Role Based Encryption with Efficient Access Control in Cloud Storage



Similar documents
IMPLEMENTATION OF NETWORK SECURITY MODEL IN CLOUD COMPUTING USING ENCRYPTION TECHNIQUE

Secure Role-Based Access Control on Encrypted Data in Cloud Storage using Raspberry PI

Implementation of Role Based Access Control on Encrypted Data in Hybrid Cloud

Data management using Virtualization in Cloud Computing

EFFICIENT AND SECURE ATTRIBUTE REVOCATION OF DATA IN MULTI-AUTHORITY CLOUD STORAGE

Secure Data Sharing in Cloud Computing using Hybrid cloud

Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage

An Efficient Security Based Multi Owner Data Sharing for Un-Trusted Groups Using Broadcast Encryption Techniques in Cloud

Application Based Access Control on Cloud Networks for Data Security

Secure Group Oriented Data Access Model with Keyword Search Property in Cloud Computing Environment

KEY-POLICY ATTRIBUTE BASED ENCRYPTION TO SECURE DATA STORED IN CLOUD

Categorical Heuristic for Attribute Based Encryption in the Cloud Server

Sharing Of Multi Owner Data in Dynamic Groups Securely In Cloud Environment

Data Security Using Reliable Re-Encryption in Unreliable Cloud

A Secure Decentralized Access Control Scheme for Data stored in Clouds

Keywords: Authentication, Third party audit, cloud storage, cloud service provider, Access control.

Privacy Preservation and Secure Data Sharing in Cloud Storage

SECURE RE-ENCRYPTION IN UNRELIABLE CLOUD USINGSYNCHRONOUS CLOCK

RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM

Cryptographic Data Security over Cloud

DECENTRALIZED ACCESS CONTROL TO SECURE DATA STORAGE ON CLOUDS

Secure Attribute Based Mechanism through Access cipher policy in Outsourced Cloud Data

G.J. E.D.T.,Vol.3(1):43-47 (January-February, 2014) ISSN: SUODY-Preserving Privacy in Sharing Data with Multi-Vendor for Dynamic Groups

Attribute Based Encryption with Privacy Preserving In Clouds

Secure and Efficient Data Retrieval Process based on Hilbert Space Filling Curve

SMART FRAME- AN EFFICIENT SECURITY FRAMEWORK FOR BIG DATA MANAGEMENT SCHEME ON CLOUD

Enhancing Data Security in Cloud Storage Auditing With Key Abstraction

Providing Access Permissions to Legitimate Users by Using Attribute Based Encryption Techniques In Cloud

Index Terms: Cloud Computing, Cloud Security, Mitigation Attack, Service Composition, Data Integrity. 1. Introduction

Analysis on Secure Data sharing using ELGamal s Cryptosystem in Cloud

Improving data integrity on cloud storage services

ADVANCE SECURITY TO CLOUD DATA STORAGE

Secure Sharing of Health Records in Cloud Using ABE

Strengthen Cloud Computing Security with Federal Identity Management Using Hierarchical Identity-Based Cryptography

CRYPTOGRAPHIC SECURE CLOUD STORAGE MODEL WITH ANONYMOUS AUTHENTICATION AND AUTOMATIC FILE RECOVERY

ISSN Index Terms Cloud computing, outsourcing data, cloud storage security, public auditability

A Novel Framework for Cloud Environment Using CPDP for Data Integrity and Security

DATA SECURITY IN CLOUD USING ADVANCED SECURE DE-DUPLICATION

Dynamic Data Storage for Trustworthy Cloud

Enabling Public Auditability, Dynamic Storage Security and Integrity Verification in Cloud Storage

A SECURE FRAMEWORK WITH KEY- AGGREGATION FOR DATA SHARING IN CLOUD

IMPLEMENTATION CONCEPT FOR ADVANCED CLIENT REPUDIATION DIVERGE AUDITOR IN PUBLIC CLOUD

Secure Multi Authority Cloud Storage Based on CP- ABE and Data Access Control

Keywords-- Cloud computing, Encryption, Data integrity, Third Party Auditor (TPA), RC5 Algorithm, privacypreserving,

