Secure Cloud Architecture for Preserving Privacy in Cloud Computing using OTPWTP



Similar documents
A Review of Cloud Environment and Recognition of Highly Secure Public Data Verification Architecture using Secure Public Verifier Auditor

Security in Database Systems

Implementing Cloud Data Security by Encryption using Rijndael Algorithm

Keywords : audit, cloud, integrity, station to station protocol, SHA-2, third party auditor, XOR. GJCST-B Classification : C.2.4, H.2.

Global Journal of Computer Science and Technology

Data Integrity for Secure Dynamic Cloud Storage System Using TPA

Cloud Data Storage Services Considering Public Audit for Security

ASurveyonEncryption andimprovedvirtualizationsecuritytechniquesforcloudinfrastructure

Information Security Basic Concepts

Survey on Enhancing Cloud Data Security using EAP with Rijndael Encryption Algorithm

Dynamic Query Updation for User Authentication in cloud Environment

A Critical Investigation of Botnet

AStudyofEncryptionAlgorithmsAESDESandRSAforSecurity

Cryptographic Data Security over Cloud

International Journal of Advance Foundation and Research in Computer (IJAFRC) Volume 2, Special Issue (NCRTIT 2015), January 2015.

ADVANCE SECURITY TO CLOUD DATA STORAGE

Technical Safeguards is the third area of safeguard defined by the HIPAA Security Rule. The technical safeguards are intended to create policies and

REGULATIONS FOR THE SECURITY OF INTERNET BANKING

Standard: Information Security Incident Management

Evaluation of different Open Source Identity management Systems

Monalisa P. Kini, Kavita V. Sonawane, Shamsuddin S. Khan

Keywords : complexity, dictionary, compression, frequency, retrieval, occurrence, coded file. GJCST-C Classification : E.3

Index Terms: Cloud Computing, Third Party Auditor, Threats In Cloud Computing, Dynamic Encryption.

A survey on cost effective multi-cloud storage in cloud computing

Privacy-preserving Digital Identity Management for Cloud Computing

Sharing Of Multi Owner Data in Dynamic Groups Securely In Cloud Environment

Information Security

A Secure Authenticate Framework for Cloud Computing Environment

nwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4.

International Journal of Advanced Research in Computer Science and Software Engineering

AgileSoftwareDevelopmentandTestingApproachandChallengesinAdvancedDistributedSystems

A Survey on Secure Storage Services in Cloud Computing

A Survey on Security Issues and Security Schemes for Cloud and Multi-Cloud Computing

An Efficient Windows Cardspace identity Management Technique in Cloud Computing

6. AUDIT CHECKLIST FOR NETWORK ADMINISTRATION AND SECURITY AUDITING

Security Analysis of Cloud Computing: A Survey

Journal of Electronic Banking Systems

Cloud Computing: Provide privacy and Security in Databaseas-a-Service

DEPARTMENTAL POLICY. Northwestern Memorial Hospital

Ensuring Security in Cloud with Multi-Level IDS and Log Management System

Whitepaper on AuthShield Two Factor Authentication with ERP Applications

APPENDIX G ASP/SaaS SECURITY ASSESSMENT CHECKLIST

Proactive Credential Monitoring as a Method of Fraud Prevention and Risk Mitigation. By Marc Ostryniec, vice president, CSID

An Efficient Emergency, Healthcare, and Medical Information System

Connected from everywhere. Cryptelo completely protects your data. Data transmitted to the server. Data sharing (both files and directory structure)

Secure Authentication of Distributed Networks by Single Sign-On Mechanism

Scientific Journal Impact Factor (SJIF): 1.711

PRIVACY-PRESERVING PUBLIC AUDITING FOR SECURE CLOUD STORAGE

Secure Data Sharing in Cloud Computing using Hybrid cloud

CRYPTANALYSIS OF A MORE EFFICIENT AND SECURE DYNAMIC ID-BASED REMOTE USER AUTHENTICATION SCHEME

MULTI LAYERS INTERFERENCE DETECTION SYSTEM IN WEB BASED SERVICES

HYBRID ENCRYPTION FOR CLOUD DATABASE SECURITY

Threat Modeling. 1. Some Common Definition (RFC 2828)

Privacy preserving technique to secure cloud

A Secure & Efficient Data Integrity Model to establish trust in cloud computing using TPA

Cloud Database Storage Model by Using Key-as-a-Service (KaaS)

MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE

On the Limits of Anonymous Password Authentication

RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM

An Implementation of RSA Algorithm in Google Cloud using Cloud SQL

An Enhanced Countermeasure Technique for Deceptive Phishing Attack

Privacy Preservation and Secure Data Sharing in Cloud Storage

Clustering on Large Numeric Data Sets Using Hierarchical Approach Birch

GSM Based Operating of Embedded System Cloud Computing, Mobile Application Development and Artificial Intelligence Based System

How To Ensure Correctness Of Data In The Cloud

HIPAA: MANAGING ACCESS TO SYSTEMS STORING ephi WITH SECRET SERVER

Secure Collaborative Privacy In Cloud Data With Advanced Symmetric Key Block Algorithm

Volume I, Appendix C Table of Contents

NETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015

DATA SECURITY IN CLOUD USING ADVANCED SECURE DE-DUPLICATION

Keywords Cloud Storage, Error Identification, Partitioning, Cloud Storage Integrity Checking, Digital Signature Extraction, Encryption, Decryption

N TH THIRD PARTY AUDITING FOR DATA INTEGRITY IN CLOUD. R.K.Ramesh 1, P.Vinoth Kumar 2 and R.Jegadeesan 3 ABSTRACT

Big Data, Big Risk, Big Rewards. Hussein Syed

Banking Security using Honeypot

SECURITY ENHANCEMENT OF GROUP SHARING AND PUBLIC AUDITING FOR DATA STORAGE IN CLOUD

How To Design A Cloud Data Storage Service For A Cloud Computer System

BUCKEYE EXPRESS HIGH SPEED INTERNET SERVICE ACCEPTABLE USE POLICY

Remote Access Securing Your Employees Out of the Office

HIPAA 203: Security. An Introduction to the Draft HIPAA Security Regulations

Keywords-- Cloud computing, Encryption, Data integrity, Third Party Auditor (TPA), RC5 Algorithm, privacypreserving,

IDRBT Working Paper No. 11 Authentication factors for Internet banking

Digital Certificate for Corporate Internet Banking - User Guide

Content Teaching Academy at James Madison University

EVALUATION GUIDE. Evaluating a Self-Service Password Reset Tool. Usability. The password reality

Telephony Calls over Bluetooth. By Ajinkya Salunke, Prashant Shelke & Apurva Sahasrabudhe Sinhgad college of Engineering, Pune

Chapter 1: Introduction

User Authentication Guidance for IT Systems

Volume 12 Issue 4 Version 1.0 Fabruary 2012 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals Inc.

Build (develop) and document Acceptance Transition to production (installation) Operations and maintenance support (postinstallation)

Transcription:

Global Journal of Computer Science and Technology Cloud and Distributed Volume 13 Issue 3 Version 1.0 Year 2013 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals Inc. (USA) Online ISSN: 0975-4172 & Print ISSN: 0975-4350 Secure Cloud Architecture for Preserving Privacy in Cloud Computing using OTP/WTP By Dr. Sandeep Sharma & Navdeep Kaur Khiva Pune University, India Abstract - The main objective of the proposed architecture is preserving the privacy of the information ensuring that this information cannot be misused. In this paper we have proposed secure cloud architecture to address the user privacy problem in a cloud. By using OTP and WTP in cloud computing system, our proposed architecture achieves better goal of preserving the privacy of a user. GJCST-B Classification : C.2.4 Secure Cloud Architecture for Preserving Privacy in Cloud Computing using OTPWTP Strictly as per the compliance and regulations of: 2013. Dr. Sandeep Sharma & Navdeep Kaur Khiva. This is a research/review paper, distributed under the terms of the Creative Commons Attribution-Noncommercial 3.0 Unported License http://creativecommons.org/licenses/by-nc/3.0/), permitting all noncommercial use, distribution, and reproduction inany medium, provided the original work is properly cited.

