SlideShare a Scribd company logo
INTERNATIONAL RESEARCH JOURNAL OF ENGINEERING AND TECHNOLOGY (IRJET) E-ISSN: 2395-0056
VOLUME: 06 ISSUE: 05 | MAY 2019 WWW.IRJET.NET P-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4802
Secure Database Management and Privacy Preserving in Cloud Server
Laxmi Kurmi1 and Dr. R.K. Pateriya2
1M.Tech Scholar MANIT Bhopal, India
2Associate Professor, MANIT Bhopal, India
-------------------------------------------------------------------------***----------------------------------------------------------------------
Abstract— As a vital application in distributed computing, distributed storage offers client versatile, adaptable and superb
information stockpiling and calculation administrations. A developing number of information proprietors outsource
information documents to the cloud. Because of the lack of complete reliability of distributed storage servers, proprietors of
information require a tried and true intention to check the possession of their records externalized to remote cloud servers.
There are still worries that frustrate the expansion of cloud, and information security/protection is the best worry for
information proprietors wishing to move their applications into the cloud environment. Here provide a solution to with
cryptosom generation to secure communication with multiple servers (Cloud ).
Index Terms — Cloud Storage, Secure Database, DPC(Data Possession Checking), Homomorphic, CyptoSom, Secure
Communication.
——————————  ——————————
1.INTRODUCTION
Recent innovative advances ease the dangerous development of computerized sub-stance. The US International Data
Corporation (IDC) announces that the computerized universe will develop by a factor of 300, up to 40 trillion gigabytes of
imitated information by 2020. This multiplication of computerized universe keeps on raising the interest for new capacity and
system utilities, alongside an expanding requirement for more financially savvy utilization of capacity limits and system
transmission capacity for information exchange. Accordingly, the utilization of remote stockpiling frameworks is picking up an
extending interest, to be specific the Cloud stockpiling based administrations, since they give gainful designs[1]. These designs
bolster the transmission, storage, and escalated calculation of outsourced information in compensation for every utilization
plan of action. This broad enthusiasm for distributed storage benefits primarily exudes from business associations and
government organizations looking for stronger and practical frameworks. That is, the advantages of cloud adoption are
extremely unmistakable in another time of responsiveness, and effectiveness in Information Technology service delivery.
Cloud Computing (CC) is another means of communication that makes distributed computing and grid computing
technologically evolve. Over a certain undefined time frame, CC has evolved and many companies find it interesting to use it.
The improvement of ARPANET (Advanced Research Projects Agency Network) by J.C.R. Licklider in the 1960s and number of
different experts who sought to improve frameworks connectivity, CC may never have appeared. The arrival of ARPANET,
which associated a group of computer systems (for exchanging, sharing and so on), provoking the emergence of the Internet
(where it turned out to be simple to cross any barrier between frameworks)[2 ]. This Internet has accelerated various
exercises, such as human association (texting, web-based social networking, etc.), an organization's business needs (web-
based shopping, money-related administrations, etc.).
In addition, the advancement of Applications Service Provision (ASP), framework and utility registration and distributed
computing led to further progress around the Internet. CC presented another worldview that transformed the conventional
frame-works interconnection into a pool of joint assets that can be accessed via the web.
I.1 Privacy and Security Concerns in Cloud
Privacy and Security is one of the major Cloud Computing(CC) usage concerns. As information is not anymore under the
clients' immediate control, clients are hesitant to move their important information onto the cloud - particularly general
society cloud with its high combination and multi-occupancy. Likewise, from an effectiveness viewpoint, questioning and
recovering from cloud servers require significantly more exertion than it does in neighborhood servers[3].
INTERNATIONAL RESEARCH JOURNAL OF ENGINEERING AND TECHNOLOGY (IRJET) E-ISSN: 2395-0056
VOLUME: 06 ISSUE: 05 | MAY 2019 WWW.IRJET.NET P-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4803
Amongst the many technological aspects, the three main dimensions of data security research are confidentiality, integrity,
and availability. The power, optimization, and cloud computing flexibility generate security challenge. It is also a concern for
the new user also their accessibility.
In this field, A non-thorough hunt demonstrates few problems. They are Service Level Agreements (SLA), movements, security,
etc. Cloud Computing has a programmed refresh element that implies a single change to an application by a head that would
consider each of its customers. This also leads to the end that any problems in the product can be noticed very soon, which is a
notable hazard for any association with little safety[5]. Numerous scientists also agree that security is a huge concern for the
appropriation of distributed computing. Additionally, an IDC overview of 263 officials shows that security is placed first
among cloud computing challenges. Although an organization is gloating to have top class security and does not refresh its
approaches to security every now and then, in not so distant future it will be inclined to breaks in security. Through this nitty-
gritty examination, we propose to refresh and respond to security challenges for perusers with different qualifications (sorts
of). We also include real-time challenge mitigation practices, including the solutions proposed by enhanced researchers to
demonstrate which areas of cloud computing need more attention.
