SlideShare a Scribd company logo
1 of 7
Efficient Security Solution for Privacy-Preserving
Cloud Services
Abstract:
In this paper, we present a novel privacy-preserving security solution for cloud
services. We deal with user anonymous access to cloud services and shared storage
servers. Our solution provides registered users with anonymous access to cloud
services. Our solution offers anonymous authentication. This means that users’
personal attributes (age, valid registration, successful payment) can be proven
without revealing users’ identity. Thus, users can use services without any threat of
profiling their behavior. On the other hand, if users break provider’s rules,
their access rights are revoked. We analyze current privacy preserving solutions for
cloud services and outline our solution based on advanced cryptographic
components. Our solution offers anonymous access, unlink ability and the
confidentiality of transmitted data. Moreover, we implement our solution and we
output the experimental results and compare the performance with related
solutions.
Existing system:
Users, who store their sensitive information like financial information, health
records, etc., have a fundamental right of privacy. There are few cryptographic
tools and schemes like anonymous authentication schemes, group signatures, zero
knowledge protocols that can both hide user identity and provide authentication.
The providers of cloud services need to control the authentication process to permit
the access of only valid clients to their services.
Disadvantages of Existing system:
Further, they must be able to revoke malicious clients and reveal their identities. In
practice, hundreds of users can access cloud services at the same time. Hence, the
verification process of user access must be as efficient as possible and the
computational cryptographic overhead must be minimal. These solutions and
provide privacy-preserving public audit but do not offer the anonymous access of
users to cloud services.
Proposed system:
We propose a novel security solution for cloud services that offers anonymous
authentication. We aim mainly on the efficiency of the authentication process and
user privacy. Our solution also provides the confidentiality and integrity of
transmitted data between users and cloud service providers .Moreover, we
implement our solution as a proof-of-concept application and compare the
performance of our solution with related schemes. Our results show that our
solution is more efficient than the related solutions.
Advantages:
Analyze current privacy preserving solutions for cloud services and outline our
solution based on advanced cryptographic components. Our solution offers
anonymous access, unlink ability and the confidentiality of transmitted data.
Moreover, we implement our solution and we output the experimental results and
compare the performance with related solutions.
Architecture Diagram:
Implementation Modules:
1. System Model
2. Requirements
3. Cryptography Used
4. Proposed Protocol
System Model:
Our solution consists of three fundamental parties:
Cloud Service Provider (CSP)
CSP manages cloud services and shared storages. CSP is usually a company
which behaves as a partly trusted party. CSP provides cloud services, authenticates
users when they access a cloud service. CSP also issues access attributes to users.
Nevertheless, when CSP needs to revoke and identify a malicious user then CSP
must collaborate with a revocation manager.
Revocation Manager (RM).
RM is a partly trusted party, e.g. government authority, who decides if the
revocation of a user identity is rightful or not. Only the cooperation between CSP
and RM can reveal the user identity. RM also cooperates with CSP during user
registration when the user’s access attributes are issued.
User (U).
