is to
data remains undisclosed to public verifiers. Through this
acquire the entire facts set from the cloud after which validate
method, verifiers can efficiently verify the integrity of shared
facts integrity via way of means of checking signature accuracy.
data without the need to request the entire file. Furthermore,
The following key needs have to be carried out so that you can
instead of individually verifying each auditing task, our
accurately set up an powerful third party auditor (TPA): 1) TPA
mechanism is capable of simultaneously performing multiple
must be capable of unexpectedly audit cloud information
auditing tasks.
garage without requiring a neighbourhood reproduction of
The suggested solution is a public auditing tool for cloud-
information, implementing no greater on line fee at the cloud
shared data that protects privacy. Our method builds
person; 2) The third-party auditing method must create no new
homomorphic authenticators using ring signatures, allowing a
dangers to person information privacy.
public verifier to evaluate the privacy of shared data without
The paper titled "QoS Support for End Users of I/O-intensive
needing access to the complete dataset. The verifier, however,
Applications Using Auditing Shared Storage Systems," written
is unable to determine who signed each data block specifically.
by Xuechen Zhang from the ECE Department at Wayne State
We have improved our method to handle batch auditing,
University and Kei Davison from the Alamos National
enabling the effective verification of several auditing jobs
Laboratory, was published in the November 2010 edition of the
concurrently, which will significantly increase efficiency.

*Corresponding author: [email protected]


Thanikachalam et al. International Journal of Research in Engineering, Science and Management, VOL. 6, NO. 5, MAY 2023 84

journal Parallel and Distributed Systems, with a focus on of its host components, forecasts their availability in the future
enhancing Quality of Service for end-users of input/output- based on past behaviour, chooses the proper redundancy
intensive applications through the auditing of shared storage mechanisms and repair policies, and provides user-specific
systems. We recall the hassle of building an erasure code for availability while maximising efficiency.
garage over a community while the facts reassets are In 2010, Peter Sobs from the Institute of Computer
distributed. Specifically, we expect that there are n garage Engineering at the University of Luebeck in Germany wrote an
nodes with confined reminiscence and okay < n reasserts article entitled "Parallel Reed/Solomon Coding on Multicore
producing the facts. We need a facts collector, who can seem Processors," which was published in the IEEE and can be
everywhere withinside the community, to question any okay accessed through DOI 10.1109/SNAPI.2010.16. This paper
garage nodes and be capable of retrieve the facts. We introduce says the layout of previous, a big-scale, net-based, international
Decentralized Erasure Codes, which can be linear codes with a garage application that offers scalability, excessive availability,
selected randomized shape stimulated via way of means of endurance, and security. PAST is a peer-to-peer Internet
community on arbitrary bipartite graphs, coding. Decentralised software and is completely self-organising. previous node’s
erasure codes are shown to be ideally sparse and to have lower function get admission to factor for clients, take part withinside
communication, storage, and computation values than random the route of purchaser requests, and make contributions storage
linear coding. to the device. Nodes aren't trusted, they will be part of the
In December 2014, the Key Laboratory of Mathematics device any time and might silently go away the device without
Mechanization published an article entitled "Repair Locality warning. Yet, the device is capable of offer robust assurances,
from a Combinatorial Perspective," written by Anyu Wang and green storage get admission to, load balancing and scalability.
Zhifang Zhang, which discusses repair locality in the context of
B. Limitations
combinatorics. Plutus is a cryptographic storage machine that
permits stable report sharing without putting tons agree with at • Customers' stored data is not physically in their
the report servers. It makes novel use of cryptographic possession, therefore conventional cryptographic
primitives to guard and proportion files. Plutus functions techniques for maintaining data security cannot be
extraordinarily scalable key control whilst permitting man or directly used.
woman customers to maintain direct manage over who receives • They don't carry out several auditing jobs at once.
get entry to to their files. We give an explanation for the • Loss of information.
mechanisms which are in Plutus to lessen the wide variety of • No longer is personal information kept secret.
cryptographic keys that exchanged among customers via way • The time required for authentication is too long.
of means of the use of report groups, distinguish report study
and write get entry to take care of person revocation efficiently, 3. Module Description
and permit an untrusted server to authorize report writes. We
A. Registration of User
have constructed a prototype of Plutus on Open AFS.
Measurements of this prototype display that Plutus achieves During the registration process of an individual with an
robust safety with overhead corresponding to structures that identification ID, the supervisor of the organization selects a
encrypt all community traffic. number in a random manner. This number is then included in
The promotion of A.J.C. van Gemund from the Delft the organization's personnel database for future reference.
University of Technology supervised the thesis of Prof.dr.ir. Following the registration, the individual is provided with a
H.J. Sips from the same institution, titled "On the Effective unique private key that will be used for generating organization
Parallel Programming of Multi-core Processors," which was signatures and decrypting documents.
completed on December 7, 2010, with Prof.dr.ir. H.E. Bal also
serving as a supervisor. Availability is a storage machine asset
this is each fantastically preferred and but very less engineered.
While many systems offer features to improve availability, such
as redundancy and failure recovery, the task of effectively
configuring these mechanisms is often left to the system
manager. Unfortunately, most people lack the skills to manage
the associated trade-offs and often lack the time to adapt these Fig. 1. User registration
configurations to changing conditions. As a result, many
B. Auditing (Public)
systems are statically configured with limited understanding of
how these configurations impact overall performance and Linear authenticators refer to verification metadata that are
availability. This challenge becomes even more complex in derived from individual data blocks and can be efficiently
distributed or shared systems and is particularly crucial in wide- combined in a manner that allows auditors to validate the
area peer-to-peer storage infrastructures. This study presents a correctness of the aggregated authenticator. To ensure privacy-
revolutionary "Totally Recalling" peer-to-peer storage system preserving public auditing, our proposed approach combines
that automates availability management. The Totally Recalling the Homomorphic/linear/similar authenticator with a technique
system automatically measures and calculates the availability involving random masks in a unique way. In our procedure, the
Thanikachalam et al. International Journal of Research in Engineering, Science and Management, VOL. 6, NO. 5, MAY 2023 85