Secure Cloud Architecture for Preserving Privacy in Cloud Computing using OTP/WTP Dr. Sandeep Sharma α & Navdeep Kaur Khiva σ Abstract - The main objective of the proposed architecture is preserving the privacy of the information ensuring that this information cannot be misused. In this paper we have proposed secure cloud architecture to address the user privacy problem in a cloud. By using OTP and WTP in cloud computing system, our proposed architecture achieves better goal of preserving the privacy of a user. I. Introduction C loud computing is an On-demand self-service Internet infrastructure where a customer can pay and use only what is needed, managed by an API. The SP plays an active role in transmitting information across the cloud. Privacy for the information through authentication is being considered important. [5] People can only enjoy the full benefits of Cloud computing if there can address the very real privacy and security concerns that come along with storing sensitive personal information in databases and software scattered around the Internet. There are many service provider in the internet, can call each service as a cloud, each cloud service will exchange data with other cloud, so when the data is exchanged between the clouds, there exist the problem of disclosure of privacy. So the privacy disclosure problem about individual or company is inevitably exposed when releasing or sharing data in the cloud service. Privacy is an important issue for cloud computing, both in terms of legal compliance and user trust, and needs to be considered at every phase of design. [6] Privacy means that the person to be free from all interference. Privacy control allows the person to maintain a degree of intimacy.[2] Privacy is the protection for the truthful use of personal information of cloud user. Privacy breaches may create a lot of troubles to cloud users. As more and more sensitive data are shared and stored in the cloud, data security and privacy have been considered as a thorniest problem that may impede the growth of cloud computing. Since all the resources are provided over the Internet, the cloud becomes a single point of access for all the users. The different scenarios are: Authors α σ : Dept of CSE, GNDU, GT Rd, Off NH1, Amritsar(PB)- 143005, India. E-mails : sandeep_gndu@yahoo.com, navdeep07khiva@gmail.com a) From the perspective of Individuals connecting to the cloud: [4] Maximizing individual user control, creating anonymous services for individual users, creating facilities for the use of multiple identities and limiting identity information and authentication to high level transactions are the privacy issues which have to be guaranteed for an individual to feel that the privacy of information submitted to the cloud is ensured. b) From the perspective of Cloud computing service providers: [4] Providing facilities for maintaining anonymity of personal information, encryption of data if it contains personal information, compartmentalizing data processing and storage, controlling unique identifiers, managing explicitly the privacy and security requirements between the cloud service providers are the major privacy issues from the point of view of the cloud service provider. II. Earlier Approach The user might give his/her identity of proof certificate [1] willingly to a person of his/her trust. There might be a case where there is a breach of trust. Hence your secure key lies in the unauthorized person. There might be a case where proof of identity is stolen. In both the cases, the IOP is in the unauthorized person and there might be a case of illegal intrusion. If IOP certificate is with the unauthorized person, it could be misused to any extent which may prove to be harmful. The personal information and data is now available to the intruder and could be accessed at his/her wish. This information or data could be used in an unethical manner which might harm the credibility of the user. A careful analysis of literature on the variants and methodologies of privacy preserving in cloud computing reveals the following: Some of the variants of privacy problem are yet to be explored. It includes the problems of misuse of the proof of identity (POI) certificate if fallen into unauthorized person. So this leads us to draft out a scheme or method so that if POI certificate is with unauthorized person, he/she cannot take advantage of it by making some changes to sign in process. Global Journal of Computer Science and Technology ( D B ) Volume XIII Issue III Version I Year 2 013 15

In a cloud network, once the user has finished with the sign up process, he/she is provided with the POI certificate using which he/she could sign in and access the information as required. But here arises a problem that what would happen if this POI certificate falls in wrong hands. So here comes an objective to make the sign in process secure enough to prevent an intrusion and keeping the sign in process simple enough to the user as per his/her need. Year 2 013 16 III. Proposed Architecture The architecture consists of four main components: the third party website, the cloud Service Provider, the User, and the third party database. Global Journal of Computer Science and Technology ( D B ) Volume XIII Issue III Version I Figure 1 : Proposed Secure Cloud Architecture An OTP (one-time password) is a password that is valid for only one login session or transaction. WTP (weekly-time password) is a password valid for a week. a) User Sign up Process This new technique of user sign up has been added with the feature of OTP and WTP by which the users can decide upon their type of usability and security. A non frequent user uses OTP (one time password) and always gets the new password for each access and hence providing security with each access. A frequent user go for WTP(weekly time password) so that the user need not change the password on each access rather weekly. Figure 2 : User Sign Up for Cloud Service The user sign up process starts with user sign up interface where the user enters its personal and protected information. This information moves for verification to the user database. Once verified, the user proceeds to deciding the type of usability and accordingly the security whether it s an OTP or WTP. The users make their choice depending upon their frequency of sign in and whether to go for OTP or WTP. Once the choice has been made, an OTP/WTP database is updated and their respective OTP/WTP is conveyed securely via E-mail. This password can be used by user to sign in. b) User Accessing Cloud Services To access cloud services the users sign in using digital signature or by using OTP/WTP. Request is generated to cloud regarding the access. The CSPs accepts the requests and verifies the certificate and OTP/WTP from user database and proceeds. Any discrepancy regarding the mismatch of certificate and OTP/WTP, user again needs to provide the sign in information. Once OTP/WTP is verified, they check its validity. If OTP/WTP is valid and if the user is authenticated and then an ok signal is sent to the third party service which allow user to use the service. If authentication fails, a new OTP/WTP is generated and sent to the user through e-mail and mobile, and again make a request to access the CSPs.

