IMPLEMENTATION OF NETWORK SECURITY MODEL IN CLOUD COMPUTING USING ENCRYPTION TECHNIQUE



Similar documents
A Hierarchical Distributed Authority based Model for Security and Integrity in Cloud Computing

Role Based Encryption with Efficient Access Control in Cloud Storage

EFFICIENT AND SECURE ATTRIBUTE REVOCATION OF DATA IN MULTI-AUTHORITY CLOUD STORAGE

Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage

Data management using Virtualization in Cloud Computing

CLOUD COMPUTING SECURITY IN UNRELIABLE CLOUDS USING RELIABLE RE-ENCRYPTION

ISSN: ISO 9001:2008 Certified International Journal of Engineering Science and Innovative Technology (IJESIT) Volume 2, Issue 3, May 2013

Categorical Heuristic for Attribute Based Encryption in the Cloud Server

DECENTRALIZED ACCESS CONTROL TO SECURE DATA STORAGE ON CLOUDS

Sharing Of Multi Owner Data in Dynamic Groups Securely In Cloud Environment

An Efficient Security Based Multi Owner Data Sharing for Un-Trusted Groups Using Broadcast Encryption Techniques in Cloud

Data Security Using Reliable Re-Encryption in Unreliable Cloud

Efficient Secured Two Party Computing with Encrypted Data for Public Cloud L.Kalaivani, Dr.R.Kalpana

KEY-POLICY ATTRIBUTE BASED ENCRYPTION TO SECURE DATA STORED IN CLOUD

Application Based Access Control on Cloud Networks for Data Security

Secure Role-Based Access Control on Encrypted Data in Cloud Storage using Raspberry PI

Data defense in unpredictable Cloud Using Access Control and Access Time

Secure Group Oriented Data Access Model with Keyword Search Property in Cloud Computing Environment

Privacy Preservation and Secure Data Sharing in Cloud Storage

Secure Multi Authority Cloud Storage Based on CP- ABE and Data Access Control

Decentralized Access Control Schemes for Data Storage on Cloud

ISSN Index Terms Cloud computing, outsourcing data, cloud storage security, public auditability

SECURE RE-ENCRYPTION IN UNRELIABLE CLOUD USINGSYNCHRONOUS CLOCK

Sheltered Multi-Owner Data distribution For vibrant Groups in the Cloud

CP-ABE Based Encryption for Secured Cloud Storage Access

Authentication. Authorization. Access Control. Cloud Security Concerns. Trust. Data Integrity. Unsecure Communication

Secure Data Sharing in Cloud Computing using Hybrid cloud

Index Terms: Cloud Computing, Cloud Security, Mitigation Attack, Service Composition, Data Integrity. 1. Introduction

How To Secure Cloud Computing, Public Auditing, Security, And Access Control In A Cloud Storage System

Distributed Attribute Based Encryption for Patient Health Record Security under Clouds

Attribute Based Encryption with Privacy Preserving In Clouds

A Secure Decentralized Access Control Scheme for Data stored in Clouds

Secure Cloud Storage using Multi Attribute Authority with Multi Central Authority

G.J. E.D.T.,Vol.3(1):43-47 (January-February, 2014) ISSN: SUODY-Preserving Privacy in Sharing Data with Multi-Vendor for Dynamic Groups

Semi-Trusted Authentication for Health Data in Cloud

A Security Integrated Data Storage Model for Cloud Environment

A Novel Framework for Cloud Environment Using CPDP for Data Integrity and Security

Decentralized Firewall for Attribute-Based Encryption with Verifiable and Revocable Cloud Access Control

A study on keyword searchable frameworks for efficient data utilization in cloud storage

Secure Attribute Based Mechanism through Access cipher policy in Outsourced Cloud Data

Isolated Distribution of Health Records in Cloud Computing using Attribute-Based Encryption

Secure Sharing of Health Records in Cloud Using ABE

Providing Access Permissions to Legitimate Users by Using Attribute Based Encryption Techniques In Cloud

Secure and Efficient Data Retrieval Process based on Hilbert Space Filling Curve

RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM

Multi Tenancy Access Control Using Cloud Service in MVC

Securing Personal Health Records in Cloud Utilizing Multi Authority Attribute Based Encryption

Scalable and secure sharing of data in cloud computing using attribute based encryption

Keywords: Authentication, Third party audit, cloud storage, cloud service provider, Access control.