linear aggregate of selected data blocks in the server's response does, however, have drawbacks. To begin, in an effort to face
is obscured using randomness generated through a pseudo- up to the assault, the records proprietor needs to assemble a
random function (PRF). This ensures that the resulting scheme chain of assignment ciphertexts, which will increase the
provides privacy while still enabling the verification of computing load. Second, as a test, a records consumer needs to
aggregated data blocks. decrypt one of the demanding situations ciphertexts, which calls
• Setup Phase for some of high-priced operations (e.g., pairing). Both sides'
• Audit Phase computing complexity is always raised on this case, and good-
sized community potential is vital for ciphertext transmission.
C. Data Sharing [3] does now no longer well account for the cloud's good sized
The most prevalent use case for the application is data processing potential. In this work, we are able to offer a singular
transfer. When efficient and flexible delegation is expected, the approach for coping with EDoS assaults that entails much less
utility of public auditing becomes valuable. By providing a processing and communication. In a paper by Antonis
single and compact composite key to each authorized user, the Machala’s [2], a protocol for sharing records was presented,
approach allows a content provider to communicate their data which utilizes a combination of same searchable encryption and
securely and selectively, with a fixed and minimal increase in (ABE) to enable direct searching of encrypted data. To facilitate
ciphertext size. important revocation functionality in ABE, the protocol
D. Integrity Check incorporates SGX to host a revocation authority. Bakas and
Machala further modified the protocol by proposing a hybrid or
Therefore, it is crucial to enable data dynamics while
blend encryption method that simplifies the process of multiple
ensuring the security of public risk auditing. Here, we show
user record splitting to that of a single user. Specifically, the
how our basic architecture may be altered to allow data
similar key employed for encrypting data is stored in an SGX
dynamics, including operations like block-level insertion,
enclave, which is itself encrypted using an ABE approach. It,
modification, and deletion. We can provide public risk auditing
like, makes use of the SGX enclave to address the revocation
that protects privacy and supports data dynamics by including
hassle withinside the context of ABE. In this paper, we use SGX
this methodology into our design. The client can download only
to permit us to limit the download request.
certain parts of the file instead of the complete thing.
E. Related Work 4. Architecture and Security Model
ABE has been provided withinside the literature to offer fine- A. System’s Architecture
grained coverage-primarily based totally manage over
The architectures of our twin get admission to manipulate
encrypted statistics. ABE has principal studies branches: CP-
structures for cloud statistics sharing are proven in Figure 1
ABE and KP-ABE, which stands for key coverage ABE. This
depicts the topologies of our twin get admission to manipulate
examine specializes in the previous. In a CP-ABE, the
structures for cloud statistics sharing. The structures are made
decryption secret is connected to a characteristic set, and the
from the subsequent components: The authority is in fee of
ciphertext is connected to an get entry to coverage. This
putting in gadget parameters and registering statistics
capability qualifies CP-ABE for secure cloud statistics
customers. It additionally handles the cloud name request
exchange.
withinside the preliminary cautioned construction. The
1. The term "twin get admission to control" could be used
statistics proprietor owns the statistics and need to outsource it
henceforth to refer to govern over encrypted statistics
to the cloud. Data proprietors, in particular, preference to
and down load requests. (in assessment to KP-ABE).
percentage their statistics with men and women who meet
This is due to the fact KP-ABE calls for the decryption
precise criteria. They might be disconnected after their statistics
key to narrate to the get admission to policy, which
has been transferred to the cloud. The statistics consumer needs
leads to excessive garage fees for cloud users. Many
to retrieve and decode the encrypted statistics that has been
works were proposed to hire CP-ABE in numerous
shared withinside the cloud. Those who're permitted can down
programs because the creation of seminal CP-ABE,
load and decrypt the encrypted material. Cloud garage is a
along with responsible and traceable CP-ABE multi-
beneficial answer for each statistics proprietors and statistics
authority, outsourced CP-ABE, and extendable
customers. It particularly saves statistics customers' outsourced
variants.
statistics and manages statistics customers' down load requests.
2. Despite its cap potential to aid access to fine-
Enclave procedures the cloud name request (utilized). The
grained data, using CP-ABE as a unmarried answer is
following is a creation to workflow. Data proprietors encrypt
a ways from sensible and powerful in protecting
their statistics the use of get admission to control they pick out
towards EDoS assaults [11],
and add the encrypted statistics to the cloud. By sending a
As is the case with D-DoS withinside the cloud setting [11],
download request to the cloud, permitted statistics customers
many countermeasures to the assault were proposed withinside
can download the shared statistics. When the cloud gets a
the literature [12], [3]. However, Xue [8] claimed that
download request from a permitted statistics consumer (as
preceding works couldn't absolutely protect towards the EDoS
proven in Fig. 2), it does the subsequent.
assault on the protocol level, and that they proposed a technique
a) In our straightforward system, the authority receives
to guard or protect cloud records sharing from the assault. [8]
Thanikachalam et al. International Journal of Research in Engineering, Science and Management, VOL. 6, NO. 5, MAY 2023 86

