Privacy Preservation and Secure Data Sharing in Cloud Storage



Similar documents
An Efficient Security Based Multi Owner Data Sharing for Un-Trusted Groups Using Broadcast Encryption Techniques in Cloud

Sharing Of Multi Owner Data in Dynamic Groups Securely In Cloud Environment

G.J. E.D.T.,Vol.3(1):43-47 (January-February, 2014) ISSN: SUODY-Preserving Privacy in Sharing Data with Multi-Vendor for Dynamic Groups

An Efficient Secure Multi Owner Data Sharing for Dynamic Groups in Cloud Computing

Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud

SECURITY ENHANCEMENT OF GROUP SHARING AND PUBLIC AUDITING FOR DATA STORAGE IN CLOUD

Secure Data Sharing in Cloud Computing using Hybrid cloud

Data Integrity for Secure Dynamic Cloud Storage System Using TPA

Decentralized Access Control Secure Cloud Storage using Key Policy Attribute Based Encryption

IMPLEMENTATION CONCEPT FOR ADVANCED CLIENT REPUDIATION DIVERGE AUDITOR IN PUBLIC CLOUD

SECURE RE-ENCRYPTION IN UNRELIABLE CLOUD USINGSYNCHRONOUS CLOCK

EFFICIENT AND SECURE ATTRIBUTE REVOCATION OF DATA IN MULTI-AUTHORITY CLOUD STORAGE

Analysis on Secure Data sharing using ELGamal s Cryptosystem in Cloud

Development of enhanced Third party Auditing Scheme for Secure Cloud Storage

Data Security Using Reliable Re-Encryption in Unreliable Cloud

Secrecy Maintaining Public Inspecting For Secure Cloud Storage

Data management using Virtualization in Cloud Computing

Secure Role-Based Access Control on Encrypted Data in Cloud Storage using Raspberry PI

Role Based Encryption with Efficient Access Control in Cloud Storage

Cloud Data Service for Issues in Scalable Data Integration Using Multi Authority Attribute Based Encryption

RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM

Third Party Auditing For Secure Data Storage in Cloud through Trusted Third Party Auditor Using RC5

EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY

SECURE AND EFFICIENT PRIVACY-PRESERVING PUBLIC AUDITING SCHEME FOR CLOUD STORAGE

Keywords: - Ring Signature, Homomorphic Authenticable Ring Signature (HARS), Privacy Preserving, Public Auditing, Cloud Computing.

A Comparative Study of Applying Real- Time Encryption in Cloud Computing Environments

Implementation of Role Based Access Control on Encrypted Data in Hybrid Cloud

Keywords-- Cloud computing, Encryption, Data integrity, Third Party Auditor (TPA), RC5 Algorithm, privacypreserving,

A Survey on Privacy-Preserving Techniques for Secure Cloud Storage

Keywords: Authentication, Third party audit, cloud storage, cloud service provider, Access control.

SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD

Index Terms: Cloud Computing, Third Party Auditor, Threats In Cloud Computing, Dynamic Encryption.

A NOVEL APPROACH FOR MULTI-KEYWORD SEARCH WITH ANONYMOUS ID ASSIGNMENT OVER ENCRYPTED CLOUD DATA

IMPLEMENTATION OF NETWORK SECURITY MODEL IN CLOUD COMPUTING USING ENCRYPTION TECHNIQUE

COMPUSOFT, An international journal of advanced computer technology, 4 (4), April-2015 (Volume-IV, Issue-IV)

Efficient and Secure Dynamic Auditing Protocol for Integrity Verification In Cloud Storage

Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage

Attribute Based Encryption with Privacy Preserving In Clouds

ADVANCE SECURITY TO CLOUD DATA STORAGE

How To Protect Your Data In A Cloud Environment

Enable Public Audit ability for Secure Cloud Storage

PRIVACY PRESERVING PUBLIC AUDITING FOR SECURED DATA STORAGE IN CLOUD USING BLOCK AUTHENTICATION CODE

SURVEY ON: CLOUD DATA RETRIEVAL FOR MULTIKEYWORD BASED ON DATA MINING TECHNOLOGY

A Secure Decentralized Access Control Scheme for Data stored in Clouds

Performance Evaluation Panda for Data Storage and Sharing Services in Cloud Computing

Secure Collaborative Privacy In Cloud Data With Advanced Symmetric Key Block Algorithm

