Enhanced Secure Data Sharing Over Cloud Using ABE Algorithm

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 4

International Journal of Scientific Research in Computer Science, Engineering and Information Technology

© 2019 IJSRCSEIT | Volume 4 | Issue 8 | ISSN : 2456-3307


DOI : https://doi.org/10.32628/IJSRCSEIT

Enhanced Secure Data Sharing Over Cloud Using ABE Algorithm


Virangni Gaikwad1, Ekta Bhosale 2, Ankita Istalkar 3, Rajashri Tapkir4, Prof. Sachin Patil5
1,2,3,4
Student, Department of Computer Engineering, Dr. D. Y. Patil School of Engineering, Lohegoan, Savitribai
Phule Pune University, Pune, Maharashtra, India
5
Professor, Department of Computer Engineering, Dr. D. Y. Patil School of Engineering, Lohegoan, Savitribai
Phule Pune University, Pune, Maharashtra, India
ABSTRACT

Cloud Computing provides a convenient way of sharing of data, which brings various benefits for both the
society and individuals. Security is becoming a wide necessity in day-to-day life. Data security is the most
obliged security of all. The data in our system is opened to high potential risks. Due to many security reasons
we adopt diverse methods. Now everyone is being dependent on the cloud platform for security and storage
but even it is vulnerable to various threats. The data inside cloud is not well-secured as it can be accessed by
anyone who would have our credentials. But there exists a resistance for users to directly outsource the shared
data to the cloud server as the data often contains valuable information. So we propose an Enhanced Security to
the data using encryption- The ciphertext-policy (CP) attribute-based encryption (ABE) (CP-ABE) and Byte
Rotation Algorithm emerging as a promising technology for allowing users to conveniently access data in cloud
computing, giving security to outsourced information, while thinking that client is not stressed while
transferring their classified information.  Moreover, the privacy of users are protected in this scheme. The
security and performance analysis shows the scheme is secure, efficient and privacy-preserving.
Keywords: Cloud computing, CP, ABE, Encryption, Decryption, Privacy preserving.

I. INTRODUCTION the Cloud Computing i.e. It condenses the total


of hardware that could have been used at user
Cloud computing has introduced the new method for completion. As there is no essential for the
computing and related problems like data privacy, collection of data at user’s end because it is already
data security in cloud. It offers development at some other situation. So as an alternative of buying
environment, allocation and reallocation of assets the complete infrastructure required to run the
when needed, storage and interacting facility. The processes and save bulk of data which you are just
cloud computing is composed of shared renting the assets according to your requirements.
computing resources and services that deliver the
resources through which users can access the CLOUD computing is rapidly emerging technology
structures, hardware, applications, and services on and on-demand storage and computing services for
request which are independent of locations. It customers
contents the on-demand requests of the user. It
simplifies the sharable resources “as-a-service” ideal. Security Issues Within The Cloud:
For the association, the cloud offers data access to
move their data totally. Here comes the assistance of

CSEIT195433 | Received : 03 Oct 2019 | Accepted : 25 Oct 2019 | September-October-2019 [ 4 (8) : 125-128 ]
125
Virangni Gaikwad et al Int J Sci Res CSE & IT, September-October-2019; 4(8) : 125-128

