This document discusses a proposed scheme called Blowfish Encryption (BE) to securely store data in public clouds using encryption. The BE scheme addresses weaknesses in an existing mCL-PKE scheme. In the BE scheme, users must register with the data owner before accessing data. The owner encrypts data using the Blowfish algorithm and secret key before storing it in the cloud. When a registered user requests data, the cloud verifies the user and retrieves the encrypted data without decrypting it. The user then decrypts the data using the secret key. The BE scheme improves security over mCL-PKE by requiring registration and keeping decryption with the user instead of the cloud. It also speeds up the process using the fast
Survey on Lightweight Secured Data Sharing Scheme for Cloud ComputingIRJET Journal
This document summarizes a proposed lightweight secured data sharing scheme for cloud computing. It discusses issues with securely sharing data over cloud systems, including lack of control over data and potential for exploitation. The proposed system uses a combination of Attribute-Based Encryption (ABE) and Byte Rotation Encryption to encrypt data before uploading it to the cloud. This allows users to securely store and share encrypted data. The system aims to work efficiently on devices with limited resources by encrypting data in parallel threads. The encrypted data is decrypted using a randomly generated key that is shared only with authorized users.
Secure Data Sharing in Cloud through Limiting Trust in Third Party/ServerIRJET Journal
This document proposes a method for secure data sharing in clouds that limits trust in third party servers. It discusses shortcomings of existing approaches that rely fully on third parties for security operations like encryption and access control. The proposed method uses a two-layer encryption scheme, where the data owner performs lower layer encryption and the third party performs upper layer encryption. This limits the third party's access to the raw data. The owner also maintains control over access rights by directly providing keys for lower layer encryption to authorized users. The method is implemented and evaluated experimentally using Java and cloud services. It aims to address security and privacy concerns when outsourcing data storage while still offloading some operations to a third party.
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...Editor IJCATR
The Data sharing is an important functionality in cloud storage. In this article, we show how to securely, efficiently, and
flexibly share data with others in cloud storage. We describe new public-key cryptosystems which produce constant-size ciphertexts
such that efficient delegation of decryption rights for any set of ciphertexts are possible. The novelty is that one can aggregate any set
of secret keys and make them as compact as a single key, but encompassing the power of all the keys being aggregated. In other
words, the secret key holder can release a constant-size aggregate key for flexible choices of ciphertext set in cloud storage, but the
other encrypted files outside the set remain confidential. This compact aggregate key can be conveniently sent to others or be stored in
a smart card with very limited secure storage. We provide formal security analysis of our schemes in the standard model. We also
describe other application of our schemes. In particular, our schemes give the first public-key patient controlled encryption for flexible
hierarchy, which was yet to be known.
IRJET- Security Enhancement for Sharing Data within Group Members in CloudIRJET Journal
1) The document proposes a secure data sharing scheme for sharing data within group members in the cloud. It aims to prevent collusion attacks and allow for secure sharing of data even as group membership changes dynamically.
2) The scheme uses encryption with private keys so that if a user's key is leaked, it will be difficult for others to access the shared data. A trusted authority authenticates users and stores encryption keys to determine responsibility if issues arise.
3) The scheme achieves secure key distribution without requiring secure communication channels by using public key verification. It also allows for fine-grained access control and secure revocation such that revoked users cannot access shared data even by colluding with the cloud.
IRJET - Providing High Securtiy for Encrypted Data in CloudIRJET Journal
This document proposes a scheme for providing high security for encrypted data stored in the cloud. It outlines a secure, easily integrated, and fine-grained mechanism for verifying query results over encrypted cloud data. The scheme allows an authorized user to verify the correctness of each file in a query result set, as well as detect if any qualified files were not returned. It constructs verification objects for outsourced encrypted files that can be used to verify results. Trapdoor, decryption, and verification keys are generated to control access and detect unauthorized access attempts. The scheme guarantees the authenticity of verification objects and ensures the cloud server learns nothing about requested objects.
IRJET- Key Exchange Privacy Preserving Technique in Cloud ComputingIRJET Journal
This document proposes a key exchange privacy preserving technique for cloud computing using Diffie-Hellman algorithm. It discusses issues with existing cloud security methods like data encryption. The proposed system uses Diffie-Hellman key exchange between users and cloud database to securely store and access files. When a user wants to store or access a file, prime numbers are used to generate secret keys for the user and database. These keys are exchanged and matched using Diffie-Hellman to authenticate the user before allowing file operations. This approach securely shares secret keys to preserve privacy in cloud storage and transfers without leaking sensitive user information. The system was implemented using Java and Amazon Web Services for cloud storage and database.