Cloud Based Enterprise Resource Planning Using Software As A Service

How To Ensure Data Integrity In Cloud Storage

Towards Temporal Access Control in Cloud Computing

An Enhanced Security Enabled Sharing of Protected Cloud Storage Services by Trapdoor Commitment Based on RSA Signature Assumption

CLOUD BASED STORAGE SERVICES FOR SECURITY FOLLOWED BY THE DATA AUTHENTICATION

ASSURANCE OF PATIENT CONTROL TOWARDS PERSONAL HEALTH DATA

Secure emergency medical architecture on the cloud using wireless sensor networks for emergency detection

How To Protect Your Data In A Cloud Environment

International Journal of Advance Research in Computer Science and Management Studies

Cloud Database Storage Model by Using Key-as-a-Service (KaaS)

Ranked Keyword Search Using RSE over Outsourced Cloud Data

Secure and Verifiable Policy Update Outsourcing for Big Data Access Control in the Cloud

A NOVEL APPROACH FOR MULTI-KEYWORD SEARCH WITH ANONYMOUS ID ASSIGNMENT OVER ENCRYPTED CLOUD DATA

An Efficient Multi-Keyword Ranked Secure Search On Crypto Drive With Privacy Retaining

A SECURE FRAMEWORK WITH KEY- AGGREGATION FOR DATA SHARING IN CLOUD

ENHANCED SECURITY MEASURES FOR HADOOP IN CLOUD COMPUTING

Enhancing Data Security in Cloud Storage Auditing With Key Abstraction

PRIVACY PRESERVING OF HEALTH MONITORING SERVICES IN CLOUD

Security Strength of RSA and Attribute Based Encryption for Data Security in Cloud Computing

Third Party Auditing For Secure Data Storage in Cloud through Trusted Third Party Auditor Using RC5

SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD

AN ENHANCED ATTRIBUTE BASED ENCRYPTION WITH MULTI PARTIES ACCESS IN CLOUD AREA

Protected Patients Data Centre in Cloud Computing

ADVANCE SECURITY TO CLOUD DATA STORAGE

Multi-Owner Data Sharing in Cloud Storage Using Policy Based Encryption

Cloud Data Service for Issues in Scalable Data Integration Using Multi Authority Attribute Based Encryption

Decentralized Access Control Secure Cloud Storage using Key Policy Attribute Based Encryption

Experiments in Encrypted and Searchable Network Audit Logs

Authorized Auditing of Big Data Stored on Cloud with Auditability Aware Data Scheduling

Time-Based Proxy Re-encryption Scheme for Secure Data Sharing in a Cloud Environment

Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud

Implementation of Role Based Access Control on Encrypted Data in Hybrid Cloud

Highly Secure Data Sharing in Cloud Storage using Key-Pair Cryptosystem

Secure Alternate Viable Technique of Securely Sharing The Personal Health Records in Cloud

A Comparative Study of Applying Real- Time Encryption in Cloud Computing Environments

SECURITY FOR ENCRYPTED CLOUD DATA BY USING TOP-KEY TREE TECHNOLOGIES

Survey on Efficient Information Retrieval for Ranked Query in Cost-Efficient Clouds

AN EFFICIENT AUDIT SERVICE OUTSOURCING FOR DATA IN TEGRITY IN CLOUDS

Enabling Protection and Well-Organized MRSE over Encrypted Cloud Data Using CP-ABE

A SECURE CLOUD WITH ADDITIONAL LAYER OF PROTECTION AND USER AUTHENTICATION

A SELF-DESTRUCTION SYSTEM FOR DYNAMIC GROUP DATA SHARING IN CLOUD

SECURITY ENHANCEMENT OF GROUP SHARING AND PUBLIC AUDITING FOR DATA STORAGE IN CLOUD

A Survey on Scalable Data Security and Load Balancing in Multi Cloud Environment

preliminary experiment conducted on Amazon EC2 instance further demonstrates the fast performance of the design.

