SECURE FILE STORAGE IN CLOUD COMPUTING USING ABE ALGORITHM
issue 1

SECURE FILE STORAGE IN CLOUD COMPUTING USING ABE ALGORITHM

Dr.A.A.Jaiswal1, Payal Bhanarkar2, Surbhi Vyapari3, Kanchan kapgate4, Priya Dhage5
1Head of Department prof.
2Student, 3Student, 4Student, 5Student
K.D.K COLLEGE OF ENGINEERING NAGPUR, INDIA.

Abstract:

To protect data security and privacy in cloud storage systems, a common solution is to outsource data in encrypted forms so that the data will remain secure and private even if storage systems are compromised. The encrypted data, however, must be pliable to search and access control. In this paper, we introduce a notion of attribute-based encryption with expressive and authorized keyword search (ABE-EAKS) to support both expressive keyword search and fine-grained access control over encrypted data in the cloud. In ABE-EAKS, every data user is associated with a set of attributes and is issued a private attribute-key corresponding to his/her attribute set, and each data owner encrypts the message using attribute-based encryption and attaches the encrypted message with encrypted keywords related with the message, and then uploads the encrypted message and keywords to the cloud. To access encrypted messages containing certain keywords satisfying a search policy, a data user generates a trapdoor for the search policy using his/her private attribute-key and sends it to the cloud server equipped to the cloud. The cloud server searches over encrypted data stored in the cloud for the encrypted messages containing keywords satisfying the search policy and send back the results to the data user who then decrypts the returned cipher texts to obtain the underlying messages. We present a generic construction for ABE-EAKS, formally prove its security, give a concrete construction, and then extend the concrete ABE-EAKS scheme to support user revocation. Also, we implement the proposed ABE-EAKS scheme and its extension and study their performance through experiments.

Index terms: ABE algorithm, encryption, decryption.

INTRODUCTION

Cloud computing is combination of many preexisting technologies that have matured at different rates and in different context. Now a day cloud computing is more popular in storing data online and offline also where it is mostly use in industry, military, college and many more. For storing data on cloud. Many issues are face while storing data, the solution for these issues we are using storage security any cloud computing. Many organizations are moving into cloud because it allows user to store the data on cloud and can access at any time at anywhere. The goal of cloud computing is to allowed user to take benefit from all this technology. Cloud computing is rising computing technology that uses Internet. It consists of the use of computing resources that are delivered as a service over a network. In cloud computing model users have to give access to their data for storing and performing the desired business operations. Hence cloud service provider must provide the trust and security, as there is valuable and sensitive data in huge amount stored on the clouds. For this purpose, there have been many of the schemes, proposed for encryption. Such as the hybrid encryption and decryption technique that is classically studied. We are going to discuss about the Attribute-Based Encryption (ABE) algorithm.

RELATED WORK

In Attribute- Based Encryption. n. Attribute-based encryption is a one-to-many public key encryption. Only the user, whose attributes satisfy the access policy set by the encryptor, can decrypt the cipher text. [1]

In Searchable attribute-based encryption scheme with attribute revocation in cloud storage the author will work on the keyword search attribute based with access control to decrypt the cipher text easily. [2]

Searchable and revocable multi-data owner attribute-based encryption scheme with hidden policy in cloud storage. In this paper the authors work on the hidden policy in cloud using ABE algorithm with used both cipher text and keyword index to protect user privacy. [3]

It described the security issue that facing in storing the data on cloud therefore using hybrid cryptography technique it easy to maintain and secure the data in computing. [4]

This paper is providing security using following technique i.e. public cloud, private cloud, hybrid cryptography for archiving the file security. [5]

It is proposed a simple data protection model where data is encrypted using Advanced Encryption Standard (AES) before it is launched in the cloud, thus ensuring data confidentiality and security. [6]

A Study of data storage security issue in cloud computing in the paper the security related to cloud they can used the algorithm to protect the files, using different method to encrypt and decrypt the data. [7]

In 2005, Sahai and Waters presented their idea: fuzzy identity-based encryption that later known as the first Attribute Based Encryption scheme. In fuzzy IBE, they share use of Shamir’s work that combine the IBE system with secret sharing. In this scheme, a set of descriptive attributes is viewed as an identity and possess by both cipher text and recipients; recipients who have the attribute close to the fuzzy identity can access the data. Secret sharing is used to distribute master key. In 2006, Waters, Pirretti, Traynor and et al. introduced a secure attribute-based system. They proposed cryptographic optimizations that vastly improved enforcement efficiency. ABE can minimize the effort of large amount user-key management.

PROBLEM STATEMENT

The security issues in cloud computing includes:

  • Data security
  • Identity and access control

Among these main security issues in the cloud, data security and integrity are believed to be the most difficult problem which could limit the use of cloud computing. In fact, access control and key management are all issues involved in data security. Data security in the cloud refers to data confidentiality, integrity, availability and traceability (CIAT), and these requirements pose major problems for cloud computing. Confidentiality: Data confidentiality requires that information be available or disclosed only to authorized Symmetric algorithms. The hybrid approach when deployed in cloud environment makes the remote server more secure and thus, helps the cloud providers to fetch more trust of their users. For data security and privacy protection issues, the fundamental challenge of separation of sensitive data. Individuals, entities or IT processes. Integrity: Data integrity ensures that the data is maintained in its original state and has not been intentionally or accidentally altered or deleted. Availability: Data availability ensures continuous access to data even in the occurrence of a natural or man-made disaster or events such as fires or power outages. Traceability: Data traceability means that the data and communications are genuine in a transaction and that both parties involved are who they claim to be. Authentication: Authentication is a method by which a system verifies and validates the identity of a user of the system who wishes to access it.

SECURITY ISSUES IN CLOUD

Cloud computing comes with numerous possibilities and challenges simultaneously. Security is considered to be a critical barrier for cloud computing in its path to success. The security challenges for cloud computing approach are somewhat dynamic and vast. In terms of customers personal or business data security, the strategic policies of the cloud providers are of highest significance. Security issues in cloud:

  • Lack of trust
  • Multi-tenancy
  • At highly sensitive

At highly sensitive data, if we use cloud high degree of security is required for our data. For hosted clouds, third party is responsible for storing and securing data. But is third parties trust worthy? Handing over sensitive data to other party is a serious concern. Data loss is also possible in cloud. A malicious hacker might delete a Target’s data out of spite or data can be lost because of a careless cloud service provider. Trusting a third party requires taking the risk of assuming that the trusted third party will act as it is expected (which may not be true all the time). The scalable nature of cloud has posed another threat. Cloud service providers share infrastructure, platforms, and applications to provide services. There is no strong isolation. Two companies might be using same piece of hardware without knowledge. Another question comes who is responsible for security of data? Is it only cloud service providers duty or stake holders, business entities are also responsible for maintaining safeguards. Legal decisions will ultimately determine who owns the responsibility for securing information shared within clouds [2].

FLOWCHART

Fig: ABE Algorithm

OUR PROPOSE WORK

Attribute-Based Encryption: Attribute-based encryption (ABE) is a relatively recent approach that reconsiders the concept of public-key cryptography. In traditional public-key cryptography, a message is encrypted for a specific receiver using the receiver’s public-key. Identity-based cryptography and in particular identity-based encryption (IBE) changed the traditional understanding of public-key cryptography by allowing the public-key to be an arbitrary string, e.g., the email address of the receiver. ABE goes one step further and defines the identity not atomic but as a set of attributes, e.g., roles, and messages can be encrypted with respect to subsets of attributes (key-policy ABE – KP-ABE) or policies defined over a set of attributes (cipher text-policy ABE – CP-ABE). The key issue is, that someone should only be able to decrypt a cipher text if the person holds a key for “matching attributes” (more below) where user keys are always issued by some trusted party.

Fig: Identity-Based Encryption

Since the introduction of ABE, several works proposed different applications of ABE as well as different ABE systems. In order to gain a fine-grained access control over ABE system, Goyal et al. proposed a Key-Policy Attribute-Based Encryption (KP-ABE) [4] and Bettencourt et al. introduced CiphertextPolicy Attribute-Based Encryption (CP-ABE) [5] in 2006 and 2007, respectfully. After that, several improvements have been made from both performance and security aspect. Just like the idea of separate a large complex data table into many smaller relational tables, decentralized auth. (or multipath.) could lead to a more flexible, scalable and realistic solution. It can also ensure privacy by sensitive information into separate server (no need to be entirely trusted). But in main time, more functionality comes with trade off of performance since any additional layer of authority will introduce more computation.

Fig: Login form

Login phase: In the login page whenever the end user he/she will enter the email-id and password and then login to the page if the end user will not login then will he/she go to registration page and register And coming to the login page and login to the form. In the login page after registration the user will come and enter the details i.e. email-id and password and login to the page later the user will come to working form and

Fig: Registration form

Registration phase: in registration phase end user register in order to upload and view files to/from the storage server.

Fig: Upload form

Upload phase: the files are uploaded by the end user to the registered server. The encryption of uploaded files is done using the hybrid cryptosystem.

Fig: working form

Working phase: after login to login form the end user will move forward to working page then he/she will upload data, download data, delete data, and decrypt data and logout. The end user will first upload the file, image then go to downloading page and he/she will download and later will decrypt the file using password and email-id and decrypt the file. After decryption he/she logout to the page and again coming back to login page.

CONCLUSION

The main goal is securely store and access data in cloud computing by using the technique ABE, AES and DES retrieval and also its secure data uploading which provide by the system, it also increases accuracy and availability of user in cloud. AES provide security to system, which was not vulnerable to known attacks. Practical design like input output privacy cheating resilience and efficiency was providing by proposed mechanism. It can enhanced encrypt data like file, image and text.

RESULT

Fig: decrypt file
Fig: decrypt file

In above figure the end user enters the details as email, address, and password and connects to after the connection there is option choose the file after choosing the file the end user will decrypt it. And user will easily download the file.

FUTURE SCOPE

Nowadays the cloud storage is on high demand, where anyone can store their data on it, in this there is challenges to security because everyone can use that information without permission. that’s why there is risk of data being loss these model is design for security purpose and providing an environment in which the user are easily working on it. And it can work on local host for encryption and decryption purpose.

ACKNOWLEDGEMENT

I am very thankful to my guide for his invaluable guidance and advice throughout this project. It would beneficial for project. I special thanks to the institute who always help us for doing work.

REFERENCES

  1. Yujiao Song, Hao Wang, Xiaochao Wei, and Lei Wu,” Efficient Attribute-Based Encryption with Privacy-Preserving Key Generation and Its Application in Industrial Cloud” Security and Communication Networks Volume 2019
  2. Wang S, Zhao D, Zhang Y. “Searchable attribute-based encryption scheme with attribute revocation in cloud storage”- doi: 10.1371/journal.pone.0183459-2017
  3. Wang S, GAO T, Zhang Y “Searchable and revocable multi-data owner attribute-based encryption scheme with hidden policy in cloud storage” PLoS One-2018
  4. A Venkatesh, Marrynal S. Eastaff “A Study of data storage security issue in cloud computing” International Journal Research in computer science, engineering and information technology-2018
  5. Tripathi Jyoti, Prof. Gayatri Pandi “Achieving Cloud Security Using Hybrid Cryptography Algorithm” IJARIIE-2017
  6. Abha Sachdev, Mohit Bhansali “Enhancing Cloud Computing Security using AES Algorithm” International Journal of Computer Applications (0975 – 8887) Volume 67– No.9, April 2013
  7. Sphurti Atram, N.R.Borkar “A Review paper on attribute-based encryption scheme in cloud computing” International Journal Research in computer science and mobile Computing volume-2017,
  8. Anup r. Nimje, V.T.Gaikwad, H.N.Datir “Attribute-Based Encryption Techniques in Cloud computing security, An Overview” International Journal Research in computer science-2013.
  9. Shangping Wang, Xiaoxue Zhang, and Yaling Zhang “Efficiently Multi-User Searchable Encryption Scheme with Attribute Revocation and Grant for Cloud Storage”-2016
  10. Ruqayah R. Al-Dahhan, Qi Shi, Gyu Myoung Lee, and Kashif Kifayat “Survey on Revocation in Cipher text-Policy Attribute-Based Encryption”-2019
  11. A. Sahai and B. Waters, “Fuzzy identity-based encryption,” in Proceedings of the 24th Annual International Conference on the TheoryandApplicationsofCryptographic Techniques, Advances in Cryptology – EUROCRYPT ’05, vol. 3494 of Lecture Notes in Computer Science,pp.457–473,Springer,Aarhus,Denmark, 2005.
  12. V.Goyal, O. Pandy, A. Sahani and B.Waters “attribute-based encryption for fine-grained access control of encrypted data,” in Proceedings of the 13th ACM Conference on Computer and Communications Security,(CCS’06),pp.89–98,Alexandria,VA, USA,November2006
  13. X. Li, Y. Zhu, J. Wang, Z. Liu, Y. Liu, and M. Zhang, “On the soundness and security of privacy-preserving SVM for outsourcing data classification, ”IEEE Transactions on Dependable and Secure Computing,vol.15,no.5,pp.906–912,2018
  14. Z. Liu, X. Huang, Z. Hu, M. K. Khan, H. Seo, and L. Zhou, “On emerging family of elliptic curves to secure internet of things: ECC comes of age,” IEEE Transactions on Dependable andSecureComputing,vol.14,no.3,pp.237–248,2017.
  15. H. Wang, Z. Zheng, L. Wu, and P. Li, “New directly revocable attribute-based encryptions chemeandits application in cloud storage environment,” Cluster Computing, vol. 20, no. 3, pp. 2385–2392,2017.

Related posts

Design Mobile application base Voice command wireless CNC Plotter machine

admin

Simulation On Web Controlled Smart Notice Board Using Raspberry pi

admin

Advanced Image Segmentation algorithm to analyze and detect Dermatitis Disease

admin

Leave a Comment