Organizations which are having low budget can now II. Related Work
utilize high computing and storage services without Literature Review
investing in the infrastructure and maintenance. These are various surveys which we are studied
However, the loss of control over data and
A. Lightweight Secure Data Sharing Scheme for
computation raises many security concerns for
Mobile Cloud Computing
organizations, the wide adaptability of the public
A lightweight information sharing plot (LDSS) for
cloud. The loss of control over data and the storage
portable distributed computing. It receives CP-ABE,
platform also motivates cloud customers to maintain
an entrance control innovation utilized as a part of
and have control over data (individual data and the
typical cloud condition, be that as it may, changes the
data shared among a group of users through the
structure of access control tree to make it reasonable
public cloud) Moreover, the privacy and
for versatile cloud situations. LDSS moves a vast
confidentiality of the data is also recommended to be
segment of the computational serious access control
cared for by the customers. The confidentiality
tree change in CP-ABE from cell phones to outer
management by a customer ensures that the cloud
intermediary servers. Moreover, to lessen the client
does not have any information about the customer
renouncement cost, it acquaints property depiction
data. The data encryption is done before storing to
ends with execute apathetic disavowal, which is a
the cloud. The access control, key management,
prickly issue in pro-gram-based CP-ABE frameworks.
encryption, and decryption processes are handled by
The trial comes about demonstrate that LDSS can
the customers to ensure data security. However,
successfully lessen the overhead on the cell phone
when the data is shared among a group, the
side when clients are sharing information in portable
cryptography services need to be flexible enough to
cloud situations.
handle different users, exercise the access control,
and manage the keys in an effective manner to B. Low Latency for File Encryption and Decryption
safeguard data confidentiality. A separate key for Using BRA Algorithm in Network Security.
every user is a cumbersome solution.The changes in Data security is significant deterrent in various zones
the data require the decryption of all of the copies of like military, bank application, educational
the users and encryption again with the modified organization. Document is forward starting with one
contents. The existing and legitimate group members area then onto the next area in the organize.
might show illegitimate behaviour to manipulate the Numerous programmers are unlawfully get to the
data. The data can be decrypted, modified, and re- data. To give answer for this issue many creators has
encrypted by a malicious insider within a group. presented diverse calculations and strategies. The
Consequently, a legitimate user in the group may distinctive calculations like DES, triple DES and AES
have the access to certain unauthorized files within accomplish greater security however it sets aside
the group. On the other hand, it is necessary for a more opportunity for encryption and decoding
user to possess a key to conduct various operations on records. This algorithm gives greater security and
the data. The possession of the key also implicitly takes littlest measure of time for record encryption
proves the legitimacy of a user to operate on the data. and decoding. This encryption can apply on various
Nevertheless, simultaneously dealing with both the sorts of records like content, picture, sound, video
issues related to the key is an important issue that records. In the Byte Rotation Encryption Algorithm
needs to be addressed include two procedures. One is irregular key era
effectively. procedure is utilized. What's more, second is parallel

Volume 4, Issue 8, September-October-2019 | http://ijsrcseit.com


2
Virangni Gaikwad et al Int J Sci Res CSE & IT, September-October-2019; 4(8) : 125-128

encryption and decoding is process utilizing Step 4: The input is fed to the encryption function
multithreading procedure. which it is necessary to encrypt, a set of attributes,
decryption of data will be done by owner, and
C. Analysis of multi-threading time metric on single randomly selected number, and the output will be
and multi-core CPUs with Matrix multiplication. obtained encrypted data.
With the landing of multi-centre CPUs, to accelerate Step 5: A set of user attributes AU and the encrypted
execution of frame-works utilizing parallelism is data are supplied to the input of the decryption
prompting new approaches. Prior techniques to function, and the output will be obtained decrypted
actualize parallelism in applications were constrained message.
to either utilization of excess equipment assets or Step 6: Safe data retrieval.
direction level parallelism (ILP). This requested the Step 7: End
need of part the undertaking or process into little
sections that can keep running in parallel in the 2. Byte Rotation Algorithm:
errand's unique circumstance, and strings have been Step 1: Start
presented. It is normal that the quantity of centres Step 2: The Data is partitioned into fixed length of
per processor would duplicate with increment in blocks. These blocks are represented by matrix Mp.
silicon do- main on chip. Keeping in mind the end Step 3: The numerical values is assigned to the data in
goal to achieve most extreme centre usage of sequence.
equipment, programming needs to nourish. Multi- Step 4: The value of Key matrix is randomly selected
threading is prevalent approach to enhance from the given range.
application execution speeds through parallelism. As Step 5: Calculate the Transpose matrix of data block
each string has its possess autonomous asset for matrix Mp which is denoted by Mt.
assignment execution, various procedures can be Step 6: Calculate the encrypted key matrix Kc .
executed parallel by expanding number of strings. Step 7: Add both matrix Mt and Kc. The resultant
Parallelism is the running of strings in the meantime matrix is denoted by Cpk.
on centres of a similar CPU. Multi-threading is Step 8: Rotate the first 3 row horizontally of Cpk
famous approach to enhance application execution matrix. The resultant matrix will be matrix Chr.
speeds through parallelism. As each string has its Step 9: Rotate the first 3 column of Chr matrix. The
claim free asset for assignment execution, various resultant matrix is denoted by Cvr.
procedures can be executed parallel by expanding Step 10: Replace the numerical values of Cvr matrix
number of strings. Parallelism is the running of by the corresponding blocks.
strings in the meantime on centres of a similar CPU.
III. RESULTS AND DISCUSSION
Algorithms Used:
In several distributed systems a user should only
1. Attribute Based Encryption Algorithm: access data, If a user possess a certain set of
Step 1: Start credentials or attributes. Currently, the only method
Step 2: Generating the symmetric key for the register is to employ a trusted server to store the data and
users. mediate access control. However, if any server which
Step 3: A set of user attributes is supplied to the input is storing the data is compromised, then the
of the private key generation, and the output of the confidentiality of the data will be compromised. In
algorithm turns user's private key. this survey paper we are presenting a system for

