Decentralized Access Control Secure Cloud Storage using Key Policy Attribute Based Encryption 1 Thota Naresh Kumar, 2 K.SRINIVAS, 3 Y.Raju 2 Associate Professor, 3 Associate Professor 1,2,3 Department of Information Technology 1,2,3 Geethanjali College of Engineering & Technology. Abstract- Cloud computing multitenancy feature, which provides privacy, security and access control challenges, because of sharing of physical resources among untrusted tenants. In order to achieve safe storage, policy based file access control, policy based file assured deletion and policy based renewal of a file stored in a cloud environment, a suitable encryption technique with key management should be applied before outsourcing the data. In this paper we implemented secure cloud storage by providing access to the files with the policy based file access using Attribute Based Encryption (ABE) scheme with RSA key public-private key combination. Private Key is the combination of the user s credentials. So that high security will be achieved. Time based file Revocation scheme is used for file assured deletion. When the time limit of the file expired, the file will be automatically revoked and cannot be accessible to anyone in future. Manual Revocation also supported. Policy based file renewal is proposed. The Renewal can be done by providing the new key to the existing file, will remains the file until the new time limit reaches. Keywords: cloud storage, renewal policy, decentralized access, policy based access. I.Introduction The investigation in cloud computing has received a lot of interest from educational and business worlds. In cloud computing users can contract out their calculation and storage to clouds using Internet. This frees users from problem of maintaining resources on-site. The services like applications, infrastructure and platforms are provided by cloud and helps developers to write application. The data is encrypted for the sake of secure data storage. The data stored in cloud is frequently modified so this feature is to be considered while designing the proficient secure storage techniques. The important concern is that encrypted data is to be properly searched. The cloud researchers have made up security and privacy protection in cloud. In Online social networking access control is very important and only valid user must be allowed to access and store personal information, images and videos and all this data is stored in cloud. The goal is not just store the data securely in cloud it is also important to make secure that anonymity of user is ensured. The situation like user wants to comment on object but does not want to be known. But the user wants the other user to know that he is a valid user. In this paper two protocols Attribute Based Encryption(ABE) and Attribute Based Signature(ABS) are used. ABE and ABS are combined to offer legitimate access control without revealing the identity of the user. The important offerings of this paper are distributed access control that is only approved users with valid attributes can have entree to data in cloud. The users who stores and modify the data is verified. There are many KDCs for key management because of this the architecture is IJCSIET-ISSUE5-VOLUME2-SERIES1 Page 1
decentralized. No two users can join together and verify themselves to access data if they are not authenticated. There is no access of data for users who have been revoked. The process of invalidation or withdrawal of control by authority that is removal of license, name or position is revocation. The system is flexible to replay attacks. There is support for multiple read and write operations on data in cloud. The costs are analogous to centralized approaches and cloud performs the costly operations. II.Related Work Access control in clouds is gaining consideration on the grounds that it is imperative that just authorized clients have access to services. A colossal measure of data is constantly archived in the cloud, and much of this is sensitive data. Utilizing Attribute Based Encryption (ABE), the records are encrypted under a few access strategy furthermore saved in the cloud. Clients are given sets of traits and corresponding keys. Just when the clients have matching set of attributes, would they be able to decrypt the data saved in the cloud. [5][6] Studied the access control in health care. Access control is likewise gaining imperativeness in online social networking where users store their personal data, pictures, films and shares them with selected group of users they belong. Access control in online social networking has been studied in [7]. The work done by [8] gives privacy preserving authenticated access control in cloud. Nonetheless, the researchers take a centralized methodology where a single key distribution center(kdc) disperses secret keys and attributes to all clients. Unfortunately, a single KDC is not just a single point of failure however troublesome to uphold due to the vast number of clients that are upheld in a nature's domain. The scheme In [9] uses a symmetric key approach and does not support authentication. Multi-authority ABE principle was concentrated