U is an ordinary customer who accesses into a cloud and uses cloud services,
shared storages, etc. Users are anonymous if they properly follow the rules of CSP.
To increase security, users use tamper-resistant devices or protected local storages.
Requirements:
Our solution provides the following security requirements:
Anonymity. Every honest user stays anonymous when uses cloud services. User
identities are hidden if users behave honestly and do not break rules.
Confidentiality . Every user’s session to CSP is confidential. No one without a
secret session key is able to obtain data transmitted between U and CSP.
Integrity. Data sent in user’s session cannot be modified without a secret session
key.
Unlink ability. The user’s sessions to cloud services are unlink able. No one
besides CSP collaborating with RM is able to link two or more sessions between a
certain U and CSP.
Un traceability. Other users are unable to trace user’s authentication and concrete
users’ communication.
Revocation. Every user can be revoked by the collaboration of CSP and RM.
Cryptography Used:
In our solution, we use discrete logarithm commitments described in prior work .
Further, the solution employs _-protocols to prove of discrete logarithm
knowledge, representation and equivalence. To revoke a user, we use the
Okamoto-Uchiyama Trapdoor One-Way Function described in .For more details
about the used basic cryptographic blocks see prior works .
Proposed Protocol:
Our protocol consists of five phases: initialization, registration, anonymous access,
secure communication and revocation. The basic principle of the proposed protocol
.
1) Initialization:
The initialization phase is run by Cloud Service Provider (CSP) and Revocation
Manager (RM).CSP generates a group H defined by a large prime modulus p,
generators h1; h2 of prime order q and q .CSP generates a RSA key pair and stores
own private key KCSP .
2) Registration:
In the registration phase, a user registers and requests a user master key which they
use in anonymous access to cloud services. Firstly, U must physically register on
CSP. CSP checks user’s ID. This device which stores the user secret key should be
also protected against a key estimation by side channel attacks, such as in [23].
Further, U cannot make own user master key because only RM knows KRK. Any
honest user can repeat the request for the user master key or demand other
authentication proofs if CSP agrees with that.
3) Anonymous Access:
In this phase, the i- th user Ui anonymously accesses Cloud Service Provider
(CSP). This phase consists of two-messages used to authenticate Ui and
establish a secret key between Ui and CSP.
4) Secure Communication:
If the anonymous access phase is successful, the user Ui can upload and download
data from CSP. Data confidentiality and integrity are secured by a symmetric
cipher. We propose to use AES which is well know cipher and is supported by
many types of software and hardware platforms. To encrypt and decrypt
transmitted data, Ui and CSP use the AES secret key K sym established in the
previous phase.
5) Revocation:
Depending on the case of rule breaking, the revocation phase can revoke a user
and/or user anonymity. If users misuse a cloud service, they get revoked by
RM. Because RM knows the factorization of n, RM is able to extract w RM.
Algorithms:
1.Encryption algorithm.
2.Decryption algorithm.
3. Proposed Protocol.
System Configuration:
HARDWARE REQUIREMENTS:
Hardware - Pentium
Speed - 1.1 GHz
RAM - 1GB
Hard Disk - 20 GB
Floppy Drive - 1.44 MB
Key Board - Standard Windows Keyboard
Mouse - Two or Three Button Mouse
Monitor - SVGA
SOFTWARE REQUIREMENTS:
Operating System : Windows
Technology : Java and J2EE
Web Technologies : Html, JavaScript, CSS
IDE : My Eclipse
Web Server : Tomcat
Tool kit : Android Phone
Database : My SQL
Java Version : J2SDK1.5

