enhanced group data sharing using cloud … · ... expressive, efficient and revocable data access...
TRANSCRIPT
International Journal of Computer Engineering and Applications, Volume XI, Special Issue, May
17, www.ijcea.com ISSN 2321-3469
Jyoti P.Khurpade, Aditya Londhe, Prabhakar Vishwakarma, Krishna Gade 1
ENHANCED GROUP DATA SHARING USING CLOUD
COMPUTING
Jyoti P.Khurpade1, Aditya Londhe2, Prabhakar Vishwakarma3,
Krishna Gade4
1 MIT Polytechnic, Department of Computer Engineering, Pune-411038
2MIT Polytechnic, Department of Computer Engineering, Pune-411038
3MIT Polytechnic, Department of Computer Engineering, Pune-411038
4MIT Polytechnic, Department of Computer Engineering, Pune-411038
ABSTRACT:
International Journal of Computer Engineering and Applications, Volume XI,
Special Issue, May 17, www.ijcea.com ISSN 2321-3469
Jyoti P.Khurpade, Aditya Londhe, Prabhakar Vishwakarma, Krishna Gade 2
The group data sharing is becoming a popular concept in cloud computing
environment. In this group of members can access their data on cloud
storage servers remotely. As the group contains group leader, group admin
and multiple group members, it is very difficult task to maintain secure
data sharing with integrity checking at cloud storage servers. Frequent
changes in membership behavior is also the challenging issue in group
sharing framework of cloud computing. It will leads to requirement of
efficient key management and computational overhead of key management
at group side when any group member leaves or join the group. To
overcome all of these disadvantages, in this paper we proposed an
enhanced group sharing framework with number of contributions in it.
First we take help of cloud servers for group key management when
membership is updated, for reducing computational complexity and
communication overhead. Second, for key synchronization among online
and offline group members, enhanced TGDH are used. In Third, Key lock
box concept is used to reduce the key management complexity. Final and
more important, data integrity concept is also used to save the storage by
avoiding the duplicate file storage. To evaluate this system, group members
randomly upload and download files on cloud server and experimental
results show that the proposed system for secure group sharing in cloud
computing is better in terms of low computational and communication
overhead, higher memory utilization, high security over data sharing with
efficient key management.
Keywords: Encryption, AES Algorithm, Cloud, Socket, Efficient Key
Management.
[1] INTRODUCTION
Cloud is a term used for a simulated collection of computing means. Cloud
computing facilitate highly scalable services to be easily consumed over the
Internet as and when needed. Significant advantage of the cloud services is
that user’s data are typically processed remotely in unknown machines that
users do not use. Cloud storage architecture consists of collection of storage
servers with higher end configuration which in turn offer long-term storage
services over the Internet and also for the cloud storage system. Although
enjoying all the benefits of this technology, users get afraid of losing their
data. As good as it may be, this concept additionally delivers numerous new
difficulties for security of data. Users can remotely store their data by using
cloud storage and enjoy the on request applications with high quality as well
as various services from a common pool of configurable computing resources,
ENHANCED GROUP DATA SHARING USING CLOUD COMPUTING
Jyoti P.Khurpade, Aditya Londhe, Prabhakar Vishwakarma, Krishna Gade
3
without the taking any load of local data storage and maintenance. “Cloud”
has several problems related to the design that can make some impact on the
security and performance of the overall system.
The appearance of cloud storage instigates organization as well as
companies to outsource information storage to third-party cloud providers, as
evidenced by many real-life case studies [3]. One basic issue of today's cloud
storage services is the administration of the perpetually expanding volume of
data. Based on the IDC‘s report of analysis, the volume of data in the wild is
expected to reach 40 trillion giga bytes in 2020 [9]. Cloud computing is a
rising service model which gives storage and computation resources on the
Internet. One best function which cloud computing can offer is storage on
cloud. People as well as organizations are regularly required to remotely store
their information to keep away from any information loss in case there are any
hardware/software failures or unforeseen disasters. Rather than buying the
required storage media to keep information backups, people and organization
can simply outsource their data backup services to the cloud service providers,
which provide the necessary storage resources to host the data backups.