Enabling Public Auditability, Dynamic Storage Security and Integrity Verification in Cloud Storage

Verifying Correctness of Trusted data in Clouds

Secure Privacy Preserving Public Auditing for Cloud storage

Chapter 2 Taxonomy and Classification of Access Control Models for Cloud Environments

Cryptographic Encryption to the Personal Medical Information in Cloud

ASurveyonEncryption andimprovedvirtualizationsecuritytechniquesforcloudinfrastructure

RSA BASED CPDP WITH ENCHANCED CLUSTER FOR DISTRUBED CLOUD STORAGE SERVICES

Transcription:

IMPLEMENTATION OF NETWORK SECURITY MODEL IN CLOUD COMPUTING USING ENCRYPTION TECHNIQUE 1 Rajesh L Gaikwad, 2 Dhananjay M Dakhane, 3 Ravindra L Pardhi M.E Student, Associate Professor, Assistant Professor, Dept of Computer Science and Engineering Sipna College of Engineering and Technology, Amravati, Maharashtra, India. Email : 1 rssv06@gmail.com, 2 ddakhane@gmail.com, 3 rlpardhi@gmail.com Abstract Now a day s cloud computing services will play high role in corporate business. It provides different service-oriented cloud computing models that have been proposed, including Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). This data provides needs to increasing security and privacy concerns on outsourced data. Many methods are proposed for access control of outsourced data in cloud computing; however, most of them suffer from inflexibility in implementing complex access control policies. This paper implements network security model using encryption for clouding computing. There are various older methods of security but are not enough secured like single sign on methods and various methods that are proposed using firewalls. Cloud computing requires flexible, fined grained access control so that the cloud user can rely on it. Index Terms access control, flexibility, scalability, encryption. I. INTRODUCTION Cloud computing is a new paradigm that builds a virtualization, parallel and distributed computing, utility computing and service oriented architecture. Now days cloud computing is emerged service, that provides lot of benefits including the cost and capital expenditures, increased operational efficiencies, scalability and flexibility so on. Different cloud computing service providers provide the service oriented services such as Infrastructure as a service (IaaS), Platform as a service (PaaS) and Software as a Service (SaaS). Based on this services IT industry will get fine state of infrastructure on the hardware/software and maintenances should be very easy. They save the cost on the Infrastructure and human resources. Although the great benefits brought by cloud computing paradigm are exciting for IT companies, academic researchers, and potential cloud users, security problems in cloud computing become serious obstacles which, without being appropriately addressed, will prevent cloud computing extensive applications and usage in the future. One of the prominent security concerns is data security and privacy in cloud computing is due to its Internet- based data storage and management. The benefits of cloud computing will get lot of works from those work we considered a major problem is the security for the cloud data from users access limits and authorization service. The major constriction of our work will provide securable and with specific access control along with authentication and maintain the data security. To provide the data security there several works available, those works will be majorly on attribute based encryption and access control solutions. Here we are making an attempt to implement a network security model proposed as the Hierarchy Attribute Set Based Encryption (HASBE).it is expected that the HASBE network security model will prove highly scalable, flexible and fine grade in access control. II. LITERATURE REVIEW AND RELATED WORK To provide the security and better access control we have several existing works available, those work will be major constrain on two process, those are Attribute Based Encryption (ABE) and Access Control Solutions. Attribute Based Encryption The Attribute Based Encryption method will propose by Sahai and Waters [1], a new method fuzzy identification based encryption. The draw backs of this scheme are lack of threshold semantics. The ABE scheme ciphertexts are not encrypted to one particular user as traditional public keys cryptography and user capable to decrypt the decryption key and cipher text key while matching the values. The ABE scheme will classified as the Key Policy Attribute Based Encryption (KP-ABE) and Cipher text Policy Attribute Based Encryption (CP-ABE). KP-ABE [2], cipher texts is associated with a set of attributes and user s decryption key is associated with a 51