5. Now it s the turn of the patient to generate the OTP/ WTP. Now the patient will sign up in the NHS to get the password to see their tests report. By this the patients gets the password on their respective e-mail. Figure 3 : User accessing cloud services A one-time password (OTP) is a password that is valid for only one login session or transaction. OTPs avoid a number of shortcomings that are associated with traditional (static) passwords. The most important shortcoming that is addressed by OTPs is that, in contrast to static passwords, they are not vulnerable to replay attacks. This means that a potential intruder who manages to record an OTP that was already used to log into a service or to conduct a transaction will not be able to abuse it, since it will be no longer valid. On the downside, OTPs are difficult for human beings to memorize. Therefore they require additional technology to work. c) Hospital Management System In this scenario, two sites are built: one is Medical Health Service/National Health Service (MHS/NHS) and another is the Laboratory Service (LS). The actual scenario and its working is explained below: 1. First of all, the patients go to meet the doctor for the treatment. Doctor checks them and asks for some tests which are done by the Laboratory. 2. The patient has to give the personal information to the admin of the NHS so that he/she can add it into the database of NHS and gets the NHSId. 3. Admin logs in and adds the personal information of the patient into the database given by the patient and sends the NHSId to their respective e-mail. 4. Then an employee of the laboratory logs in and adds the patient s tests report into the database of LS. After that an employee of laboratory gives the PatientId (PId) to the patient. Figure 4 : Hospital Management System An OTP (one-time password) is a password that is valid for only one login session or transaction.[5] WTP (weekly-time password) is a password valid for a week. A non frequent user uses OTP and always gets the new password for each access and hence providing security with each access. Frequent users go for WTP so that the user need not change the password on each access rather weekly. 6. Patient logs in to the LS by entering the NHSId, PId and password and gets the test reports. IV. Experimental Results To test this architecture we have built a National Health Service cloud with secure authentication. As the admin logs in, he will create the clients account and enter his details which were given by the patient and then patient gets the National Health Service Id (NHSId) on their respective e-mail. The employee of the laboratory then logs into the laboratory service (LS). He will enter the test results of the patient and give one ID of the LS as PatientId (PId) to the patient. Patient will log in to the National Health Service to generate their type of usability i.e. OTP or WTP. After getting the NHSId, PatientId and the password which was send on mail can logs into the LS and see the test reports. V. Conclusion and Future Work Data privacy is one of the biggest challenges in Cloud Computing. By the introduction of the OTP/ WTP password protection schemes, the privacy of the user will now be assured to a great extent. The OTP provides a user new password each time and WTP provides the Global Journal of Computer Science and Technology ( D B ) Volume XIII Issue III Version I Year 2 013 17

task for a frequent user to use OTP so he/she would opt for WTP. In future, this proposed model could be used to get the secure cloud computing environment which would be a great enhancement in the privacy preservation. References Références Referencias Year 2 013 18 Global Journal of Computer Science and Technology ( D B ) Volume XIII Issue III Version I 1. Bertino, E.; Paci, F.; Ferrini, R. 2009 Privacypreserving Digital Identity Management for Cloud Computing, IEEE Computer Society Technical Committee on Data Engineering. 2. Wang, B.; Baochun; Wang, H. L. 2012 Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud, IEEE Fifth International Conference on Cloud Computing, 2012 IEEE, DOI 10.1109/ CLOUD.2012.46. 3. Yassin, A. A.; Jin, H.; Ibrahim, A.; Qiang, W.; Zou, D. 2012. A Practical Privacy-preserving Password Authentication Scheme for Cloud Computing, IEEE 26th International Parallel and Distributed Processing Symposium Workshops & PhD Forum, 2012 IEEE, DOI 10.1109/IPDPSW.2012.148. 4. Syed, M. R.; and F, Mohammad; PccP: A Model for Preserving Cloud Computing Privacy, 2012 International Conference on Data Science & Engineering (ICDSE), 2012 IEEE. 5. D Jayalatchumy, P Ramkumar, and D Kadhirvelu, Preserving Privacy through Data Control in a Cloud Computing Architecture using Discretion Algorithm, Third International Conference on Emerging Trends in Engineering and Technology, 2010 IEEE, DOI 10.1109/ICETET.2010.103. 6. W, Jian; Y, Wang; J, Shuo and Le, Jiajin; Providing Privacy Preserving in cloud computing, 2009 International Conference on Test and Measurement, 2009 IEEE, ICTM 2009. 7. Wikipedia-One-time_password