Businesses and consumers are becoming increasingly conscious of the
value of secure, archival data storage. In the business arena, data preservation
is often mandated by law [16], and data mining has proven to be a boon in
shaping business strategy. For individuals, archival storage is being called
upon to preserve sentimental and historical artifacts such as photos, movies
and personal documents. Further, while few would argue that business data
calls for security, privacy is equally important for individuals; data such as
medical records and legal documents must be kept for long periods of time but
must not be publicly accessible.
This paper shows analysisregarding the associatedwork completed over the
trust system in wireless sensor network in section II, the executionpoints is in
section III where the system architecture, modules explanation, mathematical
models, algorithms and experimental setup. In section IV presents discussion
over the expected results and gives a conclusion in section V.
[2] RELATED WORK
ENHANCED GROUP DATA SHARING USING CLOUD COMPUTING
Jyoti P.Khurpade, Aditya Londhe, Prabhakar Vishwakarma, Krishna Gade
4
Chun-1 Fan [1] solve the issues if an encrypt or can ensure that only the client
who coordinate the limitations on predefined values of attribute related with
the ciphertext can decrypt the ciphertext.
KanYang and [2] proposed a design an expressive, efficient and revocable
data access control system for multi-authority cloud storage frameworks,
where there are numerous authorities exist together and every authority is able
to issue attributes independently.
Jin Li deals [3] proposed a new Secure Outsourced ABE system, which
supports both secure outsourced key-issuing and decryption. Author’s new
method offloads all access policy and attribute related operations in the key-
issuing process or decryption to a Key Generation Service Provider (KGSP)
and a Decryption Service Provider (DSP), separately, leaving just a number
that is constant of straightforward operations for the attribute authority as well
as eligible users to perform locally.
Eric Zavattoni [4] proposed the design of a software cryptographic library
that achieves record timings for the computation of a 126-bit security level
attribute-based encryption scheme. We built up all the required auxiliary
blocks of building as well as thought about the computational weight which
each of them adds to the overall performance of this protocol.
Yan Zhu [5] proposed a practical cryptographic RBAC model, called role-
key hierarchy model, to support various security features, including signature,
identification, and encryption on role-key hierarchy.
The work [6] proposed by Bharti RatanMadnani deals with exploiting and
uniquely combining techniques of attribute-based encryption (ABE), proxy re-
encryption, and lazy re-encryption. Key Policy Attribute-Based Encryption,
Proxy Re-Encryption (PRE) algorithm is used in the proposed scheme has
salient properties of user access privilege confidentiality and user secret key
accountability.
MikkoKiviharju [7] proposed studies the feasibility of implementing
RBAC with respect to read-rights using a recent type of cryptographic
schemes called attribute-based encryption (ABE).
[3] PROBLEM DEFINITION
To proposed the secured system which secures the data by using the AES
algorithm for storing the data on cloud.
ENHANCED GROUP DATA SHARING USING CLOUD COMPUTING
Jyoti P.Khurpade, Aditya Londhe, Prabhakar Vishwakarma, Krishna Gade
5
[4] IMPLEMENTATION DETAILS
4.1System Overview
This system contains three modules:
4.1.1 Admin
Admin controls and monitors all activities of group admin and user. Admin
can remove or add the group admin.
4.1.2 Group Admin
Group admin control or give the access over the various activities of users
such as file upload, download and modifications. Group admin can add or
remove the students. Also it checks the status of the users and gives the
permission to the users for uploading and downloading file.
4.1.3 User
All users of organization access the data stored on cloud server, as per their
access authority. User can upload text or doc file only.
The system can provide security to the user’s document, all the document
which is uploaded in cloud only in the encrypted format. AES algorithm is
used for data encryption.
ENHANCED GROUP DATA SHARING USING CLOUD COMPUTING
Jyoti P.Khurpade, Aditya Londhe, Prabhakar Vishwakarma, Krishna Gade
6
Figure 1. System Architecture
4.2Algorithm Key Expansion: - Using Rijndaels key schedule Round keys are derived from
the cipher key.
If TreeDistance (u) >TreeDistance (DCM) and First-Sending(u) then
Initial Round: - AddRoundKey where every byte of the state is consolidated
with the round key by making use of bitwise xor.