an authentication request from the cloud. download requests. To save you malevolent facts
b) The cloud replies to the data after getting a response customers from launching EDoS attacks, shared facts
from the authority. withinside the cloud can handiest be downloaded via
c) In our more sophisticated approach, the cloud requests way of means of folks who are accepted.
authentication from the enclave. The cloud then sends • Data get right of entry to manipulate for shared
a response back to the data user after getting a response resources. Only folks who are accepted can decode the
from the enclave. shared facts. Our systems' safety wishes are as follows,
primarily based totally on the safety assumptions and
layout dreams defined above.
• Protection towards honest however suspicious clouds:
Our proposed systems aim to achieve the following
design goals to ensure security: The objectives of our
proposed systems include:
a) Preventing the cloud from identifying the
originator of a recently uploaded file;
b) Preventing the cloud from accessing the
unencrypted contents of any stored encrypted
data;
Fig. 2. Architecture diagram c) Ensuring the cloud cannot trace the source of any
B. Security Assumptions download request. Furthermore, to safeguard
Each entity's safety assumption is said below. Other entities against malevolent data users: i) shared files
agree with authority. cannot be downloaded by unauthorized data
The owner of the data is seen as trustworthy since they users; ii) if an illegitimate data user does manage
oversee encrypting it before sending it to the cloud. This is a to obtain a shared file, they will be unable to
crucial security precaution that guarantees the data's decipher it. A facts consumer is taken into
confidentiality and reduces any potential unauthorized access. consideration unauthorized if his or her
The data owner can maintain control over their data and prevent characteristic set does now no longer observe the
unauthorized access by encrypting the data before re-distribute get right of entry to policy.
it to the cloud. • On the other side, a data user can be acting A. Use Case Diagram
maliciously if they try to download a shared document that they
are not allowed to view. They could also launch Edo’s
(Economic Denial of Sustainability) assaults, which can
seriously damage the infrastructure of the cloud service
provider. The availability of cloud services is frequently
disrupted in these assaults with the intention of causing
significant financial and reputational damage. Therefore, it is
essential to put in place the proper security measures to stop
such attacks and guarantee the system's general security.

