Document 12929278

advertisement
International Journal of Engineering Trends and Technology (IJETT) – Volume 31 Number 2- January 2016
A Secure and Novel Key Aggregation Mechanism for
Multiple Data owners
BalaMuralikrishna. Bokka1, Saran Kumar Kuchibhatala2, Ramesh Challagundla3
1,2,3
Final M.Tech Student1, Assistant Professor2, Professor3
Dept of CSE, Pydah college of engineering and Technology, AP, India
size. Blocks of 64 bits have been
commonly used.
Abstract:
Key aggregation mechanism over cloud between
multiple owners is always an interesting research
issue in the field of secure cloud computing .Simple
symmetric and asymmetric approach may not give
the optimal results, so it is a polynomial approach
where aggregated key can be generated from
multiple users and distributed asynchronously.
Here the key can be computed from part of the
shared keys from all the users and data can be
encoded with a novel cryptographic approach
which uses coefficient sets and reminder sets. Our
experimental results show more accurate results
than traditional approaches.
I. INTRODUCTION
Cloud computing is also known as Ondemand computing. It is a kind of internet based
computing, where shared resources, data and
information are provided to the computers and
other devices. Cloud computing is a model for
enabling ubiquitous, convenient, on-demand access
to shared pool of configurable computing resources
that can be rapidly provisioned and released with
minimal management effort. Cloud computing also
focuses on maximizing the effectiveness of shared
resources. Cloud resources are not only shared by
multiple users but also dynamically reallocated per
demand. With cloud computing, multiple users can
access a single server to retrieve and update their
data without purchasing licenses for different
applications.
Symmetric key is a key which is used for
encryption of plain text and decryption of cipher
text. The keys represent shared secret between two
or more parties that can be used to maintain private
information. Symmetric key encryption can use
either stream ciphers or block ciphers.


Stream ciphers encrypt the digits of a
message once at a time.
Block cipher takes a number of bits and
encrypt them as a single unit, padding the
plain text so that it is a multiple of block
SSN: 2231-5381
Asymmetric keys are also known as
public/private keys. They are used for asymmetric
encryption. Asymmetric encryption is mainly used
to encrypt and decrypt session keys and digital
signatures. Asymmetric encryption uses public key
encryption algorithm.
Public key algorithms use two different keys.
They are public key and private key. Public key
can be distributed to anyone who requests for it
and private key must be kept secret and secure
Encryption is the best way to achieve data
security. Encryption is nothing but conversion of
plain text into cipher text. Unencrypted data is
called plain text and encrypted data is called cipher
text. Blowfish, AES, RC4, RC5 and RC6 are the
examples of encryption algorithms.
Decryption is the reverse process of encryption. It
is the process of converting the cipher text into
plain text. To make the data securable, plain text
(data) can be encrypted with secret key, the
encrypted data is called cipher text. To get the
plain text, cipher text can be converted into plain
text with particular algorithm.
II. RELATED WORK:
Even though various traditional approaches
proposed by the authors, every approach has their
own drawbacks and their advantages. In existing
model, the data owner establishes the public
system parameter via Setup and generates a
public/master-secret key pair via KeyGen.
Messages can be encrypted via Encrypt by anyone
who also decides what cipher text class is
associated with the plaintext message to be
encrypted. The data owner can use the mastersecret to generate an aggregate decryption key for
a set of cipher text classes via Extract. The
generated keys can be passed to delegates securely
(via secure e-mails or secure devices) finally, any
user with an aggregate key can decrypt any cipher
http://www.ijettjournal.org
Page 83
International Journal of Engineering Trends and Technology (IJETT) – Volume 31 Number 2- January 2016
text provided that the cipher text‟s class is
contained in the aggregate key via Decrypt, but
problem with this traditional mechanism is more
complex and may not provide optimal security.
Cloud is a resource area where we can store and
retrieve whenever access the data, various roles
involved while cloud computing. Data owner is the
person who stores and retrieves the data from
server, Cloud service provider allows data owner
to buy storage space and can manipulate the space
whenever required. End users can consume the
services provided by data owner. One more
specific role involved in cloud computing i.e.,
auditor, he audits or monitors the data uploaded
into the server and gives updates to the respective
data owner.
