Vous êtes sur la page 1sur 13

JASC: Journal of Applied Science and Computations ISSN NO: 1076-5131

Safeguarding Cloud By Increasing Confidentiality


Conservation and User Built Access Controller
Mechanism
#1 #2 #3
Mr. Shubham S. Chourasiya , Prof.A.R.Bhagat Patil , Prof.T.R Ravi
#
Department of Computer Science, Yeshwantrao Chavhan College of Engineering .Nagpur, India
1
sschourasiya14@gmail.com
2
arbhagatpatil@gmail.com
3
ravitr2000@yahoo.com

Abstract— In this era’s cloud computing is becoming a preferred technology. Many researches accepted cloud computing
environment and its usage is increasing day by day. For globalization we require remotely accessible virtual memory with
assistance from virtual cloud to record our data. As cloud owner can exploit the security, there is a need to protect cloud by
encryption as well as security keys to access. Cloud computing is developing as an extensive data interactive paradigm to
realize users’ data remotely preserved in an online cloud server. The security and privacy difficulties regarding the storing of
the data in the cloud and access through the Internet have been most significant concerns for numerous organizations. We
detected the security concerns of cloud computing and plan a system that protect public cloud by encryption as well as
security keys to access. It is advantageous to host user data in the cloud at the identical time assistant fine-grained and
flexible access control for shared data existing in the cloud.

Keywords— Cloud server,SHA-1,security,AES Algorithm , Encryption ,Decryption and Blowfish Algorithm

I. INTRODUCTION

Cloud Computing is the emerging technology where we can improve platform, software and organization as a service. When it
moves toward to storage as a service, data utilization and privacy are the main problems to deal with. To handle the transaction
of files from and to the cloud server, the files are in the encrypted form before being outsourced to the commercial public cloud.
Acquiring cloud data is the most significant for numerous services. The main use of securing cloud data is on authentication,
privacy and security. To preserve the cloud data protected we implemented the additional advanced encryption and decryption
i.e. AES and Blowfish algorithms. Using advanced encryption and decryption algorithms our public and private user’s data will
stay secure in cloud. To increase user’s privacy we kept user information on third party server so cloud admin will not be able
to disrupt user’s privacy. The system provides service for both public and private users.

Public user can upload data in the cloud without revealing personal information and uploaded data will remain secure.
Private user is an authenticated user able to share data among private users and upload and download file in cloud. A huge
quantity of data is being kept in the cloud, and more of this is profound information. This application can be used in day to day
life like keeping personal information, medical history details and other private details in secure cloud. The data existing in the
cloud should be fully safe. Only the authenticated (private) users should be able to access the data.

The data should be secured from the external world. In order to deliver security to the data different security algorithms should
be executed. The selected security algorithm should be an effective one in terms of performance, confidentiality and cost.

• The project aim is to describe a Third party Security server hence one can achieved a fully secured cloud computing
for virtualization as its today’s requirement.

• The server mainly deals with the user based control access mechanism to access process cloud data.

• The Third party server will decide the encryption logic to record data on the cloud.

• It provides OTP to access Cloud.

Volume VI, Issue V, May/2019 Page No:728


JASC: Journal of Applied Science and Computations ISSN NO: 1076-5131

II .LITERATURE SURVEY

In the past several other works are implemented for the cloud data security. The literature reviews of some of these
works are described below:

In 2010, Rohit Ranchal et al. [1] talked about that Identity the board (IDM) which is viewed as one of the vital
segments in cloud protection and security facilitates a portion of the issues related with distributed computing. In distinguishing
substances to SPs, the accessible arrangements use confided in outsider (TTP). This is a methodology for IDM that can utilize
character information on endowed has and is free of TTP. The methodology utilizes predicate multi-party registering for
arranging an utilization of a cloud administration and utilizes predicates over encoded information. It utilizes dynamic group
which is a middleware specialist that has a lot of insurance component and additionally incorporates the protection approaches,
PII information, virtual machine that implements the strategies. To validate a client to cloud benefits, an dynamic pack
associates for the benefit of a client with it utilizing protection strategies of a client