on in [10], which obliged no trusted power which requires each client to have characteristics from at all the KDCs. In spite of the fact that Yang et al. [11] proposed a decentralized approach, their strategy does not confirm clients, who need to remain anonymous while accessing the cloud. Ruj et al. [12] proposed a distributed access control module in clouds. On the other hand, the approach did not provide client verification. The other weakness was that a client can make and store an record and different clients can just read the record. write access was not allowed to clients other than the originator. Time-based file assured deletion, which is initially presented in [13], implies that records could be safely erased and remain forever difficult to reach after a predefined time. The primary thought is that a record is encrypted with an information key by the possessor of the record, and this information key is further encrypted with a control key by a separate key Manager. File Assured Deletion The policy of a file may be denied under the request by the customer, when terminating the time of the agreement or totally move the files starting with one cloud then onto the next cloud nature's domain. The point when any of the above criteria exists the policy will be repudiated and the key director will totally evacuates the public key of the associated file. So no one can recover the control key of a repudiated file in future. For this reason we can say the file is certainly erased. To recover the file, the user IJCSIET-ISSUE5-VOLUME2-SERIES1 Page 2
must ask for the key supervisor to produce the public key. For that the user must be verified. The key policy attribute based encryption standard is utilized for file access which is verified by means of an attribute connected with the file. With file access control the file downloaded from the cloud will be in the arrangement of read just or write underpinned. Every client has connected with approaches for each one file. So the right client will access the right file. For making file access the key policy attribute based encryption. File Access Control Ability to limit and control the access to host systems and applications via communication links. To achieve, access must be identified or authenticated. After achieved the authentication process the users must associate with correct policies with the files. To recover the file, the client must request the key manager to generate the public key. For that the client must be authenticated. The attribute based encryption standard is used for file access which is authenticated via an attribute associated with the file. With file access control the file downloaded from the cloud will be in the format of read only or write supported. Each user has associated with policies for each file. So the right user will access the right file. For making file access the attribute based encryption scheme is utilized. SECURITY OF THE PROTOCOL In this section, we will prove the security of the protocol. We will show that our scheme authenticates a user who wants to write to the cloud. A user can only write provided the cloud is able to validate its access claim. An invalid user cannot receive attributes from a KDC, if it does not have the credentials from the trustee. If a user s credentials are revoked, then it cannot replace data with previous stale data, thus preventing replay attacks to the user. III. COMPUTATION COMPLEXITY In this section, we present the computation complexity of the privacy preserving access control protocol. We will calculate the computations required by users (creator, reader, writer) and that by the cloud. Table 2 [14] presents notations used for different operations. The creator needs to encrypt the message and sign it. Creator needs to calculate one pairing eðg; gþ. Encryption takes two exponentiations to calculate each of C1;x. So this requires 2mET time, where m is the number of attributes. User needs to calculate three exponentiation to calculate C2;x and C3;x. So time taken for encryption is ð3m þ 1ÞE0 þ 2mET þ P. To sign the message, Y ;W;S0i s and Pjs have to be calculated as well as H(c) So, time taken to sign is The cloud needs to verify the signature. IV. COMPARISON WITH OTHER ACCESS CONTROL SCHEMES IN CLOUD We compare our scheme with other access control schemes (in Table 3)[8][12][13][15] and show that our scheme supports many TABLE 3 Comparison of Our Scheme with Existing Access Control Schemes TABLE 4[8][12][13][15] Comparison of Computation and Size of Cipher text While Creating a File TABLE 5[8][12][13][15] Comparison of Computation during Read and Write by User and Cloud features that the other schemes did not support. 1-W-M-R means that only one user can write while many users can read. M-W-M-R IJCSIET-ISSUE5-VOLUME2-SERIES1 Page 3
