You are on page 1of 6

IOSR Journal of Computer Engineering (IOSR-JCE)

e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 6, Ver. II (Nov Dec. 2015), PP 34-39
www.iosrjournals.org

"SL-SKE (Signature Less-Secret Key Encryption) For DataSharing in Clouds"


1

V. Trivikramaraja, 2Mr. R Sathiya Raj

PG Student, Department Of Computer Science & Engineering Madanapalle Institute of Technology & Science
Madanapalle, India
2
Asst.Professor, Department Of Computer Science & Engineering Madanapalle Institute of Technology &
Science Madanapalle, India

Abstract: Cloud cmutg s tyclly defed as type of cmutg that relies shrg cmutg
resources. The frstructure as Service cloud offers the dt-ceter servces to stre d mge
frmt, the rvte frmt c be shared mg the busess-cmy employees or the members of
cmmuty. reservg data rvcy requires it to be encrypted before uld g t the cloud server. The
uthrzed users are ly teded to dwld d decrypt usg secret-key. The resetly exstg
crytgrhc models use key mgemet rtcls t address key revct rblems d some other uses
relble security ctrller for ssug the sgtures d ttch secret-keys t the users. This leads to lot of
verhed. our rsed model, we trduce vel secure data shrg lgrthm SL-SKE (Sgture
Less-Secret Key Ecryt) does t require dgtl-sgture d also ddtl relble security
ctrller s required. The complete lgrthm runs mg the cloud server, data owner d the trusted-users.
The newly generated keys are fully based the users rfle. It will be tmted to the user through eml.
Flly the results shows that it mmzes the verheds d the ddtl requirements like trusted third
rty.

Keywords: Cloudcomputing, certificate less cryptography, confidentiality, access control.


I.

Introduction

The clud cmutg s used s fgure t "the teret", clud cmutg s thg but " tye f
teret-bsed cmutg," where vrus servces such s servers, strge d lcts re delvered t
rgzt's cmuters d devces v the teret. Due t the beefts f ublc clud strge, rgzts
hve bee dtg ublc clud servces such s Mcrsft Skydrve d Drbx t mge ther dt.
Servces mdels exl the tye f servce tht the servce rvder s fferg. Tht s, shred sestve dt
must be strgly secured frm uuthrzed ccesses. The cfdetlty f sestve dt stred ublc
cluds, cmmly dted rch s t ecryt the dt befre uldg t t the clud.
The clud des t kw the keys t ecryt the dt; cfdetlty f the dt frm the clud s
ssured. Hwever, s my rgzts re requred t efrce fe-gred ccess ctrl t the dt, the
ecryt mechsm shuld ble t surt FGEB ccess ctrl. Ths tycl rch hels t surt
FGEB ccess ctrl whch ecryts the set f dt wth sme ccess Ctrl.

II.

Related Work

Key mgemet systems mmze re-keyg verheds, but t s complex rcess.Relble Security
Ctrller (RSC) that generates ew keys or rekeys for every uthrzed user d that itself heavy weight
rch. The ttrbute Based Ecryt s difficult to mge when the user hvg the key s left the group.
A. Disadvantages
1. Re-keyg cmlexty
2. Cost of key-mgemet s high
3. Need trusted third rty to mge the keysorSgtures.
4. erfrmce degrdts

DOI: 10.9790/0661-17623439

www.iosrjournals.org

34 | Page

"SL-SKE (Signature Less-Secret Key Encryption) For Data-Sharing in Clouds"


III.

Proposed Work

Secure data shrg lgrthm SL-SKE (Sgture Less-Secret Key Ecryt) t requires t hve
dgtl-sgture, t eve relble securty ctrller s requred.The clud server, dt-wer d the
trusted-users re ly vlved rvcy ctrl. The clud server cretes ew secret key f the user bsed
the users rfle wth the hel f securty rvleges; the wer ecryts d submts the cfdetl
frmt t the clud server.The ewly geerted keys d tht wll be frmed t the user thrugh
eml. request frm uthrzed user the server executes level-1 decryt d t user sde level-2
cmletely decryts the cher text
A. Advantages of Proposed System
1. No Re-keyg cmlexty
2. Highly trusted
3. N need fr trusted thrd rty
4. Securty mrvemets t less cmutt cst.

Figure: System Architecture


1.
2.
3.
4.
5.

Profile verification authority


User signup
Data uploading and encryption
Data dwldg d decryt
Ecryt evlut mgemet

A. Profile Verification Authority


detty rvder is an authority of ID and re highly trusted thrd rtes are tht grants the detty
tkes t the Users which is bsed ther profile ttrbutes. t must be ted s detty rvders no needs to
be le fter they wll issues the detty tkes.
B User Signup
The Users can sign up with their tke t get the credetls rder t the decryts the dt d the
they re llwed t the ccessibility. The Users regster wth ther credentials re terrelted t the ttrbute
cdts CC wth the wer d the rest f the detty credentials that are terrelted t the ttrbute
cdts CB/CC wth the Clud. Whe the Users regsters wth the wer the the wer grants tw
sets f secrets fr the ttrbute cdts CC thse re ls reset the sub ccess ctrl lces
CB Clud. The wer kees e set d gves the ther set t the Clud. Tw dfferet pairs re used
rder t vd the Clud frm decrytg the wer ecryted dt.
C. Data Uploading And Encryption
The wer frst ecryts the dt bsed the wers sub ccess Ctrl lces rder t hde
the ctet frm the Clud d the ulds them lg wth the ublc frmtn. Owner updates the
DOI: 10.9790/0661-17623439

