SlideShare a Scribd company logo
ISSN: 2278 - 1323
International Journal of Advanced Research in Computer Engineering and Technology (IJARCET)
Volume 2, Issue 6, June 2013
www.ijarcet.org 2073
Abstract– Major problem in public clouds is how to share
documents based on fine-grained attribute based access control
policies, sharing data in a dynamic groups while preserving data
and identity privacy from an un trusted cloud is still a challenging
issue, due to the frequent change of the membership., encrypting
documents with different keys using a public key cryptosystem
such as attribute based encryption (ABE), and/or proxy
re-encryption (PRE) approach has some weaknesses: it cannot
efficiently handle adding/revoking users or identity attributes, and
policy changes; it requires to keep multiple encrypted copies of the
same documents; it incurs high computational costs. In this paper,
I propose a secure multi-owner attribute authorities based data
sharing scheme for dynamic groups in the cloud. Tha aim of my
paper is secure data sharing in a dynamic group where the there is
no fixed Attribute authorities where as multi – owner attribute
authorities scheme is possible. key policy key policy
attribute-based encryption (KP-ABE) method is used to select
dynamic AA (Attribute authorities ) . By leveraging group
signature , signed receipts and dynamic broadcast encryption
techniques, any cloud user can anonymously share data with
others. As the result the computation cost is reduced and storage
overhead and encryption computation cost of our scheme are
independent with the number of revoked users so the encryption
cost is also reduced .
Index Terms— Cloud computing, data sharing, dynamic groups,
attribute- based encryption
I. INTRODUCTION
Cloud computing is recognized as an alternative to
traditional information technology [1] due to its in-trinsic
resource-sharing and low-maintenance characteristics. One
of the most fundamental services offered by cloud providers
is data storage.Such cloud providers cannot be trusted to
protect the confidentiality if the data . In fact, data privacy
and security issues have been major concerns for many
organizations utilizing such services. Data often encode
sensitive information and should be protected as mandated
by various organizational policies and legal regulations.
Encryption is a commonly adopted approach to protect the
confidentiality of the data. Encryption alone however is not
sufficient as organizations often have to enforce fine-grained
access control on the data. Such control is often based on the
attributes of users, referred to asidentity attributes, such as
the roles ofusers in the organization, projects on which users
are working and so forth. These systems, in general, are
Manuscript received June, 2013.
M. Kavitha Margret , received B.E (CSE) in 2004 from RVS college of
Engineering, M.E (CSE) in 2007 from Jayaram college of engineering .
Since 2010 she has been working as Assistant Professor in the department of
Computer Science & Engineering, SVS college of engineering
called attribute based systems. Therefore, an important
requirement is to support fine-grained access control, based
on policy spicier using identity attributes, over encrypted
data. However, it also posesa significant risk to the
confidentiality of those stored files. To preserve data privacy,
a basic solution is to encrypt data files, and then upload the
encrypted data into the cloud [2].Unfortunately, designing an
efficient and secure data sharing scheme for groups in the
cloud is not an easy task due to the following challenging
issues. First, identity Second, it is recommended that any
memberin a group should be able to fully enjoy the
datastoring and sharing services provided by the cloud,which
is defined as the multiple-owner manner. Compared with the
single-owner manner [3], Third, member revocation and
signed receipt e.g., new member participation and
currentmember revocation in a group . The changes of
membership make secure data sharing extremely difficult, it
is impossible for new granted users to contact with
anonymous data owners, and obtain the corresponding
decryption keys. On the other hand, an efficient membership
re-vocation mechanism without updating of the secret keys
of the remaining users minimize the complexity of key
management , signed receipt is collected after every member
revocation in the group it minimizes the multiple copies of
encrypted file and also reduces computation cost.
II. RELATED WORKS
[4] proposed a cryptographicstorage system that enables
secure file sharing a n untrusted servers, named Plutus. By
dividing file into file groups and encrypting each file group
with a unique lock group key, the data owner can share the
file groups with others through delivering the
corresponding group key, where the lock group-key is used
to encrypt the lock-group keys. However, itbrings about a
heavy key distribution overhead forlarge-scale file sharing.
Additionally, the Lock group keyneeds to be updated and
distributed again for a userrevocation.
In [5] untrusted server has two parts of files to be stored
those : file metadata and file data. The file meta-data implies
the access control information that includes a series of
encrypted key blocks, each of which isencrypted under the
symmetric key of authorized users.
It is proportional to the number of authorized users. The user
revoca-tion in the scheme is an intractable issue especially
Secure Policy Based Data Sharing for
Dynamic Groups in the Cloud
M. Kavitha Margret
ISSN: 2278 - 1323
International Journal of Advanced Research in Computer Engineering and Technology (IJARCET)
Volume 2, Issue 6, June 2013
2074
for large-scale sharing, since the file metadata needsto be
updated. In their extension version, the NNLconstruction
[10] is used for efficient key revocation.