2. CLOUD COMPUTING: SERVICE MODELS
Cloud Computing can be easily accessible via a set of server or service modal. This services is design to provide easy
accessibility and security of user. It is provide big data storage and controlling. Cloud computing is combination of multiple
server, that is provide global reach of data without limitation.
CC has different type of service modal, namely-
1.Infrastructure-as-a-Service (IaaS).
2.Platform-as-a-Service (PaaS).
3. Software-as-a-Service (SaaS).
All three services work in layered. The model is shown in figure below. All layer is depending each other first work start of
visualization then work on infrastructure. infrastructure is basically work on application requirement. After infrastructure we
need to design its application module then its go to end used module to complete task.
Fig. 1 Structure of service model
3. PROPOSED METHODOLOGY
In this proposed work, present Efficient Data send and Management in cloud and outsourcing calculation into IBE (Identity
Based Encryption) renouncement, and formalize the security importance of outsourced revocable IBE (Identity Based
Encryption) suddenly to the best of our understanding Here is a proposed plan to create key , for enhanced security in cloud to
hide identity and assign key through the encryption process. The second part to develop the proposed methodology to
increase data and secure communication in the minimum time period.
INTERNATIONAL RESEARCH JOURNAL OF ENGINEERING AND TECHNOLOGY (IRJET) E-ISSN: 2395-0056
VOLUME: 06 ISSUE: 05 | MAY 2019 WWW.IRJET.NET P-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4804
The proposed system, likewise with the recommendation, we understand disavowal through refreshing the private keys of the
unrevoked clients. Yet, However, not under any condition like that work which inconsequentially links day and age with
personality for key age/refresh and requires that the entire private key be reissued for unwanted customers, We propose a
new configuration safe key issuing method: for each customer, we use creamer private key, which includes an AND door
interface and links two sub-sections, in particular, the character segment and time segment.
At first, the client can acquire from the essential server a default time segment and the character part (i.e., for the present era)
as its private key in key issue. A little time later, with a specific end goal to keep up decode capacity, the need for unrevoked
clients to intermittently request key refresh for the time part of an optional service that has recently been presented.
Fig.2 Stream chart of proposed framework
4 PROXY RE-ENCRYPTION
Proxy re-encryption plans are cryptosystems which permit outsiders (intermediaries) to modify a ciphertext which hosts been
scrambled for one get-together, with the goal that it might be unscrambled by another. Anyway, the outsiders can't get the
mystery esteem [10]. Blast introduces the BBS, Elgamal-based plan working more than two gathering _ of prime request q with
a bilinear map. The system parameters are random generators 1g G and   2,Z e g g G  .
 Key Generation (KG). The user A select random x. A’s key pair is the form.
 Re-Encryption Key Generation (RG). A user A delegates to B by publishing the re-encryption key, computed from
B’s public key.
 First-Level Encryption ( 1E ). To encrypt a message under in such a way that it can only be the holder of, output.
 Second-level Encryption ( 2E ).To encrypt a message 2m G under apk in such a way that it can be decrypted by
user A and his delegates, output ( , )ak k
c g mZ .
 Re-Encryption(R). Anybody can change a second-level ciphertext for A into a first level ciphertext for B with A Brk  .
From ( , )ak k
ac g mZ , compute
/
( , )ak b a bk
e g g Z and publish ( , )bk k
bc Z mZ .
INTERNATIONAL RESEARCH JOURNAL OF ENGINEERING AND TECHNOLOGY (IRJET) E-ISSN: 2395-0056
VOLUME: 06 ISSUE: 05 | MAY 2019 WWW.IRJET.NET P-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4805
Fig3: Structure of Encryption Process
 Decryption ( 1D , 2D ). To decrypt a first-level ciphertext ( , )ac   with secret key sk a ,
compute 1/
/ a
m   . To decrypt a second-level ciphertext ( , )ac   with secret key sk a , compute
1/
/ ( , ) a
m e g  .
 Step 1 :Calculate Data dimension
 Step 2 :Create server id using fomula flk_ID = h2(x,y,h1(I)) (1) h1(I) = mod(M×N, E) (2)
where I = original Data M, N = dimension datax & y = coefficient of correlation of adjacent of data and E = entropy of
data
 Step 3 :XOR data from Original and mask
 Step 4 : Then Data is divided into 8 sub data by using the Logistic Map and random permutationxn+1 = rxn(1-xn), (3)
 Step 5: for b = 1 to 8 do
 Data block shuffling
Dimension of a block : Bm×Bn
5 RESULT & DISSCUSSION
To work acknowledge renouncement through refreshing the private keys of the unrevoked clients. Be that as it may, different
from the work that inconsistently connects day and age with key age/refresh personality and requires the reissue of the entire
private key for unrevoked customers. The proposed research work results are shown below figure.Our system basically works
on two cloud structure first that is user interact and second work on data security. For this basically design one system that
follow some steps:
1. Server identity
2. Server Key Encryption
3. Server User Validation
4. User and Input Data
5. Ker Encryption and URL Design
6. Data Store in Cloud
7. Verification of Key
8. Decryption of Key
9. Verify Identity
INTERNATIONAL RESEARCH JOURNAL OF ENGINEERING AND TECHNOLOGY (IRJET) E-ISSN: 2395-0056
VOLUME: 06 ISSUE: 05 | MAY 2019 WWW.IRJET.NET P-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4806
10. Download Data
11. Analyze accuracy
In figure 3 take basic information of Server to validate the identity of the server and verify for secure communication.