monotonic tree access structure. Only if the attributes associated with the ciphertexts satisfy the tree access structure, can the user decrypt the cipher texts. CP-ABE scheme [3], the roles of cipher texts and decryption keys are switched, the ciphertexts is encrypted with a tree access policy chosen by an encryptor, while the corresponding decryption key is created with respect to a set of attributes. As long as the set of attributes associated with a decryption key satisfies the tree access policy associated with a given ciphertext, the key can be used to decrypt the ciphertext. Bobba et al [6] introduces ciphertext policy attribute based encryption to organize the user attributes into a recursive set structure. The drawback of this approach it will hold the private key and not able to combine the attributes sets. Access Control Solutions Yu et al [4] proposed access control scheme based on the KP-ABE, this approach is fine- gradient for the access control and scalable. In this approach use they specific symmetric data encryption key ( DEK), this DEK will access generate a public key corr esponding the KP- ABE, the key is generated according to structure of access. The files to upload the cloud with the encrypted format and data user will decrypt the file use DEK. The draw backs of this approach are encryptor will not able to decide who can decrypt the file. Wang et al [5] proposed Hierarchical Attributed Based Encryption (HABE) to achieve the fine-grained access control in cloud storage by services combining HIBE and CP-ABE. The problem in this scheme is the same attribute may be administrated by multiple domain masters according to specific policies, which is difficult to implement in practice. Furthermore, compared with ASBE, this scheme cannot support compound attributes efficiently and does not support multiple values assignments. III. ANALYSIS OF PROBLEM Figure 1: System Model As shown in System Model Figure I, The computation complexity for each system operation in our scheme is as follows. System Setup: The System Setup calls the trusted authority, select the domain authority and generate the random number. To generate random number we apply several computational, the time complicity of system set up is O(1). Top Level Domain Authority Grant: This operation will do by trusted authority to generate the master key for the domain authority. MKi =( A, D, D ij, Dˊii, for all aij belongs to A, Ei for Ai belongs to A ). The time complexity of the this process is O(2N+M). New User/Domain Authority Grant: This operation will create a new user or domain authority along with the attribute sets. These operations do by the trusted authority. The time complexity of the process is O(2N+M), where N is the number of attributes in the set of the new user or domain authority, and M is the number of sets in A. New File Creation: This operation does by the data owner; to do this work we need the DEK to encrypt the file. The time complexity of this process is O(2 Y + X ) where Y denotes the leaf nodes and X denotes the translating nodes in tree access structure. User Revocation: This operation will do by the domain authority to maintain the user keys and encrypt the data files. The time complexity of this process is O(1). File Access: This operation will do by the data consumer and this will test for the decryption algorithm process. The decryption process will impact on the scalability. File Deletion: This operation will do by the cloud provider based on the data owner s request. The time complexity of this process is O(1). IV. SYSTEM ANALYSIS Cloud computing is a new paradigm that builds a virtualization, parallel and distributed computing, utility computing and service oriented architecture. Now days cloud computing is emerged service, the cloud computing providing lot of benefits include the cost and capital expenditures, increased operational efficiencies, scalability and flexibility so on. Differ from the cloud computing provide the service oriented services such as Infrastructure as a service (IaaS), Platform as a service 52