However, when a new user joins the group, theprivate key of
each user in NNL system needs tobe recomputed, which may
limit the application fordynamic groups. Another concern is
that, the compu-tation overhead of encryption linearly
increases with the sharing-scale.
[6] To ensure security in distributed storage. Specifically the
dataowner encrypts blocks of content with unique
andsymmetric content keys. For access control, theserver
uses proxy cryptography to directly re-encrypt through
dynamically encrypted keys the appropriate content key(s)
from the AA,s dynamically derived symmetric key.
Unfortunately,a collusion attack between the untrusted server
andany revoked malicious user can be launched,
whichenables them to learn the decryption keys of all
theencrypted blocks.
In [3], Yu et al. presented a scalable and fine-graineddata
access control scheme in cloud computing basedon the key
policy attribute-based encryption (KP-ABE) technique. The
data owner uses a random key to encrypt a file, where the
random key is furtherencrypted with a set of attributes using
KP-ABE. Thenthe AA’s for the group assigns an access
structure andthe corresponding secret key to authorized
users, suchthat a user can only decrypt a cipher text if and
only if the data file attributes satisfy the access structure.
Toachieve user revocation, the manager delegates tasksof
data file re-encryption and user secret key updateto cloud
servers. The single-owner mannermay hinder the
implementation of applications withthe scenario, where any
member in a group should beallowed to store and share data
files with others.
[7] proposed a secure scheme,which is built upon group
signatures and policy attribute-based encryption techniques.
The system in their scheme is set with a singleattribute. Each
user obtains two keys after the registration:a group signature
key and an attribute key. Thusany user is able to encrypt a
data file using attributebasedencryption and others in the
group can decryptthe encrypted data using their attribute
keys. Meanwhile,the user signs encrypted data with her
groupsignature key for privacy-preserving and traceability.
However, user revocation is not supported in
theirscheme.From the above analysis, we can observe that
howto securely share data files in a multiple-owner
mannerfor dynamic groups while preserving identityprivacy
from an untrusted cloud remains to be a challengingissue.
The proposed scheme uses a protocol for secure data sharing
in cloud computing.Compared with the existing works the
new protocol offers
1) the user in the group can share and store data files with
others by the cloud;
2) the complexity and size taken for encryption is
independent with the number of revoked users in
the system;
3) user revocation can be achieved without
updating the private keys of the remaining users and signed
receipts will be collected after any revocation that reduces
duplication of encrypted copies ;
III. PROPOSED SCHEME
A.System model
The system model consists of threedifferent entities: the
cloud, a AAmanager and a large number of groupmembers
as illustrated in Fig.1.
Cloud is operated by Cloud Service Providers(CSPs) which
provides abundant storage services.However, the cloud is
not fully trusted Similar to [7], we assumethat the cloud
server is honest-but-curious. That is, thecloud server will not
maliciously delete or modifyuser data due to the protection of
data auditing schemes[8], but will try to learn the content
ofthe stored data and the identities of cloud users.AA
Manager for group takes charge of system
parametersgeneration, user registration, user revocation and
revealingthe real identity of a dispute data owner. Inthe given
example, the AA manager is acted by the administrator of an
organization . Therefore, we assumethat the AA manager is
fully trusted by the otherparties.
Group Members are a set of registered users thatwill store
their private data into the cloud server andshare them with
others in the group. In my example,
Each group has a members. Note that,
the group membership is dynamically changed, dueto the
ISSN: 2278 - 1323
International Journal of Advanced Research in Computer Engineering and Technology (IJARCET)
Volume 2, Issue 6, June 2013
www.ijarcet.org 2075
member resignation and new member participationin an
organization
B. Design goals
The main design goals ofthe proposed scheme including
access control, dataconfidentiality, anonymity and
traceability and efficiencyas follows.
Access Control: The requirement of access controlis
two-fold. First, group members are able to use thecloud
resource for data operations.
Second, unauthorizedusers cannot access the cloud resource
at anytime, and revoked users will be incapable of usingthe
cloud once again they are revoked.
Data Confidentiality: Data confidentiality requiresthat
unauthorized users including the cloud are incapableof
learning the content of the stored data . Animportant and
challenging issue for data confidentialityis to maintain its
availability for dynamic groups.New users should decrypt
the data storedin the cloud before their participation, and
revokedusers is unable to decrypt the data moved into
thecloud after the revocation.
Anonymity and Traceability: Anonymity guaranteesthat
group members can access the cloud withoutrevealing the
real identity it enables effective protection for user identity
itposes a potential inside attack risk to the system.
To tackle the inside attack, the group managershould have the
ability to reveal the real identities ofdata owners.