More Related Content

What's hot

Control cloud-data-access-privilege-and-anonymity-with-fully-anonymous-attrib...
Control cloud-data-access-privilege-and-anonymity-with-fully-anonymous-attrib...Control cloud-data-access-privilege-and-anonymity-with-fully-anonymous-attrib...
Control cloud-data-access-privilege-and-anonymity-with-fully-anonymous-attrib...Pvrtechnologies Nellore
 
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...Editor IJCATR
 
CONTROL CLOUD DATA ACCESS PRIVILEGE AND ANONYMITY WITH FULLY ANONYMOUS ATTRIB...
CONTROL CLOUD DATA ACCESS PRIVILEGE AND ANONYMITY WITH FULLY ANONYMOUS ATTRIB...CONTROL CLOUD DATA ACCESS PRIVILEGE AND ANONYMITY WITH FULLY ANONYMOUS ATTRIB...
CONTROL CLOUD DATA ACCESS PRIVILEGE AND ANONYMITY WITH FULLY ANONYMOUS ATTRIB...Shakas Technologies
 
privacy preserving abstract
 privacy preserving abstract privacy preserving abstract
privacy preserving abstractmuhammed jassim k
 
Vtu network security(10 ec832) unit 1 notes
Vtu network security(10 ec832) unit 1 notesVtu network security(10 ec832) unit 1 notes
Vtu network security(10 ec832) unit 1 notesJayanth Dwijesh H P
 
Public integrity auditing for shared dynamic cloud data with group user revoc...
Public integrity auditing for shared dynamic cloud data with group user revoc...Public integrity auditing for shared dynamic cloud data with group user revoc...
Public integrity auditing for shared dynamic cloud data with group user revoc...Pvrtechnologies Nellore
 
Secure Data Storage and Forwarding in Cloud Using AES and HMAC
Secure Data Storage and Forwarding in Cloud Using AES and HMACSecure Data Storage and Forwarding in Cloud Using AES and HMAC
Secure Data Storage and Forwarding in Cloud Using AES and HMACIRJET Journal
 
Enabling Secure Data Sharing Scheme in the Cloud Storage Groups
Enabling Secure Data Sharing Scheme in the Cloud Storage GroupsEnabling Secure Data Sharing Scheme in the Cloud Storage Groups
Enabling Secure Data Sharing Scheme in the Cloud Storage GroupsIRJET Journal
 
Attribute Based Encryption with Privacy Preserving In Clouds
Attribute Based Encryption with Privacy Preserving In Clouds Attribute Based Encryption with Privacy Preserving In Clouds
Attribute Based Encryption with Privacy Preserving In Clouds Swathi Rampur
 
USER-DEFINED PRIVACY GRID SYSTEM FOR CONTINUOUS LOCATION-BASED SERVICES - IEE...
USER-DEFINED PRIVACY GRID SYSTEM FOR CONTINUOUS LOCATION-BASED SERVICES - IEE...USER-DEFINED PRIVACY GRID SYSTEM FOR CONTINUOUS LOCATION-BASED SERVICES - IEE...
USER-DEFINED PRIVACY GRID SYSTEM FOR CONTINUOUS LOCATION-BASED SERVICES - IEE...Nexgen Technology
 
Access Policy Management For OSN Using Network Relationships
Access Policy Management For OSN Using Network RelationshipsAccess Policy Management For OSN Using Network Relationships
Access Policy Management For OSN Using Network RelationshipsIJMTST Journal
 
Control cloud data access privilege and
Control cloud data access privilege andControl cloud data access privilege and
Control cloud data access privilege andjpstudcorner
 
CONTROL CLOUD DATA ACCESS PRIVILEGE AND ANONYMITY WITH FULLY ANONYMOUS ATTRIB...
CONTROL CLOUD DATA ACCESS PRIVILEGE AND ANONYMITY WITH FULLY ANONYMOUS ATTRIB...CONTROL CLOUD DATA ACCESS PRIVILEGE AND ANONYMITY WITH FULLY ANONYMOUS ATTRIB...
CONTROL CLOUD DATA ACCESS PRIVILEGE AND ANONYMITY WITH FULLY ANONYMOUS ATTRIB...Nexgen Technology
 
IRJET- Data Centric Access Control Solution with Role baesd Proxy Re-Encryption
IRJET- Data Centric Access Control Solution with Role baesd Proxy Re-EncryptionIRJET- Data Centric Access Control Solution with Role baesd Proxy Re-Encryption
IRJET- Data Centric Access Control Solution with Role baesd Proxy Re-EncryptionIRJET Journal
 
Circuit Ciphertext-policy Attribute-based Hybrid Encryption with Verifiable D...
Circuit Ciphertext-policy Attribute-based Hybrid Encryption with Verifiable D...Circuit Ciphertext-policy Attribute-based Hybrid Encryption with Verifiable D...
Circuit Ciphertext-policy Attribute-based Hybrid Encryption with Verifiable D...1crore projects
 
Audit free cloud storage via deniable attribute-based encryption
Audit free cloud storage via deniable attribute-based encryptionAudit free cloud storage via deniable attribute-based encryption
Audit free cloud storage via deniable attribute-based encryptionPvrtechnologies Nellore
 
Certificate less key management scheme in
Certificate less key management scheme inCertificate less key management scheme in
Certificate less key management scheme inIJNSA Journal
 

What's hot (19)

Control cloud-data-access-privilege-and-anonymity-with-fully-anonymous-attrib...
Control cloud-data-access-privilege-and-anonymity-with-fully-anonymous-attrib...Control cloud-data-access-privilege-and-anonymity-with-fully-anonymous-attrib...
Control cloud-data-access-privilege-and-anonymity-with-fully-anonymous-attrib...
 