Data authentication and confidentiality are the
important factors while transmission of data
components over network, because data owner
does not know the physical location of the data
component which is stored, so data owners needs
to handle the authentication and data privacy or
confidentiality. Authentication explains about the
authorization of the user, only valid or
authenticated person can access the data resources
which are uploaded. Cryptographic approaches
maintain data confidentiality and privacy while
transmission of data components. Data component
can be encoded with key which is generated from
group key protocol securely along with
authentication.
Our group key generation mechanism generates an
efficient and dynamic session key between key
generation center and users without direct
transmission of key. It is a three level approach,
first level identifies the authentication of the
connected users, after the authentication of users
key can be generated by the key generation center
and embeds in to polynomial equation along with
some constants and generates few points which
satisfies the polynomial equation and forwards half
of the points to individual users, points may not be
the same to the all users. Users constructs three
equations from the received points and integrates
the all three equations and extracts the key from
the equation and uses this key for encoding and
decoding with efficient and simple cryptographic
approach.
Key Generation :
Key Generation process
The
goal
is
to
divide
a safe combination)
secret
into
data
(e.g.,
pieces
of
in such a way that:
1. Knowledge of any
makes
pieces
easily computable.
2. Knowledge
fewer
or more
of
any
pieces leaves
or
completely
undetermined (in the sense that all its
possible values are equally likely).
III. PROPOSED SYSTEM
In this paper we propose an efficient key
aggregate mechanism for secure key generation
between multiple cloud users. It can be constructed
from shared key pairs from the individual users
,key can be easily distributed to the new users even
though they are not directly communicates with
other group people and encoding mechanism
maintain data confidentiality with coefficient
vectors and reminder vector without forwarding
the data component directly. This proposed
approach is simple and stronger in performance
and security factors because key need not to be
forwarded directly to any one and data cannot be
transmitted directly or simply in terms of cipher
blocks.
SSN: 2231-5381
This scheme is called
If
threshold scheme.
then all participants are required to
reconstruct the secret.
Example
• Let us consider S=1234 (Secret key)
•
Consider n=6 and k=3 and obtain any
random integers a1=166 and a2=94
f(x)=1234+166x+94x2
• Secret
share
points
D0=
(1,1494),D1=(2,1942)D3=(3,2598)D4=(4,3
402)D5=(5,4414)D6=(6,5614)
We give each participant a different single
point (both x and f(x)). Because we use Dx-1
instead of Dx the points start from (1, f(1)) and not
(0, f(0)). This is necessary because if one would
have (0, f(0)) he would also know the secret
(S=f(0))
http://www.ijettjournal.org
Page 84
International Journal of Engineering Trends and Technology (IJETT) – Volume 31 Number 2- January 2016
R[I]=I(mi)%Δ
Re-construction
In order to reconstruct the secret any 3 points will
be enough
Let us consider
(x0,y0)=(2,1924),(x1,y1)=(4,3402),(x2,y2)=(5,4414)
Using lagrangeous polynomials
L0=x-x1/x0-x1*x-x2/x0-x2=x-4/2-4*x-5/25=(1/6)x2-(3/2)x+10/3
L1=x-x0/x1-x0*x-x2/x1-x2=x-2/4-2*x-5/4-5=-(1/2)x2(7/2)x-5
L2=x-x0/x2-x0*x-x1/x2-x1=x-2/5-2*x-4/5-4=(1/3)x22x+8/3
f(x)=j * lj(x) =1942((1/6)x2-(3/2)x+10/3)+3402((1/2)x2-(7/2)x-)+4414((1/3)x2-2x+8/3 )
f(x)=1234+166x+94x2
Recall that the secret is the free coefficient, which
means that S=1234.
Find Q
Q[I]=I(mi)/Δ
Representation of R
For I=1 to n
Represent R[I] in base Δ
Representation of Q
Uses the Compression mechanism.
Converts Base B quotients to Base 10
Encoding and Decoding:
MOD-ENCODER Decoding Algorithm:
This algorithm uses a finite alphabet set,
constant value Δ for encryption and a decryption of
the message and is used as a secret key. This Δ is
generated using Diffie-Hellman key generation
algorithm to provide more security to algorithm.