A SELF-DESTRUCTION SYSTEM FOR DYNAMIC GROUP DATA SHARING IN CLOUD

Secure Group Oriented Data Access Model with Keyword Search Property in Cloud Computing Environment

Security over Cloud Data through Encryption Standards

Cloud Data Storage Services Considering Public Audit for Security

SECURITY STORAGE MODEL OF DATA IN CLOUD Sonia Arora 1 Pawan Luthra 2 1,2 Department of Computer Science & Engineering, SBSSTC

Categorical Heuristic for Attribute Based Encryption in the Cloud Server

Distributed Attribute Based Encryption for Patient Health Record Security under Clouds

Australian Journal of Basic and Applied Sciences

AN ENHANCED ATTRIBUTE BASED ENCRYPTION WITH MULTI PARTIES ACCESS IN CLOUD AREA

Secure Authentication of Distributed Networks by Single Sign-On Mechanism

A Comprehensive Data Forwarding Technique under Cloud with Dynamic Notification

How To Secure Cloud Computing, Public Auditing, Security, And Access Control In A Cloud Storage System

Enhancing Data Security in Cloud Storage Auditing With Key Abstraction

Data Integrity Check using Hash Functions in Cloud environment

Privacy-Preserving Public Auditing & Data Intrgrity for Secure Cloud Storage

Improving data integrity on cloud storage services

Index Terms: Cloud Computing, Cloud Security, Mitigation Attack, Service Composition, Data Integrity. 1. Introduction

IMPLEMENTATION OF RESPONSIBLE DATA STORAGE IN CONSISTENT CLOUD ENVIRONMENT

Secure Privacy Preserving Public Auditing for Cloud storage

Keyword Ranked MetaData Indexed Object Clawler in Cloud Servers

Enabling Public Auditability, Dynamic Storage Security and Integrity Verification in Cloud Storage

Multi-Owner Data Sharing in Cloud Storage Using Policy Based Encryption

A Survey on Secure Storage Services in Cloud Computing

DATA SECURITY IN CLOUD USING ADVANCED SECURE DE-DUPLICATION

PRIVACY PRESERVING AND BATCH AUDITING IN SECURE CLOUD DATA STORAGE USING AES

CRYPTOGRAPHIC SECURE CLOUD STORAGE MODEL WITH ANONYMOUS AUTHENTICATION AND AUTOMATIC FILE RECOVERY

Surveying Cloud Storage Correctness using TPA with BLS

Authorized Auditing of Big Data Stored on Cloud with Auditability Aware Data Scheduling

Data Grid Privacy and Secure Storage Service in Cloud Computing

Privacy-Preserving Public Auditing for Secure Cloud Storage

Survey Paper on Integrity Auditing of Storage

Verifying Correctness of Trusted data in Clouds

Application Based Access Control on Cloud Networks for Data Security

Analysis of Secure Cloud Data Sharing Within a Group

A Proxy-Based Data Security Solution in Mobile Cloud

An Efficiency Keyword Search Scheme to improve user experience for Encrypted Data in Cloud

Secure Sharing of Health Records in Cloud Using ABE

Cloud Information Accountability Framework for Auditing the Data Usage in Cloud Environment

PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD COMPUTING

SECURING CLOUD DATA COMMUNICATION USING AUTHENTICATION TECHNIQUE

Keywords Cloud Storage, Error Identification, Partitioning, Cloud Storage Integrity Checking, Digital Signature Extraction, Encryption, Decryption

Secure and privacy-preserving DRM scheme using homomorphic encryption in cloud computing

A Survey of Different Encryption Techniques for Secure Cloud Storage

Transcription:

OPEN ACCESS Int. Res. J. of Science & Engineering, 2015; Vol. 3 (6): 231-236 ISSN: 2322-0015 RESEARCH ARTICLE Privacy Preservation and Secure Data Sharing in Cloud Storage Chavhan Bhaurao* and Deshmukh Swati Department of computer science & engineering, G. H. Raisoni College of Engineering & Management, Amravati *Corresponding Author Email : chavhanbhaurao@gmail.com Manuscript Details Received : 23.11.2015 Revised :28.12.2015 Revised received : 04.12.2015 Accepted: 10.12.2015 Published: 15.12. 2015 ISSN: 2322-0015 Editor: Dr. Chavhan Arvind Cite this article as: Chavhan Bhaurao and Deshmukh Swati. Privacy Preservation and Secure Data Sharing in Cloud Storage, Int. Res. J. of Science & Engineering, 2015, 3(6):231-236. Copyright: Author(s), This is an open access article under the terms of the Creative Commons Attribution Non-Commercial No Derivs License, which permits use and distribution in any medium, provided the original work is properly cited, the use is non-commercial and no modifications or adaptations are made. ABSTRACT Cloud computing provides an economical and efficient solution for sharing group resource among cloud users. Privacy preservation and secure sharing of the data over un-trusted cloud is still a challenging issue, due to the frequent change of the membership. A secure multi owner data sharing technique is proposed for dynamic groups in the cloud. By us group signature and dynamic broadcast encryption techniques, any cloud user can anonymously share data with others. The storage overhead and encryption computation cost of our technique are independent with the number of users. In addition, to this the security of proposed technique with rigorous proofs, and demonstrate the efficiency of proposed system. Keywords: Cloud computing, data sharing, privacy-preserving, access control, dynamic groups. 1. INTRODUCTION Cloud computing is recognized as an alternative to traditional information technology (Armbrust et al., 2010) due to its intrinsic resource sharing and low-maintenance characteristics. In cloud computing, the cloud service providers (CSPs), such as Amazon, are able to deliver various services to cloud users with the help of powerful data centers. By migrating the local data management systems into cloud servers, users can enjoy high quality services and save significant investments on their local infrastructures. But as per review completed by Chavhan and Wadhe (2014) on cloud services in which data sharing is done has various security problem and to overcome we have to implement some technique for secure data sharing. One of the most fundamental services offered by cloud providers is data storage. Let us consider a practical data application. A company allows its staffs in the same group or department to store and share files in the cloud. By utilizing the cloud, the staffs 2015 All right reserved 231

Chavhan and Deshmukh, 2015 can be completely released from the troublesome local data storage and maintenance. However, it also has a significant risk to the confidentiality of those stored files. Specifically, the cloud servers managed by cloud providers are not fully trusted by users while the data files stored in the cloud may be sensitive and confidential, such as business plans. To preserve data privacy, a basic solution is to encrypt data files, and then upload the encrypted data into the cloud (Kamara and Lauter, 2010). Unfortunately, designing an efficient and secure data sharing scheme for groups in the cloud is not an easy task due to the following challenging issues. Identity privacy is one of the most significant obstacles for the wide deployment of cloud computing. Any member in a group should be able to fully enjoy the data storing and sharing services provided by the cloud, which is defined as the multiple-owner manner. Groups are normally dynamic in practice. Our contributions: To solve the challenges presented above and propose a secure multiowner data sharing scheme for dynamic groups in the cloud. The main contributions include: Propose technique assured secure multiowner data sharing. It implies that any user in the group can securely share data with others by the un-trusted cloud. Proposed scheme is able to support dynamic groups efficiently. Specifically, new granted users can directly decrypt data files uploaded before their participation without contacting with data owners. Proposed technique provides secure and privacypreserving access control to users, which guarantees any member in a group to anonymously utilize the cloud resource. 2. LITERATURE REVIEW Kallahalla et al. (2003) proposed a cryptographic storage system that enables secure file sharing on untrusted servers, named Plutus. By dividing files into file groups and encrypting each file group with a unique file-block key, the data owner can share the file groups with others through delivering the corresponding lockbox key, where the lockbox key is used to encrypt the file-block keys. However, it brings about a heavy key distribution overhead for large-scale file sharing. Additionally, the file-block key needs to be updated and distributed again for a user revocation. Goh et al. (2003) files stored on the untrusted server include two parts: file metadata and file data. The file metadata implies the access control information including a series of encrypted key blocks, each of which is encrypted under the public key of authorized users. Thus, the size of the file metadata is proportional to the number of authorized users. The user revocation in the scheme is an intractable issue especially for largescale sharing, since the file metadata needs to be updated. Ateniese et al. (2005) leveraged proxy reencryptions to secure distributed storage. Specifically, the data owner encrypts blocks of content with unique and symmetric content keys, which are further encrypted under a master public key. For access control, the server uses proxy cryptography to directly re-encrypt the appropriate content key(s) from the master public key to a granted user s public key. Unfortunately, a collusion attack between the untrusted server and any revoked malicious user can be launched, which enables them to learn the decryption keys of all the encrypted blocks. Lu et al. (2010) proposed a secure provenance scheme, which is built upon group signatures and cipher text-policy attribute-based encryption techniques. Particularly, the system in their scheme is set with a single attribute. Each user obtains two keys after the registration: a group signature key and an attribute key. Thus, any user is able to encrypt a data file using attribute-based encryption and others in the group can decrypt the encrypted data using their attribute keys. Meanwhile, the user signs encrypted data with her 232 www.irjse.in