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
 
CONTROL CLOUD DATA ACCESS PRIVILEGE AND ANONYMITY WITH FULLY ANONYMOUS ATTRIB...
CONTROL CLOUD DATA ACCESS PRIVILEGE AND ANONYMITY WITH FULLY ANONYMOUS ATTRIB...CONTROL CLOUD DATA ACCESS PRIVILEGE AND ANONYMITY WITH FULLY ANONYMOUS ATTRIB...
CONTROL CLOUD DATA ACCESS PRIVILEGE AND ANONYMITY WITH FULLY ANONYMOUS ATTRIB...
 
If3614251429
If3614251429If3614251429
If3614251429
 
privacy preserving abstract
 privacy preserving abstract privacy preserving abstract
privacy preserving abstract
 
Vtu network security(10 ec832) unit 1 notes
Vtu network security(10 ec832) unit 1 notesVtu network security(10 ec832) unit 1 notes
Vtu network security(10 ec832) unit 1 notes
 
Public integrity auditing for shared dynamic cloud data with group user revoc...
Public integrity auditing for shared dynamic cloud data with group user revoc...Public integrity auditing for shared dynamic cloud data with group user revoc...
Public integrity auditing for shared dynamic cloud data with group user revoc...
 
Secure Data Storage and Forwarding in Cloud Using AES and HMAC
Secure Data Storage and Forwarding in Cloud Using AES and HMACSecure Data Storage and Forwarding in Cloud Using AES and HMAC
Secure Data Storage and Forwarding in Cloud Using AES and HMAC
 
Enabling Secure Data Sharing Scheme in the Cloud Storage Groups
Enabling Secure Data Sharing Scheme in the Cloud Storage GroupsEnabling Secure Data Sharing Scheme in the Cloud Storage Groups
Enabling Secure Data Sharing Scheme in the Cloud Storage Groups
 
Attribute Based Encryption with Privacy Preserving In Clouds
Attribute Based Encryption with Privacy Preserving In Clouds Attribute Based Encryption with Privacy Preserving In Clouds
Attribute Based Encryption with Privacy Preserving In Clouds
 
USER-DEFINED PRIVACY GRID SYSTEM FOR CONTINUOUS LOCATION-BASED SERVICES - IEE...
USER-DEFINED PRIVACY GRID SYSTEM FOR CONTINUOUS LOCATION-BASED SERVICES - IEE...USER-DEFINED PRIVACY GRID SYSTEM FOR CONTINUOUS LOCATION-BASED SERVICES - IEE...
USER-DEFINED PRIVACY GRID SYSTEM FOR CONTINUOUS LOCATION-BASED SERVICES - IEE...
 
Access Policy Management For OSN Using Network Relationships
Access Policy Management For OSN Using Network RelationshipsAccess Policy Management For OSN Using Network Relationships
Access Policy Management For OSN Using Network Relationships
 
Control cloud data access privilege and
Control cloud data access privilege andControl cloud data access privilege and
Control cloud data access privilege and
 
sanju
sanjusanju
sanju
 
CONTROL CLOUD DATA ACCESS PRIVILEGE AND ANONYMITY WITH FULLY ANONYMOUS ATTRIB...
CONTROL CLOUD DATA ACCESS PRIVILEGE AND ANONYMITY WITH FULLY ANONYMOUS ATTRIB...CONTROL CLOUD DATA ACCESS PRIVILEGE AND ANONYMITY WITH FULLY ANONYMOUS ATTRIB...
CONTROL CLOUD DATA ACCESS PRIVILEGE AND ANONYMITY WITH FULLY ANONYMOUS ATTRIB...
 
