Vous êtes sur la page 1sur 6

IJSTE - International Journal of Science Technology & Engineering | Volume 3 | Issue 11 | May 2017

ISSN (online): 2349-784X

Research on Storage Privacy Via Black-Box and


Sanitizable Signature
Ruchika P Dungarani Ketan Patel
Student Assistant Professor
Department of Computer Engineering Department of Computer Engineering
G.M.F.E, Himmatnagar G.M.F.E, Himmatnagar

Rakesh Shah
Assistant Professor
Department of Computer Engineering
G.M.F.E, Himmatnagar

Abstract
Information security, also known as InfoSec, which is the application of protecting information from invalid access, use,
declaration, confusion, changes, examination, or demolition. It is a general term that can be used anyhow the form the data may
take (e.g. electronic, physical) Information security process is set of techniques to managing the processes and tools necessary
to stop, notice, document and counter threats to digital and non-digital information.[28] Storage Privacy make resources
available to authorized users only and unavailable to others. [14] Easily available to authorized people, institution and agencies.
To compromise the system difficult for a potential hacker. The network must be well founded and solid under a wide variety of
surroundings conditions and volumes of usage. Without knowledge of internal working we give input and get output that system
or device is known as BLACK-BOX. Implementation of black-box is “Fussy”. The designated portion of document is changed
by sanitizer after agreement by signer. The sanitizer is valid if designated portion is only changed.[7] Sanitizable signature is
used to sanitize(Modify) the portion of data which we do not want to share or we want to protect from others. The modification
of sensitive information is performed by the sanitizer and this was not known by the signer or verifier. Today’s generation is
become a digital. Every person using the mobile phones for any important Document Transformation also use the mobile or
computer even for money transaction we use online banking for these all we strongly need storage privacy. We get better privacy
by SSS (Sanitizable signature) and black-box. In sanitizable Signature Authorized person can modify the authorized portion of
Signature.
Keywords: Storage privacy, Black-box, Sanitizable signature, NetBeans
________________________________________________________________________________________________________

I. INTRODUCTION

Storage privacy is basic need for security because today’s generation is become digital .Every person use internet for
money transaction and other important document transformation. Sanitizable signature is used to modify the sensitive
information of document by sanitizer and this was not known by the original signer.[5] Lot of information is shared through
internet using different means now a day. From that information some information are sensitive and we cannot compromise
with its security. Different techniques and algorithms we use to secure our data.[3] Sanitizable signature is important
techniques which help to decide that information provider and provided information both are genuine. Black-box is very
important concept for provide better security to storage. We also use sanitizable signature and redactable signature for storage
privacy.[2] Redactable signature allow anyone to remove blocks from Document, without invalidating the signature. When we
don’t want to share particular portion of document we just dark out that portion the same thing was done by using redactable
signature.[6] Sanitizable signature is used to modify the sensitive information of document by sanitizer and this was not known
by the original signer. In this paper for storage privacy we are going to use combine algorithm of redactable signature and
sanitizable signature. In this algorithm we have to follow seven different steps like key generation, signature, sanitization,
redactation, judge and verify. We have to use seven different algorithms for creating this algorithm. We are applying this
algorithm in black-box for tighten security.

II. STORAGE PRIVACY

“Authorized users and trusted networks can only use the available resources unauthorized person cannot use the resources” is
the basic concept of storage privacy. We have to protect information against online threats such as Viruses, Worms, Trojans,
and other malicious code. Effectiveness of storage security methodology can determine from two criteria.[10]
1) Implementing system cost should be a small fraction of value of protected data.[14]

All rights reserved by www.ijste.org 196


Research on Storage Privacy Via Black-Box and Sanitizable Signature
(IJSTE/ Volume 3 / Issue 11 / 039)

2) It should cost a potential hacker more, in term of money and/or time, to compromise the system than the protected data is
worth[14]

Fig. 2.1: Storage Privacy

III. BLACK-BOX

In black-box We get output of given input without knowing its internal working. Implementation of code in black -box is
“Blind”.[8]
Ex:- human brain

Fig. 3.1: BLACK-BOX

IV. SANITIZABLE SIGNATURE

Data sanitization is the process of change or modifies the data. In cryptosystem we use this concept for security purpose. We
use sanitizable signature which allow a person to modify the original portion of the data without knowing to the original
signer .[7] Who made these changes are known as sanitizer. The sanitizer can produce a valid signature if it modify the
designated portion no other parts of message..[7] sanitizer have authority to modify the portion of signature.
Following problem can solve using sanitizable signature: We want a properly signed document by any authorized signer,
without harming the original data behind, we need some portion of that signed document hidden or masked to protect some
important information. Sanitizing process can be done without original signer to sign again. .[7] This concept is very useful in
case signer is not available at a moment..[2]