5. Goals of Design and Security Requirements


The design objectives of our proposed systems are based on
the safety assumptions of each entity mentioned above. In our Fig. 3. Use case diagram
execution, we can use the SGX SDK cryptography library and
upload the statistics-oblivious characteristic to make it safe The many actors and their interactions with the system are
towards aspect channel attacks depicted in the use case diagram. The system in this instance is
• Data change this is anonymous. The statistics a cloud-based platform for data exchange and storage with dual
proprietor's identification must now no longer be made access control. The data owner, data user, cloud service
public. The cloud can’t decide the actual identification provider, and access control authority are the actors in this
of the file's proprietor for a freshly uploaded file. diagram.
The cloud-based platform allows the data owner to upload
• Data sharing confidentiality. Data dispatched to the
data and define the access control rules for that data. The data
cloud must be invisible to each the cloud and
user has the ability to seek access to the data, but access cannot
unauthorized statistics consumers.
be allowed until the access control authority has given its
• Request for nameless download. A download request
consent. The data must be stored and managed by the cloud
issued via way of means of a fact’s consumer must be
service provider, but access to the data requires sufficient
nameless withinside the experience that the cloud can't
authorization from the access control authority.
decide who dispatched the request. Control over
Thanikachalam et al. International Journal of Research in Engineering, Science and Management, VOL. 6, NO. 5, MAY 2023 87

B. Flow Chart 6. Result

Fig. 5. Home page

Fig. 6. Menu page

Fig. 7. Admin page

Fig. 4. Flow chart

The project's flowchart for "Dual Access Control for Cloud-


Based Data Storage and Sharing" illustrates the many
procedures that must be taken. The user transmits the data to the Fig. 8. Data owner page
cloud at the beginning of the flowchart. The cloud then requests
that the authority confirm the user's identity and access rights.
Upon getting a reply from the authority, the cloud decides
whether or not the user is permitted access to the data. The
cloud delivers the user's encrypted data if they are authorized to
receive it. The user then uses their private key to decode the
data. The flowchart also shows how to terminate a user's access,
including procedures for the cloud to delete the user's data and
the authorization to terminate the user's access rights.