1) The document proposes a system model for secure data sharing in cloud environments using cryptography.
2) It aims to provide data confidentiality, access control of shared data, remove the burden of key management and file encryption/decryption for users, and support dynamic changes to user membership without requiring the data owner to always be online.
3) The proposed system addresses common challenges with secure data sharing in cloud computing like data security, access control, key management, and user revocation and rejoining.
Cloud Auditing With Zero Knowledge PrivacyIJERA Editor
This document summarizes a research paper that proposes a new approach for auditing data stored in the cloud while preserving privacy. It begins with an introduction to cloud computing and common security issues when data is stored remotely. It then discusses existing methods for third-party auditing of cloud data that allow users to verify integrity and correctness, but compromise privacy. The proposed method uses Shamir's secret sharing algorithm to divide user data into shares and store each share on a different cloud server. This allows a third-party auditor to verify integrity without accessing or viewing the actual data contents, thus preserving privacy. The goals and design of the proposed approach are described, including how the secret sharing technique works mathematically to split data into threshold shares.
Survey on Lightweight Secured Data Sharing Scheme for Cloud ComputingIRJET Journal
This document summarizes a proposed lightweight secured data sharing scheme for cloud computing. It discusses issues with securely sharing data over cloud systems, including lack of control over data and potential for exploitation. The proposed system uses a combination of Attribute-Based Encryption (ABE) and Byte Rotation Encryption to encrypt data before uploading it to the cloud. This allows users to securely store and share encrypted data. The system aims to work efficiently on devices with limited resources by encrypting data in parallel threads. The encrypted data is decrypted using a randomly generated key that is shared only with authorized users.
Secure Data Sharing in Cloud through Limiting Trust in Third Party/ServerIRJET Journal
This document proposes a method for secure data sharing in clouds that limits trust in third party servers. It discusses shortcomings of existing approaches that rely fully on third parties for security operations like encryption and access control. The proposed method uses a two-layer encryption scheme, where the data owner performs lower layer encryption and the third party performs upper layer encryption. This limits the third party's access to the raw data. The owner also maintains control over access rights by directly providing keys for lower layer encryption to authorized users. The method is implemented and evaluated experimentally using Java and cloud services. It aims to address security and privacy concerns when outsourcing data storage while still offloading some operations to a third party.
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...Editor IJCATR
The Data sharing is an important functionality in cloud storage. In this article, we show how to securely, efficiently, and
flexibly share data with others in cloud storage. We describe new public-key cryptosystems which produce constant-size ciphertexts
such that efficient delegation of decryption rights for any set of ciphertexts are possible. The novelty is that one can aggregate any set
of secret keys and make them as compact as a single key, but encompassing the power of all the keys being aggregated. In other
words, the secret key holder can release a constant-size aggregate key for flexible choices of ciphertext set in cloud storage, but the
other encrypted files outside the set remain confidential. This compact aggregate key can be conveniently sent to others or be stored in
a smart card with very limited secure storage. We provide formal security analysis of our schemes in the standard model. We also
describe other application of our schemes. In particular, our schemes give the first public-key patient controlled encryption for flexible
hierarchy, which was yet to be known.
IRJET- Security Enhancement for Sharing Data within Group Members in CloudIRJET Journal
1) The document proposes a secure data sharing scheme for sharing data within group members in the cloud. It aims to prevent collusion attacks and allow for secure sharing of data even as group membership changes dynamically.
2) The scheme uses encryption with private keys so that if a user's key is leaked, it will be difficult for others to access the shared data. A trusted authority authenticates users and stores encryption keys to determine responsibility if issues arise.
3) The scheme achieves secure key distribution without requiring secure communication channels by using public key verification. It also allows for fine-grained access control and secure revocation such that revoked users cannot access shared data even by colluding with the cloud.
IRJET - Providing High Securtiy for Encrypted Data in CloudIRJET Journal
This document proposes a scheme for providing high security for encrypted data stored in the cloud. It outlines a secure, easily integrated, and fine-grained mechanism for verifying query results over encrypted cloud data. The scheme allows an authorized user to verify the correctness of each file in a query result set, as well as detect if any qualified files were not returned. It constructs verification objects for outsourced encrypted files that can be used to verify results. Trapdoor, decryption, and verification keys are generated to control access and detect unauthorized access attempts. The scheme guarantees the authenticity of verification objects and ensures the cloud server learns nothing about requested objects.
