766 a secure-data-sharing-in-cloud-storage-with-independent-key-generation-centre-and-certificate-less-encryption-pdf

Secure data sharing in public cloud

International Journal of Emerging Technology in Computer Science & Electronics (IJETCSE)
ISSN: 0976-1353 Volume 13 Issue 1 –MARCH 2015.
305
Abstract— A mediated certificateless encryption (mCL-PKE)
scheme which solves the certificate revocation problem and the
key escrow problem and preserves the data confidentiality in the
cloud. Since most of the CL-PKE schemes are based on bilinear
pairing and computationally expensive. mCL-PKE scheme does
not utilize pairing operation problem. The security mediator
supports instantaneous revocation of compromised or malicious
users and act as the policy enforcement scheme. This method is
highly efficient than the bilinear pairing based scheme. The
mCL-PKE scheme with the access control lists is been proposed
to overcome the problem of sharing the sensitive information in
the cloud storage. The access control list contains the details of
the user and this list is generated to the cloud and the data owner
for verification purpose. The main problem stated here is the
key generation center in the cloud. This will bring
vulnerabilities against the secure key generation. A new method
is discovered to implement the key generation centre as an
independent center which shares key independently. According
to the access control, the data is being encrypted by the data
owner using the symmetric encryption algorithm and uploads
encrypted data items with an intermediate keys to the cloud. The
user uses their private key to convert the partially decrypted
data to the fully decrypted one. The cloud storage does not
perform the decryption operation fully to preserve the data
confidentiality as well as the keys information. The extension of
the mCL-PKE approach allows the data owner to improvise the
encryption operation in an efficient way and also to implement
high level independent security in the cloud based system. The
result of the mCL-PKE schemes is efficient and practical.
Index Terms— Access control list, Bilinear pairing, mCL-PKE,
Security mediator.
I. INTRODUCTION
The cloud computing provides a massive computing
power and storage capacity which enables users to share
sensitive data in the public cloud. Maintaining the data
confidentiality is an important functionality in the cloud. An
advantage of using a cloud for storage is that the provider is
responsible for building and maintaining the storage
infrastructure and its associated costs including power,
cooling and server maintenance. In Certificate-less Public
Key Cryptography (CL-PKC) each user holds a combination
of partial private key produced by the KGC and a user-chosen
secret key. The key escrow problem can be resolved by using
this technique. As the structure of CL-PKC guarantees the
validity of the user’s public key without the certificate, it
removes the certificate management problem. Since the
advent of CL-PKC, many CL-PKE schemes have been
proposed based on bilinear pairings. The computational cost
required for pairing is still considerably high compared to
other operations such as modular exponentiation in finite
fields. To improve efficiency a strongly secure CL-PKE
without pairing operations is proposed. However, the
previous CL-PKE schemes could not solve the key revocation
problem. In public key cryptography, we should consider
scenarios where some private keys are compromised. There is
not an use of securing the corresponding public keys, if the
private keys are compromised.
Attribute Based Encryption (ABE) method is been
proposed which provide the flexibility for the user to encrypt
each data item based upon their access control policy. ABE
suffers from the revocation problem because the private keys
provided to the existing users has to be updated whenever a
user dynamic changes. To address this problem the concept of
mediated cryptography to support immediate revocation is
proposed. This mCL-PKE scheme, propose a novel approach
to assure the confidentiality of data stored in public clouds
whereas enforcing the access control requirements.
The mediated cryptography makes a practical and effective
use of security mediator (SEM) which can control security
capabilities for every transaction. The user's participation in a
transaction will stopped immediately, once the SEM is been
notified that a user’s public key should be revoked. A notation
of security-mediated certificate-less cryptography is proposed
to present a mCL-PKE depends upon the pairing operations.
If user directly applies the basic mCL.PKE scheme to the
cloud computing environment or several users access the
same data, the cost of encryption for the data owner becomes
high. In these cases, the data owner should encrypt the data
item with the same encryption key for multiple times. To
address this problem, the basic mCL-PKE scheme with an
extension is been introduced. This extended scheme makes
the data owner to apply the data encryption key process only
once which in turns provides some added information to the
cloud. By making use of this additional information the
authorized users can decrypt their content using the private
keys. This one is similar to that of the Proxy Re-Encryption
(PRE) in which the encryption key is encrypted using the data
owner’s public key and continue later to decrypt using
different private keys. However, in this extension scheme, the
cloud does not perform any transformation it simply acts as
the storage model. The security model of the existing schemes
are insecure against partial decryption attack, which does not
consider any adversary capabilities of the requesting partial
decryptions. Hence a secure mediated CL-PKE without
pairings is needed.
A SECURE DATA SHARING IN CLOUD STORAGE WITH
INDEPENDENT KEY GENERATION CENTRE AND
CERTIFICATE-LESS ENCRYPTION
REVATHI.R#1
#
M.E, CSE, ST.JOSEPH COLLEGE OF ENGINEERING, CHENNAI, INDIA
International Journal of Emerging Technology in Computer Science & Electronics (IJETCSE)
ISSN: 0976-1353 Volume 13 Issue 1 –MARCH 2015.
306
The concept behind this scheme is, data owner encrypts the
data and sends the encrypted content to the cloud. Then the
cloud partial decrypts the outer-layer of the encrypted
document and it to the requested users. The user, then fully
decrypt the inner layer of the document using their secret
keys. The main entities of this approach is (1) Data Owner, (2)
Cloud and (3) User. The cloud contains the encrypted storage
and the Security mediator(SEM). Encrypted storage part
contains all the user encrypted data, SEM contains the partial
decrypted data and the KGC generates the KGC key for the
data owner to encrypt the document. As this KGC is made as
an independent one to provide high level security for the user
keys. To reduce the amount of the time required for the
processes the cloud is sub divided into three parts as
mentioned above. Key Generation which in turn reduce the
total time of the whole process. Encryption approach are of
two types, (1) Symmetric key, (2) Asymmetric key. Both the
encryption and decryption process can be done with the same
key called Symmetric key but two different set of keys are
used in the asymmetric approach. As this symmetric key
approach is much faster one than the asymmetric approach for
the encrypting and decrypting the document. The key
management and key distribution process are easier in
asymmetric approach whereas it is tedious one in symmetric
key approach. Symmetric key approach is used in the
proposed method to provide the high level security to the user.
In this scheme, no certificate is provided to the users by
making the symmetric approach as an efficient and easy one.
To protect the user from the malicious attack it is necessary
to have a revocation as a compromised one. SEM supports the
immediate revocation from the malicious users. There is no
need to update the private key of the user whenever the user is
been revoked. The most important thing is that, if more than
one users are trying to access the same content then the
encryption cost become too high for the owner. The same
content has to be encrypted multiple times for multiple user by
the data owner. To overcome this problem the extended
mCL-PKE scheme makes the data owner to encrypt the file
only once and the additional information are provided to the
cloud to decrypt the data for the authorized users.
II. RELATED WORK
In 2006, V. Goyal, O. Pandey, A. Sahai, B. Waters [2]
introduced a Fine-grained sharing of encrypted data called as
Key-Policy Attribute-Based Encryption (KP-ABE). Access
structure contains set of attributes and private keys to control
the cipher text encryption which shares the audit-log
information. To overcome the problem of identity based
cryptography system S. Al- Riyami, K. Paterson [4] introduce
the CL-PKE scheme. In this scheme no certificates are
required to guarantee authenticity of the public keys. An
intermediate exists between identity based and traditional
PKE approaches. S. Coull, M. Green, and S. Hohenberger [5]
proposed the concept of combining the protocol the stateful
anonymous credential system with an adaptive Oblivious
Transfer protocol to improve the efficiency. This Protocol
combines Oblivious and anonymous protocols provides
flexibility to the system. Without knowing the identity or item
choices it restricts users to access the data item. D. Boneh, X.
Ding, G. Tsudik [8] introduced the concept online
semi-trusted mediator(SEM) to improvise the user security.
SEM is combined with a simple threshold variant of the RSA
cryptosystem. To Provide a simplified validation of digital
signature and efficient certificate revocation. J. Camenisch,
M. Dubovitskaya, G. Neven [9] proposed a protocol which is
used to prevent from an anonymous access to a database. This
protocol use the Diffie-Hellman model to secure the standard
mode which leads to obtain the maximal security for the
authorized user who accesses the database. Zhongmei Wan,
Jian Weng [10] proposed the CLPKC to a secure SMC
signature scheme without bilinear pairing. This Solves the key
revocation problem in an efficient way. It also uses the
random oracle based model on the intractability of factoring
problem.
III. SYSTEM DESIGN
The proposed scheme is “Two Layer Encryption” and it
is extended from the previous scheme of mCL-PKE. Thus,
the mCL-PKE scheme does not provide any authorized
certification entity for the user.
Fig. 1. System Architecture.
The Double Encryption Approach (DEA) means two
layer encryption which overcomes the computational
overhead of the mCL-PKE scheme. In this approach the user
first needs to get registered to the owner to obtain the secret
key to decrypt the encrypted documents.
The proposed scheme architecture can be categorized into
three main parts:(1) Cloud, (2) KGC and (3) User. Cloud can
be further sub divided into two parts; Encrypted storage (ES)
and Security mediator (SEM).
A. Cloud Set UP
The mCL-PKE scheme runs the Set Up operation of the
KGC in the cloud. Thereby generating the master key and
International Journal of Emerging Technology in Computer Science & Electronics (IJETCSE)
ISSN: 0976-1353 Volume 13 Issue 1 –MARCH 2015.
307
parameters for the system. Thus running the Set Up is a
one-time task in the cloud environment.
B. User Registration
User creates their own public and the private key pair,
called SK and PK by using the operations such as
SetPrivateKey and SetPublicKey respectively using the
mCL-PKE scheme.
• SetPrivateKey: It takes ID as input and output the user’s
(the owner of ID) secret value SKID . Each user runs this
algorithm.
• SetPublicKey: It takes parameter and secret key value of
the user as SKID as input and returns the user’s public
key PKID.
• SEM-Key Extract: In KGC, each user registers its own
identity and public key. The KGC in turn verifies the
user's private key corresponding to its public key and
takes the params, mk and user identity ID as input. It also
generates a SEM-key which is needed during decryption
time by the SEM. We assume that the SEM-key is
distributed securely to the SEM and for each user KGC
runs this algorithm.
Each user generates their own private and public key using
the mCL-PKE scheme. The user, send the keys to the KGC in
the cloud with the user identity(ID). After receiving the keys
from the user, the KGC generates a public key and two partial
keys. One partial key is called as SEM key which in turn sent
to SEM Storage part. Other partial key is referred to U-Key
given to the user. Public key referred as KGC key is used to
encrypt the data.SEM key, U-key, SK are used to decrypt the
data.
C. Data Encryption and uploading
In the data encryption phase, the data owner needs to
download the user's public key to generate the intermediate
keys. The data owner encrypts each data item only once using
a random symmetric key K. Then the mCL-PKE is
implemented to encrypt K using the KGC-Keys of users.
Using the extended mCL-PKE scheme, the data owner can
encrypt the data using the encryption key at once and some
additional information is provided to the cloud so that
authorized users, decrypts the encrypted content using their
private keys. The data owner uploads the encrypted data
along with the intermediate keys and the access control list to
the cloud. The cloud storage maintains the encrypted storage
separately to store the encrypted content and the intermediate
keys are stored to the SEM. The SEM in the cloud maintains
the access control list, certificated by the data owner.
• Encrypt: It takes params, a user’s identity ID, a message
M and user’s public key PKID as inputs and returns
either a ciphertext CID or a special symbol ⊥ means an