Efficiency: The efficiency is defined as follows. Anygroup
member can store and share data files withothers in the group
by the cloud . User revocation canbe achieved without
involving the remaining users and signed receipts will be
collected after secure content sharing. the remaining users do
not need to update
Data sharing :
To achieve privacy preserved data sharing for dynamic
groups in the cloud , the scheme combines the group
signature, signed receipt and dynamic broadcast encryption
techniques.Specially, the group signature and signed receipt
scheme enables usersto anonymously use the cloud
resources, and thedynamic broadcast encryption technique
allows dataowners to securely share their data files with
othersincluding new joining users.
Unfortunately, each user has to compute
revocationparameters to protect the confidentiality from
therevoked users in the dynamic broadcast
encryptionscheme, which results in that both the
computationoverhead of the encryption and the size of the
cipher text increase with the number of revoked users. Thus
the Large cipher text size may hinder the adoption of the
broadcast encryptionscheme to capacity-limited users.To
tackle this challenging issue, let the groupmanager compute
the revocation parameters andmake the result public
available by migrating theminto the cloud. Such a design can
significantly reducethe computation overhead of users to
encrypt filesand the ciphertext size. Specially, the
computationoverhead of users for encryption operations and
theciphertext size are constant and independent of
therevocation users.
IV. RESULTS AND DISCUSSION
The proposed scheme of storage into cloud server is
demonstrated using the private cloud setup with open stack.
The SQL server 2005 andvisual studio 2008 is used for
building the ASPX pages that are used in demonstration of
the proposed work.
Microsoft Visual Studio 2008 helps individual developers
accelerate solution development. Deliver breakthrough user
experiences for all the users. It effectively building solutions
for the Web, Windows, the Microsoft Office system, and
Windows Mobile.
Visual Studio is a complete set of development tools for
building ASP.NET Web applications, XML Web Services,
desktop applications, and mobile applications. Visual
Basic, Visual C#, and Visual C++ all use the same integrated
development environment, which enables tool sharing and
eases the creation of mixed-language solutions. In addition,
these languages use the functionality of the .NET
Framework, which provides access to key technologies that
simplify the development of ASP Web applications and
XML Web Services.
Regardless of which platform is being targeted, Visual
Studio 2008 delivers the productivity, performance, and
stability required to help developers remain focused on the
real business challenges, along with a broad ecosystem that
helps ensure they can always find the partners, information,
and other community members to help them deliver great
software. Also included is SQL Server 2005 Compact
ISSN: 2278 - 1323
International Journal of Advanced Research in Computer Engineering and Technology (IJARCET)
Volume 2, Issue 6, June 2013
2076
Edition, SQL Server 2005 Express Edition and MSDN
Express documentation.
The following are the visual studio 8 run-time member
functions that are involved in the proposed system.
Math Functions – math functions are used to implement RSA
algorithms which is used to encrypt the data fields (attributes
) in the data base.
Conversion Functions – conversion functions are to
implement KP- ABE , which ensures dynamic policy
changes.
• Type Conversion Functions
• String Functions
• Math Functions
• CType Function
V. CONCLUSION
In this paper, I design a secure data sharing scheme, for
dynamic groups in an untrusted cloud. In this scheme a user
is able to share data with others in thegroup without revealing
identity privacy to the cloud. Secure policy supports efficient
user revocationand new user joining. Efficient userrevocation
can be achieved through a public revocation list without
updating the private keys of theremaining users, and new
users can directly decryptfiles stored in the cloud before their
participation.Extensive analysesshow that the proposed
scheme satisfies the desiredsecurity requirements and it
guarantees efficiency aswell.
REFERENCES
[1] S. Kamara and K. Lauter, “Cryptographic cloud storage,”
in Proc. of FC, January 2010, pp. 136-149.
[2][1] M. Armbrust, A. Fox, R. Griffith, A. D.Joseph, R.
H.Katz, A. Konwinski, G. Lee, D. A. Patterson, A. Rabkin, I.
Stoica, andM. Zaharia, “A View of Cloud Computing,”
Communications of the ACM, vol. 53, no. 4, pp. 50-58, Apirl
2010.
[3] S. Yu, C. Wang, K. Ren, and W. Lou,“ Achieving secure,
scalable,and fine- grained data access control in cloud
computing,” inProc. of INFOCOM, 2010, pp. 534-542.
[4] M. Kallahalla, E. Riedel, R. Swaminathan, Q. Wang, and
K. Fu,“Scalable secure file sharing on untrusted storage,” in
Proc. OfFAST, 2003, pp. 29-42.
[5] E. Goh, H. Shacham, N. Modadugu, and D. Boneh,
“Sirius:Securing remote untrusted storage,” in Proc. of
NDSS, 2003, pp.131-145.
[6] G. Ateniese, K. Fu, M. Green, and S. Hohenberger,
“Improvedproxy re-encryption schemes with applications to
secure distributed storage,” in Proc. of NDSS, 2005, pp.
29-43.
