Secure Cloud using Homomorphic Encryption for Shared Data in Cloud Shambhu KumarSingh

advertisement
International Conference on Global Trends in Engineering, Technology and Management (ICGTETM-2016)
Secure Cloud using Homomorphic Encryption for Shared
Data in Cloud
Shambhu KumarSingh1, P. P. Rewagad2, Swati Patil3
Research Scholar, Department of Computer Science and Engineering, GHRIEM, Jalgaon, Indi 1
Assistant Prof., Department of Computer Science and Engineering, GHRIEM, Jalgaon, Indi2
Assistant Prof., Department of Computer Science and Engineering, GHRIEM, Jalgaon, Indi 3
usefulness computing describe a business model for
on-demand release of computing power; customers
pay provider based on usage, like to the way in which
we now get service from conventional public utility
services such as water resource, electricity resource,
gas resource and telephony. Cloud computing has
been coined as an umbrella term to explain a grouping
of primitive on-demand computing service initially
offered by marketable providers, such as Amazon,
Google, oracle and Microsoft. It denotes a model on
which a computing communications is viewed as a
“Cloud” from which businesses and individual access
applications from anyplace from anywhere in the
world on demand [2]. The main principle behind this
model is contribution computing, storage services, and
software “as a service”. We can say that lots of
problem connected with cloud computing resources
such as traffic, security and resource supervision. We
can provide security in cloud by many ways like on
data resources, network resources and storage
resources. Homomorphic encryption method provides
more security on data because contributor is not
involving in key supervision. We have use proxy reencryption technique and unique colors combination
technique that prevents ciphertext from chosen cipher
text attack [3]. This model is more secure than
Keywords: Cloud Computing, Cloud computing existing system [11]. Cloud computing we mean: The
Security, Homomorphic Encryption, RSA based Information Technology (IT) model for computing
resources, which is collected of all the IT components
Encryption Techniques
(hardware, software, networking, storage, and services)
that are necessary to enable expansion and delivery of
I. INTRODUCTION
When plug electrical device into a passage we care cloud services via the Internet Intranet or a private
neither how electric power is generated nor how it gets network. This description has no notion of security for
to that passage. This is probable because electricity is data in the cloud computing services even if it's a very
virtualized; it is willingly available from a wall socket new concept. Different Cloud providers like: IBM,
that hides power production stations and a huge Google, Oracle, VMware and Amazon use the
allotment grid. When extended to information virtualization in their Cloud computing platform, and
technologies, these notions means deliver useful in the same machine can exist the storage space and
function while hiding how their interior works. management virtualized which belongs to concurrent
Computing technique itself, to be well thought-out enterprise [3]. Cloud computing includes; the whole
fully virtualized, must allow computers to be built thing is delivered as a Service (XaaS), commencing
from spread components such as processing, storage, testing and security, to association and Meta modeling.
The cloud was rapidly becoming a conflagration of
data, network and software resources [1].
buzzword “as a service”.
Technologies such as cluster computing, grid
There are three main service models, which are
computing, and today cloud computing, have all
approved on and defined in the NIST document [10].
meant at allow access to huge amounts of c power of
1. Software as a Service– Applications is inherent in
computing techniques that are fully virtualized manner,
on the top of the cloud stack. Application provide by
by aggregate possessions and contribution of a single
this layer can be accessed by end users throughout
machine view. In adding, an important aim of these
web portals. Hence, clients are increasingly changing
technologies has been deliver computing as usefulness.
Abstract— Computing is a assurance computing
technology where all the services are used either
offline or via Internet. Today cloud computing played
vital role in computing where all the services are
provided through Internet .Today it has seen
increasing charisma of storing and running personal
data on the cloud. So providing confidentiality of
personal data becomes one of the challenges. We all
know the demand for isolation of data of enterprise
has increased massively. For this purpose different
types data encryption methods are used. However a
serious problem arises when there is a need of
mathematical computation on encrypted data where
security is established. At that time homomorphic
encryption techniques can be used. In this paper we
propose the model that perform the operation on
encrypted data and provides the same result on
without encrypted data as well as encrypted data
when computation to be performed. We also use
additional combination of RGB value for
authentication purpose. So, this homomorphic
encryption method and RGB value we can able to
provide authentication mechanism and data security
on cloud it also for preventing chosen cipher text
attacks.
ISSN: 2231-5381
http://www.ijettjournal.org
Page 399
International Conference on Global Trends in Engineering, Technology and Management (ICGTETM-2016)
from locally install computer programs to on-line
software services that offer the same functionality.