Fig.3 Server Identity
Fig.4 Merge Server Identity Fig.5 Key design based on server
Figure 4- and 5 show process to merge identity of server and design key using personal information. This is generate more security
in cloud architecture
Fig.6 User Data Fig.7 User data Masked
INTERNATIONAL RESEARCH JOURNAL OF ENGINEERING AND TECHNOLOGY (IRJET) E-ISSN: 2395-0056
VOLUME: 06 ISSUE: 05 | MAY 2019 WWW.IRJET.NET P-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4807
Fig.8 Key Design and URL
In figure 6 and 7 is show user utility, here user is interacting with server and store data in the cloud. Before is store data in the
cloud we process and secure it by using the hash algorithm I masked input data to secure basic information of data.
Fig.9 Store Data in Cloud
Figure 9 and 10 is shown masking of input data to secure data information and then design key URL(Index) of data to store
content in cloud URL.
Fig.10 Verify Server Ownership Fig.11 Send Request
INTERNATIONAL RESEARCH JOURNAL OF ENGINEERING AND TECHNOLOGY (IRJET) E-ISSN: 2395-0056
VOLUME: 06 ISSUE: 05 | MAY 2019 WWW.IRJET.NET P-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4808
Fig.12 Data Retrieval and Accuracy Measure
Figure 10 to 12 is the process which is proved communication between server and user and show the accuracy of data.
Fig.13 Efficiency for Item Select in Single Process
5 CONCLUSION
This study proposed to propose a privacy-preserving protocol for data security in cloud architecture. In this research
proposed a methodology to address the efficiency problems big data in the cloud server. The system we work multiple server
encryption data and identity, design key encryption utility to verify and secure transition of communication. This system is
basically designed secured key address through the encryption process and enhanced cloud security.
REFERENCES
1. AKaipingXue, Shaohua Li, Jianan Hong, YingjieXue, Nenghai Yu, and Peilin Hong “Two-Cloud Secure Database for Numeric-
Related SQL Range Queries With Privacy Preserving” IEEE Transactions On Information Forensics And Security, Vol. 12,
No. 7, July 2017.
2. Fu, Zhangjie, et al. “Enabling personalized search over encrypted outsourced data with efficiency improvement” IEEE
trans. on parallel and distributed systems 27.9 (2016): 2546-2559.
0
1
2
3
4
T
i
m
e
D
e
a
l
a
y
No of Item
Our Proposed
Query Based
INTERNATIONAL RESEARCH JOURNAL OF ENGINEERING AND TECHNOLOGY (IRJET) E-ISSN: 2395-0056
VOLUME: 06 ISSUE: 05 | MAY 2019 WWW.IRJET.NET P-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4809
3. A Xia, Zhihua, et al. “A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data” IEEE trans. on
parallel and distributed systems 27.2 (2016): 340-352.
4. A Li, Jiguo, et al. “Flexible and fine-grained attribute-based data storage in cloud computing” IEEE Trans. on Services
Computing 10.5 (2017): 785-796.
5. Yan, Hao, et al. “A novel efficient remote data possession check protocol IEEE Trans. on Info. Forensics and Security 12.1
(2017): 78-88.
6. Qian, Huiling, et al. “Privacy-preserving personal health record using multi-authority attribute-based encryption with
revocation” Intern. Jou. of Information Security 14.6 (2015): 487-497.
7. Li, Jiguo, et al. “KSF-OABE: outsourced attribute-based encryption with keyword search function for cloud storage” IEEE
Trans. on Services Computing 10.5 (2017): 715-725.
8. Yu, Yong, et al. “Improved security of a dynamic remote data possession checking protocol for cloud storage” Expert
systems withapplications 41.17 (2014): 7789-7796.
9. Haifeng, Ma, GaoZhenguo, and Yao Nianmin. “Hierarchical Enhanced Remote Data Possession Checking in Cloud Storage”
BoletínTécnico 55.3 (2017): 145-154.
10. G. Ateniese, R. Di Pietro, L. V. Mancini, and G. Tsudik, “Scalable and efficient provable data possession,” in Proc. 4th Int.
Conf. Secur.PrivacyCommun.Netw.(SecureComm), 2008, Art.no. 9.
11. F. Sebé, J. Domingo-Ferrer, A. Martinez-balleste, Y. Deswarte, and J. Quisquater, “Efficient remote data possession checking
in critical information infrastructures,” IEEE Trans. Knowl. Data Eng., vol. 20, no. 8, pp. 1034–1038, Aug. 2008.
12. Nalini, Dr T., Dr K. Manivannan, and VaishnaviMoorthy. “Efficient Remote Data Possession Checking in Critical Information
Infrastructures Ensuring Data Storage Security in Cloud Computing” International Journal of Innovative Research in
Computer and Communication Engineering 1.1 (2013).
