Smart Security For Data Sharing in Cloud Computing
Smart Security For Data Sharing in Cloud Computing
2
Student/ Information Technology, GMR Institute of Technology, Rajam , A.P ,India
Email: [email protected], [email protected], [email protected], mandangivenugmail.com,
kavitha.vana222gmail.com
Abstract-- In these computational world security is the major everything over the Internet, and without the burden of huge
Problem. Because the hackers are growing day by day. Here up-front capital expenditures. According to the National
majorly attacker’s attacks mostly while sharing or sending the Institute of Standards and Technology (NIST) Computer
data. So here we are using PAAS i.e. windows azure as the Security Division, the cloud model still suffers from significant
storage which is one of the service in cloud. So to provide the security challenges. For example, Software as a Service (SaaS)
security for the data here we come up with an RSA (encryption vendors are implementing disparate security approach has,
and decryption) algorithm. This is one of the security raising critical questions about where data is hosted,
mechanism to protect the private data over the cloud. international privacy laws, exposure of data to foreign entities,
nonstandard authentic teen and leaks in multi-tenant
Index Terms— Cloud Computing, dynamic groups, data architectures. Cloud computing continues that trend by
sharing, reliability, integrity, scalability. bringing greater levels of access to high-end applications and
data storage, as well as new techniques for collaboration.
I. INTRODUCTION
17
Integrated Intelligent Research (IIR) International Journal of Computing Algorithm
Volume: 05 Issue: 01 June 2016, Page No. 17- 20
ISSN: 2278-2397
elements are "rented" over the Internet, rather than being Reliability: The system has ability to perform required
managed locally. operations under any conditions. This system is reliable and
II. PROBLEM STATEMENT works effectively.
Performance: Performance requirements are concerned with
The cloud servers managed by cloud providers are not fully quantifiable attributes of the system like response time and
trusted by users while the data files stored in the cloud may be accuracy.
sensitive and confidential, such as business plans. To preserve
data privacy, a basic solution is to encrypt data files, and then V. EXITING SYSTEM
upload the encrypted data into the cloud. Unfortunately,
designing an efficient and secure data sharing scheme for The cloud, the group members can be completely released
groups in the cloud is not an easy task. from the troublesome local data storage and maintenance. It
also poses a significant risk to the confidentiality of those
III. PROPOSED STSTEM stored files. First, identity privacy is one of the most significant
obstacles for the wide deployment of cloud computing.
To solve the challenges presented above a secure multi-owner Traceability, which enables the group manager (e.g., a
data sharing scheme for dynamic groups in the cloud. The company manager) to reveal the real identity of a user, is also
main contributions of this paper include: This project proposes highly desirable. Second, it is highly recommended that any
a secure multi-owner data sharing scheme. It implies that any member in a group should be able to fully enjoy the data
user in the group can securely share data with others by the un- storing and sharing services provided by the cloud, which is
trusted cloud. Proposed scheme is able to support dynamic defined as the multiple-owner manner. Compared with the
groups efficiently. Specifically, new granted users can directly single-owner manner, where only the group manager can store
decrypt data files uploaded before their participation without and modify data in the cloud, the multiple-owner manner is
contacting with data owners. User revocation can be easily more flexible in practical applications. More concretely, each
achieved through a novel revocation list without updating the user in the group is able to not only read data, but also modify
secret keys of the remaining users. The size and Computation his/her part of data in the entire data file shared by the
overhead of encryption are constant and independent with the company.
number of revoked users. Provide secure and privacy-
preserving access control to users, which guarantee any VI. PROPOSED SYSTEM
member in group to anonymously utilize the cloud resource.
Provide rigorous security analysis, and perform extensive to To solve the challenges presented above a secure multi-owner
demonstrate the efficiency of scheme in terms of storage and data sharing scheme for dynamic groups in the cloud. The
computation overhead. main contributions of this paper include: This project proposes
A. objective: a [5]secure multi-owner data sharing scheme. It implies that
To implement an effective mechanism for sharing of data in a any user in the group can securely share data with others by the
multi owner manner in dynamic group in an untrusted cloud un-trusted cloud. Proposed scheme is able to support dynamic
while preserving data and identity privacy. groups efficiently. Specifically, new granted users can directly
B. Project Scope decrypt data files uploaded before their participation without
The scope of the system is select the file from the system and it contacting with data owners. User revocation can be easily
is to be send it to the other system which are in the cloud. After achieved through a novel revocation list without updating the
that we can transmitted the date with in as computer with the secret keys of the remaining users. The size and Computation
help of cloud. overhead of encryption are constant and independent with the
C. Project Objective number of revoked users. Provide secure and privacy-
The system has a clear set of objectives to achieve. They are as preserving access control to users, which guarantee any
follows: member in group to anonymously utilize the cloud resource.
1. Run all Group Manager Provide rigorous security analysis, and perform extensive to
2. Select the File demonstrate the efficiency of scheme in terms of storage and
3. Start sharing computation overhead.
4. Upload the File in the Clou
VII. ALGORITHM USED
IV. SYSTEM SPECIFICATION AND ANALYSIS
The RSA algorithm is named after Ron Rivest, Adi Shamir
A. Functional Requirements and Len Adleman, who invented it in 1977. The basic
The functional requirements are: technique was first discovered in 1973 by Clifford Cocksof
1. Input: Initial Input: Taking as a input file CESG (part of the British GCHQ) but this was a secret until
2. Outputs: Encrypted file. 1997. The patent taken out by RSA Labs has expired.
B. Non-Functional Requirements User interfaces and The RSA cryptosystem is the most widely-used public key
characteristics cryptography algorithm in the world. It can be used to encrypt
Usability: Best GUI screens allow user to interact more a message without the need to exchange a secret key
effectively with limited knowledge on Data Mining. separately. The RSA algorithm can be used for both public key
Implementation: Using dot net (c#) and windows azure encryption and digital signatures. Its security is based on the
difficulty of factoring large integers.
18
Integrated Intelligent Research (IIR) International Journal of Computing Algorithm
Volume: 05 Issue: 01 June 2016, Page No. 17- 20
ISSN: 2278-2397
sending the data by group manager and the registration page of
Party A can send an encrypted message to party B without any member who need to register.
prior exchange of secret keys. A just uses B's public key to
encrypt the message and B decrypts it using the private key,
which only he knows. RSA can also be used to sign a message,
so A can sign a message using their private key and B can
verify it using A's public key.
VIII. RESULTS
References
[1] http://www.springer.com/cda/content/document/
cda_downloaddocument/9783642385858-c2.pdf?
SGWID=0-0-45-1432954-p175259278
[2] A. Shamir, “Identity-based cryptosystems and signature
schemes,” in CRYPTO. Springer, 1985, pp. 47–53.
[3] Abhijit Das, C. E. (2009). Public-Key Cryptography:
Theory and Practice. Mumbai: Pearson Education India.
[4] M. Armbrust, A. Fox, R. Griffith, A.D. Joseph, R.H. Katz,
A. Konwinski, G. Lee, D.A. Patterson, A. Rabkin, I.
Stoica, and M. Zaharia, "A View of Cloud
Computing," Comm. ACM, vol. 53, no. 4, pp. 50-58, Apr.
2010.
[5] Xuefeng Liu, Yuqing Zhang, Boyang Wang, Jingbo Yan,
"Mona: Secure Multi-Owner Data Sharing for Dynamic
Groups in the Cloud", IEEE Transactions on Parallel &
Distributed Systems, vol.24, no. 6, pp. 1182-1191, June
2013, doi:10.1109/TPDS.2012.331
20