Journal of Electronic Banking Systems

SHARED DATA & INDENTITY PRIVACY PRESERVING IN CLOUD AND PUBLIC AUDITING

Authentication. Authorization. Access Control. Cloud Security Concerns. Trust. Data Integrity. Unsecure Communication

SECURITY ENHANCEMENT OF GROUP SHARING AND PUBLIC AUDITING FOR DATA STORAGE IN CLOUD

SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD

DESIGN AND IMPLEMENTATION OF A SECURE MULTI-CLOUD DATA STORAGE USING ENCRYPTION

Implementation of Data Sharing in Cloud Storage Using Data Deduplication

Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud

A SELF-DESTRUCTION SYSTEM FOR DYNAMIC GROUP DATA SHARING IN CLOUD

Analysis of Different Access Control Mechanism in Cloud

NEW CRYPTOGRAPHIC CHALLENGES IN CLOUD COMPUTING ERA

Secrecy Maintaining Public Inspecting For Secure Cloud Storage

Authorized Auditing of Big Data Stored on Cloud with Auditability Aware Data Scheduling

CP-ABE Based Encryption for Secured Cloud Storage Access

AN EFFICIENT AUDIT SERVICE OUTSOURCING FOR DATA IN TEGRITY IN CLOUDS

preliminary experiment conducted on Amazon EC2 instance further demonstrates the fast performance of the design.

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

Data Storage Security in Cloud Computing

Monitoring Data Integrity while using TPA in Cloud Environment

The Feasibility of SET-IBS and SET-IBOOS Protocols in Cluster-Based Wireless Sensor Network

Public Auditing & Automatic Protocol Blocking with 3-D Password Authentication for Secure Cloud Storage

An Efficient and Light weight Secure Framework for Applications of Cloud Environment using Identity Encryption Method

Chapter 2 Taxonomy and Classification of Access Control Models for Cloud Environments

Keywords Cloud Storage, Error Identification, Partitioning, Cloud Storage Integrity Checking, Digital Signature Extraction, Encryption, Decryption

How To Secure Cloud Computing, Public Auditing, Security, And Access Control In A Cloud Storage System

Multi Tenancy Access Control Using Cloud Service in MVC

A Survey of Different Encryption Techniques for Secure Cloud Storage

Index Terms: Cloud Computing, Third Party Auditor, Threats In Cloud Computing, Dynamic Encryption.

An Enhanced Security Enabled Sharing of Protected Cloud Storage Services by Trapdoor Commitment Based on RSA Signature Assumption

Verifying Correctness of Trusted data in Clouds

Development of enhanced Third party Auditing Scheme for Secure Cloud Storage

A Survey on Scalable Data Security and Load Balancing in Multi Cloud Environment

CLOUD COMPUTING SECURITY ARCHITECTURE - IMPLEMENTING DES ALGORITHM IN CLOUD FOR DATA SECURITY

A SECURE CLOUD WITH ADDITIONAL LAYER OF PROTECTION AND USER AUTHENTICATION

Secure Cloud Storage using Multi Attribute Authority with Multi Central Authority

A Security Integrated Data Storage Model for Cloud Environment

An Efficient Secure Multi Owner Data Sharing for Dynamic Groups in Cloud Computing

A Review of Cloud Environment and Recognition of Highly Secure Public Data Verification Architecture using Secure Public Verifier Auditor

Highly Secure Data Sharing in Cloud Storage using Key-Pair Cryptosystem

Third Party Auditing For Secure Data Storage in Cloud through Trusted Third Party Auditor Using RC5

International Journal of Scientific & Engineering Research, Volume 6, Issue 5, May ISSN

Transcription:

Role Based Encryption with Efficient Access Control in Cloud Storage G. V. Bandewar 1, R. H. Borhade 2 1 Department of Information Technology, Sinhgad Technical Education Society s SKNCOE, Pune, India 2 Professor, Department of Information Technology, Sinhgad Technical Education Society s SKNCOE, Pune, India Abstract: Cloud is most powerful paradigm for users to provide on demand services. Cloud is a platform which is responsible for providing many resources to the users. Many users are now migrated towards cloud from the desktop computer because it helps in providing tremendous amount of storage to store user s data on it and they can access their data from anywhere. Many users lost their control when they access their data from the cloud. In this case, users may lose their data, many attacks may occur. So in that case it is necessary to provide data access control mechanism called Role Based Encryption (RBE) using Role Based Access Control Policies (RBAC). It is able to provide access control over the data. This RBE scheme provides data access based on the roles of the users. Roles are defined according to membership of that user. So that, user having highest role membership parameters can access data and so on. Keywords: Access control, cloud computing, data storage, role- based access control policies 1. Introduction Cloud is receiving a lot of attention from academic and industrial worlds. In cloud computing users can outsource their data to the server called as cloud using internet and frees from the difficulties like maintaining data storage. Cloud provides basically three types of services they are Platform as a service (Paas), Software as a service (SaaS), and Infrastructure as a service (IaaS) [1]. Huge amount of information will be stored on the cloud it may also contain some sensitive information like personal records, health records, user-id or password, some important documents and so on. Thus, it is necessary to provide secure access control while users accessing data from the cloud. There are different types of infrastructures are associated with cloud. A public cloud is that which is publically available for users and which has no restrictions. A private cloud is a cloud which is controlled by single authority or any organization. A hybrid cloud is a combination of both the public and private cloud in which all sensitive information is stored in a private cloud and all other encrypted information is stored in the public cloud [1]. There are three types of access controls: User based access control, Attribute based access control and role based access control. In role based access control, users are classified according to their role. Data can access from the cloud if they have valid role. For example only faculty members should access data related to mark sheet of the student not the students. Data security and data privacy are also very important concerns. Thus, data often encode the sensitive information and should be protected from many organizational policies. In this encryption scheme is very useful. Encryption is major technique to provide security to the cloud data. Only encryption alone is not efficient alone with this some access control policies should be there to provide data privacy also. In this paper issue of secure data storage is addressed. To allow users to control access to their data some access control policies are required. In role based access control model, roles are generated for access permission and users are allotted to appropriate role. Access permissions are based on qualified role not on individual users. To protect the privacy of data admin/data owner can employ cryptographic techniques. Main contribution: 1) A new RBE scheme with access control policies. 2) A practical implementation of a proposed RBE system with architecture description. 3) Analysis of results in terms of encryption and decryption time. This paper is organized as follow: In Section 2 existing work is describe in detail. Section 3 introduces proposed work. Section 4 gives comparison between proposed and existing system. Section 5 gives Implementation details. Section 6 gives results and discussion. Section 7 concludes the paper. 2. Existing System 2.1 RBE (Role Based Encryption) scheme with RBAC Policies In RBE with RBAC Policies, hybrid cloud concept is used with RBAC model. It will helpful only when the cloud is trusted. Users with appropriate role can only access the part of data from the cloud. RBE system is based on position of a user within an organization. The scheme is useful for trustworthy cloud [1]. 2.2 BGKM (Broad group Key management) In BGKM (Broadcast Group Key Management) the user can decrypt data if and only if their identity attribute satisfy the content provider s policies. The main idea of this scheme is to give some secrets to the users based on their identity attributes and later allow them to derive actual symmetric Paper ID: NOV161189 560