In 2011, D. Srinivas, “Privacy-Preserving Public Auditing In Cloud Storage Security [2] utilizes the homomorphism
non-direct authenticator and arbitrary veiling to guarantee that the Third Party Reviewer (TPA) would not discover any data
about the information content which must be put away on the cloud server amid the reviewing process so it not just expels the
weight of cloud client from the tedious and potentially costly inspecting undertaking, however likewise alleviates the clients'
dread of their re-appropriated information.

In 2012, Eman Abu Khousa, Nader Mohamed and Jameela AlJaroodi [3] suggested cloud assisted health data storage
on cloud server. There is also a great group of research works on secure data access, privacy preserving authentication, and
entrustment of access rights in e-health systems.

In 2013, M. Li, S. Yu, Y. Zheng, K. Ren, and W. Lou [4] data are encrypted by the owner under a set of attributes. The
data users are assigned access structures provided by data owner and can decrypt the data only if the access structures match the
data attributes.

In 2014, Ning Cao et al. [5] describes a troublesome issue of security sparing multi-watchword situated investigate
mixed cloud data (MRSE), and makes a ton of demanding security essentials for such a sheltered cloud data use structure to
transform into a reality. Among various multi-watchword semantics, it pick the successful guideline of "organize planning", i.e.,
whatever number matches as could be permitted, which gets the comparability between data file and interest request, and
further use internal thing. It joins a fundamental MRSE plot that uses inward thing count, and subsequently widely improves it
so as to improve the different security necessities in two elements of peril models. The proposed plans present low overhead on
figuring and correspondence through mindful examination inquiring about security and profitability confirmations of proposed
plots similarly as preliminaries on this present reality dataset.

In 2016, Muhammad Yasir Shabir et al. [6] talked about that the distributed computing has turned into a critical
processing model in the IT business. In this rising model, registering assets which incorporate programming, equipment,
systems administration, and capacity can be gotten to on a compensation for each utilization premise anyplace in world.
Nonetheless, it's as yet a moving issue to store the touchy information on un-confided in servers in a cloud. All together to
guarantee the privacy and appropriate access control of delicate information, different traditional encryption procedures have
been actualized every once in a while to diminish the security rupture in a cloud. Notwithstanding, in view of absence of
adaptability, versatility and fine grained get to control, these entrance control plans are exceptionally less achievable in
distributed computing. To conquer these confinements, Quality Based Encryption (ABE) strategies are utilized in the cloud.
This paper incorporates all ABE plots as the well as the key criteria utilized in these plans.

In 2016 Rahul Shende., Shailesh Kamble and, Sandeep Kakde, [8] proposed work is to build up a methodology for
wellbeing information get to dependent on security safeguarding watchword look on distributed storage for e-medicinal services
framework. Capacity Privacy on the cloud is liable to security targets, for example, information classification and watchword
protection. The cryptographic crude SSE calculation that gives office to look over scrambled information can guarantee client
about high information security in cloud condition. Proposed framework incorporates protection via e-healthcare frameworks
with the assistance of the private cloud. It gives an answer for security saving information stockpiling by giving effective key
administration and a safe ordering strategy for security protecting watchword seek. They researched procedures that give get to
control of the approved gatherings to counteract bad conduct, by trait based encryption.

Volume VI, Issue V, May/2019 Page No:729


JASC: Journal of Applied Science and Computations ISSN NO: 1076-5131

In 2016, Bhooshan Waghmare , Nilesh Sambhe [9] proposed framework that utilizes Searchable Symmetric
Encryption (SSE) for seeking over scrambled information utilizing secure records.The framework utilizes an outsider believed
server called as Cryptographic Server (CS) as a middle person among client and the Cloud Service Provider (CSP). To share the
reports among different clients the framework gives the usefulness to make gatherings and furthermore gives the hunt
usefulness over shared records. The pursuit support multi-catchphrase question and furthermore creates positioned results
dependent on the score of the archives. The framework manages the issue of forward and in reverse access control.