IRJET- Data Centric Access Control Solution with Role baesd Proxy Re-Encryption
IRJET- Data Centric Access Control Solution with Role baesd Proxy Re-EncryptionIRJET- Data Centric Access Control Solution with Role baesd Proxy Re-Encryption
IRJET- Data Centric Access Control Solution with Role baesd Proxy Re-Encryption
 
Circuit Ciphertext-policy Attribute-based Hybrid Encryption with Verifiable D...
Circuit Ciphertext-policy Attribute-based Hybrid Encryption with Verifiable D...Circuit Ciphertext-policy Attribute-based Hybrid Encryption with Verifiable D...
Circuit Ciphertext-policy Attribute-based Hybrid Encryption with Verifiable D...
 
Audit free cloud storage via deniable attribute-based encryption
Audit free cloud storage via deniable attribute-based encryptionAudit free cloud storage via deniable attribute-based encryption
Audit free cloud storage via deniable attribute-based encryption
 
Certificate less key management scheme in
Certificate less key management scheme inCertificate less key management scheme in
Certificate less key management scheme in
 

Similar to Complete document

iaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocoliaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocolIaetsd Iaetsd
 
A secure-anti-collusion-data-sharing-scheme-for-dynamic-groups-in-the-cloud
A secure-anti-collusion-data-sharing-scheme-for-dynamic-groups-in-the-cloudA secure-anti-collusion-data-sharing-scheme-for-dynamic-groups-in-the-cloud
A secure-anti-collusion-data-sharing-scheme-for-dynamic-groups-in-the-cloudPvrtechnologies Nellore
 
IJSRED-V2I5P16
IJSRED-V2I5P16IJSRED-V2I5P16
IJSRED-V2I5P16IJSRED
 
The Recent Trend: Vigorous unidentified validation access control system with...
The Recent Trend: Vigorous unidentified validation access control system with...The Recent Trend: Vigorous unidentified validation access control system with...
The Recent Trend: Vigorous unidentified validation access control system with...IJERA Editor
 
Trust Based Management with User Feedback Service in Cloud Environment
Trust Based Management with User Feedback Service in Cloud EnvironmentTrust Based Management with User Feedback Service in Cloud Environment
Trust Based Management with User Feedback Service in Cloud EnvironmentIRJET Journal
 
IRJET- Security Enhancement for Sharing Data within Group Members in Cloud
IRJET- Security Enhancement for Sharing Data within Group Members in CloudIRJET- Security Enhancement for Sharing Data within Group Members in Cloud
IRJET- Security Enhancement for Sharing Data within Group Members in CloudIRJET Journal
 
privacy-preserving and content-protecting location based queries
privacy-preserving and content-protecting location based queriesprivacy-preserving and content-protecting location based queries
privacy-preserving and content-protecting location based queriesswathi78
 
Achieving Secure, sclable and finegrained Cloud computing report
Achieving Secure, sclable and finegrained Cloud computing reportAchieving Secure, sclable and finegrained Cloud computing report
Achieving Secure, sclable and finegrained Cloud computing reportKiran Girase
 
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...IRJET Journal
 
Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based...
Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based...Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based...
Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based...Yashwanth Reddy
 
Secure Multi-Owner Group Signature Based Secure M-Health Records in Cloud
Secure Multi-Owner Group Signature Based Secure M-Health  Records in Cloud Secure Multi-Owner Group Signature Based Secure M-Health  Records in Cloud
Secure Multi-Owner Group Signature Based Secure M-Health Records in Cloud IJMER
 