13. Y. Deswarte, J.-J.Quisquater, and A. Saïdane, “Remote integrity checking, in Proc. 6th Work. Conf. Integr. Int. Control Inf.
Syst. (IICIS), 2003, pp. 1–11.
14. Z. Hao, S. Zhong, and N. Yu, “A privacy-preserving remote data integrity checking protocol with data dynamics and public
verifiability,” IEEE Trans. Knowl. Data Eng., vol. 23, no. 9, pp. 1432–1437, Sep. 2011.
15. G. Ateniese et al., “Provable data possession at untrusted stores” in Proc. 14th ACM Conf. Comput. Commun.Secur.(CCS),
2007, pp. 598–609.
16. Y.-J. Ren, J. Shen, J. Wang, J. Han, and S.-Y.Lee, “Mutual verifiable provable data auditing in public cloud storage” J. Internet
Technol., vol. 16, no. 2, pp. 317–323, 2015.

More Related Content

PDF
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
PDF
Services, security challenges and security policies in cloud computing
PDF
Maintaining Secure Cloud by Continuous Auditing
PDF
Fs2510501055
PDF
D32035052
PDF
IRJET- Secure Cloud Storage through Dual Protection
PDF
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
PDF
DYNAMIC TENANT PROVISIONING AND SERVICE ORCHESTRATION IN HYBRID CLOUD
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
Services, security challenges and security policies in cloud computing
Maintaining Secure Cloud by Continuous Auditing
Fs2510501055
D32035052
IRJET- Secure Cloud Storage through Dual Protection
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
DYNAMIC TENANT PROVISIONING AND SERVICE ORCHESTRATION IN HYBRID CLOUD

What's hot (20)

PDF
A Study of A Method To Provide Minimized Bandwidth Consumption Using Regenera...
PDF
IRJET- Deduplication of Encrypted Bigdata on Cloud
PDF
Conceptual Model of Real Time Infrastructure Within Cloud Computing Environment
PDF
Hybrid cloud based firewalling
PDF
FRAMEWORK FOR SECURE CLOUD COMPUTING
PDF
Data Decentralisation: Efficiency, Privacy and Fair Monetisation
DOCX
CLOUD CPOMPUTING SECURITY
PDF
Paper id 27201433
PDF
Requirements and Challenges for Securing Cloud Applications and Services
PDF
IRJET- Effective Privacy based Distributed Storage Structure
PDF
Smart, Secure and Efficient Data Sharing in IoT
PDF
IRJET - Multitenancy using Cloud Computing Features
PDF
IRJET- An Adaptive Scheduling based VM with Random Key Authentication on Clou...
PDF
Comparison of data security in grid and cloud computing
PDF
EFFECTIVE METHOD FOR MANAGING AUTOMATION AND MONITORING IN MULTI-CLOUD COMPUT...
PDF
PDF
Cloud Computing for National Security Applications
PDF
Ijarcet vol-2-issue-4-1405-1409
PDF
An enhanced wireless presentation system for large scale content distribution
PDF
An Comparison with Property Based Resource Attestation to Secure Cloud Enviro...
A Study of A Method To Provide Minimized Bandwidth Consumption Using Regenera...
IRJET- Deduplication of Encrypted Bigdata on Cloud
Conceptual Model of Real Time Infrastructure Within Cloud Computing Environment
Hybrid cloud based firewalling
FRAMEWORK FOR SECURE CLOUD COMPUTING
Data Decentralisation: Efficiency, Privacy and Fair Monetisation
CLOUD CPOMPUTING SECURITY
Paper id 27201433
Requirements and Challenges for Securing Cloud Applications and Services
IRJET- Effective Privacy based Distributed Storage Structure
Smart, Secure and Efficient Data Sharing in IoT
IRJET - Multitenancy using Cloud Computing Features
IRJET- An Adaptive Scheduling based VM with Random Key Authentication on Clou...
Comparison of data security in grid and cloud computing
EFFECTIVE METHOD FOR MANAGING AUTOMATION AND MONITORING IN MULTI-CLOUD COMPUT...
Cloud Computing for National Security Applications
Ijarcet vol-2-issue-4-1405-1409
An enhanced wireless presentation system for large scale content distribution
An Comparison with Property Based Resource Attestation to Secure Cloud Enviro...
Ad

Similar to IRJET- Secure Database Management and Privacy Preserving in Cloud Server (20)

PDF
SECURITY IN COULD DATA STORAGE USING SOFT COMPUTING TECHNIQUES AND ELGAMAL CR...
PDF
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
PDF
IRJET- Cipher Text-Policy Attribute-Based Encryption and with Delegation ...
PDF
IRJET- Efficient and Secure Data Storage in Cloud Computing
PDF
Comprehensive Study on Deployment Models and Service Models in Cloud Computing.
PDF
Analysis of Cloud Computing Security Concerns and Methodologies
PDF
IRJET- Secure Cloud Data Using Attribute Based Encryption
PDF
DATA SHARING PROTOCOL TO MINIMIZE THE SECURITY AND PRIVACY RISKS OF CLOUD STO...