Privacy Preservation and Secure Data Sharing in Cloud Storage group signature key for privacy preserving and traceability. However, user revocation is not supported in their scheme. Yu et al. (2010) presented a scalable and finegrained data access control scheme in cloud computing based on the KPABE technique. The data owner uses a random key to encrypt a file, where the random key is further encrypted with a set of attributes using KP-ABE. Then, the group manager assigns an access structure and the corresponding secret key to authorized users, such that a user can only decrypt a cipher text if and only if the data file attributes satisfy the access structure. To achieve user revocation, the manager delegates tasks of data file reencryption and user secret key update to cloud servers. However, the single owner manner may hinder the implementation of applications with the scenario, where any member in a group should be allowed to store and share data files with others. Chavhan and Kamble (2014) in there review compare the various techniques used for data security and privacy of user data. This survey conclude that implementation of strong security algorithm is necessary for secure data sharing and maintaining privacy of user. 3. SYSTEM IMPLEMENTATION This section describes architecture, functional diagram and algorithm used to implement the proposed system. 3.1 Architecture of Proposed system A system architecture or systems architecture is the conceptual model that defines the structure, 233 behaviour, and more views of a system. An architecture description is a formal description and representation of a system, organized in a way that supports reasoning about the structures of the system. System architecture can comprise system components, the externally visible properties of those components, the relationships (e.g. the behaviour) between them. There have been efforts to formalize languages to describe system architecture; collectively these are called architecture description languages (ADLs) Group Member Upload/share/ download data Cloud Server Request/accept (Group member) Group Manager Upload/share/ download data Issuing file access information (Group id, File id) Verify the Auth. / Access the file Remote User Fig. 1: Architecture diagram of Proposed System Int. Res. J. of Science & Engineering, 2015; Volume 3, No. 6, Nov- Dec., 2015. 233

Chavhan and Deshmukh, 2015 The fig.1 shows the system architecture of the privacy preservation and secure data sharing in cloud storage. The application is run on the php based web application that is connect to the network and data is stored on the cloud server that helps to retrieve and stored that data in the database. The privacy preservation and secure data sharing in cloud storage application consists of php application for login purpose and use the secure data sharing services. 3.2 Data Flow Diagram A data-flow diagram (DFD) is a graphical representation of the "flow" of data through an information system. DFDs can also be used for the visualization of data processing (structured Start Log in/sign Up To System If log =? Account Upload File to System using RC6 Algorithm Sign Up design). On a DFD, data items flow from an external data source or an internal data store to an internal data store or an external data sink, via an internal process. In the above DFD, it shows that firstly user has to Log in on to our application, then System will checks the details of the user with the details available in the database. After valid login user can securely shared the data in group and also access data shared with it. 3.3 RC6(Rivest Cipher Version 6) In cryptography, RC6 (Ronald et al., 1998) is symmetric key block cipher derived from RC5. It was designed by Ron Rivest, Matt Robshaw, RaySidney and Yiqun Lisa Yin to meet the requirement of the Advanced Encryption Standard (AES) competition. The algorithm was one of the finalists, and also submitted to NESSIE and CRYPTREC projects. It is a proprietary algorithm, patented by RSA Security. Below fig. 2.3 show RC6 Cipher process. RC6 proper has a block size of 128 bits and supports key sizes of 128, 192, and 256 bits, but, like RC5, it may be parameterized to support a wide variety of word-lengths, key sizes, and number of rounds. RC6 is very similar to RC5 in structure, using data-dependent rotations, modular addition, and XOR operations; in fact, RC6 could be viewed as interweaving two parallel RC5 encryption processes, however, RC6 does use an extra multiplication operation not present in RC5 in order to make the rotation dependent on every bit in a word, and not just the least significant few bits. Share file in group Download the file Sign out End Fig. 2: Data Flow Diagram Fig. 3: RC6 Cipher 234 www.irjse.in