Conventional desktop applications such as word
processing, access and spreadsheet can now be
accessed as a service in the web. This representation
of delivering applications, known as Software as a
Service (SaaS) Typical examples are Google Docs and
Salesforce.com CRM [10], moodle on cloud.
2. Platform as a Service–Infrastructure-oriented
clouds that provide raw computing and storage
services, a further approach is to offer a higher level of
abstraction to make a cloud easily programmable,
acknowledged as Platform as a Service (PaaS).This
gives a client (developer) the litheness to build
(develop, test and deploy) applications on the
provider’s platform. PaaS stakeholders include the
PaaS hosted who provides the infrastructure, the PaaS
provider who provides the expansion tools and
platform and the PaaS user. Examples of PaaS are
Microsoft Azure and Google AppEngine, VMware
[10].
evidenced by correspond Technologies. The private
cloud gives an association greater control over its data
and possessions. As a result, the private cloud is more
engaging to enterprises more than ever in mission and
safety dangerous or invention [1].
3. The Hybrid Cloud
This includes of a grouping of any two (or all) of the
three models discussed above. Homogeny of APIs has
lead to easier allotment of applications crossways
different cloud services models. This enables newer
models services such as “Surge Computing” in which
workload spikes from the private cloud is offset to the
public cloud [1].
3. Infrastructure as a Service–It provides virtualized
resources on order is known as Infrastructure as a
Service (IaaS). A cloud infrastructure enables ondemand provisioning of servers running a number of
choices of operating system and customized software
stack. Infrastructure services are considered to be
bottom layer of cloud computing techniques. Amazon
Web Services techniques mainly offer IaaS, which in
the case of its EC2 examine means offering VMs with
software stack that can be tailored comparable to how
a normal physical server would be personalized [10].
In infrastructure ownership, there are four
consumption models of cloud computing each with its
qualities and demerits. This is where the security
issues start.
1. The Public Cloud
This is the traditional view of cloud computing in
every day lingua. It is typically owned by a large
association (e.g. Amazon’s EC2, Google’s AppEngine
and Microsoft’s Azure, Oracle). The ownerorganization makes its infrastructure as services
accessible to the universal public via a multi-tenant
model on a self-service basis delivered over the
Internet. This is the most commercial model leading to
significant savings for the user, albeit with assistant
privacy and security issues since the physical position
of the provider’s infrastructure as services usually
traverse frequent national limitations [10].
2. The Private Cloud
This includes cloud infrastructure as a services in a
single tenant surroundings. It defers commencing the
customary data center in its principal use of
virtualization. It may be managed by the tenant
association or by a third party within or external the
tenant location. Private cloud expenditure more than
the public cloud, but it leads to more expenditure
reserves when compared with a data center as
ISSN: 2231-5381
Fig. 1 Architecture of cloud computing techniques
II. HOMOMORPHIC ENCRYPTION
Homomorphic Encryption techniques are encryption
techniques in which we can able to perform operation
on encrypted data without knowing original plaintext
data or raw data. By this technique also allows server
to perform the operation on encrypted data without
knowing the original plaintext data or raw data. This
can also allows complex arithmetical operations to be
performed on encrypted data without using the
original plaintext data or raw data. Suppose consider
plaintexts X1 and X2 and corresponding ciphertext Y1
and Y2, then Homomorphic encryption scheme allows
the calculation of X1 Θ X2 from Y1 and Y2 without
using X1 Θ X2.The cryptosystem nature is
multiplicative or additive Homomorphic that
depending upon the function Θ which can be
multiplication or are used [12].
http://www.ijettjournal.org
Page 400
International Conference on Global Trends in Engineering, Technology and Management (ICGTETM-2016)
1.3) Hash Functions: It creates fixed size encrypted
message called hash irrespective of size of input
message. One of the best MD (Message Digest)
algorithms is an example of these techniques. Hash
functions are one way techniques [7].
Fig. 2 Protection of Data over the Cloud
computing
III. CRYPTOGRAPHY CONCEPT
The science contiguous the principles and methods of
transform a understandable message into one that is
inarticulate, and then retransforming that message
back to its original appearance is crucial design behind
of cryptography techniques. Cryptography, to most
people, is anxious with keeping interactions private.
Encryption is the transformation of data into some
unreadable form by other person cannot able to read.
