SlideShare a Scribd company logo
1 of 23
Secure File Sharing
Secure File Sharing Using Access Control
Raviprakash Ganji
Computer Security
Project: Secure File Sharing Using Access Control
Name: Raviprakash Ganji
Institution: New England College.
Abstract
Presently these day's sharing imperative documents are
exceptionally unsafe. So, we have made a half and half answer
for document stockpiling on the cloud. This is a propelled
framework where User can choose a document from his
telephone and enter a key for that record. For Uploading the
File is broken in 2 separate chunks and these pieces are encoded
by AES and DES calculation individually and after that, they
have put away on the cloud server side. At that point client, 1
chooses another client with whom he will share the document
to. Client 2 gets an SMS with Encrypted key. We will utilize
Blowfish calculation for key Encryption. Client 2 will login into
the application utilizing his accreditations. On the Home page,
he can see every one of the documents shared to him. At the
point when client endeavors to get to them, the application will
check for the SMS automatically, and whenever scrambled SMS
from the User 1 was discovered, Application will begin the
unscrambling procedure. For decoding both the encoded records
are unscrambled one by one and afterward combined.
Secure File Sharing: Presentation Cloud storage framework
system have been the source of captivation for the online clients
to have simple access any place and whenever clients need.
Numerous online specialist organizations have succeeded to
serve the individual clients, industrialists just as the
businessmen to have their information on cloud with
dependability and security. The quantities of versatile users who
need to utilize the assets or administrations in a haste with the
assistance of their cell or mobile phones from cloud-based
frameworks are quickly expanding. This way toward using the
cloud assets for capacity and progress of information by
multipurpose users is a testing task. The cloud environment
given by the online providers co-ops can be in the sort of open,
private or crossover cloud. The cloud client chooses the kind of
cloud condition dependent on the clients' choice to security or
introduction arrangement. Numerous IT giants are utilizing the
cloud administrations to decrease the on premises the cost
which is more prominent than they accommodate the online
specialist organizations. The cloud framework given by various
sellers shows the multiplicity as for execution and estimating.
The plan strategies are differed to accomplish focused outcomes
as far as proficient administration, decreased cost, verified
information stockpiling. The general advantages of the cloud
framework are simple sharing, matching up, off webpage
information storing, better remote openness, decrease of inside
IT costs, diminished necessity of assets and online information
joint effort.
The adaptable cloud framework diminishes the
need to send each record and each opportunity to various
beneficiaries; rather an entrance interface is sent which
undoubtedly decreases the transmission capacity utilization. The
yearly expenses for an association are diminished without the
requirement for utilizing labor and assets because of the use of
Mobile Cloud computing. Even though there are numerous
benefits in utilizing the cloud framework, the traps of Secure
file sharing using access control are that the client is charged
intensely for each byte of information storing when the breaking
point of certain limit is crossed and capacity of data in the
cloud is powerless against outside hack assaults and dangers.
The Mobile Cloud computing (MCC) has a few issues,
for example, constrained assets, arrange related issues, security
related issues, accessibility and protection issues.
Limited Resources: The cell or mobile phones which make
utilization of the distributed computing condition have limited
assets for use such as battery usage and storing data. The
controlled assets incorporate the restricted calculation control,
low quality showcase the transfer speed of the system is the
huge imperious because of the shortage of frequencies
contrasted with the conventional wired system. Calculation
offloading is one of the principle highlights of Mobile Cloud
computing which manages the exchange of calculation parts of
the application to cloud foundation. It is basic to decide if to
offload the work or not and to settle on the segments of the
administration codes to offload.
Network Related Issues: In Secure file sharing, the portable
client side preparing like, association with the web supplier and
cloud server is performed on the remote system supplier side.
Aside from the association issues, the system related issues
like, inertness, flag quality and multiplicity likewise influence
the portable clients in getting to cloud administrations.
Security: Although the cell phones in the distributed computing
condition has the functionalities like the work stations, the
issues identified with security and protection are increasingly
inclined to the cell phones. As the danger location
administrations are performed on the cloud, the other security
issues identified with cell phones presents extraordinary
difficulties. Secure file sharing issues are sorted as security for
multipurpose clients and verifying information on mists.
Versatile client security includes the gadget security and
protection of portable client. Verifying the information on the
cloud includes the cryptographic suite, secrecy and uprightness.
Availability: Accessibility of the files in cloud implies which
administrations are to almost certainly get to remotely. In basic
terms, accessibility alludes that total assets are available and
usable at record-breaking by approved people. It is the most
basic security prerequisites in portable distributed computing.
The fundamental favorable position of accessibility for files in
cloud frameworks is to guarantee the clients use them whenever
and at wherever with the utmost security. The essential
highlights of accessibility incorporate, progression, quality,
episode the board, usefulness, and security. Congruity implies it
guarantees that the administrations are accessible with no
intrusions. The Quality of administrations implies it affirms the
entrance time, a few bolstered clients, and measure of
information handled. Framework accessibility is the capacity to
proceed with tasks even in the likelihood of any security
rupture, traffic clog, arrange disappointments and out-of-flag.
Privacy: The trust of the file sharing using access key clients in
the Mobile Cloud computing stage is built up by safeguarding
the client security data like, area of the cell phone and shielding
information or application mystery from enemies and other
some hackers. Location Based Services (LBS) and Global
Positioning System (GPS) are responsible for the security issues
on mobile or work area clients which give the private
information such as the current location and other history of
locations of the mobile user. This problem is worse when any
user’s information like, travel plan, business schedules and
length of stay at a location is known to challenger.
The paper proposes a productive and secure
document sharing instrument through Trusted Third Party (TTP)
framework which oversees key administration and client get to
the board. The security of the versatile client is safeguarded by
Trusted Third Party while getting to the cloud information
storing. The security of the information put away and getting to
rights are dictated by the proposed system to defeat the
difficulties of the current consistent key cryptography.
Whatever remains of the paper is sorted out and made them in 5
different sections. The prior works related with file sharing
using frameworks are examined and the systems used to beat the
issues are displayed in Section 2. The clear subtleties of the
proposed information facilitating system are given in the
Section 3. The test results dependent on the recreation and their
relative examinations are given in Section 4. Ultimately,
Section 5 abridges and gives the end to the work.
Materials and Methods: In versatile distributed computing
framework, a protected record sharing system using open key
cryptography is proposed for cloud information stockpiling and
recovery. The proposed document sharing system comprises of
four substances as appeared in Figure 1. The elements in the
proposed framework are information proprietor, information
clients, confided in outsider framework and distributed storage.
The Trusted Third Party (TTP) framework likewise goes about
as the cryptographic server and key administration framework.
file sharing using access works with Trusted Third Party has
numerous duties, for example, proprietor the board, client the
board, encryption, unscrambling and get to control. Trusted
Third Party is the brought together expert for any document get
to related exercises by the clients from the distributed storage.
Information proprietor has the full authority over the record it
claims, and no other client can adjust the document. The
proprietor or Trusted Third Party controls the clients anytime of
time. The information proprietor enrolls as a proprietor in the
Trusted Third-Party framework for the record transfer. When
proprietor enrollment is effectively finished, the Trusted Third-
Party framework creates private key and open key for the
document that have proprietors transfer. The transferred
document is then encoded by Trusted Third Party framework
utilizing private key and the scrambled record is transferred it
to the distributed storage framework
Key Generation and Encryption: At first, information proprietor
must enlist in confided in outsider framework for keeping the
records in secure phase with only one access key for the user.
Information proprietors make the login qualifications for
transferring documents and those certifications are additionally
used to transfer the client records and their consents. In the
wake of getting a specific document (F) from the information
proprietor, the Trusted Third Party creates keys by utilizing
Hilter Kilter key encryption. Hilter Kilter key age isn't
examined in this paper and it is accepted that any standard
uneven key age calculation (APKI) is used for this reason. The
stream outline of the information proprietor presenting a record
to the cloud storehouse through Trusted Third Party is appeared
in
In open public-private key pair, the private key (Kpr) created by
Trusted Third-Party amid the hilter kilter key age is utilized for
encryption of the record. The public key (Kpu) is isolated into
two parts or parts by the Trusted Third Party and is utilized for
unscrambling of the transferred record. One half or part of the
open key is transmitted to the information proprietor (Ko) and
the other half or part is kept by Trusted Third Party (KTTP)
itself. The Trusted Third-Party framework which goes about as
a cryptographic server erases the private key through secure
overwriting of one portion of the open key over it after the
record is transferred in the cloud framework. The encoded
record (Fen) is then sending to the cloud vault for capacity.
Diagram demonstrates the documentations and its definitions
utilized in the proposed approach.
Documentations and definitions utilized in the proposed model
for security using for sharing file.
Notations Definitions
F Data file
Klength Key length
APKI Public Key Infrastructure Algorithm
Kpr Private key
Kpu Public key
KTrusted Third Party Trusted Third Party’s part of Public Key
Ko Owner’s part of Public Key
Fen Encrypted file
Khalf Value of half of the key length
FID File Identification
Ulist User list
UAPL User Access Permission List
Decryption of File: The information proprietor gives client
list/get to consent list (UAPL), client explicit security questions
and replies, number of documents get to authorization to the
Trusted Third-Party server. The information proprietor
welcomes every one of the clients given in the entrance control
list with the connection to the Trusted Third Party and half or
part of proprietor's open key for self-enrollment. At the point
when a client needs to get to the transferred document in the
cloud, the client at first registers with the Trusted Third Party.
When client enrollment is finished, the client gets login.
accreditations from the Trusted Third Party. After fruitful
confirmation among Trusted Third Party and asking for client,
the client ask for any document through File Identification
(FID) alongside the piece of the open key gave to it by the
information proprietor. Trusted Third Party approves the client
get to consent for that asked for record. The Trusted Third Party
recovers the open key by joining its own half or part of the open
key and the got half or part of the open key from the client. In
the in the interim, the Trusted Third Party downloads the asked
for record in the encoded structure from the cloud information
stockpiling. The downloaded document is then unscrambled
utilizing the recovered open key. The decoded information
record is sent back to the comparing client from Trusted Third
Party as appeared.
File Access and Data Owner: At the point when another client
wishes to get to the record, it sends joining demand message to
the information proprietor. The information proprietor includes
the subtleties of the recently arrived client in the Access
Permission List (APL) and sends the refreshed APL to Trusted
Third Party. The Trusted Third Party in the wake of checking
the qualifications of the information proprietor refreshes the
APL by safely overwriting the entrance control list for the