All rights reserved by www.ijste.org 197


Research on Storage Privacy Via Black-Box and Sanitizable Signature
(IJSTE/ Volume 3 / Issue 11 / 039)

Properties of sanitizable signature

 Unforgeability:- Says that no one except for the honest signer and sanitizer can create valid signature [3]
 Immutability:- sanitizer cannot change message parts which have not marked as modifiable by signer. [3]
 Privacy:- Secure sanitized message parts from outsider to recover that.
 Transparency:- Clear the indistinguishaibility of signature created by sanitizer or signer. [3]
 Accountability:- By this the signer can prove that a particular signature is his not by the sanitizer.

The functions of genetic operators are as follows:-


Key Generation
There are two key generation algorithms, one for the signer and one for the sanitizer. Both create a pair of keys, a private key and
the public key.
Signing
The Sign algorithm takes m = (m[1]; : : : ;m[`]),the signer's secret key sksig, the sanitizer's public key pksan, as well as a
description adm of the admissibly modifiable blocks, where adm contains the number of blocks in m, as well the indices of the
modifiable blocks. It outputs the message m and a signature Sign(1_; m; sksig; pksan; adm)
Sanitizing
Algorithm Sanit takes a message m = (m[1]; : : : ;m[`]), m[i] , the public key pksig of the signer and the secret key sksan o f the
sanitizer. It modifies the message m according to the modification instruction mod, which contains pairs (i;m[i]0) for those
blocks that shall be modified. Sanit calculates a new signature _0 for the modified message m0 mod (m). Then Sanit outputs m0
Sanit(1_; m;mod; _; pksig; sksan)
Verification
The Verify algorithm outputs a decision verifying the validity of a signature for a message m = (m[1]; : : : ;m[`]),m[i] with
respect to the public keys.

V. MOTIVATION OF WORK

The main motivation of this project is the space for research in this area is still vast. Emerged with the deliberate amount of
work still in progress and signing data becomes the standard solution to allow integrity checks, e.g., for data stored on third-party
storage servers in the cloud . Current provably secure. Solutions mostly focus on one out of two specific types of malleable
signature schemes, i.e., either on RSSs or SSSs. [2]. At first sight, both approaches aim for the same goal, i.e., changing signed
data. And we get better result by combining these algorithms.

VI. SCOPE

Scope of this research work is,


 Technique for storage privacy makes stored data very securely.
 Combine approach of RSS and SSS give strong privacy to system.
 Using black box we get tighten security.
 Generate the set of multiple non-dominated solution- As Optimal High level prediction rules.

VII. LIMITATION OF EXISTING SYSTEM

 Use black-box in analysis of sanitizing.


 In existing shabaz-groz algorithm we can further tuned in order to achieve an even larger performance.
 In existing system black-box and Sanitizable signature are used. But black-box and Sanitizable signature are not used
together.
 They are tried to combine black-box and Sanitizable signature

All rights reserved by www.ijste.org 198


Research on Storage Privacy Via Black-Box and Sanitizable Signature
(IJSTE/ Volume 3 / Issue 11 / 039)

VIII. PROPOSED FLOW CHART:

IX. INTRODUCTION TO PROPOSED ALGORITHM

Propose algorithm generate new system for storage privacy. We use black-box and Sanitizable signature for storage privacy. •
We use black-box for analysis of sanitization to give better privacy.

Notation:
 pKsig Public Key For Signer
 sKsig Private Key For Signer
 pKsan Public Key For Sanitizer
 sKsag Private Key For Sanitizer
 Kgensig Key Generation Algorithm For Signer
 Kgensan Key Generation Algorithm For Sanitizer
 M’ Modified Message Sig’ Modified Signature
 Mod Contains Pairs For Those Blocks That Shall Be Modified.

All rights reserved by www.ijste.org 199


Research on Storage Privacy Via Black-Box and Sanitizable Signature
(IJSTE/ Volume 3 / Issue 11 / 039)

Algorithm

X. PROPOSED METHODOLOGY

NetBeans:
 We are going to use NetBeans platform for implementing the proposed algorithm.
 NetBeans started as a student project in Czechoslovakia, in 1996. NetBeans is a software development platform written in
Java. NetBeans primarily developed for java but also support other languages like PHP, C/C++ etc.