Purpose is to provide privacy by maintenance the
information secreted from anyone for whom it is not
proposed. Decryption is the reverse of encryption
techniques; it is the transformation of encrypted data
back into some intelligible form or we can say that
user readable form. When in any case Encryption and
decryption require the use of some secret information
that user want to provide privacy, usually referred to
as a key or locker that prevent to other from
unauthorized access [5]. The data to be encrypted is
called as plain text or raw data. The encrypted data
obtain as a result of encryption techniques is called as
cipher text which unreadable form. Depending on the
encryption mechanism used when, why, and for what
purpose the same key might be used for encryption
and decryption techniques, while for other, the keys
used for encryption and decryption techniques might
be different [7].
1. Ways of Cryptographic Algorithms
There are many ways of classifying cryptographic
techniques. In general they are divided based on the
number of keys that are used for encryption and
decryption techniques, and further defined by their
function and use as in. There three types of algorithms
techniques are depicted as follows
1.1) Secret Key Cryptography: It Uses a single key for
both encryption and decryption techniques. Most
common algorithms techniques in use include Data
Encryption Standard (DES), It also includes Advanced
Encryption Standard (AES) [7].
1.2) Public Key Cryptography (PKC): It Uses one key
for encryption and another for decryption techniques.
One of the best RSA (Rivest, Shamir, and Adleman)
algorithms is an example of these techniques [7].
ISSN: 2231-5381
2. RGB Color Value
When we consider any color then it is the combination
of three primary colors Red, Green and Blue in fixed
quantities depends on the color will produces. Color is
stored in a computer in form of three numbers
representing the quantities of Red, Green and Blue
correspondingly. Representation of this method is
called RGB representation which is used in computers
for storing the images in BMP, JPEG and PDF
formats. When we consider this color then here each
pixel is represent as values for Red, Green and Blue.
Thus any color can be distinctively represented in the
three dimensional RGB cube as values of Red, Green
and Blue. The RGB color model is an additive model
in which Red, Green and Blue are pooled in various
ways to produce other colors. By using proper
amalgamation of Red, Green and Blue intensities,
many colors can be representing. Classically, 24 bits
are used to store a color pixel. This is usually
apportioned with 8 bits each for red, green and blue,
giving a range of 256 possible values, or intensities,
for each hue. With this system, 16 777 216 (256^ 3 or
2^24) discrete combination of hue and intensity can be
specified [5].
IV. EXISTING SYSTEM
A
Homomorphic
encryption
has
different
Homomorphic schemes according to its properties:
Security is biggest problem of cloud computing. Many
Research paper discuss about cloud and its advantage
and disadvantage. In my Literature review I found
security is major key point. From the Literature
Review I found Homomorphic encryption is the more
secure encryption scheme. In this scheme cloud server
can perform any algebraic operation on cipher data.
From literature Review I found that Chosen Cipher
text attack is major problem.
1. Additive Homomorphic Encryption
In additive Homomorphic encryption sum of
encrypted cipher text is same as sum of original plain
text. This property allows you to apply addition on
encrypted data without knowing original data. A
Homomorphic encryption is additive, if:
Enc (X+Y) = Enc(X) + Enc(Y)
Enc (+ mi) = + Enc (mi)
i=1 i=1
Suppose we have two ciphers Ci1 and Ci2 such that:
Ci1 = gm1 .R1n mod n2
Ci2 = gm2. R2n mod n2
Ci1.Ci2 = gm1.R1n.gm2.R2nmod n2 =gm1+m2
(R1R2) n mod n2
http://www.ijettjournal.org
Page 401
International Conference on Global Trends in Engineering, Technology and Management (ICGTETM-2016)
So, Pailler, Benaloh and Okamoto-Uchiyama
cryptosystems realizes the property of additive
Homomorphic encryption. An application of an
additive Homomorphic encryption is electronic voting:
Each vote is encrypted but only the "sum" is decrypted.
Cloud server contains encrypted vote it just perform
addition on encrypted data and get the encrypted result.
That encrypted result is decrypted at the client side
and get the original result.
2. Multiplicative Homomorphic Encryption
In
Multiplicative
Homomorphic
encryption
Multiplication of encrypted cipher text is same as
Multiplication of original plain text. This property
allows you to apply Multiplication on encrypted data
without knowing original data. A Homomorphic
encryption is multiplicative,
if: Enc (X*Y) = Enc(X) * Enc(Y)
Enc (*mi) = * Enc (mi)
i=1 i=1
RSA and Elgamal cryptosystems realize the properties
of the multiplicative Homomorphic encryption.
Key Generation -keygen (p,q)
1. Take two prime number such as two prime numbers
is p and q.