information proprietor's record. Simultaneously, the information
proprietor gives the half of proprietor's open key and
connection for getting to the document through Trusted Third
Party to the recently joined client. The verified client who
wishes to alter and transfer the got to document needs to wind
up the information proprietor or high advantaged client of that
changed record. The client who needs to alter the document
enlists as proprietor in Trusted Third Party and transfer the
adjusted record in the cloud as another name through Trusted
Third Party. For each record put away in the cloud, one client in
the gathering is information proprietor others are information
getting to clients.
Implementation Details: The proposed system is executed in
cloud condition with the assistance of JAVA innovation. As a
piece of the usage, self-enlistment User Interface (UI) for
record proprietors is created. In the UI, a record proprietor
enlists in the Trusted Third Party (TTP) framework and setup
the certifications. After the effective enrollment, the proprietor
can setup client records, client subtleties and their entrance
consents in Trusted Third Party through UI. An element is
created in Trusted Third Party to play out the setup as a mass
transfer just as individual client creation. When the clients are
added to Trusted Third Party, they get a welcome from the
Trusted Third Party/Owner. The Trusted Third-Party logon
certifications are setup by adhering to the guidelines in the
welcome that is send to the client. Trusted Third Party utilizes
the proposed hilter kilter key encryption technique for verifying
the records in cloud condition. In the execution of the proposed
system, RSA calculation is utilized for key age and encryption.
Trusted Third Party utilizes one of the keys (private key) for
encryption of the document and the key is safely erased (over
compose). The open key is part into two sections with the
assistance of mystery sharing calculation. The Trusted Third
Party keeps half of the open key and the other half shared to the
proprietor. In the wake of sharing the proprietor's bit of the
open key, Trusted Third Party safely erases (over composes) it
from store. The proprietor shares the open key part to the
required clients. The clients get to the Trusted Third Party and
demand for a record alongside the relating key part. Trusted
Third Party approves the client consents and remakes the open
key. Trusted Third Party downloads the encoded document from
the distributed storage and unscramble it with the remade open
key. The decoded record is shared to the asked for client. When
the procedure is finished, Trusted Third Party erases the remade
open key and the unscrambled record. In Public Key
Infrastructure (PKI), the ordinarily utilized key age calculations
for producing open key and private key are Rivest, Shamir and
Adleman (RSA), Diffie-Hellman (DH) and Digital Signature
Algorithm (DSA). The proposed key administration procedure
including key age, encryption and decoding is tried in Intel i3
processor of 1.4 GHz with 4 GB of RAM. The execution of the
distinctive PKI calculations like, RSA, ElGamal and Paillier
Algorithms29,30 are looked at for the procedure of encryption,
unscrambling, CPU use and memory use.
Encryption and Decryption Process: Encryption and Decryption
in cryptography instrument are the fundamental components for
building up security in distributed computing condition. The
encryption and decoding process is performed in PKI through
RSA, ElGamal and Paillier calculations. The correlation of the
PKI calculations as far as time utilization amid the procedure of
encryption and decoding when 10 KB record is utilized features
that RSA performs better as appeared in Figure 5. Be that as it
may, the RSA calculation debases in its execution amid the
encryption of extensive records in the request of many MB
estimate. In any case, ElGamal and Paillier are demonstrated for
its utilization in scrambling substantial size documents. The
examination of both ElGamal and Paillier displays their
execution similarly when the proposed system of key
administration is used
.
Time ingesting for encryption and decryption process by key
group algorithms using the projected methodology.
Flow diagram of the data owner process in the proposed
methodology.
Conclusion:
security for the record access and protection for the clients from
vindictive insiders in Secure File Sharing Using Access Control.
The classification and trustworthiness of the put away and
recovered document is safeguarded through the proposed record
sharing instrument such as unique keys. The gathering client get
to the board, key administration, encryption and unscrambling
of documents are performed through believed outsider to make
the information verified in portable cloud condition. The
relative examination of various PKI calculations utilizing the
proposed technique for key calculation, encryption, decoding
and asset usage demonstrates that RSA calculation performs
well in dealing with little record sizes while, ElGamal and
Paillier algorithms are progressively reasonable for bigger
documents to be put away in distributed storage Secure File
Sharing Using Access Control
Reference:
1. Khan AN, Mat Kiah ML, Khan SU, Madani SA. Towards
secure Mobile Cloud computing: A survey. Futur Gener Comput
Syst. 2013; 29(5):1278–99.
2. Kumar R, Rajalakshmi S. Mobile Cloud computing: Standard
approach to protecting and securing of mobile cloud
ecosystems. Proceedings of International Conference on
Computer Sciences and Applications; 2013. p. 663–9. Vol 9
(48) | December 2016 | www.indjst.org Indian J 8 ournal of
Science and Technology Secure File Sharing Mechanism and
Key Management for Mobile Cloud computing Environment
3. Uddin M, Memon J, Alsaqour R, Shah A, Rozan MZA.
Mobile agent based multi-layer security framework for cloud
data centers. Indian Journal of Science and Technology. 2015
Jun; 8(12):171–8.
4. Rajathi A, Saravanan N. A survey on secure storage in cloud
computing. Indian Journal of Science and Technology. 2013
Apr; 6(4):1–6.
5. Lee JY. A study on the use of secure data in cloud storage for
collaboration. Indian Journal of Science and Technology. 2015
Mar; 8(S5):33–6.
6. Grobauer B, Walloschek T, Stocker E. Understanding cloud
computing vulnerabilities. IEEE Secur Priv. 2011; 9(2):50– 7.
7.Cisco Visual Networking Index. Available from: http://
www.cisco.com/c/en/us/solutions/collateral/service-provider/
visual-networking-index-vni/mobile-white-paper- c11-
520862.pdf
8. Sanaei Z, Abolfazli S, Gani A, Shiraz M. SAMI: Service-
based arbitrated multi-tier infrastructure for Mobile Cloud
computing. Proceedings of 1st IEEE International Conference
on Communications in China Workshops; 2012. p. 14–9.
9. Kalpana V, Meena V. Study on data storage correctness
methods in Mobile Cloud computing. Indian Journal of Science
and Technology. 2015 Mar; 8(6):495–500.
10. Mishra A, Jain R, Durresi A. Cloud computing: Networking
and communication challenges. IEEE Communications
Magazine. 2012; 50(9):24–5.
Secure File Sharing
Secure File Sharing Using Access Control
Raviprakash Ganji
Computer Security
Project: Secure File Sharing Using Access Control
Your Name: Raviprakash Ganji
Institution: New England College.
Abstract
Presently these day's sharing imperative documents are
exceptionally unsafe. So, we have made a half and half answer
for document stockpiling on the cloud. This is a propelled
framework where User can choose a document from his
telephone and enter a key for that record. For Uploading the
File is broken in 2 separate chunks and these pieces are encoded
by AES and DES calculation individually and after that, they
have put away on the cloud server side. At that point client, 1
chooses another client with whom he will share the document
to. Client 2 gets an SMS with Encrypted key. We will utilize
Blowfish calculation for key Encryption. Client 2 will login into
the application utilizing his accreditations. On the Home page,
he can see every one of the documents shared to him. At the
point when client endeavors to get to them, the application will
check for the SMS automatically, and whenever scrambled SMS
from the User 1 was discovered, Application will begin the
unscrambling procedure. For decoding both the encoded records
are unscrambled one by one and afterward combined.
1.Secure File Sharing
1. Introduction Cloud storage systems have been the source of
attraction for the online users to have easy access anywhere and
anytime. Many online service providers have thrived to serve
the individual users, industrialists as well as the business people
to have their data on cloud with reliability and security. The
numbers of mobile users who need to use the resources or
services on the go with the help of their mobile devices from
cloud-based systems are rapidly increasing. The process of
utilizing the cloud resources for storage and transition of data
by mobile users is a challenging task1–5. The cloud
environment provided by the online service providers can be in
the type of public, private or hybrid cloud. The cloud user
selects the type of cloud environment based on the users’
decision to privacy or exposure policy. Many IT giants are
using the cloud services to reduce the on-premises cost which is
greater than they provide for the online service providers. The
cloud system provided by different vendors exhibits the
heterogeneity with respect to performance and pricing. The
design techniques are varied to achieve competitive results in
terms of efficient service, reduced cost, secured data storage.
The overall benefits of the cloud system are easy sharing,
syncing, off-site data storage, better remote accessibility,
reduction of internal IT costs, reduced requirement of resources
and online data collaboration.
Mobile Cloud Computing (MCC) is the combined approach of
the technologies namely, cloud computing, mobile computing,
and wireless networks for sharing resources to mobile users.
The MCC is used to bring rich computational resources to
mobile networks and differentiates from the mobile computing
by using the cloud-based web apps rather than the native apps.
In MCC, mobile devices are used to view the data files as the
storage of data and processing of data is done in the cloud
infrastructure instead of the mobile device itself. The mobile
thin native client devices in cloud computing environment are
accessed over the wireless connection. The mobile applications
accessed from the thin client devices often move the storage and
processing of data into the powerful and centralized cloud
computing infrastructure. Moreover, mobile app storage
constraint is eliminated as data is stored in cloud rather than the
mobile devices. As the data is stored or synced in the cloud
storage, the chance of data lost is reduced on the mobile devices
which indeed improve the reliability and availability of data
while the users are on move. MCC supports multi-tenancy and
ease of integration of multiple services provided by different
cloud service providers. Cloud based applications are predicted
to account for 90% of total mobile data traffic by 2019. Mobile
cloud traffic is predicted by CISCO7 to grow 11-fold from 2014
to 2019, attaining a composite annual growth rate is (CAGR) of
60%.
The mobile cloud system reduces the need to send each file
every time to different recipients; instead an access link is sent
which indeed reduces the bandwidth usage. The annual costs for
an organization are reduced largely without the need for
employing manpower and resources due to the usage of MCC.
Though there are many merits in using the cloud system, the
pitfalls of MCC is that the user is charged heavily for every
byte of data storage when the limit of certain capacity is crossed
and storage of information in the cloud is vulnerable to external
hack attacks and threats.
The MCC has several issues such as limited resources, network
related issues, security, availability and privacy.
• Limited Resources: The mobile devices which make use of the
cloud computing environment have limited resources for
utilization. The limited resources include the limited
computation power, low quality display and limited battery
power. The bandwidth of the network is the big constraint due
to the scarcity of frequencies compared to the traditional wired
network. Computation offloading is one of the main features of
MCC which deals with the transfer of computation parts of the
application to cloud infrastructure. It is critical to determine
whether to offload the work or not and to decide on the portions
of the service codes to offload.
• Network Related Issues:
In MCC, the mobile user side processing like, connection with
the internet provider and cloud server is performed on the
wireless network provider side. Apart from the connection
issues, the network related problems like, latency, signal
strength and heterogeneity also affects the mobile users in
accessing cloud services.
• Security:
Though the mobile devices in the cloud computing environment
has the functionalities similar to the desktop computers, the
issues related to security and privacy are more prone to the
mobile devices. As the threat detection services are performed
on the cloud, the other security issues related to mobile devices
poses great challenges. MCC security issues are categorized as
security for mobile users and securing data on clouds. Mobile
user security involves the device security and privacy of mobile
user. Securing the data on the cloud involves the cryptographic
suite, confidentiality and integrity.
• Availability:
Availability of the cloud means which services are to be able to
access remotely. In simple terms, availability refers that
