enhanced group data sharing using cloud … · ... expressive, efficient and revocable data access...

9

Click here to load reader

Upload: vuongquynh

Post on 04-Jun-2018

212 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: ENHANCED GROUP DATA SHARING USING CLOUD … · ... expressive, efficient and revocable data access control system for multi-authority cloud storage ... Access Control for Multi-Authority

International Journal of Computer Engineering and Applications, Volume XI, Special Issue, May

17, www.ijcea.com ISSN 2321-3469

Jyoti P.Khurpade, Aditya Londhe, Prabhakar Vishwakarma, Krishna Gade 1

ENHANCED GROUP DATA SHARING USING CLOUD

COMPUTING

Jyoti P.Khurpade1, Aditya Londhe2, Prabhakar Vishwakarma3,

Krishna Gade4

1 MIT Polytechnic, Department of Computer Engineering, Pune-411038

2MIT Polytechnic, Department of Computer Engineering, Pune-411038

3MIT Polytechnic, Department of Computer Engineering, Pune-411038

4MIT Polytechnic, Department of Computer Engineering, Pune-411038

ABSTRACT:

Page 2: ENHANCED GROUP DATA SHARING USING CLOUD … · ... expressive, efficient and revocable data access control system for multi-authority cloud storage ... Access Control for Multi-Authority

International Journal of Computer Engineering and Applications, Volume XI,

Special Issue, May 17, www.ijcea.com ISSN 2321-3469

Jyoti P.Khurpade, Aditya Londhe, Prabhakar Vishwakarma, Krishna Gade 2

The group data sharing is becoming a popular concept in cloud computing

environment. In this group of members can access their data on cloud

storage servers remotely. As the group contains group leader, group admin

and multiple group members, it is very difficult task to maintain secure

data sharing with integrity checking at cloud storage servers. Frequent

changes in membership behavior is also the challenging issue in group

sharing framework of cloud computing. It will leads to requirement of

efficient key management and computational overhead of key management

at group side when any group member leaves or join the group. To

overcome all of these disadvantages, in this paper we proposed an

enhanced group sharing framework with number of contributions in it.

First we take help of cloud servers for group key management when

membership is updated, for reducing computational complexity and

communication overhead. Second, for key synchronization among online

and offline group members, enhanced TGDH are used. In Third, Key lock

box concept is used to reduce the key management complexity. Final and

more important, data integrity concept is also used to save the storage by

avoiding the duplicate file storage. To evaluate this system, group members

randomly upload and download files on cloud server and experimental

results show that the proposed system for secure group sharing in cloud

computing is better in terms of low computational and communication

overhead, higher memory utilization, high security over data sharing with

efficient key management.

Keywords: Encryption, AES Algorithm, Cloud, Socket, Efficient Key

Management.

[1] INTRODUCTION

Cloud is a term used for a simulated collection of computing means. Cloud

computing facilitate highly scalable services to be easily consumed over the

Internet as and when needed. Significant advantage of the cloud services is

that user’s data are typically processed remotely in unknown machines that

users do not use. Cloud storage architecture consists of collection of storage

servers with higher end configuration which in turn offer long-term storage

services over the Internet and also for the cloud storage system. Although

enjoying all the benefits of this technology, users get afraid of losing their

data. As good as it may be, this concept additionally delivers numerous new

difficulties for security of data. Users can remotely store their data by using

cloud storage and enjoy the on request applications with high quality as well

as various services from a common pool of configurable computing resources,

Page 3: ENHANCED GROUP DATA SHARING USING CLOUD … · ... expressive, efficient and revocable data access control system for multi-authority cloud storage ... Access Control for Multi-Authority

ENHANCED GROUP DATA SHARING USING CLOUD COMPUTING

Jyoti P.Khurpade, Aditya Londhe, Prabhakar Vishwakarma, Krishna Gade

3

without the taking any load of local data storage and maintenance. “Cloud”

has several problems related to the design that can make some impact on the

security and performance of the overall system.

The appearance of cloud storage instigates organization as well as

companies to outsource information storage to third-party cloud providers, as

evidenced by many real-life case studies [3]. One basic issue of today's cloud

storage services is the administration of the perpetually expanding volume of

data. Based on the IDC‘s report of analysis, the volume of data in the wild is

expected to reach 40 trillion giga bytes in 2020 [9]. Cloud computing is a

rising service model which gives storage and computation resources on the

Internet. One best function which cloud computing can offer is storage on

cloud. People as well as organizations are regularly required to remotely store

their information to keep away from any information loss in case there are any

hardware/software failures or unforeseen disasters. Rather than buying the

required storage media to keep information backups, people and organization

can simply outsource their data backup services to the cloud service providers,

which provide the necessary storage resources to host the data backups.