keys based on their secrets and some public information so that security will be more. In simple ABE (Attribute Based Encryption), users only authorized attributes are handle accessing data from the cloud. Security is not provided in traditional ABE [2]. 2.3 IBBE (Identity - Based Broadcast Encryption) In IBBE scheme message broadcasting is used. This scheme first encrypts the message and after that broadcasts it to multiple users. Broadcaster is responsible for broadcasting messages. After this users use their private key to decrypt and view the data. Key encapsulation mechanism is used here [3]. 2.4 HBASE (Hierarchical Attribute set based encryption) HASBE employs multiple value assignments for access expiration time to deal with user revocation more efficient than existing schemes. A Hierarchical Attribute-Set-Based Encryption (HASBE) extends cipher-text-policy attribute-setbased encryption (ASBE) with a hierarchical structure of users. This system achieves greater scalability and flexibility in terms of access control. User revocation can be done more efficiently. ASBE is an extended version of CP-ABE that organizes user attributes into a recursive set structure. ASBE scheme is used for creating hierarchical structure. HASBE is applied for hierarchical user grant; data file creation, file access, user revocation, and file deletion[4]. 2.5 CACH (Content Access Control in Hierarchy) CACH scheme includes Independent and dependent key approaches. For data access, there is no need of key with which it is encrypted. Users can use their own key with some public parameters. But in independent key approach, user must have the copy of that key with which data is encrypted. But these are complex techniques [5]. 2.6 Cipher text policy attribute based encryption Some of the most challenging issues in data outsourcing scenario are the enforcement of authorization policies and the support of policy updates. Cipher-text-policy attribute-based encryption is a cryptographic solution to these types of issues for enforcing access control policies defined by a data owner on outsourced data. This scheme is of dual encryption exploits the combined features of the cipher-text policy attribute-based encryption and group key management algorithm. This system is scalable for securing outsourced data. This system helps in resolving the stateless problem that is many users may miss many key update messages so that they cannot sometimes keep their key states up-to-date [6]. Table 1: Literature Survey Sr. Existing Method Advantages Disadvantages no 1 Cipher text-policy attribute-based encryption -It allows efficient revocation mechanism. -Scalable for securing -It is not flexible. -Better Authentication is not provided. outsourced data -Resolves the stateless problem Paper ID: NOV161189 561 2 BGKM (Broadcast Group Key Management) 3 RBE(Role-based encryption) 4 HASBE (Hierarchical Attribute Set Based Encryption) 5 ABE (Attribute Based Encryption) scheme 6 KP-ABE(Key Policy Attribute Based Encryption) 7 RBCD (Role Based Cascaded Delegation) 8 RBE using RBAC model - Revocation can be done efficiently. -Requires minimum computation cost and space -Constant size ciphertext. -Constant size keys in single & multiple roles. -Supports user revocation. -Secure access. -Secure access is provided. -Improved performance and efficiency as well. -Constant size ciphertext and keys. -User revocation does not affect on other roles or users. -There is no need of re-encryption after user revocation. 2.7 RBCD (Role Based Cascaded delegation) -It cannot trace misleading behavior. -User revocation affects on others. -Need of Reencryption after user revocation. -It is not flexible. -key size is not constant. -User revocation affects on other users and roles. - User revocation may affect on others. -Does not support efficient user revocation. - Does not support secure information sharing. -It can not identify the source of data -Data searches are not secure -This scheme does not work for untrusted cloud. RBCD (Role Based Cascaded Delegation) system supports simple and efficient cross-domain authority. In this system, delegated privileges are issued to a role of a particular user rather than to that user. In this, role members are responsible to create delegations based on the need of collaboration. In a traditional system, many numbers of signatures required verifying the delegation chain but in RBCD, only one aggregation signature is needed to verify delegation so it will improve performance and efficiency as well. It shows some issues like efficient user revocation and security. Central authority is not available there. So that, it also shows the problem of secure information sharing [7]. 2.8 RBE (Role Based Encryption) This scheme is applied to public cloud. In this data access is based on position of that user in the organization. In this if multiple users are present in single role then any user can be added or removed from that role at any time [8].