2. Calculate such as n=p.q, fi(n)=(p-1)(q-1) and
choose a way e that is calculated gcd(e,
fi(n)))=1.
3. Calculate now d such that e.d=1 mod fi(n).
4. The Proxy public key is generated such as (Rpk) is
(e, n).
5. The proxy Secret key is generated such as (Rsk) is
(d).
Encryption Techniques: Enc (c, Rpk)
1. Let us consider m be a message which is encrypted
where m Є Zn.
2. Calculate the value of ciphertext as: rc=me mod n.
Decryption Techniques: Dec (rc,Rsk)
1. Ciphertext c Є Zn.
2. Calculate the value such as message m =cd mod n.
Proxy Re-Encryption Algorithm:
In proxy Re-Encryption techniques same algorithm
will repeat again, here only choosing of two prime
numbers should be large.
VI. DESIGN AND IMPLEMENTATION
Table 1: Homomorphic Encryption Scheme
Scheme
RSA
ElGamal
Homomorphic
Properties
Multiplicative
Multiplicative
Algorithm Types
Asymmetric
Asymmetric
Goldwasser Micali XOR
Asymmetric
Benaloh
Additive
Symmetric and
Asymmetric
Paillier
OkamotoUchiyama
Additive
Additive
Asymmetric
Asymmetric
V. PROPOSED WORK AND METHODOLOGY
For preventing of cipher data from chosen ciphertext
attack and accountability, here provide Proxy ReEncryption algorithm with paillier and RSA
Cryptosystem techniques. Initially users are identified
by assigning of unique RGB value. Each RGB value is
represented with a set of three values for example
violet red color is represented in RGB format as (137,
157, 40) simultaneously user signup will done, after
then user can able to login in system, at the time of
login OTP will generated which is accessible from
registered email In next step actual data are encrypted
using RGB and Homomorphic encryption technique,
after then these data are sent on the cloud. After then
user can able to decrypt the data by using login into
system again OTP will generated, user can login into
system by providing OTP which is accessible from
registered email then user can decrypt the data by
providing RGB value and key of Homomorphic
encryption.
Algorithm of Homomorphic encryption:
ISSN: 2231-5381
Simplified Working Model
The Figure 3 is the simple working model of the
System Framework.
Fig. 3 Architecture of System model
1. First of all user signup in the system at the time of
signup unique user will be identified using RGB value.
2. For registering the user successfully OTP will sent
on verified email which is given at the time of signup.
http://www.ijettjournal.org
Page 402
International Conference on Global Trends in Engineering, Technology and Management (ICGTETM-2016)
Table 6.1: Comparison and Result Analysis Table
3. Then by proving OTP he/she will completed their
registration.
4. After then they can able to login in the system using
valid user name password and RGB value.
5. Again OTP will send on register email for
connecting and to store the data on cloud.
6. After then he/she perform the encryption on data,
here key and document id will generated, through
which later they can able to access data easily.
7. After then they can upload encrypted data on cloud.
8. Same procedure will apply at time of accessing or
decrypting the data.
Fig 4 Main System GUI
Figure 4 shows main GUI of this system user can
interact with the system perform the operation. After
then when we click on Signup page of this system user
can able perform the registration on this page. After
then user can able to login in system at Login page of
this system user can only able Login by using valid
user name password and RGB value.
VII. RESULT AND DISCUSSION
The comparison table considers the important cloud
computing security characteristics such as,
Scalability
Security
Authentication type
Key used
Comparison among the RSA, Homomorphic
encryption algorithms and The Homomorphic
encryption algorithm are scalable but RSA is not
scalable. The RSA security applied client side only
likewise Homomorphic encryption algorithm security
applied cloud itself only. The following table
characteristic precedes the insecure issues. So we are
using the effective authentication plan to provide
stronger security for both cloud providers and
consumers.
ISSN: 2231-5381
VIII. CONCLUSIONS
Combination of secret key and public key
cryptography system techniques can be applied mainly
for encryption and decryptions of the Information;
System also provides the method for to identifying the
receiver. For encryption and decryption of the
personal data we provide Homomorphic encryption
technique which is a new impression of security on the
cloud computing that enables proving results of
computation on encrypted data without knowing the
raw data. System model design uses RSA and Paillier
algorithm for Homomorphic encryption with color
(RGB) model that prevents cipher data from Choosen
Cipher text Attack (CCA). So this system is more
secure than existing system. Every time for uploading
of data, RSA algorithm is executed at the client side.