encryption failure. Any independent entity can run this
algorithm.
D. User Verification and data retrieval phase
In data retrieval phases, if an user wants some data it
forwards a request to the SEM in the cloud, to receive the
semi decrypted data. The cloud will verify the user based on
the access control list already which is already stored in the
cloud and examine whether the encrypted content is present in
the cloud storage area.
• SEM Decrypt: It takes parameter, a SEM-key, and a
ciphertext CID as input, and then returns either a partial
decrypted message Cid for the user or a special symbol
⊥ means an decryption failure. SEM in the cloud runs
this algorithm using SEM-key.
Once the verification was successful, the SEM partially
decrypts the data encrypted using the data owner’s public key
as input to the SEM-decryption operation and provides the
partially decrypted data along with the intermediate keys. The
user load is reduced upon the partial decryption at the SEM.
The efficiency of the system can be improved by storing the
partially decrypted document in the SEM storage area. Once
user is revoked, the data owner automatically updates the
access control list present in the SEM thereby avoiding the
future requests by the users are not denied. The data owner
does not encrypt the data and upload to the cloud whenever a
new user is been added to the system. Therefore the
revocation problem is completely resolved by this method.
Note that existing systems are affected by revoking or adding
new users to the system.
IV. PROPOSED ALGORITHM
The public-key cryptographic system contains the
presumed difficulty on factoring large integers. Here the
proposed RSA algorithm solves factoring problem. RSA
stands for Ron Rivest, Adi Shamir and Leonard Adleman.
RSA allows the user to create and publish their public key,
along with an auxiliary value, as the product of two
large prime numbers. The User must keep the prime factors as
a secret one.
Anyone can encrypt a message with use of the public key,
but with currently published methods, if the public key is
large enough, only the user with knowledge of the prime
factors can feasibly decrypt the message.
The SEM architecture is based on a variant of RSA which
we call Mediated RSA (mRSA). The main idea is to split each
RSA private key into two parts using simple 2-out-of-2
threshold RSA [14; 7]. One part is given to the client and the
other one to the SEM. If the SEM and its client cooperate with
each other, they employ their respective half-keys in a way
that is functionally equivalent to (and indistinguishable from)
standard RSA. Also, with the knowledge of a half-key the user
cannot be able to derive the entire private key. Therefore,
decryption or sign a message can be done neither by client nor
the SEM without mutual consent.
Algorithmic approach
Similar to RSA, each client Ui has a unique public key and
private key. The public key PKi includes ni and ei, where the
former is a product of two large distinct primes (pi ,qi) and ei is
an integer relatively prime to φ(ni)= (pi − 1)(qi − 1).
Logically, there is also a corresponding RSA private key
SKi
= (ni , di) where di*ei= 1 mod φ(ni). However, as
mentioned above, no one party has possession of di . Instead,
di is effectively split into two parts: di
u
and di
sem
which are
International Journal of Emerging Technology in Computer Science & Electronics (IJETCSE)
ISSN: 0976-1353 Volume 13 Issue 1 –MARCH 2015.
308
secretly held by the client Ui and a SEM, respectively. The
relationship among them is:
di = di
sem
+ di
u
mod φ (ni) (1)
Unlike plain RSA, an individual client Ui cannot generate
its own RSA keys. Instead, a trusted party (most likely, a CA)
initializes and distributes the RSA keys to clients. Once a
client’s request is received and approved, a CA executes the
RSA key generation algorithm described below.
RSA Key Setup: CA generates a distinct set: {pi, qi, ei, di,
di
sem
, di} for Ui. The first four values are generated as in
standard RSA. The fifth value, di
sem
, is a random integer in the
interval [1,ni] where ni = pi . qi. The last value is set as:
di
u
= di - di
sem
mod φ(ni) (2)
Improved Advanced Techniques
The KGC in the cloud provides the KGC-keys of users to
the data owner. Then the data owner symmetrically encrypts
each data item only once with the same access control policy
using a random session key K. The KGC-Keys of the users are
obtained by data owner to encrypt K again. The encrypted
content is uploaded to the cloud along with the access control
list. In the cloud storage, the encrypted content is stored in
encrypted storage area and the access control list certified by
the data owner is maintained in the SEM storage area. The
data owner uses AES key to encrypt the data.
The plain text is encrypted in the form of blocks. Each
blocks has a binary value less than some number n. That is, the
value of block size must be less than or equal to log2(n); in
practice, the block size is 2k bits, where 2k<n<=2k+1. The
process of Encryption and Decryption can be carried out in
the following form, for some plain text block P and cipher text
block Q:
Q = Pe mod n (3)
P = Qd mod n = (Pe)d mod n = Ped mod n (4)
The value of n must be know by both the sender and
receiver. The sender should know the value of e, and similarly
the receiver should know the value of d. Thus, the public key
encryption algorithm with a public key of KU = {e, n} and
private key of KR = {d, n}. This algorithm must be
satisfactory for the public key encryption scheme, and the
following requirements should be met:
• The values of e, d, n should be found such that Med = M
mod n for all M<n.
• Thus the calculation of Me and Cd for all values of M<n
is performed easily.
• Determining the value of d given e and n is infeasible.
The value of AES M is uploaded into the SEM and
encrypted data is stored in the cloud storage.
KeyExpansions—The key-expansion routine creates round
keys word by word, where word in an array of four bytes. The
routine creates 4x(Nr+1) words. For Nk=4 words, Nr=10; this
routine creates 44 words. AES needs a distinct 128-bit key for
each round plus one more.
InitialRound
AddRoundKey—The AddRoundKey is performed at the
beginning and end of the cipher in order to provide initial and
final randomness to the algorithm. Without this, the first or
last portion of the ciphertext could be easily deduced, and
therefore would be irrelevant to the security of the cipher.
SubBytes—The ByteSub transformation is a non-linear byte
substitution that operates independently on each byte of the
state using a substitution table(S-box). This process finds the
non-linearity in the cipher.
ShiftRows—The ShiftRows operates on individual rows of
the state. It provides diffusion throughout the AES algorithm.
This operation will not change the values of byte in the row,
but will change their order.
MixColumns—In the MixColumns transformation operates
on the State column-by-column, treating each column as a
four-term polynomial. Both techniques of ShiftRows,
MixColumns provides diffusion in the cipher.
V. DISCUSSION
The main objective of the project is to create a independent
key generator in the cloud storage. A high level security can
be achieved that safeguards data thereby avoiding cipher text
attack in datasets. This technique improves the efficiency of
encryption for the data owner and shares data securely on the
cloud storage. By using the AES algorithm we prevent the
cipher-text attacks and share the data from sender to the
receiver using proper requirement methods. Thereby it also
supports the immediate revocation and assures the
confidentiality of data stored in the cloud.
VI. RESULTS
A. Deployment of cloud with Storage Content and SEM
The mCL-PKE scheme guarantees the data confidentiality
stored in cloud whereas enforcing access control
requirements. Fig.2 includes the deployment of cloud service
environment for the transmission of data. The cloud consist of
two main services: an encrypted content storage and a security
mediation server (SEM). However the sharing of data in cloud
is not secure we need to implement some security mechanisms
for secure data transfer. SEM which acts as a security
mediator for each data request and partially decrypts
encrypted data for authorized users. This new extended
scheme reduces the overhead of using a pairing-free
approach. Further, the costs of computation for the decryption
process at the user level are reduced by enabling semi-trusted
security mediator which will do decryption partially before
the decrypt the encrypted data.
B. Environmental setup with independent KGC
The initial setup is done by the Key generation centre in
Fig. 3. It will run the set up operation using mCL-PKE scheme
and generates master key and system parameters. KGC
contains the keys of user’s and generate keys during key
process. This setup operation is a one-time task. The cloud is
trusted to perform the security mediation service and key
generation correctly, but it is untrusted for the data
confidentiality and escrow problem. This approach allows
user to have secure the key generation and management
functionality deployed in the cloud. It overcomes the key
International Journal of Emerging Technology in Computer Science & Electronics (IJETCSE)
ISSN: 0976-1353 Volume 13 Issue 1 –MARCH 2015.
309
escrow problem and hence the KGC is unable to learn the full
private keys of users.
C. Identity Token Issuance
User generates their own private and public key pair,
called SK and PK, using the SetPrivateKey and SetPublicKey
operations in Fig. 4. The user's identity (ID) and their public
keys are sent to the KGC, to produce two partial private keys
and a public key. The two partial keys are named as a
SEM-key and U-key. The SEM storage part in the cloud
stores the key called SEM-key. The U-key, is given to the
user. The KGC-key, referred to as public key, consists of the
KGC generated public key as well as the user generated
public key. For the encrypting the data, KGC-keys are used.
To decrypt the encrypted data SEM key, U-key, and SK are
used together. The partial private key and the public key for
user i as SEM-key i, U-key i, KGC-key i respectively.
Fig. 2. Cloud Deployment.
Fig. 3. Key Generation Center.
Fig. 4. User key generation.
Fig. 5. Experimental Result.
Fig. 5 shows the performance level of the secure data
sharing in proposed system and the existing system. The
overall results produces more security in my system than the
existing one.
VII. CONCLUSION
Our approach mainly focuses on the revocation problem
and key escrow problem using mCL-PKE scheme. This
scheme also give supports to the immediate revocation and
guarantees the data confidentiality in the cloud storage
thereby enforcing the access control policies of the data
owner. User generates keys to key generation center and the
KGC return two keys one for the user and another for SEM.
Data owner gets keys of users and encrypt data with user’s
public key and send it to cloud storage. User requests for the
data and the cloud verifies users access control list and
partially decrypt the encrypted data and send it to the user.
User decrypts the original content with his private key. When
compared to other methods this method shares secure data
with certificate less encryption. The future enhancement
includes using an additional efficient encryption and
decryption mechanism for encryption and decryption process.
International Journal of Emerging Technology in Computer Science & Electronics (IJETCSE)
ISSN: 0976-1353 Volume 13 Issue 1 –MARCH 2015.
310
ACKNOWLEDGMENT
The preliminary version of the paper appears in the
Proceedings of the National Conference on Advances in
Computing Technology (AICT '15) as an invited paper.
REFERENCES
[1] Mohamed Nabeel and Elisa Bertino, Mohamed Nabeel and Elisa
Bertino, “Privacy perserving delegated access control in public clouds,
”IEEE., vol. 26, no. 9, september 2014.
[2] Goyal.V, O. Pandey, and A. Sahai, “Attribute-based encryption for
fine-grained access control of encrypted data,”in Proc. 13th ACM
Conf. CCS, New York, NY, USA, 2006,pp. 89–98.
[3] C Wang.S.Yu, K. Ren, and W. Lou,“Attribute based data sharing with
attribute revocation,” inProc. 5th ASIACCS, NewYork, NY, USA,
2010, pp. 261–270.
[4] Al-Riyami.S and K. Paterson, “Certificateless public key
cryptography,” inProc. ASIACRYPT 2003, C.-S. Laih, Ed. Berlin,
Germany:Springer, LNCS 2894, pp. 452–473.
[5] Coull.S, M. Green, and S. Hohenberger, “Controlling access to an
oblivious database using stateful anonymous credentials,” in Irvine:
Proc. 12th Int. Conf. Practice and Theory in PKC, Chicago, IL,USA,
2009, pp. 501–520.
[6] Miklau.G and D. Suciu, “Controlling Access to the Published Data
Using Cryptography,”Proc. 29th Int’l Conf. Very Large Data
Bases(VLDB ’03), pp. 898-909, 2003.
[7] Bethencourt.J, A.Sahai, and B.Waters,“Ciphertext-policy attribute -
based encryption,” in Proc. 2007 IEEE Symp. SP,Taormina, Italy, pp.
321–334.
[8] Boneh.D, X. Ding, G. Tsudik, “Fine-grained control of security
capabilities,”ACM Trans. Internet Technol.,vol.4,no.1,pp. 60–82, Feb.
2004.
[9] J. Camenisch, M. Dubovitskaya, and G. Neven, “Oblivious transfer
with access control,” inProc. 16th ACM Conf. CCS,NewYork,NY,
USA, 2009, pp. 131–140.
[10] Zhongmei Wan, Jian Weng, and Jiguo Li “Security-mediated
certificateless signatures without pairing ,” vol. 5, no. 12, December
2010.
First Author
MS REVATHI.R received the MCA From Madras
University, Chennai in 2013 and pursuit for M.E(Computer Science Engg)
From St. Joseph college of Engineering, Sriperumbudur, Chennai, India. She
is now attending the M.E course in CSE and her research interest include
Computer Networks, with Cloud Computing and programming languages
(JAVA, .NET) and Web Development, DBMS.