2.9 IBSC (Identity-Based Signcryption) International Journal of Science and Research (IJSR) This scheme is proposed for efficiency purpose. Bilinear mapping are done in this scheme. In this IBS (ID Based Signature) is proposed. The IBS mechanism is faster at a verification process [9]. 2.10 HIDE (Hierarchical ID-Based Encryption) This HIDE scheme is helpful in reducing cipher text expansion. It distributes the workload by transmitting keys. Authentication and key transmission is done locally. It also helps in damage control [10]. 2.11 KP-ABE(Key Policy Attribute Based Encryption) User is the entity who wishes to access their data from the cloud. Upon successful authentication of user one secret is given to the user. After receiving the key, authorized user is then able to decrypt that data with the help of that secret key. In this scheme, admin performs various tasks. Private cloud is that which contain user s identity related information along with role parameters of that user. Information in the private cloud is sensitive information. So, it will not be accessed by any external party because the private cloud only accessed by those who are within the organization only. Unlike private cloud, public cloud is globally accessible. It exists outside the infrastructure of the organization. Any unauthorized party is also able to access the data from the cloud. In KP-ABE (Key Policy Attribute Based Encryption). In this, each cipher-text is labeled as encryptor with a set of attributes. And the private key is associated with the type of cipher-text that the key can decrypt. This method uses a tree access structure in which leaves are associated with attributes. A user can decrypt the cipher-text only when attribute associated with cipher-text satisfies key access structure. This can provide delegation mechanism [11]. 3. RBE with Twofish system Many RBE schemes were implemented earlier. All are very useful, but they don t provide better security in case if cloud is un-trusted. The new RBE mechanism will reduce this drawback. Admin is responsible for outsource data on the cloud. Admin is also responsible for giving access to the part of data to the authorized users only. Admin will upload encrypted data with attached policies for the purpose of better access control. 4. Comparison between RBE and RBE using SHA-512 In previous RBE system, authentication of a user is provided that is not so efficient and whole concentration is given on securing access control only. It is necessary to provide better authentication to increase access control. Like this, data privacy is also necessary. In this new RBE scheme, data integrity is verified. When admin or data owner outsources his data to the cloud, while uploading one hash code will be generated and the key to decrypt that data is transferred to the authorized user. At the user side, when user download the data from the cloud, another hash code will be generated and if both hash codes are same then data is integral. In this case, data is not modified and it is safe. Message will be send to the user if any unauthorized modifications are made. Thus, this new RBE system is more secure than existing systems. RBE Algorithm: 1. Identify Nodes: N is main set of each user N= {A, AU} Ad - Admin AU- Authorized User From this Set of Nodes one Node behaves as server node. Figure 1: Access Control model Note: Admin can perform all the tasks of data owner this will helps in improving efficiency. Admin will manage the roles of users. Role is based on parameters of user membership, and those parameters are stored in the private cloud. If admin wants to update user membership, then he can update it in the cloud. 2. Upload File: AU= { ENC, FN, POL} FN- File name ENC - in Encrypted Format Ad- attaches policies to the files 3. Managing Role: Ad = {Mk, IDr} Ad Manages the role based upon IDr (Identity of that Role). Admin is responsible for generating and computing parameters for the users. Role parameters define the position of a user in the role hierarchy. Admin is allowed to update parameters in the private cloud if necessary. 4. Sending Encryption Key to authorized user: AU= {AU1EK, AU2EK, AU3EK.} Ad Outsource the encrypted data with attached policies to the cloud. Paper ID: NOV161189 562