complete resources are accessible and usable at all time by
authorized persons. It is the most critical security requirements
in mobile cloud computing. The main advantage of availability
for cloud systems is to ensure the users use them at any time
and at any place. The important features of availability include,
continuity, quality, incident management, functionality, and
security. Continuity means it ensures that the services are
available without any interruptions. The Quality of services
means it confirms the access time, several supported users, and
amount of data processed. System availability is the ability to
continue operations even in the possibility of any security
breach, traffic congestion, network failures and out-of-signal.
• Privacy:
The trust of the mobile users in MCC platform is established by
preserving the user privacy information like, location of the
mobile device and protecting data or application secrecy from
adversaries. Location Based Services (LBS) and Global
Positioning System (GPS) are accountable for the privacy issues
on mobile or desktop users which provide the private
information such as the current location and other history of
locations of the mobile user. This problem is worse when any
user’s information like, travel plan, business schedules and
length of stay at a location is known to challenger.
The paper proposes an efficient and secure file sharing
mechanism through Trusted Third Party (TTP) system which is
responsible for key management and user access management.
The privacy of the mobile user is preserved by TTP while
accessing the cloud data storage. The security of the data stored
and accessing rights are determined by the proposed
methodology to overcome the setbacks of the existing
symmetric key cryptography.
The rest of the paper is organized and made them in 5 sections.
The earlier works associated with cloud storage systems are
discussed and the methodologies used to overcome the problems
are presented in Section 2. The descriptive details of the
proposed data hosting technique are given in the Section 3. The
experimental results based on the simulation and their
comparative analyses are provided in Section 4. Lastly, Section
5 summarizes and gives the conclusion to the work.
2. Materials and Methods:
In mobile cloud computing infrastructure, a secure file sharing
mechanism utilizing public key cryptography is proposed for
cloud data storage and retrieval. The proposed file sharing
methodology consists of four entities as shown in Figure 1. The
entities in the proposed system are data owner, data users,
trusted third party system and cloud storage. The Trusted Third
Party (TTP) system also acts as the cryptographic server and
key management system. TTP has multiple responsibilities such
as, owner management, user management, encryption,
decryption and access control. TTP is the centralized authority
for any file access related activities by the users from the cloud
storage. Data owner has the full control over the file it owns,
and no other user can modify the file. The owner or TTP
controls the users at any point of time. The data owner registers
as an owner in the TTP system for the file upload. Once owner
registration is successfully completed, the TTP system
generates private key and public key for the file that have
owners upload. The uploaded file is then encrypted by TTP
system using private key and the encrypted file is uploaded it to
the cloud storage system.
Figure 1. Block diagram of the proposed file sharing
methodology.
2.1 Key Generation and Encryption:
Initially, data owner must register in trusted third-party system
for keeping the files in cloud environment. Data owners create
the login credentials for uploading files and those credentials
are also used to upload the user lists and their permissions.
After receiving a particular file (F) from the data owner, the
TTP generates keys by using asymmetric key encryption.
Asymmetric key generation is not discussed in this paper and it
is assumed that any standard asymmetric key generation
algorithm (APKI) is utilized for this purpose. The flow diagram
of the data owner submitting a file to the cloud repository
through TTP is shown in Figure 2.
2. Flow diagram of the data owner process in the proposed
method.
In public-private key pair, the private key (Kpr) generated by
TTP during the asymmetric key generation is used for
encryption of the file. The public key (Kpu) is divided into two
halves or parts by the TTP and is used for decryption of the
uploaded file. One half or part of the public key is transmitted
to the data owner (Ko) and the other half or part is kept by TTP
(KTTP) itself. The TTP system which acts as a cryptographic
server deletes the private key through secure overwriting of one
half of the public keyover it after the file is uploaded in the
cloud system. The encrypted file (Fen) is then sending to the
cloud repository for storage. Table 1 shows the notations and its
definitions used in the proposed methodology.
Table 1. Notations and definitions used in the proposed model
Notations Definitions
F Data file
Klength Key length
APKI Public Key Infrastructure Algorithm
Kpr Private key
Kpu Public key
KTTP TTP’s part of Public Key
Ko Owner’s part of Public Key
Fen Encrypted file
Khalf Value of half of the key length
FID File Identification
Ulist User list
UAPL User Access Permission List
2.2 Decryption of File:
The data owner provides user list/access permission list
(UAPL), user specific security questions and answers, number
of file access permission to the TTP server. The data owner
invites all the users given in the access control list with the link
to the TTP and half or part of owner’s public key for self-
registration. When a user wants to access the uploaded file in
the cloud, the user initially registers with the TTP. Once user
registration is completed, the user gets login
credentials from the TTP. After successful authentication
between TTP and requesting user, the user request any file
through File Identification (FID) along with the part of the
public key provided to it by the data owner. TTP validates the
user access permission for that requested file. The TTP
regenerates the public key by combining its own half or part of
the public key and the received half or part of the public key
from the user. In the meanwhile, the TTP downloads the
requested file in the encrypted form from the cloud data storage.
The downloaded file is then decrypted using the regenerated
public key. The decrypted data file is sent back to the
corresponding user from TTP as shown in Figure 3.
2.3 File Access and Data Owner:
When a new user wishes to access the file, it sends joining
request message to the data owner. The data owner adds the
details of the newly arrived user in the Access Permission List
(APL) and sends the updated APL to TTP. The TTP after
verifying the credentials of the data owner updates the APL by
securely overwriting the access control list for the data owner’s
file. Concurrently, the data owner provides the half of owner’s
public key and link for accessing the file through TTP to the
newly joined user. The authenticated user who wishes to modify
and upload the accessed file needs to become the data owner or
high privileged user of that modified file. The user who needs
to modify the file registers as owner in TTP and upload the
modified file in the cloud as another name through TTP. For
each file stored in the cloud, one user in the group is data owner
others are data accessing users.
2.4 Implementation Details:
The proposed mechanism is implemented in cloud environment
with the help of JAVA technology. As a part of the
implementation, self-registration User Interface (UI) for file
owners is developed. In the UI, a file owner registers in the
Trusted Third Party (TTP) system and setup the credentials.
After the successful registration, the owner can setup user lists,
user details and their access permissions in TTP through UI. A
feature is developed in TTP to perform the setup as a bulk
upload as well as individual user creation. Once the users are
added to TTP, they get an invite from the TTP/Owner. The TTP
logon credentials are setup by following the instructions in the
invite that is send to the user. TTP uses the proposed
asymmetric key encryption method for securing the files in
cloud environment. In the implementation of the proposed
mechanism, RSA algorithm is used for key generation and
encryption. TTP uses one of the keys (private key) for
encryption of the file and the key is securely deleted (over
write). The public key is split into two parts with the help of
secret sharing algorithm. The TTP keeps half of the public key
and the other half shared to the owner. After sharing the
owner’s portion of the public key, TTP securely deletes (over
writes) it from repository. The owner shares the public key
portion to the required users. The users access the TTP and
request for a file along with the corresponding key portion. TTP
validates the user permissions and reconstructs the public key.
TTP downloads the encrypted file from the cloud storage and
decrypt it with the reconstructed public key. The decrypted file
is shared to the requested user. Once the process is completed,
TTP deletes the reconstructed public key and the decrypted file.
In Public Key Infrastructure (PKI), the commonly used key
generation algorithms for generating public key and private key
are Rivest, Shamir and Adleman (RSA), Diffie-Hellman (DH)
and Digital Signature Algorithm (DSA). The proposed key
management methodology including key generation, encryption
and decryption is tested in Intel i3 processor of 1.4 GHz with 4
GB of RAM. The performance of the different PKI algorithms
like, RSA, ElGamal and Paillier Algorithms29,30 are compared
for the process of encryption, decryption, CPU usage and
memory usage.
Encryption and Decryption Process:
Encryption and Decryption in cryptography mechanism are the
vital elements for establishing security in cloud computing
environment. The encryption and decryption process is
performed in PKI through RSA, ElGamal and Paillier
algorithms. The comparison of the PKI algorithms in terms of
time consumption during the process of encryption and
decryption when 10 KB file is used highlights that RSA
performs better as shown in Figure 5. However, the RSA
algorithm degrades in its performance during the encryption of
large files in the order of hundreds of MB size. But ElGamal
and Paillier are proved for its usage in encrypting large size
files. The comparison of both ElGamal and Paillier exhibits
their performance equally when the proposed methodology of
key management is utilized.
Time consumption for encryption and decryption process by key
generation algorithms using the proposed methodology.
Memory usage by different PKI algorithms using the proposed
methodology
Conclusion:
Mobile cloud computing has become an inevitable part in the
recent business and administrative environment. The proposed
secure file sharing mechanism for accessing cloud data storage
ensures security and privacy for group user access. Trusted
third party plays the main role in protecting the security for the
file access and privacy for the users from malicious insiders in
cloud environment. The confidentiality and integrity of the
stored and retrieved file is preserved through the proposed file
sharing mechanism. The group user access management, key
management, encryption and decryption of files are performed
through trusted third party to make the data secured in mobile
cloud environment. The comparative analysis of different PKI
algorithms using the proposed methodology for key
computation, encryption, decryption and resource utilization
shows that RSA algorithm performs well in handling small file
sizes whereas, ElGamal and Paillier algorithms are more
suitable for larger files to be stored in cloud storage.
References:
1. Khan AN, Mat Kiah ML, Khan SU, Madani SA. Towards
secure mobile cloud computing: A survey. Futur Gener Comput
Syst. 2013; 29(5):1278–99.
2. Kumar R, Rajalakshmi S. Mobile cloud computing: Standard
approach to protecting and securing of mobile cloud
ecosystems. Proceedings of International Conference on
Computer Sciences and Applications; 2013. p. 663–9. Vol 9
(48) | December 2016 | www.indjst.org Indian J 8 ournal of
Science and Technology Secure File Sharing Mechanism and
Key Management for Mobile Cloud Computing Environment
3. Uddin M, Memon J, Alsaqour R, Shah A, Rozan MZA.
Mobile agent based multi-layer security framework for cloud
data centers. Indian Journal of Science and Technology. 2015
Jun; 8(12):171–8.
4. Rajathi A, Saravanan N. A survey on secure storage in cloud
computing. Indian Journal of Science and Technology. 2013
Apr; 6(4):1–6.
5. Lee JY. A study on the use of secure data in cloud storage for
collaboration. Indian Journal of Science and Technology. 2015
Mar; 8(S5):33–6.
6. Grobauer B, Walloschek T, Stocker E. Understanding cloud
computing vulnerabilities. IEEE Secur Priv. 2011; 9(2):50– 7.
7. Cisco Visual Networking Index. Available from: http://
www.cisco.com/c/en/us/solutions/collateral/service-provider/
visual-networking-index-vni/mobile-white-paper- c11-
520862.pdf
8. Sanaei Z, Abolfazli S, Gani A, Shiraz M. SAMI: Service-
based arbitrated multi-tier infrastructure for mobile cloud
computing. Proceedings of 1st IEEE International Conference
on Communications in China Workshops; 2012. p. 14–9.
9. Kalpana V, Meena V. Study on data storage correctness
methods in mobile cloud computing. Indian Journal of Science
and Technology. 2015 Mar; 8(6):495–500.
10. Mishra A, Jain R, Durresi A. Cloud computing: Networking
and communication challenges. IEEE Communications
Magazine. 2012; 50(9):24–5.