[7] R. Lu, X. Lin, X. Liang, and X. Shen, “Secure
Provenance:The Essential of Bread and Butter of Data
Forensics in CloudComputing,”, in Proc. of AISIACCS,
2010, pp. 282-292.
[8] C. Delerablee, P. Paillier, and D. Pointcheval, “Fully
Collusion Secure Dynamic Broadcast Encryption with
Constant-SizeCiphertexts or Decryption Keys,” in Proc. of
Pairing, 2007, pp.39-59.
[9] D. Chaum and E. van Heyst, “Group Signatures,” in Proc.
Of EUROCRYPT, 1991, pp. 257-265.
[10] A. Fiat and M. Naor, “Broadcast Encryption,” in Proc.
Of CRYPTO, 1993, pp. 480-491.
Mrs. M.Kavitha Margret received B.E (CSE) in 2004
from RVS college of Engineering, M.E (CSE) in 2007
from Jayaram college of engineering . Since 2010
she has been working as Assistant Professor in the
department of Computer Science & Engineering,
SVS college of engineering . Her Research interests
include Operating System, Virtualization
Techniques, and Cloud Computing

More Related Content

PDF
Iaetsd secure data sharing of multi-owner groups in cloud
PDF
Secure Data Sharing For Dynamic Groups in Multi-Attorney Manner Using Cloud
PPTX
Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud
DOCX
A secure anti collusion data sharing scheme for dynamic groups in the cloud
PDF
Mona secure multi owner data sharing for dynamic groups in the cloud
PDF
A cloud storage system for sharing data securely with privacy preservation an...
PPT
Mona secure multi owner data sharing for dynamic groups in the cloud-ppt
PDF
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
Iaetsd secure data sharing of multi-owner groups in cloud
Secure Data Sharing For Dynamic Groups in Multi-Attorney Manner Using Cloud
Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud
A secure anti collusion data sharing scheme for dynamic groups in the cloud
Mona secure multi owner data sharing for dynamic groups in the cloud
A cloud storage system for sharing data securely with privacy preservation an...
Mona secure multi owner data sharing for dynamic groups in the cloud-ppt
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.

What's hot (16)

DOCX
Mona secure multi owner data sharing for dynamic groups in the cloud
PPTX
Secure data sharing for dynamic groups in multi-owner using cloud
PDF
SMONA: Secure Multi Owner Data Sharing for Dynamic Groups in the Cloud
PDF
J018145862
PPTX
secure multi-owner data sharing for dynamic groups
DOCX
A secure-anti-collusion-data-sharing-scheme-for-dynamic-groups-in-the-cloud
PDF
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
PPTX
Mona final review
PDF
Multi Owner Data Sharing & Outsourced Revocation Using Identity Based Encrypt...
PDF
Ieeepro techno solutions 2011 ieee java project -secure role based data
PDF
A secure anti collusion data sharing scheme for dynamic groups in the cloud
PDF
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
PDF
Investigation on Revocable Fine-grained Access Control Scheme for Multi-Autho...
PDF
PDF
The Recent Trend: Vigorous unidentified validation access control system with...
PDF
IRJET- A Review on Lightweight Secure Data Sharing Scheme for Mobile Cloud Co...
Mona secure multi owner data sharing for dynamic groups in the cloud
Secure data sharing for dynamic groups in multi-owner using cloud
SMONA: Secure Multi Owner Data Sharing for Dynamic Groups in the Cloud
J018145862
secure multi-owner data sharing for dynamic groups
A secure-anti-collusion-data-sharing-scheme-for-dynamic-groups-in-the-cloud
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
Mona final review
Multi Owner Data Sharing & Outsourced Revocation Using Identity Based Encrypt...
Ieeepro techno solutions 2011 ieee java project -secure role based data
A secure anti collusion data sharing scheme for dynamic groups in the cloud
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
Investigation on Revocable Fine-grained Access Control Scheme for Multi-Autho...
The Recent Trend: Vigorous unidentified validation access control system with...
IRJET- A Review on Lightweight Secure Data Sharing Scheme for Mobile Cloud Co...
Ad

Similar to Volume 2-issue-6-2073-2076 (20)

PDF
A secure anti collusion data sharing scheme for dynamic groups in the cloud
PDF
Secure Data Sharing In an Untrusted Cloud
PDF
Encryption based multi user manner secured data sharing and storing in cloud
PDF
Encryption based multi user manner
PDF
An Efficient Scheme for Data Sharing Among Dynamic Cloud Members
PDF
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...
PDF
IJSRED-V2I3P52
PDF
Review on Key Based Encryption Scheme for Secure Data Sharing on Cloud
PDF
IRJET- Secure Cloud Data Using Attribute Based Encryption
PDF
C04932125
PDF
Control Cloud Data Access Using Attribute-Based Encryption
PDF
A review on key aggregate cryptosystem for scalable data sharing in cloud sto...