In 2017, Jyoti Muthreja1 and Arvind Bhagat Patil, [10] proposed the framework wherein records are distributed over
numerous private servers which are all in all measured by cloud or open server. When client need a limited reports, they review
to open cloud, which then returns the hopeful rundown that is private server rundown to clients.

In 2017, Saima Majeed and Er. Bandana Sharma. [11] gives the capacity to confirm without revealing decoded
information, which can be accomplished by utilizing predicate over scrambled information and insurance of character
information from depended has. RSA based Homomorphic non straight authenticator, this plan guarantees that the Third Party
Inspector (TPA) would not discover any data about the information content which must be put away on the cloud server amid
the reviewing process, likewise secure and proficient plan. Disseminated stockpiling uprightness reviewing system, this plan
ensures solid distributed storage rightness and accomplishes the quick information blunder restriction and exceedingly
proficient and versatile against Byzantine disappointment, malevolent information. Homomorphic straight authenticator, this
plan kills the weight of cloud client from the dreary and perhaps costly reviewing and furthermore empowers multi-client
setting. Property Based Encryption (ABE) plot, it gives clients access to more grounded encryption, permits key quality
circulation and offers fine-grained get to control, adaptability, and versatility in distributed computing.
In 2017 ,Wrushal K Kirnapure and Arvind R. Bhagat Patil [12], proposed system with AI based characterization
calculation against system assaults, while limiting misclassification. The objective of Intrusion discovery structure (IDS) is to
apply all the accessible data so as to recognize the assaults as either by outside software engineers or maltreatment of insiders.
System interruption recognition structure and advancement pursues various course of action models. The most as often as
possible utilized AI calculations in these models are Support Vector Machine (SVM) and Ant Colony. A standard benchmark
informational index which contains assortment of interruptions reenacted in military system condition, the KDD Cup 99 is
utilized. This dataset is prepared utilizing Genetic calculation. The standards for the SVM classifier are produced once the
dataset is prepared. The created methodology will be assessed utilizing parameters: recognition rate, false alert rate.

III. PROPOSED WORK

The project aim is a Decentralized server to deal with the User Built Access Controller Mechanism to
access cloud data. The system mainly deals with the third party security server to achieve a fully secured
cloud computing for virtualization. The user registers with the unique identity and sign up with the
TPA .The user directs request to the Third Party Authenticator for registration.

The third party server to decide the encryption logic to record data on the cloud to provide OTP (One
time password) to access cloud Public user and private user able to upload data in cloud. The KDC which
are decentralized create different keys to different kinds of users. Cloud admin has the list of KDCs and
Third Party Authenticator. The cloud admin sets the guidelines to be followed by Third Party
Authenticator (TPA) and Key Distribution Center (KDC). It observe the key generation strategies and
alerts anomalous actions

Public User

• To upload data (Files) in cloud; choose file, it will be in plain text format and convert pain text file
into cipher text using AES or Blowfish Algorithm.

• To download data (file) from cloud user will choose the file name. OTP will be sent on user’s
email.

Volume VI, Issue V, May/2019 Page No:730


JASC: Journal of Applied Science and Computations ISSN NO: 1076-5131

• OTP is made using SHA-1 random key generation Algorithm.

• User will enter OTP.

• If OTP matches, file will be downloaded from the cloud in plain text. (Original format)

Fig 1: Flowchart of Public User

Volume VI, Issue V, May/2019 Page No:731


JASC: Journal of Applied Science and Computations ISSN NO: 1076-5131

Private User Registration

• Private user will register. To verify authentication of private user send OTP on email. OTP match
the able to process further to access the service of cloud.

• They Can Able to share file in cloud with authenticated user only . While sharing file with
authenticated user. It will also Received OTP as well as color code image on file on his email for
downloading that shared file.