The sender generates Remainders and Quotients
using Δ value and the compression performs only
Input : Bi-tuple <R,Q>, Δ value
Convert Q from Base 10 to Base B
Let QB=(q1,q2,….qn) be the representation in
Base B
Interpret R as a vector of Base Δ number
on the Quotient vector further these two values
forwarded
to
the
receiver
to
ensure
the
confidentiality of the message. The receiver
For 1 ≤ i ≤n
I=qi × Δ + ri
decompresses and decodes the message using
compressed quotient and remainder vector.
Where qi the ith digit of QB,ri the ith element of R.
Mi=I-1(i)
MOD-ENCODER Encoding Algorithm:
M=(m1,m2,….mn)
Input : M ∈ ∑, Δ value
CONCLUSION
N=|M|, i.e length of M
Z=n * bit size, i.e bit size is the number of bits
require to represent each character
For i=1 to n
Read mi the ithcharacter from M
Find R
SSN: 2231-5381
We have been concluding our current research
work with efficient key aggregate system with key
generation and encoding and decoding mechanism.
Secure key can be generated with lagranges
polynomial equation and reconstruction. Data
confidentiality can be maintained with quotient and
reminder vector model along with the key
generated with polynomial equation. Our proposed
solution gives optimal solution than traditional
approach .
http://www.ijettjournal.org
Page 85
International Journal of Engineering Trends and Technology (IJETT) – Volume 31 Number 2- January 2016
REFERENCES
[1] M. Armbrust, A. Fox, R. Griffith, A.D. Joseph, R.H. Katz,
A. Konwinski, G. Lee, D.A. Patterson, A. Rabkin, I. Stoica, and
M. Zaharia, “A View of Cloud Computing,” Comm. ACM, vol.
53, no. 4, pp. 50-58, Apr. 2010.
[2] S. Kamara and K. Lauter, “Cryptographic Cloud Storage,”
Proc. Int‟l Conf. Financial Cryptography and Data Security
(FC), pp. 136- 149, Jan. 2010.
[3] S. Yu, C. Wang, K. Ren, and W. Lou, “Achieving Secure,
Scalable, and Fine-Grained Data Access Control in Cloud
Computing,” Proc. IEEE INFOCOM, pp. 534-542, 2010.
[4] M. Kallahalla, E. Riedel, R. Swaminathan, Q. Wang, and K.
Fu, “Plutus: Scalable Secure File Sharing on Untrusted
Storage,” Proc. USENIX Conf. File and Storage Technologies,
pp. 29-42, 2003.
[5] E. Goh, H. Shacham, N. Modadugu, and D. Boneh, “Sirius:
Securing Remote Untrusted Storage,” Proc. Network
[6] M. Chase, „„Multi-Authority Attribute Based Encryption,‟‟
in Proc. 4th Theory of Cryptography Conf. Theory of
Cryptography (TCC‟07), 2007, pp. 515-534.
[7] M. Chase and S.S.M. Chow, „„Improving Privacy and
Security in Multi-Authority Attribute-Based Encryption,‟‟ in
Proc. 16th ACM Conf. Computer and Comm. Security
(CCS‟09), 2009, pp. 121-130.
[8] A.B. Lewko and B. Waters, „„Decentralizing AttributeBased Encryption,‟‟ in Proc. Advances in CryptologyEUROCRYPT‟11, 2011, pp. 568-588.
[9] S. Yu, C. Wang, K. Ren, and W. Lou, „„Attribute Based
Data Sharing with Attribute Revocation,‟‟ in Proc. 5th ACM
Symp. Information, Computer and Comm. Security
(ASIACCS‟10), 2010, pp. 261-270.
[10] M. Li, S. Yu, Y. Zheng, K. Ren, and W. Lou, „„Scalable
and Secure Sharing of Personal Health Records in Cloud
Computing Using Attribute-Based Encryption,‟‟ IEEE Trans.
Parallel Distributed Systems, vol. 24, no. 1, pp. 131-143, Jan.
2013.
[11] J. Hur and D.K. Noh, „„Attribute-Based Access Control
with Efficient Revocation in Data Outsourcing Systems,‟‟ IEEE
Trans. Parallel Distributed Systems, vol. 22, no. 7, pp. 12141221, July 2011.
SSN: 2231-5381
http://www.ijettjournal.org
Page 86
Download