means that many user can read.we see that most schemes do not support many writes which is supported by our scheme. Our scheme is robust and decentralized; most of the others are centralized. Our scheme also supports privacy preserving authentication, which is not supported by others. Most of the schemes do not support user revocation, which our scheme does. In Tables 4 and 5, we compare the computation and communication costs incurred by the users and clouds and show that our distributed approach has comparable costs to centralized approaches. Cloud computing is a promising computing model which currently has drawn far reaching consideration from both the educational community and industry. By joining a set of existing and new procedures from research areas, for example, Service-Oriented Architectures (SOA) and virtualization, cloud computing is viewed all things considered a computing model in which assets in the computing infrastructure are given as services over the Internet. It is a new business solution for remote reinforcement outsourcing, as it offers a reflection of interminable storage space for customers to have data reinforcements in a pay-as-you- go way [1]. It helps associations and government offices fundamentally decrease their financial overhead of data administration, since they can now store their data reinforcements remotely to third-party cloud storage suppliers as opposed to keep up data centres on their own. Numerous services like email, Net banking and so forth are given on the Internet such that customers can utilize them from anyplace at any time. Indeed cloud storage is more adaptable, how the security and protection are accessible for the outsourced data turns into a genuine concern. The three points of this issue are availability, confidentiality and integrity. To accomplish secure data transaction in cloud, suitable cryptography method is utilized. The data possessor must encrypt the record and then store the record to the cloud. Assuming that a third person downloads the record, they may see the record if they had the key which is utilized to decrypt the encrypted record. Once in a while this may be failure because of the technology improvement and the programmers. To overcome the issue there is lot of procedures and techniques to make secure transaction and storage. V. CONCLUSION We have introduced a decentralized access control system with anonymous authentication, which gives client renouncement also prevents replay attacks. The cloud does not know the identity of the client who saves data, however just checks the client's certifications. Key dissemination is carried out in a decentralized manner. One limit is that the cloud knows the access strategy for each one record saved in the cloud. REFERENCES 1. M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. Katz, A. Konwinski, G. Lee, D. Patterson, A. Rabkin, I. Stoica, and M. Zaharia. A View of Cloud Computing. Comm. of the ACM, 53(4):50 58, Apr 2010. 2. Sushmita Ruj, Milos Stojmenovic and Amiya Nayak, Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds, IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS. 3. Wang, Q.Wang, K.Ren, N.Cao and W.Lou, Toward Secure and IJCSIET-ISSUE5-VOLUME2-SERIES1 Page 4
Dependable Storage Services in Cloud Computing, IEEE T.Services Computing, Vol. 5, no.2, pp. 220-232, 2012. 4. C.Gentry, A fully homomorphic encryption scheme, Ph.D. dissertation, Stanford University, 2009, http://www.crypto.stanford.edu/craig. 5. personal M. Li, S. Yu, K. Ren, and W. Lou, Securing health records in cloud computing: Patient-centric and fine-grained data access control in multi owner settings, in SecureComm, pp. 89 106, 2010. 6. S. Yu, C. Wang, K. Ren, and W. Lou, Attribute based data sharing with attribute revocation, in ACM ASIACCS, pp. 261 270, 2010. 7. S. Jahid, P. Mittal, and N. Borisov, EASIER: Encryption-based access control in social networks with efficient revocation, in ACM ASIACCS, 2011. 8. F. Zhao, T. Nishide, and K. Sakurai, Realizing fine-grained and flexible access control to outsourced data with attribute-based cryptosystems, in ISPEC, ser. Lecture Notes in Computer Science, vol. 6672. Springer, pp. 83 9 9. R. Lu, X. Lin, X. Liang, and X. Shen, Secure Provenance: The Essential of Bread and Butter of Data Forensics in Cloud Computing, Proc. Fifth ACM Symp. Information, Computer and Comm. Security (ASIACCS), pp. 282-292, 2010. 10. D.F. Ferraiolo and D.R. Kuhn, Role-Based Access Controls, Proc. 15th Nat l Computer Security Conf., 1992. 11. D.R. Kuhn, E.J. Coyne, and T.R. Weil, Adding Attributes to Role-Based Access Control, IEEE Computer, vol. 43, no. 6, pp. 79-81, June 2010. 12. M. Li, S. Yu, K. Ren, and W. Lou, Securing Personal Health Records in Cloud Computing: Patient-Centric and Fine-Grained Data Access Control in Multi-Owner Settings, Proc. Sixth Int l ICST Conf. Security and Privacy in Comm. Networks (SecureComm), pp. 89-106, 2010. 13. S. Yu, C. Wang, K. Ren, and W. Lou, Attribute Based Data Sharing with Attribute Revocation, Proc. ACM Symp. Information, Computer and Comm. Security (ASIACCS), pp. 261-270, 2010. 14. H.K. Maji, M. Prabhakaran, and M. Rosulek, Attribute-Based Signatures: Achieving Attribute-Privacy and Collusion-Resistance, IACR Cryptology eprint Archive, 2008. 15. J. Hur and D. Kun Noh, Attribute- Based Access Control with Efficient Revocation in Data Outsourcing Systems, IEEE Trans. Parallel and Distributed Systems, vol. 22, no. 7, pp. 1214-1221, July 2011. IJCSIET-ISSUE5-VOLUME2-SERIES1 Page 5