Privacy Data Sharing for a Group of Members in the... International Journal of Engineering Trends and Technology (IJETT) – Volume17... YaragallaSarat Babu

advertisement
International Journal of Engineering Trends and Technology (IJETT) – Volume17 Number6–Nov2014
Privacy Data Sharing for a Group of Members in the Cloud
YaragallaSarat Babu1, JayanthiRao Madina2
1
1,2
Final M.Tech Student, 2Head of the Department
Dept of CSE,Sarada Institute of Science, Technology And Management(SISTAM), Srikakulam, Andhra Pradesh
Abstract: Cloud computing is recognized as one of the
alternative to traditional information technology due to its
intrinsic
resource-sharing
and
low-maintenance
characteristics. In cloud computing, the cloud service
providers (CSPs) are able to deliver various services to
cloud users with the help of powerful data centers, So that
the sharingof data in the cloud is very securely and also
provide the authentication of users in the cloud. In this
paper we are proposed the concept digital certificate for
user authentication and key establishment by providing
security of data in the cloud we are using Triple Des for
encryption and decryption of data. So that by using those
techniques we can provide more security and low
maintenance of characteristics.
I.INTRODUCTION
In cloud computing the storage is in shared state
which is offered by third party service providers. The data
is stored in the network that is the group users in
collaborative type.It is very general that the data remains
over the period oftime. The data secrecy is in the could
became morecompromised and to protect the data privacy
in the cloudthat encrypts the data files and store in the
database of thecloud service provider. But the designing is
efficient andthe data sharing scheme for the cloud is not a
very easytask that means the data owner should able to use
all theservices that are provided by the cloud storage
service.
There are many techniques for sharing the dataand
the store the data that have been concerned. In all
thesemethods the data owners are encrypt the data and
store inthe untrusted remote server. After storing the data it
willdecrypt using the decryption keys with authorized
users.
This presents the intruders to access the encoded
data. Forauthentication the data owners have to register in
theservice provider for security issue.The novel data
sharing the new data ownerregistration retrieves the
identity of the new data owner inothers group. The new
data owner has to take permissionfrom other data owners in
the group before generating adecrypting key. In the
traditional techniques that thesystem identified the
problems during multi owner datasharing and proposed an
efficient protocol andcryptographic technique for solving
drawbacks in thetraditional approach. It proposed an
efficient and novel
secure key protocol for group key generation and
usingthese key data owners can encrypt the files.
II. RELATED WORK
In previous researches the authors specified
asecure data sharing for dynamic groups in remote
ISSN: 2231-5381
storage.In multi-owner data sharing the data owners shares
the data
With others and the other group members. It supports
theeffective user registration.Some other author introduced
a cryptographictechnique in the storage system that
provides security filesharing on untrusted services of the
servers. But dividingthe file groups with other members
which correspond tothe key services. And also the key
needs renewal and theagain for the user activation.
In [5], the contents of files placed on remoteserver
are metadata and file data. The file metadatacontains the
access control data that encompass collectionof encrypted
keys. These metadata files are encrypted withpublic key of
authorized users. As the file metadata shouldbe
refurbished, the user abrogation in the scheme is
anuncompromising issue particularly for large-scale
sharing.Nonetheless, the private key should be regenerated
for eachuser for every new user addition into the group.
This limitsthe application to support dynamic groups.
Another issue isthe encryption load enhances with the
sharing scale.
The proxy reencryption model given by
Atenieseet al. [6] strengthens the distributed storage. The
dataencryption done by the data owners is a twostepprocedure. First, encryption is done using exclusive
andsymmetric content keys. Second, the data is encrypted
witha master public key. Proxy cryptography is used by
theserver to reencrypt the particular content key(s) from
themaster public key. On the other hand, the remote
storageserver can be attacked by any malicious user to find
thedecryption keys of all encrypted blocks.
From the above analysis, the author observed
thathow to securely share data files in a multipleownermanner for dynamic groups while preserving
identityprivacy from an untrusted cloud remains to be
achallenging issue. In this paper, the author proposed
anovel multi owner data sharing group key protocol
forsecure data sharing in cloud computing.
III. PROPOSED SYSTEM
Now a days cloud computing place an important role for
sharing of data through the network. For the sharing of data
in network we are provide the security of that data. So that
for providing security of data we are using cryptography
technique. Before sharing data between users we are
identify the user is authenticated or not. The authentication
of users we are using digital signature algorithm. After
completing generation signature the users send to KGC for
the authentication purpose. The KGC will find the
authentication of users KGC will generate key for
http://www.ijettjournal.org
Page 266
International Journal of Engineering Trends and Technology (IJETT) – Volume17 Number6–Nov2014
authenticated user. After sending key each user will
encrypt and decrypt the data using that key.The following
is details description of proposed system.
Authentication of users:
In this module each user will generate signature
for authentication purpose. The generation of signature is
as follows.
1.
2.
3.
Choose a large prime number p with the range of
512 or 1024 bits and is multiple of 64.
Choose q with the range of 160 bit prime divisor
of p-1
Calculate g=h(p-1)/q
User compute public and private keys:
Signature generation:
6.Calculate r= (gk%p)%q.
7. generate signature s=[k-1 H(ID)+xr]%p.
After generation of signature user will send the signature to
KGC. The KGC will check the signature for authentication
of users. The authentication of user as follows.
The KGC will Calculate w=s-1%p.
Calculate u1=[H(ID)w]%q.
Calculate u2=rw%q.
V=[(gu1yu2)%p]%q.
After calculate v value for each users and the KGC will
verify the authentication status of each user. After verify
the authentication users the KGC will generate secret key
for encrypt and decrypt of shared data.