Rounds
SubBytes : non-linear substitution step
ShiftRows : transposition step
MixColumns : mixing operation of each column
AddRoundKey
Final Round: It contain SubBytes, ShiftRows and Ad-dRoundKey
4.3Experimental Setup
The system is built using Java framework on Windows platform. The Net
beans IDE is used as a development tool. The system will run of normal
machine it does not need any external hardware.
[5] RESULT AND DISCUSSION
ENHANCED GROUP DATA SHARING USING CLOUD COMPUTING
Jyoti P.Khurpade, Aditya Londhe, Prabhakar Vishwakarma, Krishna Gade
7
Comparison of existing and proposed system is depicted in Figure 2. As
proposed system uses AES algorithm, requires less encryption time than
existing system. X-axis shows Algorithm and Y-axis shows the time in ms
(milliseconds). AES algorithm is compared with ECC algorithm. The AES
key has small key size so it takes less time than ECC and improves the
performance.
Figure 2. Time Graph
The Fig. 3 depicts the Memory required for AES and ECC algorithm. X-axis
shows the Algorithm and Y-axis shows the memory in bytes. The propose
system has small key size which require minimum amount of memory and the
Proposed System performs operations faster.
ENHANCED GROUP DATA SHARING USING CLOUD COMPUTING
Jyoti P.Khurpade, Aditya Londhe, Prabhakar Vishwakarma, Krishna Gade
8
Figure 3. Memory Graph
[6] CONCLUSION AND FUTURE SCOPE
System categorizes the access over data in different modules, such as Admin,
group admin, and users. The roles of the admin are controls and monitor all
activities of group admin and user. Group admin control or give the access
over the various activities of users such as file upload, download and
modifications. All users of organization access the data stored on cloud
server, as per their access authority. The system can provide security to the
user’s document, all the document which is uploaded in cloud only in the
encrypted format. AES algorithm is used for data encryption.
REFERENCES
[1] Arbitrary-State Attribute-Based Encryption with Dynamic Membership by
Chun-I Fan, , Vincent Shi-Ming Huang, and He-Ming Ruan - IEEE
TRANSACTIONS ON COMPUTERS, VOL. 63, NO. 8, AUGUST 2014.
ENHANCED GROUP DATA SHARING USING CLOUD COMPUTING
Jyoti P.Khurpade, Aditya Londhe, Prabhakar Vishwakarma, Krishna Gade
9
[2] Expressive, Efficient, and Revocable Data Access Control for Multi-
Authority Cloud Storage by Kan Yang and XiaohuaJia, Fellow - IEEE
TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS,
VOL. 25, NO. 7, JULY 2014
[3] Securely Outsourcing Attribute-Based Encryption with Check ability by Jin
Li, Xinyi Huang, Jingwei Li, Xiaofeng Chen, and Yang Xiang - IEEE
TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS,
VOL. 25, NO. 8, AUGUST 2014.
[4] Software Implementation of an Attribute-Based Encryption Scheme by Eric
Zavattoni, Luis J, Dominguez Perez, Shigeo Mitsunari-IEEE,FEBRUARY
2014.
[5] Role-Based Cryptosystem: A New Cryptographic RBAC System Based on
Role-Key Hierarchy by Yan Zhu, Gail-JoonAhn, Hongxin Hu, Di Ma, and
Shanbiao Wang- IEEE TRANSACTIONS ON INFORMATION
FORENSICS AND SECURITY, VOL. 8, NO. 12, DECEMBER 2013.
[6] Attribute Based Encryption for Scalable and Secure Sharing of Medical
Records in Cloud Computing Design and Implementation by Bharti
RatanMadnani, Sreedevi – International Journal of Innovative Research in
Computer and Communication Engineering Vol. 1, Issue 3, May 2013.
[7] Cryptographic Roles in the Age of Wikileaks by MikkoKiviharju, Riihimaki,
Finland-
Military communications conference,2013.
[8] From RBAC to ABAC: Constructing Flexible Data Access Control for
Cloud Storage
Services by Yan Zhu, Dijiang Huang-IEEE.