(PaaS) and Software as a Service (SaaS). Based on this services IT industry will get fine state on the hardware/software maintenances should be very easy to state. They save the cost on the Infrastructure and human resources. Although the great benefits brought by cloud computing paradigm are exciting for IT companies, academic researchers, and potential cloud users, security problems in cloud computing become serious obstacles which, without being appropriately addressed, will prevent cloud computing extensive applications and usage in the future. One of the prominent security concerns is data security and privacy in cloud computing due to its Internet- based data storage and management. The benefits of cloud computing will get lot of works from those work we considered a major problem is the security for the cloud data from users access limits and authorization service. The major constriction of our work will provide securable and with specific access control along with authentication and maintain the data security. To provide the data security there several works available, those works will be majorly on attribute based encryption and access control solutions. Here we propose the Hierarchy Attribute Set Based Encryption (HASBE). The HASBE will prove high scalable, flexible and fine grade in access control. A. Existing System The major problem in the clod computing is sharing the resources to all service requester either the requester should be same trusted authority or some other trusted authority, the second problem is providing data effectively when the service requested for the resources on the domain authority, third problem is providing security for the sensitive data from the third party vendors access limitations. To resolve these problems some existing schemes are available those details will observe on the following section. B. Access control Access control is security constrain based on this model several models available, the most effective two techniques are Bell-La Padila and BiBa, this techniques are flexible and fine grained access control. Some other approaches on access control are Principal of Policy in Secure group, Methods and limitations of security policy reconciliation etc. Unfortunately, these schemes are only applicable to systems in which data owners and the service providers are with in the same trusted domain. C. Attribute Based Encryption Attribute based Encryption is technique to resolve the problem of the access control process, on this approach we have some existing systems those are Attribute based encryption for fine grained access control of encrypted data and Achieving secure, scalable, and fine grained data access control in cloud computing. This scheme falls short of flexibility in attribute management and lacks scalability in dealing with multiple-levels of attribute authorities. D. Proposed System To resolve the problems of existing work we propose a new approach is Hierarchy Attribute Set Based Encryption (HASBE), this approach is extension work for the Ciphertexts Policy Attribute Set Based Encryption (CP-ASBE or ASBE). The propose work will solve the problems of access control and scalable. This work will majorly process access control system using the following parameters; they are cloud services provider, data owners, data consumers, domain authorities and trusted authority. The cloud service provider manages the cloud as the private data storage service. Data owners encrypt the files and store them in the cloud for sharing with data consumers. Data consumers access the files and download the encrypted files and decrypt the files. The Data owner/consumer will administrated by the domain authority. The trusted authority is the root authority and responsible for manage the domain authorities. V. SYSTEM ARCHITECTURE E. System Modules Figure 2: System Architecture Trusted Authority Domain Authority Data Owner Data Consumer Cloud Service Provider Trusted Authority The Trusted Authority is responsible to system set up, top level domain authority grant; create domain authority and key update. The system set up process to create the public key and master key with considering the attribute sets range i.e depth, the hierarchy of domain services. The trusted authority create the domain with the unique id, before assign the unique to a domain it will check is valid 53

domain or not if valid domain it will call the create domain authority function. The create domain authority function will give the unique id to create domain. Then the domain authority will able to create the sub domain and the users. Domain Authority The Domain Authority will able the create the new domain authority and new users, the domain authority created domains will be considering the sub domain authority, these domains authority will give the depth of the access tree structures, The each domain authority also able to create users, the user should a data owner or data consumer. To create the users it will having the functions create user. The domain authority is also able to remove the users. Data Owner The data owner able to create file, encrypt file, re-encrypt file, file deletion permissions. The data owner to create a file, accept a unique id to the file and by using the encryption process encrypt the file and make tree structure access and store in the cloud. The data owner want to re encrypt file, it s possible with the accessing the file with the unique id and tree structure format. The data owner will also able to delete the file. Data Consumer The data consumer will created by the domain authority, data consumer is able to access the cloud data by data owners provide, to access the data they need a key to access the file on the cloud, the key is provided by the domain authority. To get that key the data consumer needs to send the request to the domain authority, the domain authority checks the permissions then provide key. The key will contain the information of the file and decryption key value and access structure of the file. The data consumer will access the file by using the tree structure and unique id, and the data should read the file decrypt the file with the references of the decryption key. Cloud Service Provider The cloud service provider manages a cloud to provide the data storage services. Introduction VI. SYSTEM DESIGN This chapter describes the system designs in the form system architecture, modules, dataflow diagram; use case diagram, sequential diagram and collaboration diagram. It is also explain the software and hard ware requirement to perform the system execution. Data Flow Diagrams: A data flow diagram (DFD) is a graphic representation of the flow of data through an information system, modeling its process aspects and it is an important technique for modeling a system s high level detail by showing how input data is transformed to output results through sequence of functional transformations. DFD s provide a detailed representation of system components which are easier to understand by technical and non-technical audiences. Data Flow Diagram for Trusted Authority The figure 3 will give the description about data fallow diagram or trusted authority. The Trusted Authority is responsible to system set up, top level domain authority grant; create domain authority and key update. The system set up process to create the public key and master key with considering the attribute sets range i.e depth, the hierarchy of domain services. The trusted authority create the domain with the unique id, before assign the unique to a domain it will check is valid domain or not if valid domain it will call the create domain authority function. The create domain authority function will give the unique id to create domain. Then the domain authority will able to create the sub domain and the users. False Start System Set Up Top level domain authority grant Is Valid Domain True Create Domain Grant Resources Figure 3 Data Flow Diagram for Trusted Authority 54