Recomendados

KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUD por
KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUDKEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUD
KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUDNaseem nisar
14.7K vistas46 diapositivas
Key aggregate searchable encryption (kase) for group data sharing via cloud s... por
Key aggregate searchable encryption (kase) for group data sharing via cloud s...Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Key aggregate searchable encryption (kase) for group data sharing via cloud s...Pvrtechnologies Nellore
280 vistas7 diapositivas
Key aggregate searchable encryption (kase) for group data sharing via cloud s... por
Key aggregate searchable encryption (kase) for group data sharing via cloud s...Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Key aggregate searchable encryption (kase) for group data sharing via cloud s...LeMeniz Infotech
606 vistas3 diapositivas
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo... por
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...Editor IJCATR
124 vistas4 diapositivas
Key aggregate cryptosystem for scalable data sharing in cloud storage por
Key aggregate cryptosystem for scalable data sharing in cloud storageKey aggregate cryptosystem for scalable data sharing in cloud storage
Key aggregate cryptosystem for scalable data sharing in cloud storageShakas Technologies
2.1K vistas6 diapositivas
Attribute Based Encryption with Privacy Preserving In Clouds por
Attribute Based Encryption with Privacy Preserving In Clouds Attribute Based Encryption with Privacy Preserving In Clouds
Attribute Based Encryption with Privacy Preserving In Clouds Swathi Rampur
2.8K vistas17 diapositivas

