Enhanced Secure Data Sharing Over Cloud Using ABE Algorithm

Download as pdf or txt
Download as pdf or txt
You are on page 1of 4

International Journal of Scientific Research in Computer Science, Engineering and Information Technology

© 2019 IJSRCSEIT | Volume 4 | Issue 8 | ISSN : 2456-3307


DOI : https://doi.org/10.32628/IJSRCSEIT

Enhanced Secure Data Sharing Over Cloud Using ABE Algorithm


Virangni Gaikwad1, Ekta Bhosale 2, Ankita Istalkar 3, Rajashri Tapkir4, Prof. Sachin Patil5
1,2,3,4 Student, Department of Computer Engineering, Dr. D. Y. Patil School of Engineering, Lohegoan, Savitribai
Phule Pune University, Pune, Maharashtra, India
5 Professor, Department of Computer Engineering, Dr. D. Y. Patil School of Engineering, Lohegoan, Savitribai
Phule Pune University, Pune, Maharashtra, India
ABSTRACT

Cloud Computing provides a convenient way of sharing of data, which brings various benefits for both the society
and individuals. Security is becoming a wide necessity in day-to-day life. Data security is the most obliged security
of all. The data in our system is opened to high potential risks. Due to many security reasons we adopt diverse
methods. Now everyone is being dependent on the cloud platform for security and storage but even it is
vulnerable to various threats. The data inside cloud is not well-secured as it can be accessed by anyone who would
have our credentials. But there exists a resistance for users to directly outsource the shared data to the cloud
server as the data often contains valuable information. So we propose an Enhanced Security to the data using
encryption- The ciphertext-policy (CP) attribute-based encryption (ABE) (CP-ABE) and Byte Rotation
Algorithm emerging as a promising technology for allowing users to conveniently access data in cloud computing,
giving security to outsourced information, while thinking that client is not stressed while transferring their
classified information. Moreover, the privacy of users are protected in this scheme. The security and performance
analysis shows the scheme is secure, efficient and privacy-preserving.
Keywords: Cloud computing, CP, ABE, Encryption, Decryption, Privacy preserving.

I. INTRODUCTION condenses the total of hardware that could have been


used at user completion. As there is no essential for
Cloud computing has introduced the new method for the collection of data at user’s end because it is
computing and related problems like data privacy, data already at some other situation. So as an alternative of
security in cloud. It offers development environment, buying the complete infrastructure required to run the
allocation and reallocation of assets when needed, processes and save bulk of data which you are just
storage and interacting facility. The cloud computing renting the assets according to your requirements.
is composed of shared computing resources and
services that deliver the resources through which CLOUD computing is rapidly emerging technology
users can access the structures, hardware, applications, and on-demand storage and computing services for
and services on request which are independent of customers
locations. It contents the on-demand requests of the
user. It simplifies the sharable resources “as-a-service” Security Issues Within The Cloud:
ideal. For the association, the cloud offers data
access to move their data totally. Here comes the Organizations which are having low budget can now
assistance of the Cloud Computing i.e. It utilize high computing and storage services without

CSEIT195433 | Received : 03 Oct 2019 | Accepted : 25 Oct 2019 | September-October-2019 [ 4 (8) : 125-128 ]
125
Virangni Gaikwad et al Int J Sci Res CSE & IT, September-October-2019; 4(8) : 125-128