One time for encryption at the client end and one time
for decryption and encryption at the Encryption Server
end. Similarly for downloading of data each time same
procedure will be executed.
REFERENCES
[1]
Anjana Chaudhary, Ravinder Thakur and Manish Mann
“Security in Cloud Computing by Using Homomorphic
Encryption Scheme with Diffie-Hellman Algorithm”
http://www.ijettjournal.org
Page 403
International Conference on Global Trends in Engineering, Technology and Management (ICGTETM-2016)
[2]
[3]
[4]
[5]
[6]
[7]
[8]
[9]
[10]
[11]
[12]
[13]
[14]
[15]
[16]
Proceedings of 7th SARC-IRF International Conference, 03rd
August-2014, New Delhi, India, ISBN: 978-93-84209-41-4.
Yogita S. Pawar and Shambhu Kumar Singh” Secure Cloud
using RGB value and Homomorphic Encryption for shared
data in cloud” International Journal on Recent and Innovation
Tends in computing and communication , Volume 3 issue 6,
page 4158-4162, June 2015.
Hu Shuijing “Data Security: the Challenges of Cloud
Computing” 2014 Sixth International Conference on
Measuring Technology and Mechatronics Automation.
Sushmita Ruj, Milos Stojmenovic, and Amiya Nayak
“Decentralized
Access
Control
with
Anonymous
Authentication of Data Stored in Clouds” IEEE Transactions
On Parallel And Distributed Systems Vol: 25 NO: 2 YEAR
2014.
Bhabendu Kumar Mohanta and Debasis Gountia “Fully
homomorphic encryption equating to cloud security: An
approach” IOSR Journal of Computer Engineering (IOSRJCE) e-ISSN: 2278-0661, p- ISSN: 2278-8727Volume 9,
Issue 2 (Jan.- Feb. 2013), PP 46-50.
Shashank Bajpai and Padmija Srivastava “A Fully
Homomorphic Encryption Implementation on Cloud
Computing” International Journal of Information &
Computation Technology. ISSN 0974-2239 Volume 4,
Number 8 (2014), pp. 811-816
Iram Ahmad and ArchanaKhandekar “International Journal of
Information & Computation Technology” ISSN 0974-2239
Volume 4, Number 15 (2014), pp. 1519-1530”
S. Pavithra Deepa, S. Kannimuthu, and V. Keerthika “Security
Using Colors and Armstrong Numbers” National Conference
on Innovations in Emerging Technology Year 2011.
Maha Tebaa, Saïd El Hajji, Abdellatif El Ghazi
“Homomorphic Encryption Applied to the Cloud Computing
Security” Proceedings of the World Congress on Engineering
2012 Vol I WCE 2012, July 4 - 6, 2012, London, U.K.
Boyang Wang, Baochun Li, Member, IEEE, and Hui Li,
Member, IEEE “Oruta: Privacy-Preserving Public Auditing
for Shared Data in the Cloud” IEEE 5th International
Conference On Cloud Computing Year 2014 Rajkumar
Buyya, James Broberg and Andrzej Goscinski “Cloud
Computing Principles and Paradigms” ISBN 978-81-2654125-6
Vidya S and Vani K “Secured PHR Transactions using
Homomorphic Encryption in Cloud Computing” International
Journal of Engineering and Computer Science ISSN: 23197242 Volume 2 Issue 12 Dec, 2013 Page No. 3540-3543.
Myur Sunil Patil and Shambhu Kumar Singh “Cloud
Security using Colors and Homomorphic Encryption”
International Journal on Emerging Trends in Technology
ISSN: 2350-0808, September 2014, Volume 1 Issue 1, 182.
S. J. Patil, N. P. Jagtap and Shambhu Kumar Singh “Use of
RGB Colors and Cryptography for Cloud Security”
International Journal of Science Spirituality Business and
Technology ISSN: 2277-7261.
S. V. J. B. Rajkumar Buyya, Chee Shin Yeo and I. Brandic,
\Cloud computing and emerging it platforms: Vision, hype,
and reality for delivering computing as the 5 th utility," Future
Generation Computer Systems, pp. 599{616, 2009.
V. P. Alexandros G. Dimakis and K. Ramchandran,
\Decentralized erasure codes for distributed networked
storage," ACM, vol. 1, pp. 1{8, June 2006.
R. S. Q. W. Mahesh Kallahalla, Erik Riedel and K. Fu,
“Plutus: Scalable secure file sharing on untrusted storage," pp.
1{14, March 2003.
ISSN: 2231-5381
http://www.ijettjournal.org
Page 404
Download