Volume VI, Issue V, May/2019 Page No:732


JASC: Journal of Applied Science and Computations ISSN NO: 1076-5131

Fig 2: Flowchart of Private User

Volume VI, Issue V, May/2019 Page No:733


JASC: Journal of Applied Science and Computations ISSN NO: 1076-5131

Color Code Image

Fig. 3: Color Code Combination

For Example; to download shared file, receiver will receive color code number: 220146. To download
that file user need to insert color code’s First letter and generate code GGRYVB and enter it. If it matches
then file will be downloaded.

Fig 4: Architecture of Our System

Volume VI, Issue V, May/2019 Page No:734


JASC: Journal of Applied Science and Computations ISSN NO: 1076-5131

Fig. 5: Architecture of Private User and Public User Models Using AES or BLOW FISH Encryption and
Decryption

Admin

Volume VI, Issue V, May/2019 Page No:735


JASC: Journal of Applied Science and Computations ISSN NO: 1076-5131

Fig 6: Admin Private and Public User Flowchart

• Admin views public users’ Login details (meaning login date and time details) for uploading and
downloading data.

• Admin views private users: number of authenticated users and unauthenticated user registered.
View private users’ login details (Means Login date and Time details) for the uploading file,
downloading file and sharing file among authenticated users.

Algorithm & Techniques

1. SAH-1

• SHA-1 random key generation algorithm is generating random key OTP (one time password) for
accessing (downloading) file from the server.

2. AES Algorithm (Public User)

• Applied AES encryption algorithm to upload file on cloud in encrypted form.

• AES decryption algorithm is applied while downloading file to view file content in the original
form.

3. Blowfish Algorithm (Private User)


• Applied Blowfish encryption algorithm to upload file on cloud in encrypted form.

• Blowfish decryption algorithm is applied while downloading file to view content in the original form.

Volume VI, Issue V, May/2019 Page No:736


JASC: Journal of Applied Science and Computations ISSN NO: 1076-5131

Fig 7: Architecture of Admin Model Using AES or BLOW FISH Encryption and Decryption.

Comparison of Algorithm:

Table 1: Comparison of Various Techniques

Sr.No Algorithms Parameters AES Blowfish

1 Key length(Bit) 128/192/256 bits Variable key length i.e., 33-448 bits

2 Rounds 10/12/14 16

3 Block size (Bits) 18 64

4 Encryption speed Faster Very fast

5 Power consumption Higher than Blowfish Very low

6 Level of security Excellent Highly secure

7 Output Lower than Blow fish Very high


8 Complexity Less Less than AES

Volume VI, Issue V, May/2019 Page No:737


JASC: Journal of Applied Science and Computations ISSN NO: 1076-5131

9 Security against Chosen plain, known plain text Dictionary attacks

IV. COMPARITIVE ANALYSIS

Table. 2: Comparitive Study of Previous papers

Sr.no 1 2 3 4 5

Approaches Secure and Effective data Realizing fine Security in Secure cloud by
efficient access to access control grained and cloud computing enhancing privacy
outsourced data for multi- flexible access using preservation and
authority control to cryptographic user based access
attribute based outsourced data techniques control mechanism
encryption with attribute
based
cryptosystems

Centralized/ Centralized De- Centralized Centralized De-Centralized


Decentralized Centralized

Write/read 1-W-M-R 1-W-M-R M-W-M-R M-W-M-R M-W-M-R


access

Algorithm Ranked search, MD5 TACE Cloud SHA-1 random


searchable ALGORITHM Framework and computing, key generation
encryption, Model Infrastructure, AES Encryption
confidential data, Service, Security & Decryption
cloud computing Attacks, Security Blowfish
Algorithms Encryption &
Decryption