PDF
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
PDF
A Data Sharing Protocol to Minimize Security and Privacy Risks in Cloud Storage
PDF
A Secure & Scalable Access Method in Cloud Computing
PDF
IRJET- Cipher Text Policy Attribute based Encryption by Deduplication for Tim...
PDF
An Improved Integrated Hash and Attributed based Encryption Model on High Dim...
PDF
IRJET- Redsc: Reliablity of Data Sharing in Cloud
PDF
IRJET- A Research Paper on Block Design-based Key Agreement for Group Dat...
PDF
Achieving Secure, sclable and finegrained Cloud computing report
A secure anti collusion data sharing scheme for dynamic groups in the cloud
Secure Data Sharing In an Untrusted Cloud
Encryption based multi user manner secured data sharing and storing in cloud
Encryption based multi user manner
An Efficient Scheme for Data Sharing Among Dynamic Cloud Members
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...
IJSRED-V2I3P52
Review on Key Based Encryption Scheme for Secure Data Sharing on Cloud
IRJET- Secure Cloud Data Using Attribute Based Encryption
C04932125
Control Cloud Data Access Using Attribute-Based Encryption
A review on key aggregate cryptosystem for scalable data sharing in cloud sto...
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
A Data Sharing Protocol to Minimize Security and Privacy Risks in Cloud Storage
A Secure & Scalable Access Method in Cloud Computing
IRJET- Cipher Text Policy Attribute based Encryption by Deduplication for Tim...
An Improved Integrated Hash and Attributed based Encryption Model on High Dim...
IRJET- Redsc: Reliablity of Data Sharing in Cloud
IRJET- A Research Paper on Block Design-based Key Agreement for Group Dat...
Achieving Secure, sclable and finegrained Cloud computing report
Ad

More from Editor IJARCET (20)

PDF
Electrically small antennas: The art of miniaturization
PDF
Volume 2-issue-6-2205-2207
PDF
Volume 2-issue-6-2195-2199
PDF
Volume 2-issue-6-2200-2204
PDF
Volume 2-issue-6-2190-2194
PDF
Volume 2-issue-6-2186-2189
PDF
Volume 2-issue-6-2177-2185
PDF
Volume 2-issue-6-2173-2176
PDF
Volume 2-issue-6-2165-2172
PDF
Volume 2-issue-6-2159-2164
PDF
Volume 2-issue-6-2155-2158
PDF
Volume 2-issue-6-2148-2154
PDF
Volume 2-issue-6-2143-2147
PDF
Volume 2-issue-6-2119-2124
PDF
Volume 2-issue-6-2139-2142
PDF
Volume 2-issue-6-2130-2138
PDF
Volume 2-issue-6-2125-2129
PDF
Volume 2-issue-6-2114-2118
PDF
Volume 2-issue-6-2108-2113
PDF
Volume 2-issue-6-2102-2107
Electrically small antennas: The art of miniaturization
Volume 2-issue-6-2205-2207
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2200-2204
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2186-2189
Volume 2-issue-6-2177-2185
Volume 2-issue-6-2173-2176
Volume 2-issue-6-2165-2172
Volume 2-issue-6-2159-2164
Volume 2-issue-6-2155-2158
Volume 2-issue-6-2148-2154
Volume 2-issue-6-2143-2147
Volume 2-issue-6-2119-2124
Volume 2-issue-6-2139-2142
Volume 2-issue-6-2130-2138
Volume 2-issue-6-2125-2129
Volume 2-issue-6-2114-2118
Volume 2-issue-6-2108-2113
Volume 2-issue-6-2102-2107

Recently uploaded (20)

PDF
Approach and Philosophy of On baking technology
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Encapsulation theory and applications.pdf
PDF
KodekX | Application Modernization Development
PPTX
A Presentation on Artificial Intelligence
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
Approach and Philosophy of On baking technology
Dropbox Q2 2025 Financial Results & Investor Presentation
Encapsulation theory and applications.pdf
KodekX | Application Modernization Development
A Presentation on Artificial Intelligence
Encapsulation_ Review paper, used for researhc scholars
Unlocking AI with Model Context Protocol (MCP)
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Per capita expenditure prediction using model stacking based on satellite ima...
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
NewMind AI Weekly Chronicles - August'25 Week I
“AI and Expert System Decision Support & Business Intelligence Systems”
Chapter 3 Spatial Domain Image Processing.pdf
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
Network Security Unit 5.pdf for BCA BBA.
The Rise and Fall of 3GPP – Time for a Sabbatical?