More Related Content

Similar to Secure File SharingSecure File Sharing Using Access Contro.docx

IRJET- Security Enhancement for Sharing Data within Group Members in Cloud
IRJET- Security Enhancement for Sharing Data within Group Members in CloudIRJET- Security Enhancement for Sharing Data within Group Members in Cloud
IRJET- Security Enhancement for Sharing Data within Group Members in CloudIRJET Journal
 
iaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocoliaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocolIaetsd Iaetsd
 
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage SecurityEnhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage SecurityEditor IJMTER
 
Preserving Privacy Policy- Preserving public auditing for data in the cloud
	Preserving Privacy Policy- Preserving public auditing for data in the cloud	Preserving Privacy Policy- Preserving public auditing for data in the cloud
Preserving Privacy Policy- Preserving public auditing for data in the cloudinventionjournals
 
Fog computing document
Fog computing documentFog computing document
Fog computing documentsravya raju
 
Achieving Secure, sclable and finegrained Cloud computing report
Achieving Secure, sclable and finegrained Cloud computing reportAchieving Secure, sclable and finegrained Cloud computing report
Achieving Secure, sclable and finegrained Cloud computing reportKiran Girase
 
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...eSAT Journals
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentIOSR Journals
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentIOSR Journals
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentIOSR Journals
 
Fragmentation of Data in Large-Scale System For Ideal Performance and Security
Fragmentation of Data in Large-Scale System For Ideal Performance and SecurityFragmentation of Data in Large-Scale System For Ideal Performance and Security
Fragmentation of Data in Large-Scale System For Ideal Performance and SecurityEditor IJCATR
 
Enhanced security framework to ensure data security
Enhanced security framework to ensure data securityEnhanced security framework to ensure data security
Enhanced security framework to ensure data securityeSAT Publishing House
 
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...IJERA Editor
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...IRJET Journal
 

Similar to Secure File SharingSecure File Sharing Using Access Contro.docx (20)

IRJET- Security Enhancement for Sharing Data within Group Members in Cloud
IRJET- Security Enhancement for Sharing Data within Group Members in CloudIRJET- Security Enhancement for Sharing Data within Group Members in Cloud
IRJET- Security Enhancement for Sharing Data within Group Members in Cloud
 
iaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocoliaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocol
 
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage SecurityEnhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
 
Preserving Privacy Policy- Preserving public auditing for data in the cloud
	Preserving Privacy Policy- Preserving public auditing for data in the cloud	Preserving Privacy Policy- Preserving public auditing for data in the cloud
Preserving Privacy Policy- Preserving public auditing for data in the cloud
 
1784 1788
1784 17881784 1788
1784 1788
 
1784 1788
1784 17881784 1788
1784 1788
 
Fog computing document
Fog computing documentFog computing document
Fog computing document
 
Achieving Secure, sclable and finegrained Cloud computing report
Achieving Secure, sclable and finegrained Cloud computing reportAchieving Secure, sclable and finegrained Cloud computing report
Achieving Secure, sclable and finegrained Cloud computing report
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing Environment
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing Environment
 
H017155360
H017155360H017155360
H017155360
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing Environment
 
Fragmentation of Data in Large-Scale System For Ideal Performance and Security
Fragmentation of Data in Large-Scale System For Ideal Performance and SecurityFragmentation of Data in Large-Scale System For Ideal Performance and Security
Fragmentation of Data in Large-Scale System For Ideal Performance and Security
 
Enhanced security framework to ensure data security
Enhanced security framework to ensure data securityEnhanced security framework to ensure data security
Enhanced security framework to ensure data security
 
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
L04302088092
L04302088092L04302088092
L04302088092
 
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
 

More from jeffreye3

Select 2 particular media forum types from the following listNews.docx
Select 2 particular media forum types from the following listNews.docxSelect 2 particular media forum types from the following listNews.docx
Select 2 particular media forum types from the following listNews.docxjeffreye3
 
Select 1 of the datasets.Set up a frequency table.docx
Select 1 of the datasets.Set up a frequency table.docxSelect 1 of the datasets.Set up a frequency table.docx
Select 1 of the datasets.Set up a frequency table.docxjeffreye3
 
Select 1 alternative religion (e.g., Church of Scientology, Tr.docx
Select 1 alternative religion (e.g., Church of Scientology, Tr.docxSelect 1 alternative religion (e.g., Church of Scientology, Tr.docx
Select 1 alternative religion (e.g., Church of Scientology, Tr.docxjeffreye3
 
Select 1 existing or defunct magazine or newspaper, and research its.docx
Select 1 existing or defunct magazine or newspaper, and research its.docxSelect 1 existing or defunct magazine or newspaper, and research its.docx
Select 1 existing or defunct magazine or newspaper, and research its.docxjeffreye3
 
SeleccionarSelect the item that does not belong.¿Lógico o .docx
SeleccionarSelect the item that does not belong.¿Lógico o .docxSeleccionarSelect the item that does not belong.¿Lógico o .docx
SeleccionarSelect the item that does not belong.¿Lógico o .docxjeffreye3
 
SeleccionarSelecciona la respuesta que mejor completa cada oración.docx
SeleccionarSelecciona la respuesta que mejor completa cada oración.docxSeleccionarSelecciona la respuesta que mejor completa cada oración.docx
SeleccionarSelecciona la respuesta que mejor completa cada oración.docxjeffreye3
 
Segmented Assimilation Theory and theLife Model An Integrat.docx
Segmented Assimilation Theory and theLife Model An Integrat.docxSegmented Assimilation Theory and theLife Model An Integrat.docx
Segmented Assimilation Theory and theLife Model An Integrat.docxjeffreye3
 
Seeking your ability to think about criminalsocial issues .docx
Seeking your ability to think about criminalsocial issues .docxSeeking your ability to think about criminalsocial issues .docx
Seeking your ability to think about criminalsocial issues .docxjeffreye3
 
Seeking help with week 4 UOP PSY525 team assignment.  Only one.docx
Seeking help with week 4 UOP PSY525 team assignment.  Only one.docxSeeking help with week 4 UOP PSY525 team assignment.  Only one.docx
Seeking help with week 4 UOP PSY525 team assignment.  Only one.docxjeffreye3
 
Seeking a minimin of one page with scholarly in-text references with.docx
Seeking a minimin of one page with scholarly in-text references with.docxSeeking a minimin of one page with scholarly in-text references with.docx
Seeking a minimin of one page with scholarly in-text references with.docxjeffreye3
 
Seeking a 500 word document that outlines(A) who most commonly .docx
Seeking a 500 word document that outlines(A) who most commonly .docxSeeking a 500 word document that outlines(A) who most commonly .docx
Seeking a 500 word document that outlines(A) who most commonly .docxjeffreye3
 