Ijmer 41025357
Ijmer 41025357Ijmer 41025357
Ijmer 41025357IJMER
 
Ijmer 41025357
Ijmer 41025357Ijmer 41025357
Ijmer 41025357IJMER
 
Ijmer 41025357
Ijmer 41025357Ijmer 41025357
Ijmer 41025357IJMER
 
Efficient and Secure Single Sign on Mechanism for Distributed Network
Efficient and Secure Single Sign on Mechanism for Distributed NetworkEfficient and Secure Single Sign on Mechanism for Distributed Network
Efficient and Secure Single Sign on Mechanism for Distributed NetworkIJERA Editor
 
A cloud storage system for sharing data securely with privacy preservation an...
A cloud storage system for sharing data securely with privacy preservation an...A cloud storage system for sharing data securely with privacy preservation an...
A cloud storage system for sharing data securely with privacy preservation an...eSAT Journals
 
Two Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed ServicesTwo Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed ServicesIRJET Journal
 
Space-efficient Verifiable Secret Sharing Using Polynomial Interpolation
Space-efficient Verifiable Secret Sharing Using Polynomial InterpolationSpace-efficient Verifiable Secret Sharing Using Polynomial Interpolation
Space-efficient Verifiable Secret Sharing Using Polynomial Interpolationnexgentechnology
 
Space efficient verifiable secret sharing
Space efficient verifiable secret sharingSpace efficient verifiable secret sharing
Space efficient verifiable secret sharingnexgentech15
 

Similar to Complete document (20)

iaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocoliaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocol
 
A secure-anti-collusion-data-sharing-scheme-for-dynamic-groups-in-the-cloud
A secure-anti-collusion-data-sharing-scheme-for-dynamic-groups-in-the-cloudA secure-anti-collusion-data-sharing-scheme-for-dynamic-groups-in-the-cloud
A secure-anti-collusion-data-sharing-scheme-for-dynamic-groups-in-the-cloud
 
IJSRED-V2I5P16
IJSRED-V2I5P16IJSRED-V2I5P16
IJSRED-V2I5P16
 
Abstract
AbstractAbstract
Abstract
 
The Recent Trend: Vigorous unidentified validation access control system with...
The Recent Trend: Vigorous unidentified validation access control system with...The Recent Trend: Vigorous unidentified validation access control system with...
The Recent Trend: Vigorous unidentified validation access control system with...
 
Trust Based Management with User Feedback Service in Cloud Environment
Trust Based Management with User Feedback Service in Cloud EnvironmentTrust Based Management with User Feedback Service in Cloud Environment
Trust Based Management with User Feedback Service in Cloud Environment
 
IRJET- Security Enhancement for Sharing Data within Group Members in Cloud
IRJET- Security Enhancement for Sharing Data within Group Members in CloudIRJET- Security Enhancement for Sharing Data within Group Members in Cloud
IRJET- Security Enhancement for Sharing Data within Group Members in Cloud
 
privacy-preserving and content-protecting location based queries
privacy-preserving and content-protecting location based queriesprivacy-preserving and content-protecting location based queries
privacy-preserving and content-protecting location based queries
 
Achieving Secure, sclable and finegrained Cloud computing report
Achieving Secure, sclable and finegrained Cloud computing reportAchieving Secure, sclable and finegrained Cloud computing report
Achieving Secure, sclable and finegrained Cloud computing report
 
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
 
Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based...
Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based...Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based...
Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based...
 
Secure Multi-Owner Group Signature Based Secure M-Health Records in Cloud
Secure Multi-Owner Group Signature Based Secure M-Health  Records in Cloud Secure Multi-Owner Group Signature Based Secure M-Health  Records in Cloud
Secure Multi-Owner Group Signature Based Secure M-Health Records in Cloud
 
Ijmer 41025357
Ijmer 41025357Ijmer 41025357
Ijmer 41025357
 
Ijmer 41025357
Ijmer 41025357Ijmer 41025357
Ijmer 41025357
 
Ijmer 41025357
Ijmer 41025357Ijmer 41025357
Ijmer 41025357
 
Efficient and Secure Single Sign on Mechanism for Distributed Network
Efficient and Secure Single Sign on Mechanism for Distributed NetworkEfficient and Secure Single Sign on Mechanism for Distributed Network
Efficient and Secure Single Sign on Mechanism for Distributed Network
 
A cloud storage system for sharing data securely with privacy preservation an...
A cloud storage system for sharing data securely with privacy preservation an...A cloud storage system for sharing data securely with privacy preservation an...
A cloud storage system for sharing data securely with privacy preservation an...
 