Digital-Transformation-Roadmap-for-Companies.pptx
20250228 LYD VKU AI Blended-Learning.pptx

Volume 2-issue-6-2073-2076

  • 1. ISSN: 2278 - 1323 International Journal of Advanced Research in Computer Engineering and Technology (IJARCET) Volume 2, Issue 6, June 2013 www.ijarcet.org 2073 Abstract– Major problem in public clouds is how to share documents based on fine-grained attribute based access control policies, sharing data in a dynamic groups while preserving data and identity privacy from an un trusted cloud is still a challenging issue, due to the frequent change of the membership., encrypting documents with different keys using a public key cryptosystem such as attribute based encryption (ABE), and/or proxy re-encryption (PRE) approach has some weaknesses: it cannot efficiently handle adding/revoking users or identity attributes, and policy changes; it requires to keep multiple encrypted copies of the same documents; it incurs high computational costs. In this paper, I propose a secure multi-owner attribute authorities based data sharing scheme for dynamic groups in the cloud. Tha aim of my paper is secure data sharing in a dynamic group where the there is no fixed Attribute authorities where as multi – owner attribute authorities scheme is possible. key policy key policy attribute-based encryption (KP-ABE) method is used to select dynamic AA (Attribute authorities ) . By leveraging group signature , signed receipts and dynamic broadcast encryption techniques, any cloud user can anonymously share data with others. As the result the computation cost is reduced and storage overhead and encryption computation cost of our scheme are independent with the number of revoked users so the encryption cost is also reduced . Index Terms— Cloud computing, data sharing, dynamic groups, attribute- based encryption I. INTRODUCTION Cloud computing is recognized as an alternative to traditional information technology [1] due to its in-trinsic resource-sharing and low-maintenance characteristics. One of the most fundamental services offered by cloud providers is data storage.Such cloud providers cannot be trusted to protect the confidentiality if the data . In fact, data privacy and security issues have been major concerns for many organizations utilizing such services. Data often encode sensitive information and should be protected as mandated by various organizational policies and legal regulations. Encryption is a commonly adopted approach to protect the confidentiality of the data. Encryption alone however is not sufficient as organizations often have to enforce fine-grained access control on the data. Such control is often based on the attributes of users, referred to asidentity attributes, such as the roles ofusers in the organization, projects on which users are working and so forth. These systems, in general, are Manuscript received June, 2013. M. Kavitha Margret , received B.E (CSE) in 2004 from RVS college of Engineering, M.E (CSE) in 2007 from Jayaram college of engineering . Since 2010 she has been working as Assistant Professor in the department of Computer Science & Engineering, SVS college of engineering called attribute based systems. Therefore, an important requirement is to support fine-grained access control, based on policy spicier using identity attributes, over encrypted data. However, it also posesa significant risk to the confidentiality of those stored files. To preserve data privacy, a basic solution is to encrypt data files, and then upload the encrypted data into the cloud [2].Unfortunately, designing an efficient and secure data sharing scheme for groups in the cloud is not an easy task due to the following challenging issues. First, identity Second, it is recommended that any memberin a group should be able to fully enjoy the datastoring and sharing services provided by the cloud,which is defined as the multiple-owner manner. Compared with the single-owner manner [3], Third, member revocation and signed receipt e.g., new member participation and currentmember revocation in a group . The changes of membership make secure data sharing extremely difficult, it is impossible for new granted users to contact with anonymous data owners, and obtain the corresponding decryption keys. On the other hand, an efficient membership re-vocation mechanism without updating of the secret keys of the remaining users minimize the complexity of key management , signed receipt is collected after every member revocation in the group it minimizes the multiple copies of encrypted file and also reduces computation cost. II. RELATED WORKS [4] proposed a cryptographicstorage system that enables secure file sharing a n untrusted servers, named Plutus. By dividing file into file groups and encrypting each file group with a unique lock group key, the data owner can share the file groups with others through delivering the corresponding group key, where the lock group-key is used to encrypt the lock-group keys. However, itbrings about a heavy key distribution overhead forlarge-scale file sharing. Additionally, the Lock group keyneeds to be updated and distributed again for a userrevocation. In [5] untrusted server has two parts of files to be stored those : file metadata and file data. The file meta-data implies the access control information that includes a series of encrypted key blocks, each of which isencrypted under the symmetric key of authorized users. It is proportional to the number of authorized users. The user revoca-tion in the scheme is an intractable issue especially Secure Policy Based Data Sharing for Dynamic Groups in the Cloud M. Kavitha Margret