Más contenido relacionado

La actualidad más candente

Key aggregate searchable encryption (kase) for group data sharing via cloud s... por
Key aggregate searchable encryption (kase) for group data sharing via cloud s...Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Key aggregate searchable encryption (kase) for group data sharing via cloud s...CloudTechnologies
2.4K vistas8 diapositivas
Key aggregate cryptosystem for scalable data sharing in cloud storage por
Key aggregate cryptosystem for scalable data sharing in cloud storageKey aggregate cryptosystem for scalable data sharing in cloud storage
Key aggregate cryptosystem for scalable data sharing in cloud storageShruthi Iyer
1.3K vistas13 diapositivas
Attribute-Based Encryption for Access of Secured Data in Cloud Storage por
Attribute-Based Encryption for Access of Secured Data in Cloud StorageAttribute-Based Encryption for Access of Secured Data in Cloud Storage
Attribute-Based Encryption for Access of Secured Data in Cloud StorageIJSRD
327 vistas3 diapositivas
An efficient certificate less encryption for por
An efficient certificate less encryption forAn efficient certificate less encryption for
An efficient certificate less encryption forShakas Technologies
153 vistas7 diapositivas
key-aggregate cryptosystem for scalable data sharing in cloud storage por
key-aggregate cryptosystem for scalable data sharing in cloud storagekey-aggregate cryptosystem for scalable data sharing in cloud storage
key-aggregate cryptosystem for scalable data sharing in cloud storageswathi78
824 vistas4 diapositivas
Attribute based encryption with privacy preserving in clouds por
Attribute based encryption with privacy preserving in cloudsAttribute based encryption with privacy preserving in clouds
Attribute based encryption with privacy preserving in cloudsSwathi Rampur
638 vistas6 diapositivas

La actualidad más candente(20)

Key aggregate searchable encryption (kase) for group data sharing via cloud s... por CloudTechnologies
Key aggregate searchable encryption (kase) for group data sharing via cloud s...Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
CloudTechnologies2.4K vistas
Key aggregate cryptosystem for scalable data sharing in cloud storage por Shruthi Iyer
Key aggregate cryptosystem for scalable data sharing in cloud storageKey aggregate cryptosystem for scalable data sharing in cloud storage
Key aggregate cryptosystem for scalable data sharing in cloud storage
Shruthi Iyer1.3K vistas
Attribute-Based Encryption for Access of Secured Data in Cloud Storage por IJSRD
Attribute-Based Encryption for Access of Secured Data in Cloud StorageAttribute-Based Encryption for Access of Secured Data in Cloud Storage
Attribute-Based Encryption for Access of Secured Data in Cloud Storage
IJSRD 327 vistas
key-aggregate cryptosystem for scalable data sharing in cloud storage por swathi78
key-aggregate cryptosystem for scalable data sharing in cloud storagekey-aggregate cryptosystem for scalable data sharing in cloud storage
key-aggregate cryptosystem for scalable data sharing in cloud storage
swathi78824 vistas
Attribute based encryption with privacy preserving in clouds por Swathi Rampur
Attribute based encryption with privacy preserving in cloudsAttribute based encryption with privacy preserving in clouds
Attribute based encryption with privacy preserving in clouds
Swathi Rampur638 vistas
Authentication on Cloud using Attribute Based Encryption por Ankit Raj
Authentication on Cloud using Attribute Based EncryptionAuthentication on Cloud using Attribute Based Encryption
Authentication on Cloud using Attribute Based Encryption
Ankit Raj758 vistas
Audit free cloud storage via deniable attribute-based encryption por Pvrtechnologies Nellore
Audit free cloud storage via deniable attribute-based encryptionAudit free cloud storage via deniable attribute-based encryption
Audit free cloud storage via deniable attribute-based encryption
Decentralized access control with anonymous authentication of data stored in ... por Adz91 Digital Ads Pvt Ltd
Decentralized access control with anonymous authentication of data stored in ...Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...
Secure Data Sharing Algorithm for Data Retrieval In Military Based Networks por IJTET Journal
Secure Data Sharing Algorithm for Data Retrieval In Military Based NetworksSecure Data Sharing Algorithm for Data Retrieval In Military Based Networks
Secure Data Sharing Algorithm for Data Retrieval In Military Based Networks
IJTET Journal447 vistas
Decentralized access control with anonymous authentication of data stored in ... por IGEEKS TECHNOLOGIES
Decentralized access control with anonymous authentication of data stored in ...Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...
IGEEKS TECHNOLOGIES8.3K vistas
Secure Redundant Data Avoidance over Multi-Cloud Architecture. por IJCERT JOURNAL
Secure Redundant Data Avoidance over Multi-Cloud Architecture. Secure Redundant Data Avoidance over Multi-Cloud Architecture.
Secure Redundant Data Avoidance over Multi-Cloud Architecture.
IJCERT JOURNAL224 vistas
An efficient certificateless encryption for data sharing on public cloud por Abhijeet Patil
An efficient certificateless encryption for data sharing on public cloudAn efficient certificateless encryption for data sharing on public cloud
An efficient certificateless encryption for data sharing on public cloud
Abhijeet Patil1.1K vistas
A review on key aggregate cryptosystem for scalable data sharing in cloud sto... por eSAT Journals
A review on key aggregate cryptosystem for scalable data sharing in cloud sto...A review on key aggregate cryptosystem for scalable data sharing in cloud sto...
A review on key aggregate cryptosystem for scalable data sharing in cloud sto...
eSAT Journals74 vistas
IEEE 2014 DOTNET NETWORKING PROJECTS Secure data-retrieval-for-decentralized-... por IEEEMEMTECHSTUDENTPROJECTS
IEEE 2014 DOTNET NETWORKING PROJECTS Secure data-retrieval-for-decentralized-...IEEE 2014 DOTNET NETWORKING PROJECTS Secure data-retrieval-for-decentralized-...
IEEE 2014 DOTNET NETWORKING PROJECTS Secure data-retrieval-for-decentralized-...
Control cloud-data-access-privilege-and-anonymity-with-fully-anonymous-attrib... por Pvrtechnologies Nellore
Control cloud-data-access-privilege-and-anonymity-with-fully-anonymous-attrib...Control cloud-data-access-privilege-and-anonymity-with-fully-anonymous-attrib...
Control cloud-data-access-privilege-and-anonymity-with-fully-anonymous-attrib...
Secure data retrieval for decentralized disruption tolerant military networks por IGEEKS TECHNOLOGIES
Secure data retrieval for decentralized disruption tolerant military networksSecure data retrieval for decentralized disruption tolerant military networks
Secure data retrieval for decentralized disruption tolerant military networks
IGEEKS TECHNOLOGIES11.7K vistas

Destacado

Encryption based multi user manner secured data sharing and storing in cloud por
Encryption based multi user manner secured data sharing and storing in cloudEncryption based multi user manner secured data sharing and storing in cloud
Encryption based multi user manner secured data sharing and storing in cloudprjpublications
637 vistas9 diapositivas
Secure Data Storage in Cloud Using Encryption and Steganography por
Secure Data Storage in Cloud Using Encryption and SteganographySecure Data Storage in Cloud Using Encryption and Steganography
Secure Data Storage in Cloud Using Encryption and Steganographyiosrjce
377 vistas4 diapositivas
Enhancing Data Storage Security in Cloud Computing Through Steganography por
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyIDES Editor
1.4K vistas7 diapositivas
LCEU13: Securing your cloud with Xen's advanced security features - George Du... por
LCEU13: Securing your cloud with Xen's advanced security features - George Du...LCEU13: Securing your cloud with Xen's advanced security features - George Du...
LCEU13: Securing your cloud with Xen's advanced security features - George Du...The Linux Foundation
195.3K vistas150 diapositivas
Cloud computing security from single to multiple por
Cloud computing security from single to multipleCloud computing security from single to multiple
Cloud computing security from single to multipleKiran Kumar
11.9K vistas47 diapositivas
Cloud Computing Security por
Cloud Computing SecurityCloud Computing Security
Cloud Computing SecurityNinh Nguyen
41.6K vistas37 diapositivas

Destacado(7)

Encryption based multi user manner secured data sharing and storing in cloud por prjpublications
Encryption based multi user manner secured data sharing and storing in cloudEncryption based multi user manner secured data sharing and storing in cloud
Encryption based multi user manner secured data sharing and storing in cloud
prjpublications637 vistas
Secure Data Storage in Cloud Using Encryption and Steganography por iosrjce
Secure Data Storage in Cloud Using Encryption and SteganographySecure Data Storage in Cloud Using Encryption and Steganography
Secure Data Storage in Cloud Using Encryption and Steganography
iosrjce377 vistas
Enhancing Data Storage Security in Cloud Computing Through Steganography por IDES Editor
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through Steganography
IDES Editor1.4K vistas
LCEU13: Securing your cloud with Xen's advanced security features - George Du... por The Linux Foundation
LCEU13: Securing your cloud with Xen's advanced security features - George Du...LCEU13: Securing your cloud with Xen's advanced security features - George Du...
LCEU13: Securing your cloud with Xen's advanced security features - George Du...
The Linux Foundation195.3K vistas
Cloud computing security from single to multiple por Kiran Kumar
Cloud computing security from single to multipleCloud computing security from single to multiple
Cloud computing security from single to multiple
Kiran Kumar11.9K vistas
Cloud Computing Security por Ninh Nguyen
Cloud Computing SecurityCloud Computing Security
Cloud Computing Security
Ninh Nguyen41.6K vistas
Data security in cloud computing por Prince Chandu
Data security in cloud computingData security in cloud computing
Data security in cloud computing
Prince Chandu77.6K vistas