investing in the infrastructure and maintenance. A. Lightweight Secure Data Sharing Scheme for
However, the loss of control over data and Mobile Cloud Computing
computation raises many security concerns for A lightweight information sharing plot (LDSS) for
organizations, the wide adaptability of the public portable distributed computing. It receives CP-ABE,
cloud. The loss of control over data and the storage an entrance control innovation utilized as a part of
platform also motivates cloud customers to maintain typical cloud condition, be that as it may, changes the
and have control over data (individual data and the structure of access control tree to make it reasonable
data shared among a group of users through the public for versatile cloud situations. LDSS moves a vast
cloud) Moreover, the privacy and confidentiality of segment of the computational serious access control
the data is also recommended to be cared for by the tree change in CP-ABE from cell phones to outer
customers. The confidentiality management by a intermediary servers. Moreover, to lessen the client
customer ensures that the cloud does not have any renouncement cost, it acquaints property depiction
information about the customer data. The data ends with execute apathetic disavowal, which is a
encryption is done before storing to the cloud. The prickly issue in pro-gram-based CP-ABE frameworks.
access control, key management, encryption, and The trial comes about demonstrate that LDSS can
decryption processes are handled by the customers to successfully lessen the overhead on the cell phone side
ensure data security. However, when the data is when clients are sharing information in portable cloud
shared among a group, the cryptography services need situations.
to be flexible enough to handle different users,
B. Low Latency for File Encryption and Decryption
exercise the access control, and manage the keys in an
Using BRA Algorithm in Network Security.
effective manner to safeguard data confidentiality. A
separate key for every user is a cumbersome Data security is significant deterrent in various zones
solution.The changes in the data require the like military, bank application, educational
decryption of all of the copies of the users and organization. Document is forward starting with one
encryption again with the modified contents. The area then onto the next area in the organize.
existing and legitimate group members might show Numerous programmers are unlawfully get to the data.
illegitimate behaviour to manipulate the data. The To give answer for this issue many creators has
data can be decrypted, modified, and re-encrypted by presented diverse calculations and strategies. The
a malicious insider within a group. Consequently, a distinctive calculations like DES, triple DES and AES
legitimate user in the group may have the access to accomplish greater security however it sets aside more
certain unauthorized files within the group. On the opportunity for encryption and decoding records. This
other hand, it is necessary for a user to possess a key to algorithm gives greater security and takes littlest
conduct various operations on the data. The possession measure of time for record encryption and decoding.
of the key also implicitly proves the legitimacy of a This encryption can apply on various sorts of records
user to operate on the data. Nevertheless, like content, picture, sound, video records. In the Byte
simultaneously dealing with both the issues related to Rotation Encryption Algorithm include two
the key is an important issue that needs to be addressed procedures. One is irregular key era procedure is
effectively. utilized. What's more, second is parallel encryption
and decoding is process utilizing multithreading
II. Related Work procedure.
Literature Review
These are various surveys which we are studied

Volume 4, Issue 8, September-October-2019 | http://ijsrcseit.com


126
Virangni Gaikwad et al Int J Sci Res CSE & IT, September-October-2019; 4(8) : 125-128

C. Analysis of multi-threading time metric on single decryption of data will be done by owner, and
and multi-core CPUs with Matrix multiplication. randomly selected number, and the output will be
With the landing of multi-centre CPUs, to accelerate obtained encrypted data.
execution of frame-works utilizing parallelism is Step 5: A set of user attributes AU and the encrypted
prompting new approaches. Prior techniques to data are supplied to the input of the decryption
actualize parallelism in applications were constrained function, and the output will be obtained decrypted
to either utilization of excess equipment assets or message.
direction level parallelism (ILP). This requested the Step 6: Safe data retrieval.
need of part the undertaking or process into little Step 7: End
sections that can keep running in parallel in the
errand's unique circumstance, and strings have been 2. Byte Rotation Algorithm:
presented. It is normal that the quantity of centres per Step 1: Start
processor would duplicate with increment in silicon Step 2: The Data is partitioned into fixed length of
do- main on chip. Keeping in mind the end goal to blocks. These blocks are represented by matrix Mp.
achieve most extreme centre usage of equipment, Step 3: The numerical values is assigned to the data in
programming needs to nourish. Multi-threading is sequence.
prevalent approach to enhance application execution Step 4: The value of Key matrix is randomly selected
speeds through parallelism. As each string has its from the given range.
possess autonomous asset for assignment execution, Step 5: Calculate the Transpose matrix of data block
various procedures can be executed parallel by matrix Mp which is denoted by Mt.
expanding number of strings. Parallelism is the Step 6: Calculate the encrypted key matrix Kc .
running of strings in the meantime on centres of a Step 7: Add both matrix Mt and Kc. The resultant
similar CPU. Multi-threading is famous approach to matrix is denoted by Cpk.
enhance application execution speeds through Step 8: Rotate the first 3 row horizontally of Cpk
parallelism. As each string has its claim free asset for matrix. The resultant matrix will be matrix Chr.
assignment execution, various procedures can be Step 9: Rotate the first 3 column of Chr matrix. The
executed parallel by expanding number of strings. resultant matrix is denoted by Cvr.
Parallelism is the running of strings in the meantime Step 10: Replace the numerical values of Cvr matrix by
on centres of a similar CPU. the corresponding blocks.