PDF
Understanding the Determinants of Security and Privacy in Cloud Computing Arc...
PDF
IRJET- SAAS Attacks Defense Mechanisms and Digital Forensic
PDF
IRJET- Cloud Computing Review
PDF
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
PDF
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
PDF
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
PDF
Data Security Approach in Cloud computing using SHA
PDF
SECURE DATA TRANSFER BASED ON CLOUD COMPUTING
PDF
IRJET- Single to Multi Cloud Data Security in Cloud Computing
PDF
IRJET-2 Proxy-Oriented Data Uploading in Multi Cloud Storage
PDF
The Impact of Cloud Computing in the field of Finance: A Comprehensive Analysis
PDF
IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
SECURITY IN COULD DATA STORAGE USING SOFT COMPUTING TECHNIQUES AND ELGAMAL CR...
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
IRJET- Cipher Text-Policy Attribute-Based Encryption and with Delegation ...
IRJET- Efficient and Secure Data Storage in Cloud Computing
Comprehensive Study on Deployment Models and Service Models in Cloud Computing.
Analysis of Cloud Computing Security Concerns and Methodologies
IRJET- Secure Cloud Data Using Attribute Based Encryption
DATA SHARING PROTOCOL TO MINIMIZE THE SECURITY AND PRIVACY RISKS OF CLOUD STO...
Understanding the Determinants of Security and Privacy in Cloud Computing Arc...
IRJET- SAAS Attacks Defense Mechanisms and Digital Forensic
IRJET- Cloud Computing Review
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
Data Security Approach in Cloud computing using SHA
SECURE DATA TRANSFER BASED ON CLOUD COMPUTING
IRJET- Single to Multi Cloud Data Security in Cloud Computing
IRJET-2 Proxy-Oriented Data Uploading in Multi Cloud Storage
The Impact of Cloud Computing in the field of Finance: A Comprehensive Analysis
IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
Ad

More from IRJET Journal (20)

PDF
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
PDF
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
PDF
Kiona – A Smart Society Automation Project
PDF
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
PDF
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
PDF
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
PDF
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
PDF
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
PDF
BRAIN TUMOUR DETECTION AND CLASSIFICATION
PDF
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
PDF
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
PDF
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
PDF
Breast Cancer Detection using Computer Vision
PDF
Auto-Charging E-Vehicle with its battery Management.
PDF
Analysis of high energy charge particle in the Heliosphere
PDF
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
PDF
Auto-Charging E-Vehicle with its battery Management.
PDF
Analysis of high energy charge particle in the Heliosphere
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
Kiona – A Smart Society Automation Project
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
BRAIN TUMOUR DETECTION AND CLASSIFICATION
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
Breast Cancer Detection using Computer Vision
Auto-Charging E-Vehicle with its battery Management.
Analysis of high energy charge particle in the Heliosphere
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
Auto-Charging E-Vehicle with its battery Management.
Analysis of high energy charge particle in the Heliosphere
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...

Recently uploaded (20)

PDF
Well-logging-methods_new................
PPTX
CH1 Production IntroductoryConcepts.pptx
PDF
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
PDF
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
PDF
Embodied AI: Ushering in the Next Era of Intelligent Systems
DOCX
573137875-Attendance-Management-System-original
PPTX
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
PPTX
Sustainable Sites - Green Building Construction
PDF
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
PPTX
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
PDF
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
PPTX
Internet of Things (IOT) - A guide to understanding
PDF
Model Code of Practice - Construction Work - 21102022 .pdf
PPT
CRASH COURSE IN ALTERNATIVE PLUMBING CLASS
PPTX
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
PPTX
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
PPT
Project quality management in manufacturing
PPTX
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
PPTX
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
PDF
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
Well-logging-methods_new................