Similar a 766 a secure-data-sharing-in-cloud-storage-with-independent-key-generation-centre-and-certificate-less-encryption-pdf

CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T... por
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...IJNSA Journal
4 vistas11 diapositivas
Paper id 27201446 por
Paper id 27201446Paper id 27201446
Paper id 27201446IJRAT
399 vistas4 diapositivas
C04932125 por
C04932125C04932125
C04932125IOSR-JEN
362 vistas5 diapositivas
IRJET- Secure Data Deduplication and Auditing for Cloud Data Storage por
IRJET-  	  Secure Data Deduplication and Auditing for Cloud Data StorageIRJET-  	  Secure Data Deduplication and Auditing for Cloud Data Storage
IRJET- Secure Data Deduplication and Auditing for Cloud Data StorageIRJET Journal
21 vistas5 diapositivas
Improving Efficiency of Security in Multi-Cloud por
Improving Efficiency of Security in Multi-CloudImproving Efficiency of Security in Multi-Cloud
Improving Efficiency of Security in Multi-CloudIJTET Journal
317 vistas4 diapositivas
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri... por
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...IRJET Journal
35 vistas6 diapositivas

Similar a 766 a secure-data-sharing-in-cloud-storage-with-independent-key-generation-centre-and-certificate-less-encryption-pdf(20)

CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T... por IJNSA Journal
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
IJNSA Journal4 vistas
Paper id 27201446 por IJRAT
Paper id 27201446Paper id 27201446
Paper id 27201446
IJRAT399 vistas
C04932125 por IOSR-JEN
C04932125C04932125
C04932125
IOSR-JEN362 vistas
IRJET- Secure Data Deduplication and Auditing for Cloud Data Storage por IRJET Journal
IRJET-  	  Secure Data Deduplication and Auditing for Cloud Data StorageIRJET-  	  Secure Data Deduplication and Auditing for Cloud Data Storage
IRJET- Secure Data Deduplication and Auditing for Cloud Data Storage
IRJET Journal21 vistas
Improving Efficiency of Security in Multi-Cloud por IJTET Journal
Improving Efficiency of Security in Multi-CloudImproving Efficiency of Security in Multi-Cloud
Improving Efficiency of Security in Multi-Cloud
IJTET Journal317 vistas
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri... por IRJET Journal
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET Journal35 vistas
A Hybrid Cloud Approach for Secure Authorized Deduplication por SWAMI06
A Hybrid Cloud Approach for Secure Authorized DeduplicationA Hybrid Cloud Approach for Secure Authorized Deduplication
A Hybrid Cloud Approach for Secure Authorized Deduplication
SWAMI061.7K vistas
Key aggregate cryptosystem for scalable data sharing in cloud storage por Mugesh Mukkandan
Key aggregate cryptosystem for scalable data sharing in cloud storageKey aggregate cryptosystem for scalable data sharing in cloud storage
Key aggregate cryptosystem for scalable data sharing in cloud storage
Mugesh Mukkandan3K vistas
Attribute-Based Data Sharing por IJERA Editor
Attribute-Based Data SharingAttribute-Based Data Sharing
Attribute-Based Data Sharing
IJERA Editor353 vistas
Two Aspect Validation Control Frameworks for Online Distributed Services por IRJET Journal
Two Aspect Validation Control Frameworks for Online Distributed ServicesTwo Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed Services
IRJET Journal35 vistas
Privacy Preserving Delegated Access Control in Public Clouds por Md Uddin
Privacy Preserving Delegated Access Control in Public CloudsPrivacy Preserving Delegated Access Control in Public Clouds
Privacy Preserving Delegated Access Control in Public Clouds
Md Uddin1.4K vistas
Application of CP-ABE Scheme in Data Sharing System for confidentiality por Editor IJMTER
Application of CP-ABE Scheme in Data Sharing System for confidentialityApplication of CP-ABE Scheme in Data Sharing System for confidentiality
Application of CP-ABE Scheme in Data Sharing System for confidentiality
Editor IJMTER549 vistas
iaetsd Robots in oil and gas refineries por Iaetsd Iaetsd
iaetsd Robots in oil and gas refineriesiaetsd Robots in oil and gas refineries
iaetsd Robots in oil and gas refineries
Iaetsd Iaetsd83 vistas
Identifying the Performance Efficiency Of Attribute Based Encryption With Sec... por IJSRD
Identifying the Performance Efficiency Of Attribute Based Encryption With Sec...Identifying the Performance Efficiency Of Attribute Based Encryption With Sec...
Identifying the Performance Efficiency Of Attribute Based Encryption With Sec...
IJSRD 177 vistas
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ... por IRJET Journal
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET Journal10 vistas
Secure sensitive data sharing on a big data platform por Nexgen Technology
Secure sensitive data sharing on a big data platformSecure sensitive data sharing on a big data platform
Secure sensitive data sharing on a big data platform
Nexgen Technology 1.7K vistas
Secure sensitive data sharing on a big data platform por Nexgen Technology
Secure sensitive data sharing on a big data platformSecure sensitive data sharing on a big data platform
Secure sensitive data sharing on a big data platform
Nexgen Technology 404 vistas
Privacy preserving delegated access control in public cloud por Aswathy Rajan
Privacy preserving delegated access control in public cloudPrivacy preserving delegated access control in public cloud
Privacy preserving delegated access control in public cloud
Aswathy Rajan1.3K vistas
An Efficient Scheme for Data Sharing Among Dynamic Cloud Members por IRJET Journal
An Efficient Scheme for Data Sharing Among Dynamic Cloud MembersAn Efficient Scheme for Data Sharing Among Dynamic Cloud Members
An Efficient Scheme for Data Sharing Among Dynamic Cloud Members
IRJET Journal39 vistas
Towards Secure Data Distribution Systems in Mobile Cloud Computing: A Survey por IRJET Journal
Towards Secure Data Distribution Systems in Mobile Cloud Computing: A SurveyTowards Secure Data Distribution Systems in Mobile Cloud Computing: A Survey
Towards Secure Data Distribution Systems in Mobile Cloud Computing: A Survey
IRJET Journal49 vistas

Último

"Node.js vs workers — A comparison of two JavaScript runtimes", James M Snell por
"Node.js vs workers — A comparison of two JavaScript runtimes", James M Snell"Node.js vs workers — A comparison of two JavaScript runtimes", James M Snell
"Node.js vs workers — A comparison of two JavaScript runtimes", James M SnellFwdays
14 vistas30 diapositivas
PCCC23:日本AMD株式会社 テーマ1「AMD Instinct™ アクセラレーターの概要」 por
PCCC23:日本AMD株式会社 テーマ1「AMD Instinct™ アクセラレーターの概要」PCCC23:日本AMD株式会社 テーマ1「AMD Instinct™ アクセラレーターの概要」
PCCC23:日本AMD株式会社 テーマ1「AMD Instinct™ アクセラレーターの概要」PC Cluster Consortium
29 vistas68 diapositivas
Innovation & Entrepreneurship strategies in Dairy Industry por
Innovation & Entrepreneurship strategies in Dairy IndustryInnovation & Entrepreneurship strategies in Dairy Industry
Innovation & Entrepreneurship strategies in Dairy IndustryPervaizDar1
39 vistas26 diapositivas
Cencora Executive Symposium por
Cencora Executive SymposiumCencora Executive Symposium
Cencora Executive Symposiummarketingcommunicati21
174 vistas14 diapositivas
Future of AR - Facebook Presentation por
Future of AR - Facebook PresentationFuture of AR - Facebook Presentation
Future of AR - Facebook PresentationRob McCarty
66 vistas27 diapositivas
Enabling DPU Hardware Accelerators in XCP-ng Cloud Platform Environment - And... por
Enabling DPU Hardware Accelerators in XCP-ng Cloud Platform Environment - And...Enabling DPU Hardware Accelerators in XCP-ng Cloud Platform Environment - And...
Enabling DPU Hardware Accelerators in XCP-ng Cloud Platform Environment - And...ShapeBlue
120 vistas12 diapositivas

Último(20)

