Professional Documents
Culture Documents
e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 6, Ver. II (Nov Dec. 2015), PP 34-39
www.iosrjournals.org
PG Student, Department Of Computer Science & Engineering Madanapalle Institute of Technology & Science
Madanapalle, India
2
Asst.Professor, Department Of Computer Science & Engineering Madanapalle Institute of Technology &
Science Madanapalle, India
Abstract: Cloud cmutg s tyclly defed as type of cmutg that relies shrg cmutg
resources. The frstructure as Service cloud offers the dt-ceter servces to stre d mge
frmt, the rvte frmt c be shared mg the busess-cmy employees or the members of
cmmuty. reservg data rvcy requires it to be encrypted before uld g t the cloud server. The
uthrzed users are ly teded to dwld d decrypt usg secret-key. The resetly exstg
crytgrhc models use key mgemet rtcls t address key revct rblems d some other uses
relble security ctrller for ssug the sgtures d ttch secret-keys t the users. This leads to lot of
verhed. our rsed model, we trduce vel secure data shrg lgrthm SL-SKE (Sgture
Less-Secret Key Ecryt) does t require dgtl-sgture d also ddtl relble security
ctrller s required. The complete lgrthm runs mg the cloud server, data owner d the trusted-users.
The newly generated keys are fully based the users rfle. It will be tmted to the user through eml.
Flly the results shows that it mmzes the verheds d the ddtl requirements like trusted third
rty.
Introduction
The clud cmutg s used s fgure t "the teret", clud cmutg s thg but " tye f
teret-bsed cmutg," where vrus servces such s servers, strge d lcts re delvered t
rgzt's cmuters d devces v the teret. Due t the beefts f ublc clud strge, rgzts
hve bee dtg ublc clud servces such s Mcrsft Skydrve d Drbx t mge ther dt.
Servces mdels exl the tye f servce tht the servce rvder s fferg. Tht s, shred sestve dt
must be strgly secured frm uuthrzed ccesses. The cfdetlty f sestve dt stred ublc
cluds, cmmly dted rch s t ecryt the dt befre uldg t t the clud.
The clud des t kw the keys t ecryt the dt; cfdetlty f the dt frm the clud s
ssured. Hwever, s my rgzts re requred t efrce fe-gred ccess ctrl t the dt, the
ecryt mechsm shuld ble t surt FGEB ccess ctrl. Ths tycl rch hels t surt
FGEB ccess ctrl whch ecryts the set f dt wth sme ccess Ctrl.
II.
Related Work
Key mgemet systems mmze re-keyg verheds, but t s complex rcess.Relble Security
Ctrller (RSC) that generates ew keys or rekeys for every uthrzed user d that itself heavy weight
rch. The ttrbute Based Ecryt s difficult to mge when the user hvg the key s left the group.
A. Disadvantages
1. Re-keyg cmlexty
2. Cost of key-mgemet s high
3. Need trusted third rty to mge the keysorSgtures.
4. erfrmce degrdts
DOI: 10.9790/0661-17623439
www.iosrjournals.org
34 | Page
Proposed Work
Secure data shrg lgrthm SL-SKE (Sgture Less-Secret Key Ecryt) t requires t hve
dgtl-sgture, t eve relble securty ctrller s requred.The clud server, dt-wer d the
trusted-users re ly vlved rvcy ctrl. The clud server cretes ew secret key f the user bsed
the users rfle wth the hel f securty rvleges; the wer ecryts d submts the cfdetl
frmt t the clud server.The ewly geerted keys d tht wll be frmed t the user thrugh
eml. request frm uthrzed user the server executes level-1 decryt d t user sde level-2
cmletely decryts the cher text
A. Advantages of Proposed System
1. No Re-keyg cmlexty
2. Highly trusted
3. N need fr trusted thrd rty
4. Securty mrvemets t less cmutt cst.
www.iosrjournals.org
35 | Page
DOI: 10.9790/0661-17623439
www.iosrjournals.org
36 | Page
B: user operations.
DOI: 10.9790/0661-17623439
www.iosrjournals.org
37 | Page
IV.
Conclusion
ths er we hve rsed the frst Sgture Less Secret Key Ecryt scheme wthut rg
erts d rvded ts frml securty. ur SL-SKE slves the key escrw rblem d revct
rblem. Usg the SL-SKE scheme s key buldg blck, we rsed mrved rch t securely
shre sestve dt ublc cluds thrugh eml ccet by usg the bth wer d clud keys whch
re bsed the user's rfle verfct uthrty. ur rch surts mmedte revct d ssures
the cfdetlty f the dt stred utrusted ublc clud whle efrcg the ccess ctrl lces f
the dt wer. ur exermetl results shws the effcecy f bsc SL-SKE scheme d mrved rch
fr the ublc clud. Further, fr multle users stsfyg the sme ccess ctrl lces, ur mrved
rch erfrms ly sgle ecryt f ech dt tem d reduces the verll verhed t the dt
wer.
Future Enhancement
For future enhancement, we have to improve the performances of an encrypting data. I can provide the
AES algorithm for both uploading data and encrypts the data.
DOI: 10.9790/0661-17623439
www.iosrjournals.org
38 | Page
Certificateless Public Key Cryptography Sattam S . Al-Riyami and Kenneth G. Paterson Information Security Group,
Royal Holloway, University of London, Egham, Surrey, TW20
Relations Among Notions of Security for Public- Key Encryption Scheme Bellare A. Desai D. Pointchevaly P. Rogawayz Februa
1999.
Attribute-Based Encryption for Fine- Grained Access Control of Encrypted Data Vipul Goyal Omkant Pandeyy Amit
Sahaiz Brent.
R. Agrawal, J. Kiernan, R. Srikant, and Y. Xu, Order preserving encryption for numeric data, in Proceedings of ACM SIGMOD
Conference, 2004.
B. Chor, E. Kushilevitz, O. Goldreich, and M. Sudan, Private information retrieval, ACM Computer Survey, vol.45, no. 6,pp.
965981, 1998.
DOI: 10.9790/0661-17623439
www.iosrjournals.org
39 | Page