CH1 Production IntroductoryConcepts.pptx
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
Embodied AI: Ushering in the Next Era of Intelligent Systems
573137875-Attendance-Management-System-original
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
Sustainable Sites - Green Building Construction
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
Internet of Things (IOT) - A guide to understanding
Model Code of Practice - Construction Work - 21102022 .pdf
CRASH COURSE IN ALTERNATIVE PLUMBING CLASS
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
Project quality management in manufacturing
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf

IRJET- Secure Database Management and Privacy Preserving in Cloud Server

  • 1. INTERNATIONAL RESEARCH JOURNAL OF ENGINEERING AND TECHNOLOGY (IRJET) E-ISSN: 2395-0056 VOLUME: 06 ISSUE: 05 | MAY 2019 WWW.IRJET.NET P-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4802 Secure Database Management and Privacy Preserving in Cloud Server Laxmi Kurmi1 and Dr. R.K. Pateriya2 1M.Tech Scholar MANIT Bhopal, India 2Associate Professor, MANIT Bhopal, India -------------------------------------------------------------------------***---------------------------------------------------------------------- Abstract— As a vital application in distributed computing, distributed storage offers client versatile, adaptable and superb information stockpiling and calculation administrations. A developing number of information proprietors outsource information documents to the cloud. Because of the lack of complete reliability of distributed storage servers, proprietors of information require a tried and true intention to check the possession of their records externalized to remote cloud servers. There are still worries that frustrate the expansion of cloud, and information security/protection is the best worry for information proprietors wishing to move their applications into the cloud environment. Here provide a solution to with cryptosom generation to secure communication with multiple servers (Cloud ). Index Terms — Cloud Storage, Secure Database, DPC(Data Possession Checking), Homomorphic, CyptoSom, Secure Communication. ——————————  —————————— 1.INTRODUCTION Recent innovative advances ease the dangerous development of computerized sub-stance. The US International Data Corporation (IDC) announces that the computerized universe will develop by a factor of 300, up to 40 trillion gigabytes of imitated information by 2020. This multiplication of computerized universe keeps on raising the interest for new capacity and system utilities, alongside an expanding requirement for more financially savvy utilization of capacity limits and system transmission capacity for information exchange. Accordingly, the utilization of remote stockpiling frameworks is picking up an extending interest, to be specific the Cloud stockpiling based administrations, since they give gainful designs[1]. These designs bolster the transmission, storage, and escalated calculation of outsourced information in compensation for every utilization plan of action. This broad enthusiasm for distributed storage benefits primarily exudes from business associations and government organizations looking for stronger and practical frameworks. That is, the advantages of cloud adoption are extremely unmistakable in another time of responsiveness, and effectiveness in Information Technology service delivery. Cloud Computing (CC) is another means of communication that makes distributed computing and grid computing technologically evolve. Over a certain undefined time frame, CC has evolved and many companies find it interesting to use it. The improvement of ARPANET (Advanced Research Projects Agency Network) by J.C.R. Licklider in the 1960s and number of different experts who sought to improve frameworks connectivity, CC may never have appeared. The arrival of ARPANET, which associated a group of computer systems (for exchanging, sharing and so on), provoking the emergence of the Internet (where it turned out to be simple to cross any barrier between frameworks)[2 ]. This Internet has accelerated various exercises, such as human association (texting, web-based social networking, etc.), an organization's business needs (web- based shopping, money-related administrations, etc.). In addition, the advancement of Applications Service Provision (ASP), framework and utility registration and distributed computing led to further progress around the Internet. CC presented another worldview that transformed the conventional frame-works interconnection into a pool of joint assets that can be accessed via the web. I.1 Privacy and Security Concerns in Cloud Privacy and Security is one of the major Cloud Computing(CC) usage concerns. As information is not anymore under the clients' immediate control, clients are hesitant to move their important information onto the cloud - particularly general society cloud with its high combination and multi-occupancy. Likewise, from an effectiveness viewpoint, questioning and recovering from cloud servers require significantly more exertion than it does in neighborhood servers[3].
  • 2. INTERNATIONAL RESEARCH JOURNAL OF ENGINEERING AND TECHNOLOGY (IRJET) E-ISSN: 2395-0056 VOLUME: 06 ISSUE: 05 | MAY 2019 WWW.IRJET.NET P-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4803 Amongst the many technological aspects, the three main dimensions of data security research are confidentiality, integrity, and availability. The power, optimization, and cloud computing flexibility generate security challenge. It is also a concern for the new user also their accessibility. In this field, A non-thorough hunt demonstrates few problems. They are Service Level Agreements (SLA), movements, security, etc. Cloud Computing has a programmed refresh element that implies a single change to an application by a head that would consider each of its customers. This also leads to the end that any problems in the product can be noticed very soon, which is a notable hazard for any association with little safety[5]. Numerous scientists also agree that security is a huge concern for the appropriation of distributed computing. Additionally, an IDC overview of 263 officials shows that security is placed first among cloud computing challenges. Although an organization is gloating to have top class security and does not refresh its approaches to security every now and then, in not so distant future it will be inclined to breaks in security. Through this nitty- gritty examination, we propose to refresh and respond to security challenges for perusers with different qualifications (sorts of). We also include real-time challenge mitigation practices, including the solutions proposed by enhanced researchers to demonstrate which areas of cloud computing need more attention. 2. CLOUD COMPUTING: SERVICE MODELS Cloud Computing can be easily accessible via a set of server or service modal. This services is design to provide easy accessibility and security of user. It is provide big data storage and controlling. Cloud computing is combination of multiple server, that is provide global reach of data without limitation. CC has different type of service modal, namely- 1.Infrastructure-as-a-Service (IaaS). 2.Platform-as-a-Service (PaaS). 3. Software-as-a-Service (SaaS). All three services work in layered. The model is shown in figure below. All layer is depending each other first work start of visualization then work on infrastructure. infrastructure is basically work on application requirement. After infrastructure we need to design its application module then its go to end used module to complete task. Fig. 1 Structure of service model 3. PROPOSED METHODOLOGY In this proposed work, present Efficient Data send and Management in cloud and outsourcing calculation into IBE (Identity Based Encryption) renouncement, and formalize the security importance of outsourced revocable IBE (Identity Based Encryption) suddenly to the best of our understanding Here is a proposed plan to create key , for enhanced security in cloud to hide identity and assign key through the encryption process. The second part to develop the proposed methodology to increase data and secure communication in the minimum time period.