Privacy Preservation and Secure Data Sharing in Cloud Storage 4. Experimental Result Analysis The experimental result analysis is performed on cloud computation cost for performing various input and output operation performed by client request. The cloud computation cost is measured in term of CPU time (second) required to serve client request. We take both inputs and outputs request to calculate the cloud computation cost. We also compare cloud computation cost with following Paper- Mona: Secure Multi Owner data sharing for dynamic groups in the cloud (Liu et al., 2013). Fully Collusion Secure Dynamic Broadcast Encryption with Constant-Size Cipher texts or Decryption Keys (Delerablee et al., 2007). Table 1: Comparisons of computation cost of cloud in proposed system and existing system Cloud Computation cost(second) Request Proposed System MONA[12] ODBE[11] 0 0 1.579 1.6 20 0.795 1.678 1.85 40 1.09 1.746 2.2 60 1.35 1.824 2.44 80 1.75 1.949 2.8 100 2.31 2.10 3.25 operation is only involved file sharing parameter such as group id, user id and symmetric encryption key and is independent of file size. 5. CONCLUSION & FUTURE SCOPE Proposed system introduced privacy preservation and secure data sharing strategy for cloud storage, which will provide high security to shared data in group. In proposed technique, a user is able to share data with other in group without revealing identity privacy to the cloud. Users efficiently join the group and new user can directly decrypt shared data file stored in cloud after participation. Moreover, the storage overhead and encryption computation cost are constant. Extensive analysis shows that the proposed technique satisfies the desired security requirement and guaranteed efficiency as well. In future more advance and sophisticated feature for secure data sharing can be implemented. File encryption technique can be used for more secure data sharing. The system with file encryption and path encryption data is secured from unauthorized access of data. Another technique which can be introduced in proposed technique is two factor authentications. Two factor authentication provide more security while authentication process because while login process required username, password and OTP verification REFERENCES Fig 4: Graphical representation of comparisons of computation cost of cloud. The above (Fig. 4) shows the graphical representation of comparison of computation cost of cloud in proposed system and existing system. The graph show that the computation cost of our system is better because the input and output 1. Armbrust M, Fox A, Griffith R, Joseph AD, Katz RH, Konwinski A, Lee G, Patterson DA, Rabkin A, Stoica I and Zaharia M. A View of Cloud Computing, Comm. ACM, Apr. 2010; 53(4):50-58. 2. Chavhan BB and Wadhe AP. Review Paper on Security problems in Cloud services, 2014 3. Kamara S and Lauter K. Cryptographic Cloud Storage, Proc. Int l Conf. Financial Cryptography and Data Security (FC), Jan. 2010; pp. 136-149. 4. Kallahalla M, Riedel E, Swaminathan R, Wang Q, and Fu K. Plutus: Scalable Secure File Sharing on Untrusted Storage, Proc. USENIX Conf. File and Storage Technologies, 2003; pp. 29-42. Int. Res. J. of Science & Engineering, 2015; Volume 3, No. 6, Nov- Dec., 2015. 235

Chavhan and Deshmukh, 2015 5. Goh E, Shacham H, Modadugu N and Boneh D. Sirius: Securing Remote Untrusted Storage, Proc. Network and Distributed Systems Security Symp. (NDSS),2003; pp. 131-145. 6. Ateniese G, Fu K, Green M and Hohenberger S. Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage, Proc. Network and Distributed Systems Security Symp. (NDSS), 2005; pp. 29-43. 7. Lu R, Lin X, Liang X and Shen X. Secure Provenance: The Essential of Bread and Butter of Data Forensics in Cloud Computing, Proc. ACM Symp. Information, Computer and Comm. Security, 2010; pp. 282-292. 8. Yu S, Wang C, Ren K and Lou W. Achieving Secure, Scalable, and Fine-Grained Data Access Control in Cloud Computing, Proc. IEEE INFOCOM,2010; pp. 534-542. 9. Chavhan Bhaurao and Kamble Rutuja. Review on Privacy Preservation and Secure Data Sharing on Cloud Storage, Int. Res. J. of Sci. & Engg., 2014; 2 (6): 226-234. 10. Rivest, Ronald L, et al. The RC6TM block cipher." First Advanced Encryption Standard (AES) Conference. 1998. 11. Delerablee C, Paillier P and Pointcheval D. Fully Collusion Secure Dynamic Broadcast Encryption with Constant-Size Ciphertexts or Decryption Keys, Proc. First Int l Conf. Pairing-Based Cryptography, 2007; pp. 39-59. 12. Liu X, Zhang Y and Yan J. Mona: Secure Multi Owner data sharing for dynamic groups in the cloud Proc. IEEE Transactions on parallel and distributed systems, June, 2013; 24(6). 2015 Published by IRJSE 236 www.irjse.in