Privacy No authentication Not privacy Authenticatio Authentication Authentication


preserving preserving n
authentication

User No Yes No No Yes


revocation

Attribute No No No Yes Yes


hiding
File recovery No No No Yes Yes

Volume VI, Issue V, May/2019 Page No:738


JASC: Journal of Applied Science and Computations ISSN NO: 1076-5131

V. ADVANTAGES

1. The will spread access, increase storage capability, and enhance security.
2. Software as a Service has become a popular approach for deploying enterprise level software system.
3. This approach is economical for the service supplier and customers.
4. The cloud delivers extra flexibility within the sense that you just will relish huge storage and on demand backups.
5. Recovery is faster in the cloud because the data is kept over a network of physical servers

VI. CONCLUSION

Cloud computing is wide and flexible technology. The main objective is to secure data on the cloud. We
present three users in our system i.e. admin, public and private user for Enhancing Privacy, User Based
Access Control Mechanism. We provide secure cloud for the users to upload and download data from the
cloud. To download data from the cloud private user will be receiving OTP. User requires to enter the
OTP and able to download the file. User based access control to maintain user’s privacy is achieved
through set rights for public users and private users. To preserve data secure on cloud AES and Blowfish
algorithm are used.

VII. FUTURE SCOPE

In future the file access policy can be implemented with Multi Authority Attribute based Encryption.
Using the technique we can avoid the number of wrong hits during authentication. Create a random delay
for authentication.

REFERENCES

[1] Rohit Ranchal et al., “Protection of Identity Information in Cloud Computing without Trusted Third
Party”, 29th IEEE International Symposium on Reliable Distributed System, 2010.
[2] D. Srinivas, “Privacy-Preserving Public Auditing In Cloud Storage Security,” International Journal of
Computer Science and Information Technologies, Vol. 2, 2011.
[3] Eman AbuKhousa, Nader Mohamed and Jameela AlJaroodi, “e-Health Cloud: Opportunities and
Challenges", a future internet Journal, 2012.
[4] M. Li, et al., “Scalable and secure sharing of personal health records in cloud computing using
attribute-based encryption, "IEEE Trans. Parallel Distrib. Syst., vol. 24, no. 1, pp. 131-143, Jan. 2013.
[5] Ning Cao, et al., “Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data”,
IEEE Transactions on Parallel and Distributed Cloud Computing Systems, Vol: 25, Issue:1, Jan 2014

Volume VI, Issue V, May/2019 Page No:739


JASC: Journal of Applied Science and Computations ISSN NO: 1076-5131

[6] Muhammad Yasir Shabir, et al. ,“Analysis of Classical Encryption Techniques in Cloud Computing,”
TSINGHUA SCIENCE AND TECHNOLOGY ISSN pp:102-113 Volume 21, Number 1, Feb. 2016.
[8] Rahul Shende , Shailesh Kamble ,Sandeep Kakde “Health data access in cloud-assisted e-healthcare
system”, International Conference and Workshop on Electronics & Telecommunication Engineering 2016
[9] Bhooshan Waghmare , Nilesh Sambhe “Multi-Keyword Ranked Searched on Encrypted Data using
Searchable Symmetric Encryption in Cloud Storage “International Journal of Computer Science and
Mobile Computing, Vol.5 Issue.4, April- 2016
[10] Jyoti Muthreja1, Arvind Bhagat Patil, A Muilt-Keyword Ranked Based Search and Privacy
Preservation of Distributed Documents in the Network Volume: 04 Issue: 03 | Mar -2017
[11] Saima Majeed , Er. Bandana Sharma. “An Analytical Survey of Privacy Preserving Schemes in
Cloud Computing”, International Journal for Research in Applied Science & Engineering Technology,
Volume 5, Issue IV, April 2017.
[12] Wrushal K Kirnapure , Arvind R. Bhagat Patil “ Classification, Detection and Prevention of Network
Attacks Using Rule Based Approach”,International Research Journal of Engineering and Technology
Volume: 04 Issue: 04, Apr -2017.

Volume VI, Issue V, May/2019 Page No:740

Vous aimerez peut-être aussi