Algorithms Used: III. RESULTS AND DISCUSSION

1. Attribute Based Encryption Algorithm: In several distributed systems a user should only access
Step 1: Start data, If a user possess a certain set of credentials or
Step 2: Generating the symmetric key for the register attributes. Currently, the only method is to employ a
users. trusted server to store the data and mediate access
Step 3: A set of user attributes is supplied to the input control. However, if any server which is storing the
of the private key generation, and the output of the data is compromised, then the confidentiality of the
algorithm turns user's private key. data will be compromised. In this survey paper we are
Step 4: The input is fed to the encryption function presenting a system for realizing complex access
which it is necessary to encrypt, a set of attributes, control on encrypted data that we call ciphertext-
policy attribute-based encryption. The encrypted data

Volume 4, Issue 8, September-October-2019 | http://ijsrcseit.com


127
Virangni Gaikwad et al Int J Sci Res CSE & IT, September-October-2019; 4(8) : 125-128

can be kept confidential even if the storage server is Dhruva R. Rinku, Dr. M Asha Rani 3rd
untrusted; moreover, our methods get secure against International Conference on Advances in
collusion attacks. In previous attributes where used to Electrical, Electronics, Information,
describe the encrypted data and built policies into Communication and Bio-Informatics
user's keys in attribute-based encryption systems (AEEICB17)
while in our new system attributes are used to describe [5]. V. Maitri, Dattatray S. Waghole, Vivek S.
a user's credentials, and a party encrypting data Deshpande, IEEE Senior Member, \Low latency
determines a policy for who can decrypt. for _le encryption and decryption using BRA
algorithm in network security", 2015
IV. CONCLUSION International Conference on Pervasive
computing.
Data which is available in the cloud can be at risk if
not handled or protected in a rightful manner. This
paper discusses various risks and security threats to Cite this article as :
data in the cloud and given an overview of three types
Virangni Gaikwad, Ekta Bhosale, Ankita Istalkar,
of security concerns. The major concerns of this paper
Rajashri Tapkir, Prof. Sachin Patil, "Enhanced Secure
was data security and its malicious threats and
Data Sharing Over Cloud Using ABE Algorithm",
solutions in cloud computing. Data has been discussed
International Journal of Scientific Research in
along with the techniques which are efficient for
Computer Science, Engineering and Information
encrypting the data in the cloud. To build a cost
Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 4
effective and secure data sharing system in cloud
Issue 8, pp. 125-128, September-October 2019.
computing, we proposed the notation called ABE-
Journal URL : http://ijsrcseit.com/CSEIT194829
Attribute-based encryption is a type of public-key
encryption, and ciphertext policy.

V. REFERENCES

[1]. Auditing and Resisting Key Exposure on Cloud


Storage Akshata M. Bhand, D. A. Meshram
Student, ME (IT) , RMD Sinhgad School of
Engineering,Pune, Assistant Professor, ME (IT),
RMD Sinhgad School of Engineering, Pune,2017
[2]. Strong Key-Exposure Resilient Auditing for
Secure Cloud Storage Jia Yu, and Huaqun Wang -
IEEE TRANSACTIONS ON INFORMATION
FORENSICS AND SECURITY, VOL. , NO., 2016
[3]. Enabling Cloud Storage Auditing with Key-
Exposure Resistance Jia Yu, Kui Ren, Senior
Member, IEEE, Cong Wang, Member, IEEE and
Vijay Varadharajan, Senior Member, IEEE , IEEE.
[4]. Analysis of multi-threading time metric on single
and multi-core CPUs with Matrix multiplication

Volume 4, Issue 8, September-October-2019 | http://ijsrcseit.com


128

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy