Académique Documents
Professionnel Documents
Culture Documents
Abstract:- The cloud computing could be a new computing model that comes from grid computing, distributed computing,
parallel computing, virtualization technology, utility computing and alternative laptop technologies during this paper, we have a
tendency to present a unique privacy-preserving security resolution for cloud services. We have a tendency to wear down user
identification and secure communication. Our resolution provides solely registered users to access cloud services. Our
resolution offers anonymous authentication. This implies that users personal attributes (age, valid registration, and successful
payment) may be proved while not revealing users identity. Our resolution offers secure communication of transmitted
information.
Key Terms: Cloud Service Provider, RSA public key, privacy-enhancing technologies (PETs), standards development
organizations (SDOs)
IJCERT2014 240
www.ijcert.org
ISSN (Online): 2349-7084
GLOBAL IMPACT FACTOR 0.238
INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING IN RESEARCH TRENDS VOLUME 1, ISSUE 4, OCTOBER
2014, PP 240-24
IJCERT2014 241
www.ijcert.org
ISSN (Online): 2349-7084
GLOBAL IMPACT FACTOR 0.238
INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING IN RESEARCH TRENDS VOLUME 1, ISSUE 4, OCTOBER
2014, PP 240-24
B Necessity
IJCERT2014 242
www.ijcert.org
ISSN (Online): 2349-7084
GLOBAL IMPACT FACTOR 0.238
INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING IN RESEARCH TRENDS VOLUME 1, ISSUE 4, OCTOBER
2014, PP 240-24
Anonymity. Every honest user stays anonymous when Secure Communication: - RSA provides the secure
uses cloud services. User identities are hidden if users communication between client and server. Users encrypts
behave honestly and do not break rules. Confidentiality. random by the RSA public key of CSP. The encrypted
Every users session to CSP is confidential. No one Enc PK server (random) is send to the server. Server
without a secret session key is able to obtain data verifies the encrypted Enc PK server (random) if it verify
transmitted between U and CSP. then the server decrypt this with its secret key and
C. Proposed Architecture generate random key K_sym.Compute the Response =
This proposed architecture is enhanced security model K_sym random. CSP sends a response message (random
for cloud services like data storage. It consist of CSP i.e. K sym) back to user.
loud Service Provider and users. File Upload and Download:-The user can upload and
Cloud Service Provider: - CSP generates a pair of keys download data to CSP. Data privacy is secured by a
i.e. secret key and public key by using cryptography Symmetric cipher. We propose to use AES which is well
algorithm RSA. CSP stores its own private key generated known cipher and is supported by many types of software
RSA algorithm and public key is shared by all. and hardware platforms. To encrypt and decrypt
Users:- Users must physically register on CSP. CSP transmitted data, User and CSP use the AES secret key K
check users id. If user is already registered then there are sym established in the previous phase.
some messages exchanged between users and CSP for
establishing secure communication between them. Users IV. CONCLUSSIONS
generated a random request and encrypts this random This paper presents resolution that offers user obscurity
request with the RSA public key of CSP and sends this in authentication section and confidentiality throughout
request message to the server. Now server verifies this file Uploading and downloading for all users. Our
request if it is verified then server decrypt this message authentication section is additional economical than
by using RSA secret key of CSP and generate a random connected solutions on the consumer aspect and
key K_sym. Now with the help of this random key server conjointly on the server aspect because of missing
generates a response by applying the X-OR operation to valuable additive pairing operations and fewer
random and K_sym.Server send this response to users. involution operations. Because of this reality, cloud
Users use this service suppliers victimization our resolution will
Random key for file uploading and downloading and manifest additional purchasers within the same time. We
attain secure communication have a tendency to handle user anonymous access to
cloud services and shared storage servers. Our resolution
provides registered users with anonymous access to
cloud services.
REFERENCES
*1+ Y. Chen and R. Sion, On securing untrusted clouds
with cryptography, in Proceedings of the 9th annual
ACM workshop on Privacy in the electronic society.
ACM, 2010, pp. 109114.
*2+ R. Laurikainen, Secure and anonymous
communication in the cloud, Aalto University School of
Fig 4: Architecture for proposed protocol Science and Technology, Department of Computer
D. Proposed Algorithm
Science and Engineering, Tech. Rep. TKK-CSE-B10, 2010.
Key Generation: - The CSP generates the random key
[3] Sushmita Ruj, Milos Stojmenovic and Amiya Nayak,
pair (Pk, Sk). Two large prime numbers P, Q are
Privacy Preserving Access Control with Authentication
generated such that N=PQ (N is 1024 bits) and = (P-
for Securing Data in Cloudsin proceedings of the 12th
1)(Q-1) Select a random number 1<e< such that gcd
IEEE/ACM International Symposium on Cluster, Cloud
(e,)=1. Compute the unique integer d=e-1(mod
and Grid Computing
(n)).Where Pk (e, N) is the Public Key and Sk (d, N) is the
Secret Key.
IJCERT2014 243
www.ijcert.org
ISSN (Online): 2349-7084
GLOBAL IMPACT FACTOR 0.238
INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING IN RESEARCH TRENDS VOLUME 1, ISSUE 4, OCTOBER
2014, PP 240-24
IJCERT2014 244
www.ijcert.org