  • 3. INTERNATIONAL RESEARCH JOURNAL OF ENGINEERING AND TECHNOLOGY (IRJET) E-ISSN: 2395-0056 VOLUME: 06 ISSUE: 05 | MAY 2019 WWW.IRJET.NET P-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4804 The proposed system, likewise with the recommendation, we understand disavowal through refreshing the private keys of the unrevoked clients. Yet, However, not under any condition like that work which inconsequentially links day and age with personality for key age/refresh and requires that the entire private key be reissued for unwanted customers, We propose a new configuration safe key issuing method: for each customer, we use creamer private key, which includes an AND door interface and links two sub-sections, in particular, the character segment and time segment. At first, the client can acquire from the essential server a default time segment and the character part (i.e., for the present era) as its private key in key issue. A little time later, with a specific end goal to keep up decode capacity, the need for unrevoked clients to intermittently request key refresh for the time part of an optional service that has recently been presented. Fig.2 Stream chart of proposed framework 4 PROXY RE-ENCRYPTION Proxy re-encryption plans are cryptosystems which permit outsiders (intermediaries) to modify a ciphertext which hosts been scrambled for one get-together, with the goal that it might be unscrambled by another. Anyway, the outsiders can't get the mystery esteem [10]. Blast introduces the BBS, Elgamal-based plan working more than two gathering _ of prime request q with a bilinear map. The system parameters are random generators 1g G and   2,Z e g g G  .  Key Generation (KG). The user A select random x. A’s key pair is the form.  Re-Encryption Key Generation (RG). A user A delegates to B by publishing the re-encryption key, computed from B’s public key.  First-Level Encryption ( 1E ). To encrypt a message under in such a way that it can only be the holder of, output.  Second-level Encryption ( 2E ).To encrypt a message 2m G under apk in such a way that it can be decrypted by user A and his delegates, output ( , )ak k c g mZ .  Re-Encryption(R). Anybody can change a second-level ciphertext for A into a first level ciphertext for B with A Brk  . From ( , )ak k ac g mZ , compute / ( , )ak b a bk e g g Z and publish ( , )bk k bc Z mZ .
  • 4. INTERNATIONAL RESEARCH JOURNAL OF ENGINEERING AND TECHNOLOGY (IRJET) E-ISSN: 2395-0056 VOLUME: 06 ISSUE: 05 | MAY 2019 WWW.IRJET.NET P-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4805 Fig3: Structure of Encryption Process  Decryption ( 1D , 2D ). To decrypt a first-level ciphertext ( , )ac   with secret key sk a , compute 1/ / a m   . To decrypt a second-level ciphertext ( , )ac   with secret key sk a , compute 1/ / ( , ) a m e g  .  Step 1 :Calculate Data dimension  Step 2 :Create server id using fomula flk_ID = h2(x,y,h1(I)) (1) h1(I) = mod(M×N, E) (2) where I = original Data M, N = dimension datax & y = coefficient of correlation of adjacent of data and E = entropy of data  Step 3 :XOR data from Original and mask  Step 4 : Then Data is divided into 8 sub data by using the Logistic Map and random permutationxn+1 = rxn(1-xn), (3)  Step 5: for b = 1 to 8 do  Data block shuffling Dimension of a block : Bm×Bn 5 RESULT & DISSCUSSION To work acknowledge renouncement through refreshing the private keys of the unrevoked clients. Be that as it may, different from the work that inconsistently connects day and age with key age/refresh personality and requires the reissue of the entire private key for unrevoked customers. The proposed research work results are shown below figure.Our system basically works on two cloud structure first that is user interact and second work on data security. For this basically design one system that follow some steps: 1. Server identity 2. Server Key Encryption 3. Server User Validation 4. User and Input Data 5. Ker Encryption and URL Design 6. Data Store in Cloud 7. Verification of Key 8. Decryption of Key 9. Verify Identity
  • 5. INTERNATIONAL RESEARCH JOURNAL OF ENGINEERING AND TECHNOLOGY (IRJET) E-ISSN: 2395-0056 VOLUME: 06 ISSUE: 05 | MAY 2019 WWW.IRJET.NET P-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4806 10. Download Data 11. Analyze accuracy In figure 3 take basic information of Server to validate the identity of the server and verify for secure communication. Fig.3 Server Identity Fig.4 Merge Server Identity Fig.5 Key design based on server Figure 4- and 5 show process to merge identity of server and design key using personal information. This is generate more security in cloud architecture Fig.6 User Data Fig.7 User data Masked