Data Flow Diagram for Domain Authority The figure 4 gives the description of data flow diagram for Domain Authority. The Domain Authority will able the create the new domain authority and new users, the domain authority created domains will be considering the sub domain authority, these domains authority will give the depth of the access tree structures, The each domain authority also able to create users, the user should a data owner or data consumer. To create the users it will having the functions create user. The domain authority is also able to remove the users. The figure 5 will gives description of data flow diagram for data owner. The data owner able to create file, encrypt file, re-encrypt file, file deletion permissions. The data owner to create a file, accept a unique id to the file and by using the encryption process encrypt the file and make tree structure access and store in the cloud. The data owner want to re encrypt file, it s possible with the accessing the file with the unique id and tree structure format. The data owner will also able to delete the file. Start Star t Manage Services Process Request Input Data File New User/D omain Is New User/ Access Key? Access Key Encrypt Collect Unique Id Encrypt/ Re encrypt? Collect File from Cloud Re-Encrypt Create Domain/ User T Is Authorize F Encrypt File Re Encrypt File Grant Resources Provide Access Key Set Tree Access Structure Update File in cloud Store File in cloud Figure 4 Data flow diagram for Domain Authority Data Flow Diagram for Data Owner Figure 5 Data Flow Diagram for Data Owner 55

Data Flow Diagram for Data Consumer The figure 6 gives the description about data flow diagram for data consumer. The data consumer will crated by the domain authority, data consumer is able to access the cloud data by data owners provide, to access the data they need a key to access the file on the cloud, the key is provided by the domain authority. To get that key the data consumer needs to send the request to the domain authority, the domain authority checks the permissions then provide key. The key will contain the information of the file and decryption key value and access structure of the file. The data consumer will access the file by using the tree structure and unique id, and the data should read the file decrypt the file with the references of the decryption key. Figure 6 Data Flow Diagram for Data Consumer HARDWARE AND SOFTWARE REQUIREMENTS FOR IMPLEMENTATION OF NETWORK SECURITY MODEL Hardware Specifications The hardware used for the development of the project is: Processor Start Access Resources Collect Access Key Get Data from Cloud Decrypt file : Pentium IV Ram : 1 GB Hard Disk : 80GB Software Specifications The software used for the development of the project is: Operating Systems Web Server : WIndows XP/2007 : Tomcat Languages : JAVA, JSP, Servlets, API Java-cryptography Database : MS-SQL Server 2000 VII. CONCLUSION This paper has focused on implementation of Network Security model for cloud computing using Hierarchical Attribute set based encryption technique which is considered to be scalable, flexible and role-based in multiple domains access control. REFERENCES [1] Sahai and B. Waters, Fuzzy identity based encryption, in Proc. Acvances in Cryptology Eurocrypt, 2005, vol. 3494, LNCS, pp. 457 473. [2] V. Goyal, O. Pandey, A. Sahai, and B.Waters, Attibute -based encryption for fine-grained access control of encrypted data, in Proc. ACM Conf. Computer and Communications Security (ACM CCS), Alexandria, VA, 2006. [3] J. Bethencourt, A. Sahai, and B. Waters, Ciphertext-policy attributebased encryption, in Proc. IEEE Symp. Security and Privacy, Oakland, CA, 2007. [4] S. Yu, C. Wang, K. Ren, and W. Lou, Achiving secure, scalable, and fine -grained data access control in cloud computing, in Proc. IEEE INFOCOM 2010, 2010, pp. 534 542. [5] G.Wang, Q. Liu, and J.Wu, Hierachical attibute -based encryption for fine-grained access control in cloud storage services, in Proc. ACM Conf. Computer and Communications Security (ACM CCS), Chicago, IL, 2010. [6] R. Bobba, H. Khurana, and M. Prabhakaran, Attribute -sets: A practically motivated enhancement to attribute-based encryption, in Proc. ESORICS, Saint Malo, France, 2009. [7] HASBE: A Hierarchical Attribute-Based Solution for Flexible and Scalable Access Control in Cloud Computing [8] Zhiguo Wan, Jun e Liu, and Robert H. Deng, Senior Member, IEEE. 56