ISSN: 2231-5381
Where a and b are constant value for generating
randomly. The secret key is also constant value
For generating randomly.
In this module each user retrieves equation from the
KGC and generate secret key. After generation of secret
key, the user encrypts and uploads stored data using that
key ,by encrypting the data we can provide the security
ofshared data.Providing security of data we are using any
cryptography technique. In this paper we are using triple
des algorithm.Before store data into cloud the user
encrypt the data using triple DES and key. After encrypt
the data user will stored into cloud.
Retrieve data from cloud:
After storing data into cloud if any user wants retrieve the
data, before he/she generate secret key and retrieve that
stored data. After retrieving stored data the user will
generate secret key and decrypt that data. The decryption
of retrieving data the user will also use the triple des
algorithm.
Signature verification :
Shared key generation:
F(n)=secretkey+bx2+ax
Store data into cloud:
4.Choose x is greater than or equal to q.
5.Calculatey=gx % p
1.
2.
3.
4.
After successful completion of authentication the KGC
will generate shared key for data encryption and
decryption. The generation of shared key the KGC will
use the Shamir secret share and Lagrange’s equation.
After generating shared key the KGC will send to key to
all the authenticated users. The generation of shared key
will be changed for every new user adding into group.
The general format of Lagrange’s equation as follow.
If any user wants to add this group the KGC will
regenerate new shared key and distributed to all
authenticated users. Before sending key to users the KGC
will decrypt the cloud data using old key and encrypt the
new shared key and stored into cloud. So if any user
upload the retrieve data from the cloud he/she follows
above steps.
http://www.ijettjournal.org
Page 267
International Journal of Engineering Trends and Technology (IJETT) – Volume17 Number6–Nov2014
1.Generate signature
6.
en
cr
yp
t
1.Generate signature
5.s
9.r
en
etr
5.s
d
ie
2.Send to KGC en
ve
2.Send
to KGCke
d
y
pl
ke
ai
y
TriplenDES
1.Generate signature 1.Generate signature
2.
Se
nd
to
K
5.s
end
key
5.s
en
d
ke
y
KGC
2.
Se
nd
to
K
3.Authentication users 4.Generate shared key
7.stored into cloud8.decrypt the data
Cloud storage
IV.CONCLUSION
In cloud computing sharing of data through network in
secure manner. For provide security of data we are using
cryptography technique. Before provide security of data we
can verify the given user authenticated or not. We can
identify authentication of user we are using signature
algorithm for verify authenticate user or not. The
authentication user can be performed by the KGC. After
completion authentication user the KGC will generate
shared key for encryption and decryption of data. After
generation shared key the KGC will forward to all
authenticated.
The authenticated user will retrieve shared key, encrypt
data and stored into cloud. If any user wants that data
he/she retrieve data from the decrypt it. In this paper the
encryption and decryption of data can be done by using
Triple DES algorithm. By provide those technique we can
increase efficiency and performance of given system.
ISSN: 2231-5381
REFERENCES
[1] M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R.
H.Katz, A. Konwinski,G. Lee, D. A. Patterson, A. Rabkin,
I.Stoica, and M. Zaharia,“Above the clouds: A Berkeley
view
of
cloud
computing,”
University
ofCalifornia,Berkeley, Tech. Rep. USB-EECS-2009-28,
Feb 2009.
[2] Amazon Web Services (AWS), Online at
http://aws.amazon.com.
[3]
Google
App
Engine,
Online
athttp://code.google.com/appengine/.
[4] Microsoft Azure, http://www.microsoft.com/azure/.
[5]
104th
United
States
Congress,
“Health
InsurancePortability and AccountabilityAct of 1996
(HIPPA),”
Online
athttp://aspe.hhs.gov/admnsimp/pl104191.htm, 1996.
[6] H. Harney,
A. Colgrove, and P. D.
McDaniel,“Principles of policy insecure groups,” in
Proc.OfNDSS’01, 2001.
[7] P. D. McDaniel and A. Prakash, “Methods
andlimitations of securitypolicy reconciliation,” in Proc.
Of0 SP’02, 2002.
[8] T. Yu and M. Winslett, “A unified scheme for
resourceprotection inautomated trust negotiation,” in
Proc.OfSP’03, 2003.
http://www.ijettjournal.org
Page 268
International Journal of Engineering Trends and Technology (IJETT) – Volume17 Number6–Nov2014
[9] J. Li, N. Li, and W. H. Winsborough, “Automated
trustnegotiationusing cryptographic credentials,” in Proc.
OfCCS’05, 2005.
[10] J. Anderson, “Computer Security TechnologyPlanning
Study,” AirForce Electronic Systems Division,Report
ESD-TR-73-51, 1972,
BIOGRAPHIES
JayanthiRaoMadina is working as a HODin
Sarada Institute of Science, TechnologyAnd
Management(SISTAM), Srikakulam,Andhra
Pradesh. He received his M.Tech(CSE) from
Aditya
Institute
ofTechnology
And
Management(AITAM),Tekkali. Andhra Pradesh. His
researchareas include Image Processing, Computer
Networks, DataMining, and Distributed Systems. He
published six papers ininternational journals and he
attended for threeconferences.
YaragallaSaratBabu
is a Student in
M.Tech(CSE) in Sarada Institute of Science
Technology
And
Management(SISTAM),Srikakulam.
He
Received hisB.Tech(IT) from Sarada Institute
of
Science
Technology
And
Management(SISTAM),Srikakulam. His Interesting areas
are Cloud computing, java and oracle,mysql database.
ISSN: 2231-5381
http://www.ijettjournal.org
Page 269
Download