IRJET- Key Exchange Privacy Preserving Technique in Cloud ComputingIRJET Journal
This document proposes a key exchange privacy preserving technique for cloud computing using Diffie-Hellman algorithm. It discusses issues with existing cloud security methods like data encryption. The proposed system uses Diffie-Hellman key exchange between users and cloud database to securely store and access files. When a user wants to store or access a file, prime numbers are used to generate secret keys for the user and database. These keys are exchanged and matched using Diffie-Hellman to authenticate the user before allowing file operations. This approach securely shares secret keys to preserve privacy in cloud storage and transfers without leaking sensitive user information. The system was implemented using Java and Amazon Web Services for cloud storage and database.
1) The document proposes a system model for secure data sharing in cloud environments using cryptography.
2) It aims to provide data confidentiality, access control of shared data, remove the burden of key management and file encryption/decryption for users, and support dynamic changes to user membership without requiring the data owner to always be online.
3) The proposed system addresses common challenges with secure data sharing in cloud computing like data security, access control, key management, and user revocation and rejoining.
Cloud Auditing With Zero Knowledge PrivacyIJERA Editor
This document summarizes a research paper that proposes a new approach for auditing data stored in the cloud while preserving privacy. It begins with an introduction to cloud computing and common security issues when data is stored remotely. It then discusses existing methods for third-party auditing of cloud data that allow users to verify integrity and correctness, but compromise privacy. The proposed method uses Shamir's secret sharing algorithm to divide user data into shares and store each share on a different cloud server. This allows a third-party auditor to verify integrity without accessing or viewing the actual data contents, thus preserving privacy. The goals and design of the proposed approach are described, including how the secret sharing technique works mathematically to split data into threshold shares.
IRJET- Securing Cloud Data Under Key ExposureIRJET Journal
This document proposes a new auditing mechanism to improve the efficiency and security of attribute-based encryption for securing cloud data. The existing single attribute authority model results in long wait times for users to obtain secret keys. The proposed approach employs multiple attribute authorities that can share the work of key distribution to reduce wait times. A central authority generates keys for verified users, while each attribute is managed by its own authority. The mechanism can also detect incorrectly verified users to enhance security. Analysis shows the auditing mechanism improves cloud security performance compared to previous single authority schemes.
IRJET- Secure Data Protection in Cloud ComputingIRJET Journal
This document proposes a system to securely store data in the cloud by using honeypot technology and cryptographic algorithms. The proposed system aims to provide better data security for users by only allowing authenticated users to access encrypted data stored in the cloud. If an unauthenticated user attempts to access the data, the system will send them garbage files using honeypot technology to detect unauthorized access attempts. The system uses RSA encryption to encrypt user files before storing them in the cloud, requiring the private key to decrypt files, ensuring only authenticated users can access the encrypted user data stored remotely.
Enabling Secure Data Sharing Scheme in the Cloud Storage GroupsIRJET Journal
This document proposes an identity-based ring signature scheme to enable secure data sharing in cloud storage groups. It aims to provide forward security, authenticity, and anonymity for massive data sharing in the cloud. The proposed scheme uses identity-based ring signatures that do not require certificate verification, unlike conventional public key infrastructure approaches. It also achieves secure key distribution, fine-grained access control, prevention of collusion attacks, and secure user revocation. The scheme allows data to be securely shared within groups in the cloud while preserving the privacy of users.
IRJET- Secure Sharing of Personal Data on Cloud using Key Aggregation and...IRJET Journal
This document proposes a method for secure sharing of personal data on cloud storage using key aggregation and cryptography. It discusses how traditional cloud storage raises privacy and security issues due to outsourcing of data. The proposed method uses key-aggregate encryption to encrypt data files and generate a single aggregate key, reducing the need to exchange keys for individual files. This allows data owners to selectively and securely share a large number of encrypted files with data users by distributing the aggregate encryption key. When data users search for files, a trapdoor is generated and sent to the cloud for searching over authorized encrypted files. The method aims to enable secure, efficient and flexible sharing of encrypted personal data on cloud storage.
Two Aspect Validation Control Frameworks for Online Distributed ServicesIRJET Journal
This document proposes a two-factor validation control framework for online distributed services. Specifically, it implements an attribute-based access control framework that requires both a customer secret key and a lightweight security device. This two-factor authentication mechanism enhances security, especially when multiple customers share the same computer. It also allows fine-grained access control based on user attributes while preserving privacy, as the cloud server only knows that a user satisfies certain attributes, not their identity. A simulation is performed to demonstrate the feasibility of the proposed two-factor framework.
The document summarizes key-aggregate cryptosystem (KAC), which allows efficient and flexible sharing of encrypted
data in cloud storage. KAC encrypts data under a public key and ciphertext class. The key owner can generate an
aggregate decryption key that decrypts any ciphertext whose class is contained in the key, while keeping a constant size.