Two Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed ServicesTwo Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed Services
 
Space-efficient Verifiable Secret Sharing Using Polynomial Interpolation
Space-efficient Verifiable Secret Sharing Using Polynomial InterpolationSpace-efficient Verifiable Secret Sharing Using Polynomial Interpolation
Space-efficient Verifiable Secret Sharing Using Polynomial Interpolation
 
Space efficient verifiable secret sharing
Space efficient verifiable secret sharingSpace efficient verifiable secret sharing
Space efficient verifiable secret sharing
 

More from madhukarreddy007

More from madhukarreddy007 (7)

System configuration
System configurationSystem configuration
System configuration
 
Software requirement
Software requirementSoftware requirement
Software requirement
 
Screen short
Screen shortScreen short
Screen short
 
Proposed system
Proposed systemProposed system
Proposed system
 
Organization profile
Organization profileOrganization profile
Organization profile
 
Input and output design
Input and output designInput and output design
Input and output design
 
Existing system
Existing systemExisting system
Existing system
 

Complete document

  • 1. Efficient Security Solution for Privacy-Preserving Cloud Services Abstract: In this paper, we present a novel privacy-preserving security solution for cloud services. We deal with user anonymous access to cloud services and shared storage servers. Our solution provides registered users with anonymous access to cloud services. Our solution offers anonymous authentication. This means that users’ personal attributes (age, valid registration, successful payment) can be proven without revealing users’ identity. Thus, users can use services without any threat of profiling their behavior. On the other hand, if users break provider’s rules, their access rights are revoked. We analyze current privacy preserving solutions for cloud services and outline our solution based on advanced cryptographic components. Our solution offers anonymous access, unlink ability and the confidentiality of transmitted data. Moreover, we implement our solution and we output the experimental results and compare the performance with related solutions. Existing system: Users, who store their sensitive information like financial information, health records, etc., have a fundamental right of privacy. There are few cryptographic tools and schemes like anonymous authentication schemes, group signatures, zero knowledge protocols that can both hide user identity and provide authentication. The providers of cloud services need to control the authentication process to permit the access of only valid clients to their services. Disadvantages of Existing system: Further, they must be able to revoke malicious clients and reveal their identities. In practice, hundreds of users can access cloud services at the same time. Hence, the verification process of user access must be as efficient as possible and the
  • 2. computational cryptographic overhead must be minimal. These solutions and provide privacy-preserving public audit but do not offer the anonymous access of users to cloud services. Proposed system: We propose a novel security solution for cloud services that offers anonymous authentication. We aim mainly on the efficiency of the authentication process and user privacy. Our solution also provides the confidentiality and integrity of transmitted data between users and cloud service providers .Moreover, we implement our solution as a proof-of-concept application and compare the performance of our solution with related schemes. Our results show that our solution is more efficient than the related solutions. Advantages: Analyze current privacy preserving solutions for cloud services and outline our solution based on advanced cryptographic components. Our solution offers anonymous access, unlink ability and the confidentiality of transmitted data. Moreover, we implement our solution and we output the experimental results and compare the performance with related solutions.
  • 3. Architecture Diagram: Implementation Modules: 1. System Model 2. Requirements 3. Cryptography Used 4. Proposed Protocol System Model: Our solution consists of three fundamental parties: Cloud Service Provider (CSP) CSP manages cloud services and shared storages. CSP is usually a company which behaves as a partly trusted party. CSP provides cloud services, authenticates users when they access a cloud service. CSP also issues access attributes to users. Nevertheless, when CSP needs to revoke and identify a malicious user then CSP must collaborate with a revocation manager.