"Node.js vs workers — A comparison of two JavaScript runtimes", James M Snell por Fwdays
"Node.js vs workers — A comparison of two JavaScript runtimes", James M Snell"Node.js vs workers — A comparison of two JavaScript runtimes", James M Snell
"Node.js vs workers — A comparison of two JavaScript runtimes", James M Snell
Fwdays14 vistas
PCCC23:日本AMD株式会社 テーマ1「AMD Instinct™ アクセラレーターの概要」 por PC Cluster Consortium
PCCC23:日本AMD株式会社 テーマ1「AMD Instinct™ アクセラレーターの概要」PCCC23:日本AMD株式会社 テーマ1「AMD Instinct™ アクセラレーターの概要」
PCCC23:日本AMD株式会社 テーマ1「AMD Instinct™ アクセラレーターの概要」
Innovation & Entrepreneurship strategies in Dairy Industry por PervaizDar1
Innovation & Entrepreneurship strategies in Dairy IndustryInnovation & Entrepreneurship strategies in Dairy Industry
Innovation & Entrepreneurship strategies in Dairy Industry
PervaizDar139 vistas
Future of AR - Facebook Presentation por Rob McCarty
Future of AR - Facebook PresentationFuture of AR - Facebook Presentation
Future of AR - Facebook Presentation
Rob McCarty66 vistas
Enabling DPU Hardware Accelerators in XCP-ng Cloud Platform Environment - And... por ShapeBlue
Enabling DPU Hardware Accelerators in XCP-ng Cloud Platform Environment - And...Enabling DPU Hardware Accelerators in XCP-ng Cloud Platform Environment - And...
Enabling DPU Hardware Accelerators in XCP-ng Cloud Platform Environment - And...
ShapeBlue120 vistas
Business Analyst Series 2023 - Week 4 Session 8 por DianaGray10
Business Analyst Series 2023 -  Week 4 Session 8Business Analyst Series 2023 -  Week 4 Session 8
Business Analyst Series 2023 - Week 4 Session 8
DianaGray10180 vistas
Deep Tech and the Amplified Organisation: Core Concepts por Holonomics
Deep Tech and the Amplified Organisation: Core ConceptsDeep Tech and the Amplified Organisation: Core Concepts
Deep Tech and the Amplified Organisation: Core Concepts
Holonomics17 vistas
"Package management in monorepos", Zoltan Kochan por Fwdays
"Package management in monorepos", Zoltan Kochan"Package management in monorepos", Zoltan Kochan
"Package management in monorepos", Zoltan Kochan
Fwdays37 vistas
"Node.js Development in 2024: trends and tools", Nikita Galkin por Fwdays
"Node.js Development in 2024: trends and tools", Nikita Galkin "Node.js Development in 2024: trends and tools", Nikita Galkin
"Node.js Development in 2024: trends and tools", Nikita Galkin
Fwdays37 vistas
Optimizing Communication to Optimize Human Behavior - LCBM por Yaman Kumar
Optimizing Communication to Optimize Human Behavior - LCBMOptimizing Communication to Optimize Human Behavior - LCBM
Optimizing Communication to Optimize Human Behavior - LCBM
Yaman Kumar39 vistas
Cocktail of Environments. How to Mix Test and Development Environments and St... por Aleksandr Tarasov
Cocktail of Environments. How to Mix Test and Development Environments and St...Cocktail of Environments. How to Mix Test and Development Environments and St...
Cocktail of Environments. How to Mix Test and Development Environments and St...
Aleksandr Tarasov26 vistas
Transcript: Redefining the book supply chain: A glimpse into the future - Tec... por BookNet Canada
Transcript: Redefining the book supply chain: A glimpse into the future - Tec...Transcript: Redefining the book supply chain: A glimpse into the future - Tec...
Transcript: Redefining the book supply chain: A glimpse into the future - Tec...
BookNet Canada43 vistas
What is Authentication Active Directory_.pptx por HeenaMehta35
What is Authentication Active Directory_.pptxWhat is Authentication Active Directory_.pptx
What is Authentication Active Directory_.pptx
HeenaMehta3515 vistas

766 a secure-data-sharing-in-cloud-storage-with-independent-key-generation-centre-and-certificate-less-encryption-pdf