Latest Version:
 NetBeans IDE 8.2 was released on October 3, 2016.

Last Version:
 Net Beans IDE 6.5, released in November 2008
 Net Beans IDE 6.9, released in June 2010
 NetBeans IDE 7.0 was released in April 2011
 NetBeans IDE 7.0.1 was released in August 1, 2011
 NetBeans IDE 7.3 was released in February 2013
 NetBeans IDE 7.4 was released on October 15, 2013.
 NetBeans IDE 8.0 was released on March 18, 2014.
 NetBeans IDE 8.1 was released on November 4, 2015.

XI. CONCLUSION

When we take Long input And Complex input then Execution time is also increased. When we apply changes in algorithm its
known as black-box Because Black-box means apply or allow some changes in original data.

XII. FUTURE WORK

We apply Sanitization Process on Proposed Algorithm. . We need to judge sanitized data to check the signature is made by
sanitizer or signer. We need to verify that only the portion which needs to be changed and permitted to be changed, is changed
and the That change was made by Sanitizer Only.

REFERENCES

Papers:
[1] “Blackbox: Distributed Peer-to-Peer File Storage and Backup” Payut Pantawongdecha,Isabella Tromba,Chelsea Voss,Gary Wang May 14,
2014

All rights reserved by www.ijste.org 200


Research on Storage Privacy Via Black-Box and Sanitizable Signature
(IJSTE/ Volume 3 / Issue 11 / 039)

[2] “Rethinking Privacy for Extended Sanitizable Xu, Anjia Yang, Jianying Zhou, and Duncan S. Wong [3] “A General Framework for Redactable
Signatures and New Constructions” David Derler1z, Henrich C. P,ohls2;z;x, Kai Samelin3k, Daniel Slamanig1z
[3] “Efficient and Perfectly Unlinkable Sanitizable Signatures without Group Signatures” Christina Brzuska, Henrich ohls, Kai Samelin
[4] “Active Learning of Nondeterministic Finite State Machines” Warawoot Pacharoen, Toshiaki Aoki, Pattarasinee Bhattarakosol,and Athasit
Surarerks
[5] “An Analysis of Black-Box Web Application Security Scanners against Stored SQL Injection” Nidal Khoury, Pavol Zavarsky, Dale Lindskog, Ron
Ruhl
[6] “Sanitizable Signatures”Giuseppe Ateniese, Daniel H. Chou, Breno de Medeiros,and Gene Tsudik
[7] “Black Box Backup System”Iyad Aldasouqi & Arafat Awajan International Daniel Slamanig International Conference, CANS 2016,
Milan, Italy, November 14-16, 2016. Proceedings, Sara Foresti and Giuseppe Persiano Eds., Springer Journal of Computer Science and Security (IJCSS),
Volume (5) : Issue (3) : 2011 368
[8] “A General Framework for Redactable Signatures and New Constructions” David Derler z, Henrich ohls, Kai Samelin, Daniel Slamanig
[9] “Research Design: Qualitative, Quantitative and Mixed Methods Approaches”, J. W. Cresswell, 2nd. Ed. California: Sage Publications, Inc. 2002.
[10] “Secure Privacy Preserving Public Auditing for Cloud storage” International Journal of Innovative Research in Science, Engineering Springer-
Verlag 1998.
[11] “Using Invariant Detection Mechanism in Black Box Inference” Muzammil Shahbaz and Roland Groz
[12] “Cyber security, Innovation And The Internet Economy”The Department Of Commerce Internet Policy Task Force
[13] “Lightweight Delegatable Proofs of Storage” Jia Fortran” Carla Guillen, Leibniz Supercomputing Centre 19th March 2015.

Links
[14] “BlackBox”,2014,Wikipedia,15July2016, <https://en.wikipedia.org/wiki/Black_box >
[15] “8 Best Cloud Storage Providers For Corporate Privacy”, May 5, 2014, Hongkiat, viewed 20 Aug 2016 http://www.hongkiat.com /blog/8-best-cloud-
storage-providers-for-corporate - data-privacy/
[16] “Eclipse”,2016,eclipse,viewed 9 October 2016 < https://eclipse.org/>[28]“Cryptography”, Wikipedia, viewed 22 July 2016 https://en.wikipedia.org/
wiki/ Key_(cryptography)

All rights reserved by www.ijste.org 201