  • 4. Revocation Manager (RM). RM is a partly trusted party, e.g. government authority, who decides if the revocation of a user identity is rightful or not. Only the cooperation between CSP and RM can reveal the user identity. RM also cooperates with CSP during user registration when the user’s access attributes are issued. User (U). U is an ordinary customer who accesses into a cloud and uses cloud services, shared storages, etc. Users are anonymous if they properly follow the rules of CSP. To increase security, users use tamper-resistant devices or protected local storages. Requirements: Our solution provides the following security requirements: Anonymity. Every honest user stays anonymous when uses cloud services. User identities are hidden if users behave honestly and do not break rules. Confidentiality . Every user’s session to CSP is confidential. No one without a secret session key is able to obtain data transmitted between U and CSP. Integrity. Data sent in user’s session cannot be modified without a secret session key. Unlink ability. The user’s sessions to cloud services are unlink able. No one besides CSP collaborating with RM is able to link two or more sessions between a certain U and CSP. Un traceability. Other users are unable to trace user’s authentication and concrete users’ communication. Revocation. Every user can be revoked by the collaboration of CSP and RM.
  • 5. Cryptography Used: In our solution, we use discrete logarithm commitments described in prior work . Further, the solution employs _-protocols to prove of discrete logarithm knowledge, representation and equivalence. To revoke a user, we use the Okamoto-Uchiyama Trapdoor One-Way Function described in .For more details about the used basic cryptographic blocks see prior works . Proposed Protocol: Our protocol consists of five phases: initialization, registration, anonymous access, secure communication and revocation. The basic principle of the proposed protocol . 1) Initialization: The initialization phase is run by Cloud Service Provider (CSP) and Revocation Manager (RM).CSP generates a group H defined by a large prime modulus p, generators h1; h2 of prime order q and q .CSP generates a RSA key pair and stores own private key KCSP . 2) Registration: In the registration phase, a user registers and requests a user master key which they use in anonymous access to cloud services. Firstly, U must physically register on CSP. CSP checks user’s ID. This device which stores the user secret key should be also protected against a key estimation by side channel attacks, such as in [23]. Further, U cannot make own user master key because only RM knows KRK. Any honest user can repeat the request for the user master key or demand other authentication proofs if CSP agrees with that. 3) Anonymous Access: In this phase, the i- th user Ui anonymously accesses Cloud Service Provider (CSP). This phase consists of two-messages used to authenticate Ui and establish a secret key between Ui and CSP.
  • 6. 4) Secure Communication: If the anonymous access phase is successful, the user Ui can upload and download data from CSP. Data confidentiality and integrity are secured by a symmetric cipher. We propose to use AES which is well know cipher and is supported by many types of software and hardware platforms. To encrypt and decrypt transmitted data, Ui and CSP use the AES secret key K sym established in the previous phase. 5) Revocation: Depending on the case of rule breaking, the revocation phase can revoke a user and/or user anonymity. If users misuse a cloud service, they get revoked by RM. Because RM knows the factorization of n, RM is able to extract w RM. Algorithms: 1.Encryption algorithm. 2.Decryption algorithm. 3. Proposed Protocol. System Configuration: HARDWARE REQUIREMENTS: Hardware - Pentium Speed - 1.1 GHz RAM - 1GB
  • 7. Hard Disk - 20 GB Floppy Drive - 1.44 MB Key Board - Standard Windows Keyboard Mouse - Two or Three Button Mouse Monitor - SVGA SOFTWARE REQUIREMENTS: Operating System : Windows Technology : Java and J2EE Web Technologies : Html, JavaScript, CSS IDE : My Eclipse Web Server : Tomcat Tool kit : Android Phone Database : My SQL Java Version : J2SDK1.5