  • 1. International Journal of Emerging Technology in Computer Science & Electronics (IJETCSE) ISSN: 0976-1353 Volume 13 Issue 1 –MARCH 2015. 305 Abstract— A mediated certificateless encryption (mCL-PKE) scheme which solves the certificate revocation problem and the key escrow problem and preserves the data confidentiality in the cloud. Since most of the CL-PKE schemes are based on bilinear pairing and computationally expensive. mCL-PKE scheme does not utilize pairing operation problem. The security mediator supports instantaneous revocation of compromised or malicious users and act as the policy enforcement scheme. This method is highly efficient than the bilinear pairing based scheme. The mCL-PKE scheme with the access control lists is been proposed to overcome the problem of sharing the sensitive information in the cloud storage. The access control list contains the details of the user and this list is generated to the cloud and the data owner for verification purpose. The main problem stated here is the key generation center in the cloud. This will bring vulnerabilities against the secure key generation. A new method is discovered to implement the key generation centre as an independent center which shares key independently. According to the access control, the data is being encrypted by the data owner using the symmetric encryption algorithm and uploads encrypted data items with an intermediate keys to the cloud. The user uses their private key to convert the partially decrypted data to the fully decrypted one. The cloud storage does not perform the decryption operation fully to preserve the data confidentiality as well as the keys information. The extension of the mCL-PKE approach allows the data owner to improvise the encryption operation in an efficient way and also to implement high level independent security in the cloud based system. The result of the mCL-PKE schemes is efficient and practical. Index Terms— Access control list, Bilinear pairing, mCL-PKE, Security mediator. I. INTRODUCTION The cloud computing provides a massive computing power and storage capacity which enables users to share sensitive data in the public cloud. Maintaining the data confidentiality is an important functionality in the cloud. An advantage of using a cloud for storage is that the provider is responsible for building and maintaining the storage infrastructure and its associated costs including power, cooling and server maintenance. In Certificate-less Public Key Cryptography (CL-PKC) each user holds a combination of partial private key produced by the KGC and a user-chosen secret key. The key escrow problem can be resolved by using this technique. As the structure of CL-PKC guarantees the validity of the user’s public key without the certificate, it removes the certificate management problem. Since the advent of CL-PKC, many CL-PKE schemes have been proposed based on bilinear pairings. The computational cost required for pairing is still considerably high compared to other operations such as modular exponentiation in finite fields. To improve efficiency a strongly secure CL-PKE without pairing operations is proposed. However, the previous CL-PKE schemes could not solve the key revocation problem. In public key cryptography, we should consider scenarios where some private keys are compromised. There is not an use of securing the corresponding public keys, if the private keys are compromised. Attribute Based Encryption (ABE) method is been proposed which provide the flexibility for the user to encrypt each data item based upon their access control policy. ABE suffers from the revocation problem because the private keys provided to the existing users has to be updated whenever a user dynamic changes. To address this problem the concept of mediated cryptography to support immediate revocation is proposed. This mCL-PKE scheme, propose a novel approach to assure the confidentiality of data stored in public clouds whereas enforcing the access control requirements. The mediated cryptography makes a practical and effective use of security mediator (SEM) which can control security capabilities for every transaction. The user's participation in a transaction will stopped immediately, once the SEM is been notified that a user’s public key should be revoked. A notation of security-mediated certificate-less cryptography is proposed to present a mCL-PKE depends upon the pairing operations. If user directly applies the basic mCL.PKE scheme to the cloud computing environment or several users access the same data, the cost of encryption for the data owner becomes high. In these cases, the data owner should encrypt the data item with the same encryption key for multiple times. To address this problem, the basic mCL-PKE scheme with an extension is been introduced. This extended scheme makes the data owner to apply the data encryption key process only once which in turns provides some added information to the cloud. By making use of this additional information the authorized users can decrypt their content using the private keys. This one is similar to that of the Proxy Re-Encryption (PRE) in which the encryption key is encrypted using the data owner’s public key and continue later to decrypt using different private keys. However, in this extension scheme, the cloud does not perform any transformation it simply acts as the storage model. The security model of the existing schemes are insecure against partial decryption attack, which does not consider any adversary capabilities of the requesting partial decryptions. Hence a secure mediated CL-PKE without pairings is needed. A SECURE DATA SHARING IN CLOUD STORAGE WITH INDEPENDENT KEY GENERATION CENTRE AND CERTIFICATE-LESS ENCRYPTION REVATHI.R#1 # M.E, CSE, ST.JOSEPH COLLEGE OF ENGINEERING, CHENNAI, INDIA
  • 2. International Journal of Emerging Technology in Computer Science & Electronics (IJETCSE) ISSN: 0976-1353 Volume 13 Issue 1 –MARCH 2015. 306 The concept behind this scheme is, data owner encrypts the data and sends the encrypted content to the cloud. Then the cloud partial decrypts the outer-layer of the encrypted document and it to the requested users. The user, then fully decrypt the inner layer of the document using their secret keys. The main entities of this approach is (1) Data Owner, (2) Cloud and (3) User. The cloud contains the encrypted storage and the Security mediator(SEM). Encrypted storage part contains all the user encrypted data, SEM contains the partial decrypted data and the KGC generates the KGC key for the data owner to encrypt the document. As this KGC is made as an independent one to provide high level security for the user keys. To reduce the amount of the time required for the processes the cloud is sub divided into three parts as mentioned above. Key Generation which in turn reduce the total time of the whole process. Encryption approach are of two types, (1) Symmetric key, (2) Asymmetric key. Both the encryption and decryption process can be done with the same key called Symmetric key but two different set of keys are used in the asymmetric approach. As this symmetric key approach is much faster one than the asymmetric approach for the encrypting and decrypting the document. The key management and key distribution process are easier in asymmetric approach whereas it is tedious one in symmetric key approach. Symmetric key approach is used in the proposed method to provide the high level security to the user. In this scheme, no certificate is provided to the users by making the symmetric approach as an efficient and easy one. To protect the user from the malicious attack it is necessary to have a revocation as a compromised one. SEM supports the immediate revocation from the malicious users. There is no need to update the private key of the user whenever the user is been revoked. The most important thing is that, if more than one users are trying to access the same content then the encryption cost become too high for the owner. The same content has to be encrypted multiple times for multiple user by the data owner. To overcome this problem the extended mCL-PKE scheme makes the data owner to encrypt the file only once and the additional information are provided to the cloud to decrypt the data for the authorized users. II. RELATED WORK In 2006, V. Goyal, O. Pandey, A. Sahai, B. Waters [2] introduced a Fine-grained sharing of encrypted data called as Key-Policy Attribute-Based Encryption (KP-ABE). Access structure contains set of attributes and private keys to control the cipher text encryption which shares the audit-log information. To overcome the problem of identity based cryptography system S. Al- Riyami, K. Paterson [4] introduce the CL-PKE scheme. In this scheme no certificates are required to guarantee authenticity of the public keys. An intermediate exists between identity based and traditional PKE approaches. S. Coull, M. Green, and S. Hohenberger [5] proposed the concept of combining the protocol the stateful anonymous credential system with an adaptive Oblivious Transfer protocol to improve the efficiency. This Protocol combines Oblivious and anonymous protocols provides flexibility to the system. Without knowing the identity or item choices it restricts users to access the data item. D. Boneh, X. Ding, G. Tsudik [8] introduced the concept online semi-trusted mediator(SEM) to improvise the user security. SEM is combined with a simple threshold variant of the RSA cryptosystem. To Provide a simplified validation of digital signature and efficient certificate revocation. J. Camenisch, M. Dubovitskaya, G. Neven [9] proposed a protocol which is used to prevent from an anonymous access to a database. This protocol use the Diffie-Hellman model to secure the standard mode which leads to obtain the maximal security for the authorized user who accesses the database. Zhongmei Wan, Jian Weng [10] proposed the CLPKC to a secure SMC signature scheme without bilinear pairing. This Solves the key revocation problem in an efficient way. It also uses the random oracle based model on the intractability of factoring problem. III. SYSTEM DESIGN The proposed scheme is “Two Layer Encryption” and it is extended from the previous scheme of mCL-PKE. Thus, the mCL-PKE scheme does not provide any authorized certification entity for the user. Fig. 1. System Architecture. The Double Encryption Approach (DEA) means two layer encryption which overcomes the computational overhead of the mCL-PKE scheme. In this approach the user first needs to get registered to the owner to obtain the secret key to decrypt the encrypted documents. The proposed scheme architecture can be categorized into three main parts:(1) Cloud, (2) KGC and (3) User. Cloud can be further sub divided into two parts; Encrypted storage (ES) and Security mediator (SEM). A. Cloud Set UP The mCL-PKE scheme runs the Set Up operation of the KGC in the cloud. Thereby generating the master key and
  • 3. International Journal of Emerging Technology in Computer Science & Electronics (IJETCSE) ISSN: 0976-1353 Volume 13 Issue 1 –MARCH 2015. 307 parameters for the system. Thus running the Set Up is a one-time task in the cloud environment. B. User Registration User creates their own public and the private key pair, called SK and PK by using the operations such as SetPrivateKey and SetPublicKey respectively using the mCL-PKE scheme. • SetPrivateKey: It takes ID as input and output the user’s (the owner of ID) secret value SKID . Each user runs this algorithm. • SetPublicKey: It takes parameter and secret key value of the user as SKID as input and returns the user’s public key PKID. • SEM-Key Extract: In KGC, each user registers its own identity and public key. The KGC in turn verifies the user's private key corresponding to its public key and takes the params, mk and user identity ID as input. It also generates a SEM-key which is needed during decryption time by the SEM. We assume that the SEM-key is distributed securely to the SEM and for each user KGC runs this algorithm. Each user generates their own private and public key using the mCL-PKE scheme. The user, send the keys to the KGC in the cloud with the user identity(ID). After receiving the keys from the user, the KGC generates a public key and two partial keys. One partial key is called as SEM key which in turn sent to SEM Storage part. Other partial key is referred to U-Key given to the user. Public key referred as KGC key is used to encrypt the data.SEM key, U-key, SK are used to decrypt the data. C. Data Encryption and uploading In the data encryption phase, the data owner needs to download the user's public key to generate the intermediate keys. The data owner encrypts each data item only once using a random symmetric key K. Then the mCL-PKE is implemented to encrypt K using the KGC-Keys of users. Using the extended mCL-PKE scheme, the data owner can encrypt the data using the encryption key at once and some additional information is provided to the cloud so that authorized users, decrypts the encrypted content using their private keys. The data owner uploads the encrypted data along with the intermediate keys and the access control list to the cloud. The cloud storage maintains the encrypted storage separately to store the encrypted content and the intermediate keys are stored to the SEM. The SEM in the cloud maintains the access control list, certificated by the data owner. • Encrypt: It takes params, a user’s identity ID, a message M and user’s public key PKID as inputs and returns either a ciphertext CID or a special symbol ⊥ means an encryption failure. Any independent entity can run this algorithm. D. User Verification and data