  • 2. ISSN: 2278 - 1323 International Journal of Advanced Research in Computer Engineering and Technology (IJARCET) Volume 2, Issue 6, June 2013 2074 for large-scale sharing, since the file metadata needsto be updated. In their extension version, the NNLconstruction [10] is used for efficient key revocation. However, when a new user joins the group, theprivate key of each user in NNL system needs tobe recomputed, which may limit the application fordynamic groups. Another concern is that, the compu-tation overhead of encryption linearly increases with the sharing-scale. [6] To ensure security in distributed storage. Specifically the dataowner encrypts blocks of content with unique andsymmetric content keys. For access control, theserver uses proxy cryptography to directly re-encrypt through dynamically encrypted keys the appropriate content key(s) from the AA,s dynamically derived symmetric key. Unfortunately,a collusion attack between the untrusted server andany revoked malicious user can be launched, whichenables them to learn the decryption keys of all theencrypted blocks. In [3], Yu et al. presented a scalable and fine-graineddata access control scheme in cloud computing basedon the key policy attribute-based encryption (KP-ABE) technique. The data owner uses a random key to encrypt a file, where the random key is furtherencrypted with a set of attributes using KP-ABE. Thenthe AA’s for the group assigns an access structure andthe corresponding secret key to authorized users, suchthat a user can only decrypt a cipher text if and only if the data file attributes satisfy the access structure. Toachieve user revocation, the manager delegates tasksof data file re-encryption and user secret key updateto cloud servers. The single-owner mannermay hinder the implementation of applications withthe scenario, where any member in a group should beallowed to store and share data files with others. [7] proposed a secure scheme,which is built upon group signatures and policy attribute-based encryption techniques. The system in their scheme is set with a singleattribute. Each user obtains two keys after the registration:a group signature key and an attribute key. Thusany user is able to encrypt a data file using attributebasedencryption and others in the group can decryptthe encrypted data using their attribute keys. Meanwhile,the user signs encrypted data with her groupsignature key for privacy-preserving and traceability. However, user revocation is not supported in theirscheme.From the above analysis, we can observe that howto securely share data files in a multiple-owner mannerfor dynamic groups while preserving identityprivacy from an untrusted cloud remains to be a challengingissue. The proposed scheme uses a protocol for secure data sharing in cloud computing.Compared with the existing works the new protocol offers 1) the user in the group can share and store data files with others by the cloud; 2) the complexity and size taken for encryption is independent with the number of revoked users in the system; 3) user revocation can be achieved without updating the private keys of the remaining users and signed receipts will be collected after any revocation that reduces duplication of encrypted copies ; III. PROPOSED SCHEME A.System model The system model consists of threedifferent entities: the cloud, a AAmanager and a large number of groupmembers as illustrated in Fig.1. Cloud is operated by Cloud Service Providers(CSPs) which provides abundant storage services.However, the cloud is not fully trusted Similar to [7], we assumethat the cloud server is honest-but-curious. That is, thecloud server will not maliciously delete or modifyuser data due to the protection of data auditing schemes[8], but will try to learn the content ofthe stored data and the identities of cloud users.AA Manager for group takes charge of system parametersgeneration, user registration, user revocation and revealingthe real identity of a dispute data owner. Inthe given example, the AA manager is acted by the administrator of an organization . Therefore, we assumethat the AA manager is fully trusted by the otherparties. Group Members are a set of registered users thatwill store their private data into the cloud server andshare them with others in the group. In my example, Each group has a members. Note that, the group membership is dynamically changed, dueto the
  • 3. ISSN: 2278 - 1323 International Journal of Advanced Research in Computer Engineering and Technology (IJARCET) Volume 2, Issue 6, June 2013 www.ijarcet.org 2075 member resignation and new member participationin an organization B. Design goals The main design goals ofthe proposed scheme including access control, dataconfidentiality, anonymity and traceability and efficiencyas follows. Access Control: The requirement of access controlis two-fold. First, group members are able to use thecloud resource for data operations. Second, unauthorizedusers cannot access the cloud resource at anytime, and revoked users will be incapable of usingthe cloud once again they are revoked. Data Confidentiality: Data confidentiality requiresthat unauthorized users including the cloud are incapableof learning the content of the stored data . Animportant and challenging issue for data confidentialityis to maintain its availability for dynamic groups.New users should decrypt the data storedin the cloud before their participation, and revokedusers is unable to decrypt the data moved into thecloud after the revocation. Anonymity and Traceability: Anonymity guaranteesthat group members can access the cloud withoutrevealing the real identity it enables effective protection for user identity itposes a potential inside attack risk to the system. To tackle the inside attack, the group managershould have the ability to reveal the real identities ofdata owners. Efficiency: The efficiency is defined as follows. Anygroup member can store and share data files withothers in the group by the cloud . User revocation canbe achieved without involving the remaining users and signed receipts will be collected after secure content sharing. the remaining users do not need to update