SEED Labs – Linux Firewall Exploration Lab 1Linux Firewall.docx
SEED Labs – Linux Firewall Exploration Lab 1Linux Firewall.docxSEED Labs – Linux Firewall Exploration Lab 1Linux Firewall.docx
SEED Labs – Linux Firewall Exploration Lab 1Linux Firewall.docxjeffreye3
 
seek limited’s group report &meetingiiTable of C.docx
seek limited’s group report &meetingiiTable of C.docxseek limited’s group report &meetingiiTable of C.docx
seek limited’s group report &meetingiiTable of C.docxjeffreye3
 
Seediscussions,stats,andauthorprofilesforthispublicati.docx
Seediscussions,stats,andauthorprofilesforthispublicati.docxSeediscussions,stats,andauthorprofilesforthispublicati.docx
Seediscussions,stats,andauthorprofilesforthispublicati.docxjeffreye3
 
SEE YELLOW HIGHLIGHTED AREA BELOWPart 1.Laying the Foundat.docx
SEE YELLOW HIGHLIGHTED AREA BELOWPart 1.Laying the Foundat.docxSEE YELLOW HIGHLIGHTED AREA BELOWPart 1.Laying the Foundat.docx
SEE YELLOW HIGHLIGHTED AREA BELOWPart 1.Laying the Foundat.docxjeffreye3
 
See ENF450 Search Strategies and the Student Resources links and sup.docx
See ENF450 Search Strategies and the Student Resources links and sup.docxSee ENF450 Search Strategies and the Student Resources links and sup.docx
See ENF450 Search Strategies and the Student Resources links and sup.docxjeffreye3
 
Seed TagsCollect a variety of seed tags. Take photos of the .docx
Seed TagsCollect a variety of seed tags. Take photos of the .docxSeed TagsCollect a variety of seed tags. Take photos of the .docx
Seed TagsCollect a variety of seed tags. Take photos of the .docxjeffreye3
 
see videohttpsyoutu.be-O5gsF5oylsconsider how hist.docx
see videohttpsyoutu.be-O5gsF5oylsconsider how hist.docxsee videohttpsyoutu.be-O5gsF5oylsconsider how hist.docx
see videohttpsyoutu.be-O5gsF5oylsconsider how hist.docxjeffreye3
 
See Topic on the project 1 paperTarget- Casemanager and care.docx
See Topic on the project 1 paperTarget- Casemanager and care.docxSee Topic on the project 1 paperTarget- Casemanager and care.docx
See Topic on the project 1 paperTarget- Casemanager and care.docxjeffreye3
 
See attachments for information.Looking for assistance on an assig.docx
See attachments for information.Looking for assistance on an assig.docxSee attachments for information.Looking for assistance on an assig.docx
See attachments for information.Looking for assistance on an assig.docxjeffreye3
 

More from jeffreye3 (20)

Select 2 particular media forum types from the following listNews.docx
Select 2 particular media forum types from the following listNews.docxSelect 2 particular media forum types from the following listNews.docx
Select 2 particular media forum types from the following listNews.docx
 
Select 1 of the datasets.Set up a frequency table.docx
Select 1 of the datasets.Set up a frequency table.docxSelect 1 of the datasets.Set up a frequency table.docx
Select 1 of the datasets.Set up a frequency table.docx
 
Select 1 alternative religion (e.g., Church of Scientology, Tr.docx
Select 1 alternative religion (e.g., Church of Scientology, Tr.docxSelect 1 alternative religion (e.g., Church of Scientology, Tr.docx
Select 1 alternative religion (e.g., Church of Scientology, Tr.docx
 
Select 1 existing or defunct magazine or newspaper, and research its.docx
Select 1 existing or defunct magazine or newspaper, and research its.docxSelect 1 existing or defunct magazine or newspaper, and research its.docx
Select 1 existing or defunct magazine or newspaper, and research its.docx
 
SeleccionarSelect the item that does not belong.¿Lógico o .docx
SeleccionarSelect the item that does not belong.¿Lógico o .docxSeleccionarSelect the item that does not belong.¿Lógico o .docx
SeleccionarSelect the item that does not belong.¿Lógico o .docx
 
SeleccionarSelecciona la respuesta que mejor completa cada oración.docx
SeleccionarSelecciona la respuesta que mejor completa cada oración.docxSeleccionarSelecciona la respuesta que mejor completa cada oración.docx
SeleccionarSelecciona la respuesta que mejor completa cada oración.docx
 
Segmented Assimilation Theory and theLife Model An Integrat.docx
Segmented Assimilation Theory and theLife Model An Integrat.docxSegmented Assimilation Theory and theLife Model An Integrat.docx
Segmented Assimilation Theory and theLife Model An Integrat.docx
 
Seeking your ability to think about criminalsocial issues .docx
Seeking your ability to think about criminalsocial issues .docxSeeking your ability to think about criminalsocial issues .docx
Seeking your ability to think about criminalsocial issues .docx
 
Seeking help with week 4 UOP PSY525 team assignment.  Only one.docx
Seeking help with week 4 UOP PSY525 team assignment.  Only one.docxSeeking help with week 4 UOP PSY525 team assignment.  Only one.docx
Seeking help with week 4 UOP PSY525 team assignment.  Only one.docx
 
Seeking a minimin of one page with scholarly in-text references with.docx
Seeking a minimin of one page with scholarly in-text references with.docxSeeking a minimin of one page with scholarly in-text references with.docx
Seeking a minimin of one page with scholarly in-text references with.docx
 
Seeking a 500 word document that outlines(A) who most commonly .docx
Seeking a 500 word document that outlines(A) who most commonly .docxSeeking a 500 word document that outlines(A) who most commonly .docx
Seeking a 500 word document that outlines(A) who most commonly .docx
 
SEED Labs – Linux Firewall Exploration Lab 1Linux Firewall.docx
SEED Labs – Linux Firewall Exploration Lab 1Linux Firewall.docxSEED Labs – Linux Firewall Exploration Lab 1Linux Firewall.docx
SEED Labs – Linux Firewall Exploration Lab 1Linux Firewall.docx
 
seek limited’s group report &meetingiiTable of C.docx
seek limited’s group report &meetingiiTable of C.docxseek limited’s group report &meetingiiTable of C.docx
seek limited’s group report &meetingiiTable of C.docx
 
Seediscussions,stats,andauthorprofilesforthispublicati.docx
Seediscussions,stats,andauthorprofilesforthispublicati.docxSeediscussions,stats,andauthorprofilesforthispublicati.docx
Seediscussions,stats,andauthorprofilesforthispublicati.docx
 
SEE YELLOW HIGHLIGHTED AREA BELOWPart 1.Laying the Foundat.docx
SEE YELLOW HIGHLIGHTED AREA BELOWPart 1.Laying the Foundat.docxSEE YELLOW HIGHLIGHTED AREA BELOWPart 1.Laying the Foundat.docx
SEE YELLOW HIGHLIGHTED AREA BELOWPart 1.Laying the Foundat.docx
 
See ENF450 Search Strategies and the Student Resources links and sup.docx
See ENF450 Search Strategies and the Student Resources links and sup.docxSee ENF450 Search Strategies and the Student Resources links and sup.docx
See ENF450 Search Strategies and the Student Resources links and sup.docx
 
Seed TagsCollect a variety of seed tags. Take photos of the .docx
Seed TagsCollect a variety of seed tags. Take photos of the .docxSeed TagsCollect a variety of seed tags. Take photos of the .docx
Seed TagsCollect a variety of seed tags. Take photos of the .docx
 
see videohttpsyoutu.be-O5gsF5oylsconsider how hist.docx
see videohttpsyoutu.be-O5gsF5oylsconsider how hist.docxsee videohttpsyoutu.be-O5gsF5oylsconsider how hist.docx
see videohttpsyoutu.be-O5gsF5oylsconsider how hist.docx
 
See Topic on the project 1 paperTarget- Casemanager and care.docx
See Topic on the project 1 paperTarget- Casemanager and care.docxSee Topic on the project 1 paperTarget- Casemanager and care.docx
See Topic on the project 1 paperTarget- Casemanager and care.docx
 
See attachments for information.Looking for assistance on an assig.docx
See attachments for information.Looking for assistance on an assig.docxSee attachments for information.Looking for assistance on an assig.docx
See attachments for information.Looking for assistance on an assig.docx
 

Recently uploaded

KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,Virag Sontakke
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupJonathanParaisoCruz
 

Recently uploaded (20)

KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized Group
 

Secure File SharingSecure File Sharing Using Access Contro.docx

  • 1. Secure File Sharing Secure File Sharing Using Access Control Raviprakash Ganji Computer Security Project: Secure File Sharing Using Access Control Name: Raviprakash Ganji Institution: New England College. Abstract Presently these day's sharing imperative documents are exceptionally unsafe. So, we have made a half and half answer for document stockpiling on the cloud. This is a propelled framework where User can choose a document from his telephone and enter a key for that record. For Uploading the File is broken in 2 separate chunks and these pieces are encoded by AES and DES calculation individually and after that, they have put away on the cloud server side. At that point client, 1 chooses another client with whom he will share the document to. Client 2 gets an SMS with Encrypted key. We will utilize Blowfish calculation for key Encryption. Client 2 will login into the application utilizing his accreditations. On the Home page, he can see every one of the documents shared to him. At the
  • 2. point when client endeavors to get to them, the application will check for the SMS automatically, and whenever scrambled SMS from the User 1 was discovered, Application will begin the unscrambling procedure. For decoding both the encoded records are unscrambled one by one and afterward combined. Secure File Sharing: Presentation Cloud storage framework system have been the source of captivation for the online clients to have simple access any place and whenever clients need. Numerous online specialist organizations have succeeded to serve the individual clients, industrialists just as the businessmen to have their information on cloud with dependability and security. The quantities of versatile users who need to utilize the assets or administrations in a haste with the assistance of their cell or mobile phones from cloud-based frameworks are quickly expanding. This way toward using the cloud assets for capacity and progress of information by multipurpose users is a testing task. The cloud environment given by the online providers co-ops can be in the sort of open, private or crossover cloud. The cloud client chooses the kind of cloud condition dependent on the clients' choice to security or introduction arrangement. Numerous IT giants are utilizing the cloud administrations to decrease the on premises the cost which is more prominent than they accommodate the online specialist organizations. The cloud framework given by various sellers shows the multiplicity as for execution and estimating. The plan strategies are differed to accomplish focused outcomes as far as proficient administration, decreased cost, verified information stockpiling. The general advantages of the cloud framework are simple sharing, matching up, off webpage information storing, better remote openness, decrease of inside IT costs, diminished necessity of assets and online information joint effort. The adaptable cloud framework diminishes the need to send each record and each opportunity to various beneficiaries; rather an entrance interface is sent which undoubtedly decreases the transmission capacity utilization. The
  • 3. yearly expenses for an association are diminished without the requirement for utilizing labor and assets because of the use of Mobile Cloud computing. Even though there are numerous benefits in utilizing the cloud framework, the traps of Secure file sharing using access control are that the client is charged intensely for each byte of information storing when the breaking point of certain limit is crossed and capacity of data in the cloud is powerless against outside hack assaults and dangers. The Mobile Cloud computing (MCC) has a few issues, for example, constrained assets, arrange related issues, security related issues, accessibility and protection issues. Limited Resources: The cell or mobile phones which make utilization of the distributed computing condition have limited assets for use such as battery usage and storing data. The controlled assets incorporate the restricted calculation control, low quality showcase the transfer speed of the system is the huge imperious because of the shortage of frequencies contrasted with the conventional wired system. Calculation offloading is one of the principle highlights of Mobile Cloud computing which manages the exchange of calculation parts of the application to cloud foundation. It is basic to decide if to offload the work or not and to settle on the segments of the administration codes to offload. Network Related Issues: In Secure file sharing, the portable client side preparing like, association with the web supplier and cloud server is performed on the remote system supplier side. Aside from the association issues, the system related issues like, inertness, flag quality and multiplicity likewise influence the portable clients in getting to cloud administrations. Security: Although the cell phones in the distributed computing condition has the functionalities like the work stations, the issues identified with security and protection are increasingly inclined to the cell phones. As the danger location administrations are performed on the cloud, the other security issues identified with cell phones presents extraordinary difficulties. Secure file sharing issues are sorted as security for
  • 4. multipurpose clients and verifying information on mists. Versatile client security includes the gadget security and protection of portable client. Verifying the information on the cloud includes the cryptographic suite, secrecy and uprightness. Availability: Accessibility of the files in cloud implies which administrations are to almost certainly get to remotely. In basic terms, accessibility alludes that total assets are available and usable at record-breaking by approved people. It is the most basic security prerequisites in portable distributed computing. The fundamental favorable position of accessibility for files in cloud frameworks is to guarantee the clients use them whenever and at wherever with the utmost security. The essential highlights of accessibility incorporate, progression, quality, episode the board, usefulness, and security. Congruity implies it guarantees that the administrations are accessible with no intrusions. The Quality of administrations implies it affirms the entrance time, a few bolstered clients, and measure of information handled. Framework accessibility is the capacity to proceed with tasks even in the likelihood of any security rupture, traffic clog, arrange disappointments and out-of-flag. Privacy: The trust of the file sharing using access key clients in the Mobile Cloud computing stage is built up by safeguarding the client security data like, area of the cell phone and shielding information or application mystery from enemies and other some hackers. Location Based Services (LBS) and Global Positioning System (GPS) are responsible for the security issues on mobile or work area clients which give the private information such as the current location and other history of locations of the mobile user. This problem is worse when any user’s information like, travel plan, business schedules and length of stay at a location is known to challenger. The paper proposes a productive and secure document sharing instrument through Trusted Third Party (TTP) framework which oversees key administration and client get to the board. The security of the versatile client is safeguarded by Trusted Third Party while getting to the cloud information
  • 5. storing. The security of the information put away and getting to rights are dictated by the proposed system to defeat the difficulties of the current consistent key cryptography. Whatever remains of the paper is sorted out and made them in 5 different sections. The prior works related with file sharing using frameworks are examined and the systems used to beat the issues are displayed in Section 2. The clear subtleties of the proposed information facilitating system are given in the Section 3. The test results dependent on the recreation and their relative examinations are given in Section 4. Ultimately, Section 5 abridges and gives the end to the work. Materials and Methods: In versatile distributed computing framework, a protected record sharing system using open key cryptography is proposed for cloud information stockpiling and recovery. The proposed document sharing system comprises of four substances as appeared in Figure 1. The elements in the proposed framework are information proprietor, information clients, confided in outsider framework and distributed storage. The Trusted Third Party (TTP) framework likewise goes about as the cryptographic server and key administration framework. file sharing using access works with Trusted Third Party has numerous duties, for example, proprietor the board, client the board, encryption, unscrambling and get to control. Trusted Third Party is the brought together expert for any document get to related exercises by the clients from the distributed storage. Information proprietor has the full authority over the record it claims, and no other client can adjust the document. The proprietor or Trusted Third Party controls the clients anytime of time. The information proprietor enrolls as a proprietor in the Trusted Third-Party framework for the record transfer. When proprietor enrollment is effectively finished, the Trusted Third- Party framework creates private key and open key for the document that have proprietors transfer. The transferred document is then encoded by Trusted Third Party framework utilizing private key and the scrambled record is transferred it to the distributed storage framework
  • 6. Key Generation and Encryption: At first, information proprietor must enlist in confided in outsider framework for keeping the records in secure phase with only one access key for the user. Information proprietors make the login qualifications for transferring documents and those certifications are additionally used to transfer the client records and their consents. In the wake of getting a specific document (F) from the information proprietor, the Trusted Third Party creates keys by utilizing Hilter Kilter key encryption. Hilter Kilter key age isn't examined in this paper and it is accepted that any standard uneven key age calculation (APKI) is used for this reason. The stream outline of the information proprietor presenting a record to the cloud storehouse through Trusted Third Party is appeared in In open public-private key pair, the private key (Kpr) created by Trusted Third-Party amid the hilter kilter key age is utilized for encryption of the record. The public key (Kpu) is isolated into two parts or parts by the Trusted Third Party and is utilized for unscrambling of the transferred record. One half or part of the open key is transmitted to the information proprietor (Ko) and the other half or part is kept by Trusted Third Party (KTTP) itself. The Trusted Third-Party framework which goes about as a cryptographic server erases the private key through secure overwriting of one portion of the open key over it after the record is transferred in the cloud framework. The encoded record (Fen) is then sending to the cloud vault for capacity. Diagram demonstrates the documentations and its definitions utilized in the proposed approach. Documentations and definitions utilized in the proposed model for security using for sharing file. Notations Definitions
  • 7. F Data file Klength Key length APKI Public Key Infrastructure Algorithm Kpr Private key Kpu Public key KTrusted Third Party Trusted Third Party’s part of Public Key Ko Owner’s part of Public Key Fen Encrypted file Khalf Value of half of the key length FID File Identification Ulist User list UAPL User Access Permission List Decryption of File: The information proprietor gives client list/get to consent list (UAPL), client explicit security questions and replies, number of documents get to authorization to the Trusted Third-Party server. The information proprietor welcomes every one of the clients given in the entrance control list with the connection to the Trusted Third Party and half or part of proprietor's open key for self-enrollment. At the point when a client needs to get to the transferred document in the cloud, the client at first registers with the Trusted Third Party. When client enrollment is finished, the client gets login. accreditations from the Trusted Third Party. After fruitful confirmation among Trusted Third Party and asking for client, the client ask for any document through File Identification (FID) alongside the piece of the open key gave to it by the information proprietor. Trusted Third Party approves the client get to consent for that asked for record. The Trusted Third Party recovers the open key by joining its own half or part of the open key and the got half or part of the open key from the client. In