retrieval phase In data retrieval phases, if an user wants some data it forwards a request to the SEM in the cloud, to receive the semi decrypted data. The cloud will verify the user based on the access control list already which is already stored in the cloud and examine whether the encrypted content is present in the cloud storage area. • SEM Decrypt: It takes parameter, a SEM-key, and a ciphertext CID as input, and then returns either a partial decrypted message Cid for the user or a special symbol ⊥ means an decryption failure. SEM in the cloud runs this algorithm using SEM-key. Once the verification was successful, the SEM partially decrypts the data encrypted using the data owner’s public key as input to the SEM-decryption operation and provides the partially decrypted data along with the intermediate keys. The user load is reduced upon the partial decryption at the SEM. The efficiency of the system can be improved by storing the partially decrypted document in the SEM storage area. Once user is revoked, the data owner automatically updates the access control list present in the SEM thereby avoiding the future requests by the users are not denied. The data owner does not encrypt the data and upload to the cloud whenever a new user is been added to the system. Therefore the revocation problem is completely resolved by this method. Note that existing systems are affected by revoking or adding new users to the system. IV. PROPOSED ALGORITHM The public-key cryptographic system contains the presumed difficulty on factoring large integers. Here the proposed RSA algorithm solves factoring problem. RSA stands for Ron Rivest, Adi Shamir and Leonard Adleman. RSA allows the user to create and publish their public key, along with an auxiliary value, as the product of two large prime numbers. The User must keep the prime factors as a secret one. Anyone can encrypt a message with use of the public key, but with currently published methods, if the public key is large enough, only the user with knowledge of the prime factors can feasibly decrypt the message. The SEM architecture is based on a variant of RSA which we call Mediated RSA (mRSA). The main idea is to split each RSA private key into two parts using simple 2-out-of-2 threshold RSA [14; 7]. One part is given to the client and the other one to the SEM. If the SEM and its client cooperate with each other, they employ their respective half-keys in a way that is functionally equivalent to (and indistinguishable from) standard RSA. Also, with the knowledge of a half-key the user cannot be able to derive the entire private key. Therefore, decryption or sign a message can be done neither by client nor the SEM without mutual consent. Algorithmic approach Similar to RSA, each client Ui has a unique public key and private key. The public key PKi includes ni and ei, where the former is a product of two large distinct primes (pi ,qi) and ei is an integer relatively prime to φ(ni)= (pi − 1)(qi − 1). Logically, there is also a corresponding RSA private key SKi = (ni , di) where di*ei= 1 mod φ(ni). However, as mentioned above, no one party has possession of di . Instead, di is effectively split into two parts: di u and di sem which are
  • 4. International Journal of Emerging Technology in Computer Science & Electronics (IJETCSE) ISSN: 0976-1353 Volume 13 Issue 1 –MARCH 2015. 308 secretly held by the client Ui and a SEM, respectively. The relationship among them is: di = di sem + di u mod φ (ni) (1) Unlike plain RSA, an individual client Ui cannot generate its own RSA keys. Instead, a trusted party (most likely, a CA) initializes and distributes the RSA keys to clients. Once a client’s request is received and approved, a CA executes the RSA key generation algorithm described below. RSA Key Setup: CA generates a distinct set: {pi, qi, ei, di, di sem , di} for Ui. The first four values are generated as in standard RSA. The fifth value, di sem , is a random integer in the interval [1,ni] where ni = pi . qi. The last value is set as: di u = di - di sem mod φ(ni) (2) Improved Advanced Techniques The KGC in the cloud provides the KGC-keys of users to the data owner. Then the data owner symmetrically encrypts each data item only once with the same access control policy using a random session key K. The KGC-Keys of the users are obtained by data owner to encrypt K again. The encrypted content is uploaded to the cloud along with the access control list. In the cloud storage, the encrypted content is stored in encrypted storage area and the access control list certified by the data owner is maintained in the SEM storage area. The data owner uses AES key to encrypt the data. The plain text is encrypted in the form of blocks. Each blocks has a binary value less than some number n. That is, the value of block size must be less than or equal to log2(n); in practice, the block size is 2k bits, where 2k<n<=2k+1. The process of Encryption and Decryption can be carried out in the following form, for some plain text block P and cipher text block Q: Q = Pe mod n (3) P = Qd mod n = (Pe)d mod n = Ped mod n (4) The value of n must be know by both the sender and receiver. The sender should know the value of e, and similarly the receiver should know the value of d. Thus, the public key encryption algorithm with a public key of KU = {e, n} and private key of KR = {d, n}. This algorithm must be satisfactory for the public key encryption scheme, and the following requirements should be met: • The values of e, d, n should be found such that Med = M mod n for all M<n. • Thus the calculation of Me and Cd for all values of M<n is performed easily. • Determining the value of d given e and n is infeasible. The value of AES M is uploaded into the SEM and encrypted data is stored in the cloud storage. KeyExpansions—The key-expansion routine creates round keys word by word, where word in an array of four bytes. The routine creates 4x(Nr+1) words. For Nk=4 words, Nr=10; this routine creates 44 words. AES needs a distinct 128-bit key for each round plus one more. InitialRound AddRoundKey—The AddRoundKey is performed at the beginning and end of the cipher in order to provide initial and final randomness to the algorithm. Without this, the first or last portion of the ciphertext could be easily deduced, and therefore would be irrelevant to the security of the cipher. SubBytes—The ByteSub transformation is a non-linear byte substitution that operates independently on each byte of the state using a substitution table(S-box). This process finds the non-linearity in the cipher. ShiftRows—The ShiftRows operates on individual rows of the state. It provides diffusion throughout the AES algorithm. This operation will not change the values of byte in the row, but will change their order. MixColumns—In the MixColumns transformation operates on the State column-by-column, treating each column as a four-term polynomial. Both techniques of ShiftRows, MixColumns provides diffusion in the cipher. V. DISCUSSION The main objective of the project is to create a independent key generator in the cloud storage. A high level security can be achieved that safeguards data thereby avoiding cipher text attack in datasets. This technique improves the efficiency of encryption for the data owner and shares data securely on the cloud storage. By using the AES algorithm we prevent the cipher-text attacks and share the data from sender to the receiver using proper requirement methods. Thereby it also supports the immediate revocation and assures the confidentiality of data stored in the cloud. VI. RESULTS A. Deployment of cloud with Storage Content and SEM The mCL-PKE scheme guarantees the data confidentiality stored in cloud whereas enforcing access control requirements. Fig.2 includes the deployment of cloud service environment for the transmission of data. The cloud consist of two main services: an encrypted content storage and a security mediation server (SEM). However the sharing of data in cloud is not secure we need to implement some security mechanisms for secure data transfer. SEM which acts as a security mediator for each data request and partially decrypts encrypted data for authorized users. This new extended scheme reduces the overhead of using a pairing-free approach. Further, the costs of computation for the decryption process at the user level are reduced by enabling semi-trusted security mediator which will do decryption partially before the decrypt the encrypted data. B. Environmental setup with independent KGC The initial setup is done by the Key generation centre in Fig. 3. It will run the set up operation using mCL-PKE scheme and generates master key and system parameters. KGC contains the keys of user’s and generate keys during key process. This setup operation is a one-time task. The cloud is trusted to perform the security mediation service and key generation correctly, but it is untrusted for the data confidentiality and escrow problem. This approach allows user to have secure the key generation and management functionality deployed in the cloud. It overcomes the key
  • 5. International Journal of Emerging Technology in Computer Science & Electronics (IJETCSE) ISSN: 0976-1353 Volume 13 Issue 1 –MARCH 2015. 309 escrow problem and hence the KGC is unable to learn the full private keys of users. C. Identity Token Issuance User generates their own private and public key pair, called SK and PK, using the SetPrivateKey and SetPublicKey operations in Fig. 4. The user's identity (ID) and their public keys are sent to the KGC, to produce two partial private keys and a public key. The two partial keys are named as a SEM-key and U-key. The SEM storage part in the cloud stores the key called SEM-key. The U-key, is given to the user. The KGC-key, referred to as public key, consists of the KGC generated public key as well as the user generated public key. For the encrypting the data, KGC-keys are used. To decrypt the encrypted data SEM key, U-key, and SK are used together. The partial private key and the public key for user i as SEM-key i, U-key i, KGC-key i respectively. Fig. 2. Cloud Deployment. Fig. 3. Key Generation Center. Fig. 4. User key generation. Fig. 5. Experimental Result. Fig. 5 shows the performance level of the secure data sharing in proposed system and the existing system. The overall results produces more security in my system than the existing one. VII. CONCLUSION Our approach mainly focuses on the revocation problem and key escrow problem using mCL-PKE scheme. This scheme also give supports to the immediate revocation and guarantees the data confidentiality in the cloud storage thereby enforcing the access control policies of the data owner. User generates keys to key generation center and the KGC return two keys one for the user and another for SEM. Data owner gets keys of users and encrypt data with user’s public key and send it to cloud storage. User requests for the data and the cloud verifies users access control list and partially decrypt the encrypted data and send it to the user. User decrypts the original content with his private key. When compared to other methods this method shares secure data with certificate less encryption. The future enhancement includes using an additional efficient encryption and decryption mechanism for encryption and decryption process.
  • 6. International Journal of Emerging Technology in Computer Science & Electronics (IJETCSE) ISSN: 0976-1353 Volume 13 Issue 1 –MARCH 2015. 310 ACKNOWLEDGMENT The preliminary version of the paper appears in the Proceedings of the National Conference on Advances in Computing Technology (AICT '15) as an invited paper. REFERENCES [1] Mohamed Nabeel and Elisa Bertino, Mohamed Nabeel and Elisa Bertino, “Privacy perserving delegated access control in public clouds, ”IEEE., vol. 26, no. 9, september 2014. [2] Goyal.V, O. Pandey, and A. Sahai, “Attribute-based encryption for fine-grained access control of encrypted data,”in Proc. 13th ACM Conf. CCS, New York, NY, USA, 2006,pp. 89–98. [3] C Wang.S.Yu, K. Ren, and W. Lou,“Attribute based data sharing with attribute revocation,” inProc. 5th ASIACCS, NewYork, NY, USA, 2010, pp. 261–270. [4] Al-Riyami.S and K. Paterson, “Certificateless public key cryptography,” inProc. ASIACRYPT 2003, C.-S. Laih, Ed. Berlin, Germany:Springer, LNCS 2894, pp. 452–473. [5] Coull.S, M. Green, and S. Hohenberger, “Controlling access to an oblivious database using stateful anonymous credentials,” in Irvine: Proc. 12th Int. Conf. Practice and Theory in PKC, Chicago, IL,USA, 2009, pp. 501–520. [6] Miklau.G and D. Suciu, “Controlling Access to the Published Data Using Cryptography,”Proc. 29th Int’l Conf. Very Large Data Bases(VLDB ’03), pp. 898-909, 2003. [7] Bethencourt.J, A.Sahai, and B.Waters,“Ciphertext-policy attribute - based encryption,” in Proc. 2007 IEEE Symp. SP,Taormina, Italy, pp. 321–334. [8] Boneh.D, X. Ding, G. Tsudik, “Fine-grained control of security capabilities,”ACM Trans. Internet Technol.,vol.4,no.1,pp. 60–82, Feb. 2004. [9] J. Camenisch, M. Dubovitskaya, and G. Neven, “Oblivious transfer with access control,” inProc. 16th ACM Conf. CCS,NewYork,NY, USA, 2009, pp. 131–140. [10] Zhongmei Wan, Jian Weng, and Jiguo Li “Security-mediated certificateless signatures without pairing ,” vol. 5, no. 12, December 2010. First Author MS REVATHI.R received the MCA From Madras University, Chennai in 2013 and pursuit for M.E(Computer Science Engg) From St. Joseph college of Engineering, Sriperumbudur, Chennai, India. She is now attending the M.E course in CSE and her research interest include Computer Networks, with Cloud Computing and programming languages (JAVA, .NET) and Web Development, DBMS.