  • 6. INTERNATIONAL RESEARCH JOURNAL OF ENGINEERING AND TECHNOLOGY (IRJET) E-ISSN: 2395-0056 VOLUME: 06 ISSUE: 05 | MAY 2019 WWW.IRJET.NET P-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4807 Fig.8 Key Design and URL In figure 6 and 7 is show user utility, here user is interacting with server and store data in the cloud. Before is store data in the cloud we process and secure it by using the hash algorithm I masked input data to secure basic information of data. Fig.9 Store Data in Cloud Figure 9 and 10 is shown masking of input data to secure data information and then design key URL(Index) of data to store content in cloud URL. Fig.10 Verify Server Ownership Fig.11 Send Request
  • 7. INTERNATIONAL RESEARCH JOURNAL OF ENGINEERING AND TECHNOLOGY (IRJET) E-ISSN: 2395-0056 VOLUME: 06 ISSUE: 05 | MAY 2019 WWW.IRJET.NET P-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4808 Fig.12 Data Retrieval and Accuracy Measure Figure 10 to 12 is the process which is proved communication between server and user and show the accuracy of data. Fig.13 Efficiency for Item Select in Single Process 5 CONCLUSION This study proposed to propose a privacy-preserving protocol for data security in cloud architecture. In this research proposed a methodology to address the efficiency problems big data in the cloud server. The system we work multiple server encryption data and identity, design key encryption utility to verify and secure transition of communication. This system is basically designed secured key address through the encryption process and enhanced cloud security. REFERENCES 1. AKaipingXue, Shaohua Li, Jianan Hong, YingjieXue, Nenghai Yu, and Peilin Hong “Two-Cloud Secure Database for Numeric- Related SQL Range Queries With Privacy Preserving” IEEE Transactions On Information Forensics And Security, Vol. 12, No. 7, July 2017. 2. Fu, Zhangjie, et al. “Enabling personalized search over encrypted outsourced data with efficiency improvement” IEEE trans. on parallel and distributed systems 27.9 (2016): 2546-2559. 0 1 2 3 4 T i m e D e a l a y No of Item Our Proposed Query Based
  • 8. INTERNATIONAL RESEARCH JOURNAL OF ENGINEERING AND TECHNOLOGY (IRJET) E-ISSN: 2395-0056 VOLUME: 06 ISSUE: 05 | MAY 2019 WWW.IRJET.NET P-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4809 3. A Xia, Zhihua, et al. “A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data” IEEE trans. on parallel and distributed systems 27.2 (2016): 340-352. 4. A Li, Jiguo, et al. “Flexible and fine-grained attribute-based data storage in cloud computing” IEEE Trans. on Services Computing 10.5 (2017): 785-796. 5. Yan, Hao, et al. “A novel efficient remote data possession check protocol IEEE Trans. on Info. Forensics and Security 12.1 (2017): 78-88. 6. Qian, Huiling, et al. “Privacy-preserving personal health record using multi-authority attribute-based encryption with revocation” Intern. Jou. of Information Security 14.6 (2015): 487-497. 7. Li, Jiguo, et al. “KSF-OABE: outsourced attribute-based encryption with keyword search function for cloud storage” IEEE Trans. on Services Computing 10.5 (2017): 715-725. 8. Yu, Yong, et al. “Improved security of a dynamic remote data possession checking protocol for cloud storage” Expert systems withapplications 41.17 (2014): 7789-7796. 9. Haifeng, Ma, GaoZhenguo, and Yao Nianmin. “Hierarchical Enhanced Remote Data Possession Checking in Cloud Storage” BoletínTécnico 55.3 (2017): 145-154. 10. G. Ateniese, R. Di Pietro, L. V. Mancini, and G. Tsudik, “Scalable and efficient provable data possession,” in Proc. 4th Int. Conf. Secur.PrivacyCommun.Netw.(SecureComm), 2008, Art.no. 9. 11. F. Sebé, J. Domingo-Ferrer, A. Martinez-balleste, Y. Deswarte, and J. Quisquater, “Efficient remote data possession checking in critical information infrastructures,” IEEE Trans. Knowl. Data Eng., vol. 20, no. 8, pp. 1034–1038, Aug. 2008. 12. Nalini, Dr T., Dr K. Manivannan, and VaishnaviMoorthy. “Efficient Remote Data Possession Checking in Critical Information Infrastructures Ensuring Data Storage Security in Cloud Computing” International Journal of Innovative Research in Computer and Communication Engineering 1.1 (2013). 13. Y. Deswarte, J.-J.Quisquater, and A. Saïdane, “Remote integrity checking, in Proc. 6th Work. Conf. Integr. Int. Control Inf. Syst. (IICIS), 2003, pp. 1–11. 14. Z. Hao, S. Zhong, and N. Yu, “A privacy-preserving remote data integrity checking protocol with data dynamics and public verifiability,” IEEE Trans. Knowl. Data Eng., vol. 23, no. 9, pp. 1432–1437, Sep. 2011. 15. G. Ateniese et al., “Provable data possession at untrusted stores” in Proc. 14th ACM Conf. Comput. Commun.Secur.(CCS), 2007, pp. 598–609. 16. Y.-J. Ren, J. Shen, J. Wang, J. Han, and S.-Y.Lee, “Mutual verifiable provable data auditing in public cloud storage” J. Internet Technol., vol. 16, no. 2, pp. 317–323, 2015.