Businesses and consumers are becoming increasingly conscious of the

value of secure, archival data storage. In the business arena, data preservation

is often mandated by law [16], and data mining has proven to be a boon in

shaping business strategy. For individuals, archival storage is being called

upon to preserve sentimental and historical artifacts such as photos, movies

and personal documents. Further, while few would argue that business data

calls for security, privacy is equally important for individuals; data such as

medical records and legal documents must be kept for long periods of time but

must not be publicly accessible.

This paper shows analysisregarding the associatedwork completed over the

trust system in wireless sensor network in section II, the executionpoints is in

section III where the system architecture, modules explanation, mathematical

models, algorithms and experimental setup. In section IV presents discussion

over the expected results and gives a conclusion in section V.

[2] RELATED WORK

Page 4: ENHANCED GROUP DATA SHARING USING CLOUD … · ... expressive, efficient and revocable data access control system for multi-authority cloud storage ... Access Control for Multi-Authority

ENHANCED GROUP DATA SHARING USING CLOUD COMPUTING

Jyoti P.Khurpade, Aditya Londhe, Prabhakar Vishwakarma, Krishna Gade

4

Chun-1 Fan [1] solve the issues if an encrypt or can ensure that only the client

who coordinate the limitations on predefined values of attribute related with

the ciphertext can decrypt the ciphertext.

KanYang and [2] proposed a design an expressive, efficient and revocable

data access control system for multi-authority cloud storage frameworks,

where there are numerous authorities exist together and every authority is able

to issue attributes independently.

Jin Li deals [3] proposed a new Secure Outsourced ABE system, which

supports both secure outsourced key-issuing and decryption. Author’s new

method offloads all access policy and attribute related operations in the key-

issuing process or decryption to a Key Generation Service Provider (KGSP)

and a Decryption Service Provider (DSP), separately, leaving just a number

that is constant of straightforward operations for the attribute authority as well

as eligible users to perform locally.

Eric Zavattoni [4] proposed the design of a software cryptographic library

that achieves record timings for the computation of a 126-bit security level

attribute-based encryption scheme. We built up all the required auxiliary

blocks of building as well as thought about the computational weight which

each of them adds to the overall performance of this protocol.

Yan Zhu [5] proposed a practical cryptographic RBAC model, called role-

key hierarchy model, to support various security features, including signature,

identification, and encryption on role-key hierarchy.

The work [6] proposed by Bharti RatanMadnani deals with exploiting and

uniquely combining techniques of attribute-based encryption (ABE), proxy re-

encryption, and lazy re-encryption. Key Policy Attribute-Based Encryption,

Proxy Re-Encryption (PRE) algorithm is used in the proposed scheme has

salient properties of user access privilege confidentiality and user secret key

accountability.

MikkoKiviharju [7] proposed studies the feasibility of implementing

RBAC with respect to read-rights using a recent type of cryptographic

schemes called attribute-based encryption (ABE).

[3] PROBLEM DEFINITION

To proposed the secured system which secures the data by using the AES

algorithm for storing the data on cloud.

Page 5: ENHANCED GROUP DATA SHARING USING CLOUD … · ... expressive, efficient and revocable data access control system for multi-authority cloud storage ... Access Control for Multi-Authority

ENHANCED GROUP DATA SHARING USING CLOUD COMPUTING

Jyoti P.Khurpade, Aditya Londhe, Prabhakar Vishwakarma, Krishna Gade

5

[4] IMPLEMENTATION DETAILS

4.1System Overview

This system contains three modules:

4.1.1 Admin

Admin controls and monitors all activities of group admin and user. Admin

can remove or add the group admin.

4.1.2 Group Admin

Group admin control or give the access over the various activities of users

such as file upload, download and modifications. Group admin can add or

remove the students. Also it checks the status of the users and gives the

permission to the users for uploading and downloading file.

4.1.3 User

All users of organization access the data stored on cloud server, as per their

access authority. User can upload text or doc file only.

The system can provide security to the user’s document, all the document

which is uploaded in cloud only in the encrypted format. AES algorithm is

used for data encryption.

Page 6: ENHANCED GROUP DATA SHARING USING CLOUD … · ... expressive, efficient and revocable data access control system for multi-authority cloud storage ... Access Control for Multi-Authority

ENHANCED GROUP DATA SHARING USING CLOUD COMPUTING

Jyoti P.Khurpade, Aditya Londhe, Prabhakar Vishwakarma, Krishna Gade

6

Figure 1. System Architecture

4.2Algorithm Key Expansion: - Using Rijndaels key schedule Round keys are derived from

the cipher key.

If TreeDistance (u) >TreeDistance (DCM) and First-Sending(u) then

Initial Round: - AddRoundKey where every byte of the state is consolidated

with the round key by making use of bitwise xor.

Rounds

SubBytes : non-linear substitution step

ShiftRows : transposition step

MixColumns : mixing operation of each column

AddRoundKey

Final Round: It contain SubBytes, ShiftRows and Ad-dRoundKey

4.3Experimental Setup

The system is built using Java framework on Windows platform. The Net

beans IDE is used as a development tool. The system will run of normal

machine it does not need any external hardware.

[5] RESULT AND DISCUSSION

Page 7: ENHANCED GROUP DATA SHARING USING CLOUD … · ... expressive, efficient and revocable data access control system for multi-authority cloud storage ... Access Control for Multi-Authority

ENHANCED GROUP DATA SHARING USING CLOUD COMPUTING

Jyoti P.Khurpade, Aditya Londhe, Prabhakar Vishwakarma, Krishna Gade

7

Comparison of existing and proposed system is depicted in Figure 2. As

proposed system uses AES algorithm, requires less encryption time than

existing system. X-axis shows Algorithm and Y-axis shows the time in ms

(milliseconds). AES algorithm is compared with ECC algorithm. The AES

key has small key size so it takes less time than ECC and improves the

performance.

Figure 2. Time Graph

The Fig. 3 depicts the Memory required for AES and ECC algorithm. X-axis

shows the Algorithm and Y-axis shows the memory in bytes. The propose

system has small key size which require minimum amount of memory and the

Proposed System performs operations faster.

Page 8: ENHANCED GROUP DATA SHARING USING CLOUD … · ... expressive, efficient and revocable data access control system for multi-authority cloud storage ... Access Control for Multi-Authority

ENHANCED GROUP DATA SHARING USING CLOUD COMPUTING

Jyoti P.Khurpade, Aditya Londhe, Prabhakar Vishwakarma, Krishna Gade

8

Figure 3. Memory Graph

[6] CONCLUSION AND FUTURE SCOPE

System categorizes the access over data in different modules, such as Admin,

group admin, and users. The roles of the admin are controls and monitor all

activities of group admin and user. Group admin control or give the access

over the various activities of users such as file upload, download and

modifications. All users of organization access the data stored on cloud

server, as per their access authority. The system can provide security to the

user’s document, all the document which is uploaded in cloud only in the

encrypted format. AES algorithm is used for data encryption.

REFERENCES

[1] Arbitrary-State Attribute-Based Encryption with Dynamic Membership by

Chun-I Fan, , Vincent Shi-Ming Huang, and He-Ming Ruan - IEEE

TRANSACTIONS ON COMPUTERS, VOL. 63, NO. 8, AUGUST 2014.

Page 9: ENHANCED GROUP DATA SHARING USING CLOUD … · ... expressive, efficient and revocable data access control system for multi-authority cloud storage ... Access Control for Multi-Authority

ENHANCED GROUP DATA SHARING USING CLOUD COMPUTING

Jyoti P.Khurpade, Aditya Londhe, Prabhakar Vishwakarma, Krishna Gade

9

[2] Expressive, Efficient, and Revocable Data Access Control for Multi-

Authority Cloud Storage by Kan Yang and XiaohuaJia, Fellow - IEEE

TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS,

VOL. 25, NO. 7, JULY 2014

[3] Securely Outsourcing Attribute-Based Encryption with Check ability by Jin

Li, Xinyi Huang, Jingwei Li, Xiaofeng Chen, and Yang Xiang - IEEE

TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS,

VOL. 25, NO. 8, AUGUST 2014.

[4] Software Implementation of an Attribute-Based Encryption Scheme by Eric

Zavattoni, Luis J, Dominguez Perez, Shigeo Mitsunari-IEEE,FEBRUARY

2014.

[5] Role-Based Cryptosystem: A New Cryptographic RBAC System Based on

Role-Key Hierarchy by Yan Zhu, Gail-JoonAhn, Hongxin Hu, Di Ma, and

Shanbiao Wang- IEEE TRANSACTIONS ON INFORMATION

FORENSICS AND SECURITY, VOL. 8, NO. 12, DECEMBER 2013.

[6] Attribute Based Encryption for Scalable and Secure Sharing of Medical

Records in Cloud Computing Design and Implementation by Bharti

RatanMadnani, Sreedevi – International Journal of Innovative Research in

Computer and Communication Engineering Vol. 1, Issue 3, May 2013.

[7] Cryptographic Roles in the Age of Wikileaks by MikkoKiviharju, Riihimaki,

Finland-

Military communications conference,2013.

[8] From RBAC to ABAC: Constructing Flexible Data Access Control for

Cloud Storage

Services by Yan Zhu, Dijiang Huang-IEEE.