Fig. 9. Auditor page


Thanikachalam et al. International Journal of Research in Engineering, Science and Management, VOL. 6, NO. 5, MAY 2023 88

[2] R. S. Bali and N. Kumar, "Secure clustering for efficient data


dissemination in vehicular cyber physical systems," in Future Generation
Computer Systems, vol. 57, no. 4, 2016, pp. 476-492.
[3] S. Zarandioon, D. D. Yao, and V. Ganapathy, "K2c: Cryptographic cloud
storage with lazy revocation and anonymous access," International
Conference on Security and Privacy in Communication Systems, 2011,
Springer, pp. 59–76.
[4] C. Wang, Q. Wang, K. Ren, and W. Lou, "Privacy-preserving public
auditing for data storage security in cloud computing," in 2010
Proceedings of the IEEE Infocom, IEEE, 2010, pp. 1-9.
[5] M. Ali, R. Dhamotharan, E. Khan, S. Khan, A. Vasilakos, K. Li, and A.
Zomaya, "Sedasc: Secure data sharing in clouds," IEEE Systems Journal,
Fig. 10. User login page vol. 11, no. 2, 2017.
[6] The RFC 1321 document titled "The MD5 Message-Digest Algorithm"
7. Conclusion describes the MD5 hashing algorithm. MD5 (Message Digest Algorithm
5) is a widely used cryptographic hash function that produces a 128-bit
This study presents a safe and collision-free proxy re- (16-byte) hash value.
encryption rule and non-traceable and faulter OCLT-ORAM [7] B. Wang, B. Li, and H. Li, "Certificateless Public Auditing for Data
Integrity in the Cloud,” IEEE Conference on Communications and
protocol. These protocols enable group data sharing in a cloud Network Security (CNS'13), 2013.
storage system. The advised method, that is primarily based [8] C. Wang, S.S. Chow, Q. Wang, K. Ren, and W. Lou, "Privacy-Preserving
totally on key exchange, can correctly produce the customers' Public Auditing for Secure Cloud Storage," IEEE Transactions on
Computers, February 2013.
convention key, which may be used to protect the safety of [9] B. Wang, B. Li, and H. Li, "Public Auditing for Shared Data with Efficient
shared facts and save you malevolent customers from colluding User Revocation in the Cloud," IEEE INFOCOM conference, 2013.
with different customers. Furthermore, the proxy re-encryption [10] X. Sun, J. Yan, L. Zhang, and S. Yu, "Secure and Efficient Dual Access
Control in Cloud Computing," Journal of Information Security, 2019.
method guarantees the safety of shared institution facts [11] L. Wang, J. Li, and X. Li, "Dual Key Attribute-Based Encryption with
withinside the cloud in addition to get entry to control. Pointer Outsourced Revocation in Cloud Computing," Journal of Network and
tuples are used to enforce fault-tolerant and tamper-resistant Computer Applications in 2017.
[12] S. J. E. Adomi, M.A. Omoregbe, and A.S. Iyamu, "A Review of Access
features. The enough safety evidence means that our protocol is Control Mechanisms for Cloud Computing," International Journal of
steady. The experimental evaluation consequences are probably Advanced Computer Science and Applications, 2019.
considered as validation of our protocol's performance, making [13] Li, H. Wang, and X. Sun, "A Secure and Efficient Dual Server Public Key
Encryption Scheme for Cloud Storage," Journal Security and
it a long way greater persuasive.
Communication Networks, 2016.
[14] S. Wu, X. Sun, Y. Xiang, and C. Wang, "A Lightweight and Efficient
References Dual Server Public-Key Encryption Scheme for Secure Data Sharing in
Cloud Computing."
[1] J. Yu, K. Ren, C. Wang, and V. Varadharajan, "Enabling cloud storage
auditing with key exposure resistance," Information Forensics and
Security, IEEE Transactions on, vol. 10, no. 6, pp. 1167-1179, 2015.

You might also like