  • 8. the in the interim, the Trusted Third Party downloads the asked for record in the encoded structure from the cloud information stockpiling. The downloaded document is then unscrambled utilizing the recovered open key. The decoded information record is sent back to the comparing client from Trusted Third Party as appeared. File Access and Data Owner: At the point when another client wishes to get to the record, it sends joining demand message to the information proprietor. The information proprietor includes the subtleties of the recently arrived client in the Access Permission List (APL) and sends the refreshed APL to Trusted Third Party. The Trusted Third Party in the wake of checking the qualifications of the information proprietor refreshes the APL by safely overwriting the entrance control list for the information proprietor's record. Simultaneously, the information proprietor gives the half of proprietor's open key and connection for getting to the document through Trusted Third Party to the recently joined client. The verified client who wishes to alter and transfer the got to document needs to wind up the information proprietor or high advantaged client of that changed record. The client who needs to alter the document enlists as proprietor in Trusted Third Party and transfer the adjusted record in the cloud as another name through Trusted Third Party. For each record put away in the cloud, one client in the gathering is information proprietor others are information getting to clients. Implementation Details: The proposed system is executed in cloud condition with the assistance of JAVA innovation. As a piece of the usage, self-enlistment User Interface (UI) for record proprietors is created. In the UI, a record proprietor enlists in the Trusted Third Party (TTP) framework and setup the certifications. After the effective enrollment, the proprietor can setup client records, client subtleties and their entrance consents in Trusted Third Party through UI. An element is created in Trusted Third Party to play out the setup as a mass transfer just as individual client creation. When the clients are
  • 9. added to Trusted Third Party, they get a welcome from the Trusted Third Party/Owner. The Trusted Third-Party logon certifications are setup by adhering to the guidelines in the welcome that is send to the client. Trusted Third Party utilizes the proposed hilter kilter key encryption technique for verifying the records in cloud condition. In the execution of the proposed system, RSA calculation is utilized for key age and encryption. Trusted Third Party utilizes one of the keys (private key) for encryption of the document and the key is safely erased (over compose). The open key is part into two sections with the assistance of mystery sharing calculation. The Trusted Third Party keeps half of the open key and the other half shared to the proprietor. In the wake of sharing the proprietor's bit of the open key, Trusted Third Party safely erases (over composes) it from store. The proprietor shares the open key part to the required clients. The clients get to the Trusted Third Party and demand for a record alongside the relating key part. Trusted Third Party approves the client consents and remakes the open key. Trusted Third Party downloads the encoded document from the distributed storage and unscramble it with the remade open key. The decoded record is shared to the asked for client. When the procedure is finished, Trusted Third Party erases the remade open key and the unscrambled record. In Public Key Infrastructure (PKI), the ordinarily utilized key age calculations for producing open key and private key are Rivest, Shamir and Adleman (RSA), Diffie-Hellman (DH) and Digital Signature Algorithm (DSA). The proposed key administration procedure including key age, encryption and decoding is tried in Intel i3 processor of 1.4 GHz with 4 GB of RAM. The execution of the distinctive PKI calculations like, RSA, ElGamal and Paillier Algorithms29,30 are looked at for the procedure of encryption, unscrambling, CPU use and memory use. Encryption and Decryption Process: Encryption and Decryption in cryptography instrument are the fundamental components for building up security in distributed computing condition. The encryption and decoding process is performed in PKI through
  • 10. RSA, ElGamal and Paillier calculations. The correlation of the PKI calculations as far as time utilization amid the procedure of encryption and decoding when 10 KB record is utilized features that RSA performs better as appeared in Figure 5. Be that as it may, the RSA calculation debases in its execution amid the encryption of extensive records in the request of many MB estimate. In any case, ElGamal and Paillier are demonstrated for its utilization in scrambling substantial size documents. The examination of both ElGamal and Paillier displays their execution similarly when the proposed system of key administration is used . Time ingesting for encryption and decryption process by key group algorithms using the projected methodology. Flow diagram of the data owner process in the proposed methodology. Conclusion: security for the record access and protection for the clients from vindictive insiders in Secure File Sharing Using Access Control. The classification and trustworthiness of the put away and recovered document is safeguarded through the proposed record sharing instrument such as unique keys. The gathering client get to the board, key administration, encryption and unscrambling of documents are performed through believed outsider to make the information verified in portable cloud condition. The relative examination of various PKI calculations utilizing the proposed technique for key calculation, encryption, decoding and asset usage demonstrates that RSA calculation performs well in dealing with little record sizes while, ElGamal and Paillier algorithms are progressively reasonable for bigger documents to be put away in distributed storage Secure File Sharing Using Access Control
  • 11. Reference: 1. Khan AN, Mat Kiah ML, Khan SU, Madani SA. Towards secure Mobile Cloud computing: A survey. Futur Gener Comput Syst. 2013; 29(5):1278–99. 2. Kumar R, Rajalakshmi S. Mobile Cloud computing: Standard approach to protecting and securing of mobile cloud ecosystems. Proceedings of International Conference on Computer Sciences and Applications; 2013. p. 663–9. Vol 9 (48) | December 2016 | www.indjst.org Indian J 8 ournal of Science and Technology Secure File Sharing Mechanism and Key Management for Mobile Cloud computing Environment 3. Uddin M, Memon J, Alsaqour R, Shah A, Rozan MZA. Mobile agent based multi-layer security framework for cloud data centers. Indian Journal of Science and Technology. 2015 Jun; 8(12):171–8. 4. Rajathi A, Saravanan N. A survey on secure storage in cloud computing. Indian Journal of Science and Technology. 2013 Apr; 6(4):1–6. 5. Lee JY. A study on the use of secure data in cloud storage for
  • 12. collaboration. Indian Journal of Science and Technology. 2015 Mar; 8(S5):33–6. 6. Grobauer B, Walloschek T, Stocker E. Understanding cloud computing vulnerabilities. IEEE Secur Priv. 2011; 9(2):50– 7. 7.Cisco Visual Networking Index. Available from: http:// www.cisco.com/c/en/us/solutions/collateral/service-provider/ visual-networking-index-vni/mobile-white-paper- c11- 520862.pdf 8. Sanaei Z, Abolfazli S, Gani A, Shiraz M. SAMI: Service- based arbitrated multi-tier infrastructure for Mobile Cloud computing. Proceedings of 1st IEEE International Conference on Communications in China Workshops; 2012. p. 14–9. 9. Kalpana V, Meena V. Study on data storage correctness methods in Mobile Cloud computing. Indian Journal of Science and Technology. 2015 Mar; 8(6):495–500. 10. Mishra A, Jain R, Durresi A. Cloud computing: Networking and communication challenges. IEEE Communications Magazine. 2012; 50(9):24–5. Secure File Sharing Secure File Sharing Using Access Control Raviprakash Ganji Computer Security Project: Secure File Sharing Using Access Control Your Name: Raviprakash Ganji Institution: New England College. Abstract Presently these day's sharing imperative documents are
  • 13. exceptionally unsafe. So, we have made a half and half answer for document stockpiling on the cloud. This is a propelled framework where User can choose a document from his telephone and enter a key for that record. For Uploading the File is broken in 2 separate chunks and these pieces are encoded by AES and DES calculation individually and after that, they have put away on the cloud server side. At that point client, 1 chooses another client with whom he will share the document to. Client 2 gets an SMS with Encrypted key. We will utilize Blowfish calculation for key Encryption. Client 2 will login into the application utilizing his accreditations. On the Home page, he can see every one of the documents shared to him. At the point when client endeavors to get to them, the application will check for the SMS automatically, and whenever scrambled SMS from the User 1 was discovered, Application will begin the unscrambling procedure. For decoding both the encoded records are unscrambled one by one and afterward combined. 1.Secure File Sharing 1. Introduction Cloud storage systems have been the source of attraction for the online users to have easy access anywhere and anytime. Many online service providers have thrived to serve the individual users, industrialists as well as the business people to have their data on cloud with reliability and security. The numbers of mobile users who need to use the resources or services on the go with the help of their mobile devices from cloud-based systems are rapidly increasing. The process of utilizing the cloud resources for storage and transition of data by mobile users is a challenging task1–5. The cloud environment provided by the online service providers can be in the type of public, private or hybrid cloud. The cloud user selects the type of cloud environment based on the users’ decision to privacy or exposure policy. Many IT giants are using the cloud services to reduce the on-premises cost which is greater than they provide for the online service providers. The cloud system provided by different vendors exhibits the heterogeneity with respect to performance and pricing. The
  • 14. design techniques are varied to achieve competitive results in terms of efficient service, reduced cost, secured data storage. The overall benefits of the cloud system are easy sharing, syncing, off-site data storage, better remote accessibility, reduction of internal IT costs, reduced requirement of resources and online data collaboration. Mobile Cloud Computing (MCC) is the combined approach of the technologies namely, cloud computing, mobile computing, and wireless networks for sharing resources to mobile users. The MCC is used to bring rich computational resources to mobile networks and differentiates from the mobile computing by using the cloud-based web apps rather than the native apps. In MCC, mobile devices are used to view the data files as the storage of data and processing of data is done in the cloud infrastructure instead of the mobile device itself. The mobile thin native client devices in cloud computing environment are accessed over the wireless connection. The mobile applications accessed from the thin client devices often move the storage and processing of data into the powerful and centralized cloud computing infrastructure. Moreover, mobile app storage constraint is eliminated as data is stored in cloud rather than the mobile devices. As the data is stored or synced in the cloud storage, the chance of data lost is reduced on the mobile devices which indeed improve the reliability and availability of data while the users are on move. MCC supports multi-tenancy and ease of integration of multiple services provided by different cloud service providers. Cloud based applications are predicted to account for 90% of total mobile data traffic by 2019. Mobile cloud traffic is predicted by CISCO7 to grow 11-fold from 2014 to 2019, attaining a composite annual growth rate is (CAGR) of 60%. The mobile cloud system reduces the need to send each file every time to different recipients; instead an access link is sent which indeed reduces the bandwidth usage. The annual costs for
  • 15. an organization are reduced largely without the need for employing manpower and resources due to the usage of MCC. Though there are many merits in using the cloud system, the pitfalls of MCC is that the user is charged heavily for every byte of data storage when the limit of certain capacity is crossed and storage of information in the cloud is vulnerable to external hack attacks and threats. The MCC has several issues such as limited resources, network related issues, security, availability and privacy. • Limited Resources: The mobile devices which make use of the cloud computing environment have limited resources for utilization. The limited resources include the limited computation power, low quality display and limited battery power. The bandwidth of the network is the big constraint due to the scarcity of frequencies compared to the traditional wired network. Computation offloading is one of the main features of MCC which deals with the transfer of computation parts of the application to cloud infrastructure. It is critical to determine whether to offload the work or not and to decide on the portions of the service codes to offload. • Network Related Issues: In MCC, the mobile user side processing like, connection with the internet provider and cloud server is performed on the wireless network provider side. Apart from the connection issues, the network related problems like, latency, signal strength and heterogeneity also affects the mobile users in accessing cloud services. • Security: Though the mobile devices in the cloud computing environment has the functionalities similar to the desktop computers, the issues related to security and privacy are more prone to the mobile devices. As the threat detection services are performed on the cloud, the other security issues related to mobile devices