Volume 4, Issue 8, September-October-2019 | http://ijsrcseit.com


2
Virangni Gaikwad et al Int J Sci Res CSE & IT, September-October-2019; 4(8) : 125-128

realizing complex access control on encrypted data Vijay Varadharajan, Senior Member, IEEE ,
that we call ciphertext-policy attribute-based IEEE.
encryption. The encrypted data can be kept [4]. Analysis of multi-threading time metric on
confidential even if the storage server is untrusted; single and multi-core CPUs with Matrix
moreover, our methods get secure against collusion multiplication Dhruva R. Rinku, Dr. M Asha
attacks. In previous attributes where used to describe Rani 3rd International Conference on Advances
the encrypted data and built policies into user's keys in Electrical, Electronics, Information,
in attribute-based encryption systems while in our Communication and Bio-Informatics
new system attributes are used to describe a user's (AEEICB17)
credentials, and a party encrypting data determines a [5]. V. Maitri, Dattatray S. Waghole, Vivek S.
policy for who can decrypt. Deshpande, IEEE Senior Member, \Low latency
for _le encryption and decryption using BRA
IV. CONCLUSION algorithm in network security", 2015
International Conference on Pervasive
Data which is available in the cloud can be at risk if computing.
not handled or protected in a rightful manner. This
paper discusses various risks and security threats to
data in the cloud and given an overview of three Cite this article as :
types of security concerns. The major concerns of this
Virangni Gaikwad, Ekta Bhosale, Ankita Istalkar,
paper was data security and its malicious threats and
Rajashri Tapkir, Prof. Sachin Patil, "Enhanced Secure
solutions in cloud computing. Data has been
Data Sharing Over Cloud Using ABE Algorithm",
discussed along with the techniques which are
International Journal of Scientific Research in
efficient for encrypting the data in the cloud. To
Computer Science, Engineering and Information
build a cost effective and secure data sharing system
Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 4
in cloud computing, we proposed the notation called
Issue 8, pp. 125-128, September-October 2019.
ABE- Attribute-based encryption is a type of public-
Journal URL : http://ijsrcseit.com/CSEIT194829
key encryption, and ciphertext policy.

V. REFERENCES

[1]. Auditing and Resisting Key Exposure on Cloud


Storage Akshata M. Bhand, D. A. Meshram
Student, ME (IT) , RMD Sinhgad School of
Engineering,Pune, Assistant Professor, ME (IT),
RMD Sinhgad School of Engineering, Pune,2017
[2]. Strong Key-Exposure Resilient Auditing for
Secure Cloud Storage Jia Yu, and Huaqun Wang
- IEEE TRANSACTIONS ON INFORMATION
FORENSICS AND SECURITY, VOL. , NO., 2016
[3]. Enabling Cloud Storage Auditing with Key-
Exposure Resistance Jia Yu, Kui Ren, Senior
Member, IEEE, Cong Wang, Member, IEEE and

Volume 4, Issue 8, September-October-2019 | http://ijsrcseit.com


2

You might also like