www.iosrjournals.org

35 | Page

"SL-SKE (Signature Less-Secret Key Encryption) For Data-Sharing in Clouds"


security policy with the access rule i.e., user, data item, action to the remg sub ccess Ctrl lces t
the Clud. The Clud tur ecryts the dt bsed the keys geerted usg ts w ttrbute BsedGeerl Key Mgemet::KeyGe lgrthm. Nte tht the ttrbute Bsed-Geerl Key
Mgemet::KeyGe t the Clud tkes the security provided t the Users d the sub ccess Ctrl
lces gve by the wer t csdert t geerte credentials.
D.Data Downloading And Decryption
The Users dwlds the ecryted dt frm the Clud d decryts twce t ccess the dt. Frst
the Clud geerted ublc frmt tules were used t derve the bject Lkg d Embeddg key d
the the wer geerted ublc frmt tules s used t derve the LE key usg the ttrbute BsedGeerl Key Mgemet::KeyDecr lgrthm. These credentials are llws User t decryts dt tem ly
f the User stsfes the actual C implements t the dt tem.
E. Encrytn Evlutn Mngement
Ether ccess Ctrl lces r the user credetls my chge. Further, lredy the ecryted dt
my ges thrugh common udtes. such a stut dt lredy ecryted d it must be the re-ecryted
wth ew credential. s the Clud erfrms the ccess ctrl efrcg ecryt, t is an as usual reecryts the expensive dt wthut the vlvemet f the wer.
Keygeneration Algorithm
The main use of the key generation algorithm is sending keys to the user, the main key provided by the
owner through email and cloud can provide the key through mail. once the data user can enter both the keys
automatically he can see the owner the data.
Inputs
Gmem->group member
GP->group manager
CS->cloud server
K->key
SK->send key
RK->request key
Output
Result-> R
1.BEGIN
2.Gmem register
3.Gmem login
4.upload Fs
5.Gmem request GMkey
6.GM generates key to Gmem
7.Gmem request SK from CS
8.CS sends SK to Gmem
9.Gmem access userfiles
10.display R
11.END

DOI: 10.9790/0661-17623439

www.iosrjournals.org

36 | Page

"SL-SKE (Signature Less-Secret Key Encryption) For Data-Sharing in Clouds"

A:login page for the registered users

B: user operations.

C: File Uploaded by user

DOI: 10.9790/0661-17623439

www.iosrjournals.org

37 | Page

"SL-SKE (Signature Less-Secret Key Encryption) For Data-Sharing in Clouds"

D:Owner views the requested user files

E:Data view of the user using cloud and owner keys

IV.

Conclusion

ths er we hve rsed the frst Sgture Less Secret Key Ecryt scheme wthut rg
erts d rvded ts frml securty. ur SL-SKE slves the key escrw rblem d revct
rblem. Usg the SL-SKE scheme s key buldg blck, we rsed mrved rch t securely
shre sestve dt ublc cluds thrugh eml ccet by usg the bth wer d clud keys whch
re bsed the user's rfle verfct uthrty. ur rch surts mmedte revct d ssures
the cfdetlty f the dt stred utrusted ublc clud whle efrcg the ccess ctrl lces f
the dt wer. ur exermetl results shws the effcecy f bsc SL-SKE scheme d mrved rch
fr the ublc clud. Further, fr multle users stsfyg the sme ccess ctrl lces, ur mrved
rch erfrms ly sgle ecryt f ech dt tem d reduces the verll verhed t the dt
wer.
Future Enhancement
For future enhancement, we have to improve the performances of an encrypting data. I can provide the
AES algorithm for both uploading data and encrypts the data.

DOI: 10.9790/0661-17623439

www.iosrjournals.org

38 | Page

"SL-SKE (Signature Less-Secret Key Encryption) For Data-Sharing in Clouds"


References
[1].
[2].
[3].
[4].
[5].

Certificateless Public Key Cryptography Sattam S . Al-Riyami and Kenneth G. Paterson Information Security Group,
Royal Holloway, University of London, Egham, Surrey, TW20
Relations Among Notions of Security for Public- Key Encryption Scheme Bellare A. Desai D. Pointchevaly P. Rogawayz Februa
1999.
Attribute-Based Encryption for Fine- Grained Access Control of Encrypted Data Vipul Goyal Omkant Pandeyy Amit
Sahaiz Brent.
R. Agrawal, J. Kiernan, R. Srikant, and Y. Xu, Order preserving encryption for numeric data, in Proceedings of ACM SIGMOD
Conference, 2004.
B. Chor, E. Kushilevitz, O. Goldreich, and M. Sudan, Private information retrieval, ACM Computer Survey, vol.45, no. 6,pp.
965981, 1998.

DOI: 10.9790/0661-17623439

www.iosrjournals.org

39 | Page

You might also like