  • 16. poses great challenges. MCC security issues are categorized as security for mobile users and securing data on clouds. Mobile user security involves the device security and privacy of mobile user. Securing the data on the cloud involves the cryptographic suite, confidentiality and integrity. • Availability: Availability of the cloud means which services are to be able to access remotely. In simple terms, availability refers that complete resources are accessible and usable at all time by authorized persons. It is the most critical security requirements in mobile cloud computing. The main advantage of availability for cloud systems is to ensure the users use them at any time and at any place. The important features of availability include, continuity, quality, incident management, functionality, and security. Continuity means it ensures that the services are available without any interruptions. The Quality of services means it confirms the access time, several supported users, and amount of data processed. System availability is the ability to continue operations even in the possibility of any security breach, traffic congestion, network failures and out-of-signal. • Privacy: The trust of the mobile users in MCC platform is established by preserving the user privacy information like, location of the mobile device and protecting data or application secrecy from adversaries. Location Based Services (LBS) and Global Positioning System (GPS) are accountable for the privacy issues on mobile or desktop users which provide the private information such as the current location and other history of locations of the mobile user. This problem is worse when any user’s information like, travel plan, business schedules and length of stay at a location is known to challenger. The paper proposes an efficient and secure file sharing mechanism through Trusted Third Party (TTP) system which is
  • 17. responsible for key management and user access management. The privacy of the mobile user is preserved by TTP while accessing the cloud data storage. The security of the data stored and accessing rights are determined by the proposed methodology to overcome the setbacks of the existing symmetric key cryptography. The rest of the paper is organized and made them in 5 sections. The earlier works associated with cloud storage systems are discussed and the methodologies used to overcome the problems are presented in Section 2. The descriptive details of the proposed data hosting technique are given in the Section 3. The experimental results based on the simulation and their comparative analyses are provided in Section 4. Lastly, Section 5 summarizes and gives the conclusion to the work. 2. Materials and Methods: In mobile cloud computing infrastructure, a secure file sharing mechanism utilizing public key cryptography is proposed for cloud data storage and retrieval. The proposed file sharing methodology consists of four entities as shown in Figure 1. The entities in the proposed system are data owner, data users, trusted third party system and cloud storage. The Trusted Third Party (TTP) system also acts as the cryptographic server and key management system. TTP has multiple responsibilities such as, owner management, user management, encryption, decryption and access control. TTP is the centralized authority for any file access related activities by the users from the cloud storage. Data owner has the full control over the file it owns, and no other user can modify the file. The owner or TTP controls the users at any point of time. The data owner registers as an owner in the TTP system for the file upload. Once owner registration is successfully completed, the TTP system generates private key and public key for the file that have owners upload. The uploaded file is then encrypted by TTP system using private key and the encrypted file is uploaded it to
  • 18. the cloud storage system. Figure 1. Block diagram of the proposed file sharing methodology. 2.1 Key Generation and Encryption: Initially, data owner must register in trusted third-party system for keeping the files in cloud environment. Data owners create the login credentials for uploading files and those credentials are also used to upload the user lists and their permissions. After receiving a particular file (F) from the data owner, the TTP generates keys by using asymmetric key encryption. Asymmetric key generation is not discussed in this paper and it is assumed that any standard asymmetric key generation algorithm (APKI) is utilized for this purpose. The flow diagram of the data owner submitting a file to the cloud repository through TTP is shown in Figure 2. 2. Flow diagram of the data owner process in the proposed method. In public-private key pair, the private key (Kpr) generated by TTP during the asymmetric key generation is used for encryption of the file. The public key (Kpu) is divided into two halves or parts by the TTP and is used for decryption of the uploaded file. One half or part of the public key is transmitted to the data owner (Ko) and the other half or part is kept by TTP (KTTP) itself. The TTP system which acts as a cryptographic server deletes the private key through secure overwriting of one half of the public keyover it after the file is uploaded in the cloud system. The encrypted file (Fen) is then sending to the cloud repository for storage. Table 1 shows the notations and its definitions used in the proposed methodology. Table 1. Notations and definitions used in the proposed model Notations Definitions F Data file
  • 19. Klength Key length APKI Public Key Infrastructure Algorithm Kpr Private key Kpu Public key KTTP TTP’s part of Public Key Ko Owner’s part of Public Key Fen Encrypted file Khalf Value of half of the key length FID File Identification Ulist User list UAPL User Access Permission List 2.2 Decryption of File: The data owner provides user list/access permission list (UAPL), user specific security questions and answers, number of file access permission to the TTP server. The data owner invites all the users given in the access control list with the link to the TTP and half or part of owner’s public key for self- registration. When a user wants to access the uploaded file in the cloud, the user initially registers with the TTP. Once user registration is completed, the user gets login credentials from the TTP. After successful authentication between TTP and requesting user, the user request any file through File Identification (FID) along with the part of the public key provided to it by the data owner. TTP validates the user access permission for that requested file. The TTP regenerates the public key by combining its own half or part of the public key and the received half or part of the public key from the user. In the meanwhile, the TTP downloads the requested file in the encrypted form from the cloud data storage. The downloaded file is then decrypted using the regenerated public key. The decrypted data file is sent back to the corresponding user from TTP as shown in Figure 3.
  • 20. 2.3 File Access and Data Owner: When a new user wishes to access the file, it sends joining request message to the data owner. The data owner adds the details of the newly arrived user in the Access Permission List (APL) and sends the updated APL to TTP. The TTP after verifying the credentials of the data owner updates the APL by securely overwriting the access control list for the data owner’s file. Concurrently, the data owner provides the half of owner’s public key and link for accessing the file through TTP to the newly joined user. The authenticated user who wishes to modify and upload the accessed file needs to become the data owner or high privileged user of that modified file. The user who needs to modify the file registers as owner in TTP and upload the modified file in the cloud as another name through TTP. For each file stored in the cloud, one user in the group is data owner others are data accessing users. 2.4 Implementation Details: The proposed mechanism is implemented in cloud environment with the help of JAVA technology. As a part of the implementation, self-registration User Interface (UI) for file owners is developed. In the UI, a file owner registers in the Trusted Third Party (TTP) system and setup the credentials. After the successful registration, the owner can setup user lists, user details and their access permissions in TTP through UI. A feature is developed in TTP to perform the setup as a bulk upload as well as individual user creation. Once the users are added to TTP, they get an invite from the TTP/Owner. The TTP logon credentials are setup by following the instructions in the invite that is send to the user. TTP uses the proposed asymmetric key encryption method for securing the files in cloud environment. In the implementation of the proposed mechanism, RSA algorithm is used for key generation and encryption. TTP uses one of the keys (private key) for encryption of the file and the key is securely deleted (over write). The public key is split into two parts with the help of
  • 21. secret sharing algorithm. The TTP keeps half of the public key and the other half shared to the owner. After sharing the owner’s portion of the public key, TTP securely deletes (over writes) it from repository. The owner shares the public key portion to the required users. The users access the TTP and request for a file along with the corresponding key portion. TTP validates the user permissions and reconstructs the public key. TTP downloads the encrypted file from the cloud storage and decrypt it with the reconstructed public key. The decrypted file is shared to the requested user. Once the process is completed, TTP deletes the reconstructed public key and the decrypted file. In Public Key Infrastructure (PKI), the commonly used key generation algorithms for generating public key and private key are Rivest, Shamir and Adleman (RSA), Diffie-Hellman (DH) and Digital Signature Algorithm (DSA). The proposed key management methodology including key generation, encryption and decryption is tested in Intel i3 processor of 1.4 GHz with 4 GB of RAM. The performance of the different PKI algorithms like, RSA, ElGamal and Paillier Algorithms29,30 are compared for the process of encryption, decryption, CPU usage and memory usage. Encryption and Decryption Process: Encryption and Decryption in cryptography mechanism are the vital elements for establishing security in cloud computing environment. The encryption and decryption process is performed in PKI through RSA, ElGamal and Paillier algorithms. The comparison of the PKI algorithms in terms of time consumption during the process of encryption and decryption when 10 KB file is used highlights that RSA performs better as shown in Figure 5. However, the RSA algorithm degrades in its performance during the encryption of large files in the order of hundreds of MB size. But ElGamal and Paillier are proved for its usage in encrypting large size files. The comparison of both ElGamal and Paillier exhibits their performance equally when the proposed methodology of
  • 22. key management is utilized. Time consumption for encryption and decryption process by key generation algorithms using the proposed methodology. Memory usage by different PKI algorithms using the proposed methodology Conclusion: Mobile cloud computing has become an inevitable part in the recent business and administrative environment. The proposed secure file sharing mechanism for accessing cloud data storage ensures security and privacy for group user access. Trusted third party plays the main role in protecting the security for the file access and privacy for the users from malicious insiders in cloud environment. The confidentiality and integrity of the stored and retrieved file is preserved through the proposed file sharing mechanism. The group user access management, key management, encryption and decryption of files are performed through trusted third party to make the data secured in mobile cloud environment. The comparative analysis of different PKI algorithms using the proposed methodology for key computation, encryption, decryption and resource utilization shows that RSA algorithm performs well in handling small file sizes whereas, ElGamal and Paillier algorithms are more suitable for larger files to be stored in cloud storage. References: 1. Khan AN, Mat Kiah ML, Khan SU, Madani SA. Towards secure mobile cloud computing: A survey. Futur Gener Comput Syst. 2013; 29(5):1278–99. 2. Kumar R, Rajalakshmi S. Mobile cloud computing: Standard approach to protecting and securing of mobile cloud ecosystems. Proceedings of International Conference on Computer Sciences and Applications; 2013. p. 663–9. Vol 9 (48) | December 2016 | www.indjst.org Indian J 8 ournal of
  • 23. Science and Technology Secure File Sharing Mechanism and Key Management for Mobile Cloud Computing Environment 3. Uddin M, Memon J, Alsaqour R, Shah A, Rozan MZA. Mobile agent based multi-layer security framework for cloud data centers. Indian Journal of Science and Technology. 2015 Jun; 8(12):171–8. 4. Rajathi A, Saravanan N. A survey on secure storage in cloud computing. Indian Journal of Science and Technology. 2013 Apr; 6(4):1–6. 5. Lee JY. A study on the use of secure data in cloud storage for collaboration. Indian Journal of Science and Technology. 2015 Mar; 8(S5):33–6. 6. Grobauer B, Walloschek T, Stocker E. Understanding cloud computing vulnerabilities. IEEE Secur Priv. 2011; 9(2):50– 7. 7. Cisco Visual Networking Index. Available from: http:// www.cisco.com/c/en/us/solutions/collateral/service-provider/ visual-networking-index-vni/mobile-white-paper- c11- 520862.pdf 8. Sanaei Z, Abolfazli S, Gani A, Shiraz M. SAMI: Service- based arbitrated multi-tier infrastructure for mobile cloud computing. Proceedings of 1st IEEE International Conference on Communications in China Workshops; 2012. p. 14–9. 9. Kalpana V, Meena V. Study on data storage correctness methods in mobile cloud computing. Indian Journal of Science and Technology. 2015 Mar; 8(6):495–500. 10. Mishra A, Jain R, Durresi A. Cloud computing: Networking and communication challenges. IEEE Communications Magazine. 2012; 50(9):24–5.