Data sharing : To achieve privacy preserved data sharing for dynamic groups in the cloud , the scheme combines the group signature, signed receipt and dynamic broadcast encryption techniques.Specially, the group signature and signed receipt scheme enables usersto anonymously use the cloud resources, and thedynamic broadcast encryption technique allows dataowners to securely share their data files with othersincluding new joining users. Unfortunately, each user has to compute revocationparameters to protect the confidentiality from therevoked users in the dynamic broadcast encryptionscheme, which results in that both the computationoverhead of the encryption and the size of the cipher text increase with the number of revoked users. Thus the Large cipher text size may hinder the adoption of the broadcast encryptionscheme to capacity-limited users.To tackle this challenging issue, let the groupmanager compute the revocation parameters andmake the result public available by migrating theminto the cloud. Such a design can significantly reducethe computation overhead of users to encrypt filesand the ciphertext size. Specially, the computationoverhead of users for encryption operations and theciphertext size are constant and independent of therevocation users. IV. RESULTS AND DISCUSSION The proposed scheme of storage into cloud server is demonstrated using the private cloud setup with open stack. The SQL server 2005 andvisual studio 2008 is used for building the ASPX pages that are used in demonstration of the proposed work. Microsoft Visual Studio 2008 helps individual developers accelerate solution development. Deliver breakthrough user experiences for all the users. It effectively building solutions for the Web, Windows, the Microsoft Office system, and Windows Mobile. Visual Studio is a complete set of development tools for building ASP.NET Web applications, XML Web Services, desktop applications, and mobile applications. Visual Basic, Visual C#, and Visual C++ all use the same integrated development environment, which enables tool sharing and eases the creation of mixed-language solutions. In addition, these languages use the functionality of the .NET Framework, which provides access to key technologies that simplify the development of ASP Web applications and XML Web Services. Regardless of which platform is being targeted, Visual Studio 2008 delivers the productivity, performance, and stability required to help developers remain focused on the real business challenges, along with a broad ecosystem that helps ensure they can always find the partners, information, and other community members to help them deliver great software. Also included is SQL Server 2005 Compact
  • 4. ISSN: 2278 - 1323 International Journal of Advanced Research in Computer Engineering and Technology (IJARCET) Volume 2, Issue 6, June 2013 2076 Edition, SQL Server 2005 Express Edition and MSDN Express documentation. The following are the visual studio 8 run-time member functions that are involved in the proposed system. Math Functions – math functions are used to implement RSA algorithms which is used to encrypt the data fields (attributes ) in the data base. Conversion Functions – conversion functions are to implement KP- ABE , which ensures dynamic policy changes. • Type Conversion Functions • String Functions • Math Functions • CType Function V. CONCLUSION In this paper, I design a secure data sharing scheme, for dynamic groups in an untrusted cloud. In this scheme a user is able to share data with others in thegroup without revealing identity privacy to the cloud. Secure policy supports efficient user revocationand new user joining. Efficient userrevocation can be achieved through a public revocation list without updating the private keys of theremaining users, and new users can directly decryptfiles stored in the cloud before their participation.Extensive analysesshow that the proposed scheme satisfies the desiredsecurity requirements and it guarantees efficiency aswell. REFERENCES [1] S. Kamara and K. Lauter, “Cryptographic cloud storage,” in Proc. of FC, January 2010, pp. 136-149. [2][1] M. Armbrust, A. Fox, R. Griffith, A. D.Joseph, R. H.Katz, A. Konwinski, G. Lee, D. A. Patterson, A. Rabkin, I. Stoica, andM. Zaharia, “A View of Cloud Computing,” Communications of the ACM, vol. 53, no. 4, pp. 50-58, Apirl 2010. [3] S. Yu, C. Wang, K. Ren, and W. Lou,“ Achieving secure, scalable,and fine- grained data access control in cloud computing,” inProc. of INFOCOM, 2010, pp. 534-542. [4] M. Kallahalla, E. Riedel, R. Swaminathan, Q. Wang, and K. Fu,“Scalable secure file sharing on untrusted storage,” in Proc. OfFAST, 2003, pp. 29-42. [5] E. Goh, H. Shacham, N. Modadugu, and D. Boneh, “Sirius:Securing remote untrusted storage,” in Proc. of NDSS, 2003, pp.131-145. [6] G. Ateniese, K. Fu, M. Green, and S. Hohenberger, “Improvedproxy re-encryption schemes with applications to secure distributed storage,” in Proc. of NDSS, 2005, pp. 29-43. [7] R. Lu, X. Lin, X. Liang, and X. Shen, “Secure Provenance:The Essential of Bread and Butter of Data Forensics in CloudComputing,”, in Proc. of AISIACCS, 2010, pp. 282-292. [8] C. Delerablee, P. Paillier, and D. Pointcheval, “Fully Collusion Secure Dynamic Broadcast Encryption with Constant-SizeCiphertexts or Decryption Keys,” in Proc. of Pairing, 2007, pp.39-59. [9] D. Chaum and E. van Heyst, “Group Signatures,” in Proc. Of EUROCRYPT, 1991, pp. 257-265. [10] A. Fiat and M. Naor, “Broadcast Encryption,” in Proc. Of CRYPTO, 1993, pp. 480-491. Mrs. M.Kavitha Margret received B.E (CSE) in 2004 from RVS college of Engineering, M.E (CSE) in 2007 from Jayaram college of engineering . Since 2010 she has been working as Assistant Professor in the department of Computer Science & Engineering, SVS college of engineering . Her Research interests include Operating System, Virtualization Techniques, and Cloud Computing