Checks role parameters of that user belong with his membership to give access to that user. Gives decryption key with the access permission to that user. Here each Authorized user receives one Encryption Key to Decrypt the File. 5. Authorized User Duty: AU= {UP, DL, MOD} Authorized user may Download (DL) upload (UP) or modify (MOD) the file. This paper proposes RBE scheme that applied with the help of SHA-512(Secure Hash Algorithm) with the features combination of AES and TWO-Fish algorithm. For generating hash code on the sender side and receiver side SHA-512 algorithm is used. The method is simple. In the proposed system, when owner/admin uploads the data on the cloud, admin must attach policies regarding users to it, and also he has to encrypt that information before outsourcing to the cloud. For the hash generation at encryption side and verification at decryption side, SHA-512 algorithm is used. Any authorized user wants to access data from the cloud or want to modify his data then he makes a request to the owner/admin. Owner first authenticates the user and checks the membership of a user within an organization and then gives appropriate access to that user. This concept will help in controlling access from the cloud that result in secure searches. New RBE mechanism helps in providing better authenticity. If any unauthorized user will access data from the cloud, then this will be avoided in new RBE system by giving associated decryption key to the authenticated user so unauthorized access will be reduced even it also helps in reducing misuse of data. This scheme gives complete focus on access control and data integrity. 5. Implementation Above architecture of secure data storage is implemented in java and the services are hosted on apache tomcat server. It is an open source web server and servlet container. The cloud uses SQL database. The client side is in java language which can be run in any web browser. For database connectivity JDBC-ODBC drivers are used. Proposed system is implemented on Amazon Elastic Compute Cloud (Amazon EC2). For admin/data owner instances are created on Amazon. For implementation windows free tier is used. 6. Result and Discussion Experimental analysis of proposed system is given in this section. Figure 3: Time for Encryption In above figure 3, result shows the time for file encryption between proposed and existing system. It shows that existing system requires more time than proposed system. Figure 4: Time for Decryption In above figure 4, result shows the time for file decryption between proposed and existing system. It shows that existing system requires more time than proposed system. 7. Conclusion In existing systems, some limitations are there like it does not provide data integrity with data privacy. In proposed system, access can be controlled using Role Based Encryption algorithm with the use of access control policies. In existing system, time required to encrypt and decrypt the file is more as compared to proposed system. Thus, data access can be controlled using RBE algorithm. 8. Acknowledgement I would like to thank my guide Prof. R. H. Borhade for his exemplary guidance and constant encouragement throughout the duration of the paper. His valuable suggestions were of immense help throughout this paper. References [1] L. Zhou, V. Varadharajan, and M. Hitchens, Achieving Secure Role- Based Access Control on Encrypted Data in Cloud Storage, IEEE TRANSACTIONS ON INFORMATIONFORENSICS AND SECURITY, VOL. 8, NO. 12, DECEMBER 2013. [2] M. Nabeel, N. Shang, E. Bertino, Privacy Preserving Policy-Based Content Sharing in Public Clouds, IEEE Transactions On Knowledge And Data Engineering, Vol. 25, No. 11, November 2013. Paper ID: NOV161189 563

[3] Cecile Delerablee, Identity-Based Broadcast Encryption with Constant Size Ciphertexts and Private Keys, ASIACRYPT 2007, LNCS 4833, pp. 200 215, 2007. [4] Z. Wan, J. Liu, and Robert H. Deng, HASBE: A Hierarchical Attribute-Based Solution for Flexible and Scalable Access Control in Cloud Computing, IEEE Transactions On Information Forensics And Security, Vol. 7, No. 2, April 2012. [5] H. R. Hassen, A. Bouabdallah, H. Bettahar, and Y. Challal, Key management for content access control in a hierarchy, Comput. Netw., vol. 51, no. 11, pp. 3197 3219, 2007. [6] J. Hur and D. Kun Noh, Attribute-Based Access Control with Efficient Revocation in Data outsourcing Systems, IEEE Transactions On Parallel And Distributed Systems, Vol. 22, No. 7, July 2011. [7] R. Tamassia, Fellow, W. H. Winsborough, Independently Verifiable Decentralized Role-Based Delegation, IEEE Transactions On Systems, Man, And Cybernetics Part A: Systems And Humans, Vol. 40, No. 6, November 2010. [8] L. Zhou, V. Varadharajan, and M. Hitchens, Enforcing role-based access control for secure data storage in the cloud, Comput. J., vol. 54, no. 13, pp. 1675 1687, Oct. 2011. [9] P. S. L. M. Barreto, B. Libert, N. McCullagh, and J.-J. Quisquater, Efficient and provably secure identity based signatures andsigncryption from bilinear maps, in ASIACRYPT (Lecture Notes in Computer Science), vol. 3788. New York, NY, USA: Springer-Verlag, Dec. 2005, pp. 515 532. [10] C. Gentry and A. Silverberg, Hierarchical ID-based cryptography, in ASIACRYPT (Lecture Notes in Computer Science), vol. 2501. New York, NY, USA: Springer-Verlag, 2002, pp. 548 566. [11] V. Goyal, O. Pandey, A. Sahai, and B. Waters, Attribute-based encryption for fine-grained access control of encrypted data, in Proc. ACM Conf. Comput. Commun. Sec., Oct./Nov. 2006, pp. 89 98. Paper ID: NOV161189 564