This compact aggregate key can be shared to delegate decryption rights for a set of ciphertexts, without sharing individual
keys. KAC schemes aim to achieve constant-size ciphertexts, public keys, master secrets and aggregate keys to enable
flexible and efficient data sharing in cloud storage.
Secure Data Sharing In an Untrusted CloudIJERA Editor
Cloud computing is a huge area which basically provides many services on the basis of pay as you go. One of the fundamental services provided by cloud is data storage. Cloud provides cost efficiency and an efficient solution for sharing resource among cloud users. A secure and efficient data sharing scheme for groups in cloud is not an easy task. On one hand customers are not ready to share their identity but on other hand want to enjoy the cost efficiency provided by the cloud. It needs to provide identity privacy, multiple owner and dynamic data sharing without getting effected by the number of cloud users revoked. In this paper, any member of a group can completely enjoy the data storing and sharing services by the cloud. A secure data sharing scheme for dynamic cloud users is proposed in this paper. For which it uses group signature and dynamic broadcast encryption techniques such that any user in a group can share the information in a secured manner. Additionally the permission option is proposed for the security reasons. This means the file access permissions are generated by the admin and given to the user using Role Based Access Control (RBA) algorithm. The file access permissions are read, write and delete. In this, owner can provide files with options and accepts the users using that option. The revocation of cloud user is a function generated by the Admin for security purpose. The encryption computational cost and storage overhead is not dependent on the number of users revoked. We analyze the security by proofs and produce the cloud efficiency report using cloudsim.
A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...cscpconf
One of widely used cryptographic primitives for the cloud application is Attribute Based Encryption (ABE) where users can have their own attributes and a ciphertext encrypted by an access policy. Though ABE provides many benefits, the novelty often only exists in an academic world and it is often difficult to find a practical use of ABE for a real application. In this paper, we discuss the design and implementation of a cloud storage client application which supports the concept of ABE. Our proposed client provides an effective access control mechanism where it allows different types of access policy to be defined thus allowing large datasets to be shared by multiple users. Using different access policy, each user only needs to access only a small part of the big data. The goal of our experiment is to explore the right set of strategies for developing a practical ABE-based system. Through the implementation and evaluation, we have determined the various characteristics and issues associated with developing a practical ABEbased
application.
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...IJNSA Journal
This document proposes a cloud-based access control model for selectively encrypting documents with traitor detection. It aims to address the high computational overhead of key management and secret sharing in existing attribute-based encryption approaches for cloud data security. The proposed model uses efficient algorithms and protocols like aggregate equality oblivious commitment-based envelope protocol and fast access control vector broadcast group key management to reduce overhead. It also introduces a traitor tracing technique to identify any traitors in the two-layer encryption environment for cloud computing.
A review on key aggregate cryptosystem for scalable data sharing in cloud sto...eSAT Journals
This document summarizes a research paper on key-aggregate cryptosystem (KAC) for secure data sharing in cloud storage. KAC allows data owners to efficiently share decryption keys for selected ciphertext classes by generating an aggregate key of constant size. The data owner first encrypts data and generates keys, then can create an aggregate key over a set of ciphertexts to share with others. When received, the aggregate key allows downloading and accessing the selected encrypted data. KAC provides an efficient way to delegate decryption rights for cloud-stored data while maintaining security and flexibility in data sharing.
Towards Achieving Efficient and Secure Way to Share the DataIRJET Journal
This document discusses security and efficiency challenges with sharing data in the cloud. It notes that while cloud computing allows easy storage and sharing of data, this exposes user data to security attacks. When data is shared in the cloud, cryptographic and authentication techniques are needed to protect user data. Mechanisms for sharing data must also be efficient so they do not reduce cloud service performance or waste resources. The document reviews several existing approaches for secure and efficient data sharing in cloud computing and their limitations, noting the need for improved techniques that can handle multiple users and owners dynamically sharing data.
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASCIRJET Journal
1) The document proposes a Secure Data Sharing in Clouds (SeDaSC) methodology for secure data sharing in cloud computing.
2) SeDaSC provides data confidentiality and integrity, access control, secure data sharing without reencryption, protection from insider threats, and forward/backward access control.
3) It encrypts files with a single key, and generates two shares of the key - one given to the user and the other stored by a trusted third party, to prevent insider threats from malicious users.
This document discusses secure data access and sharing in cloud computing environments. It first outlines some security requirements for data sharing in clouds, including data security, privacy, confidentiality, access control, user revocation, and scalability. It then surveys several cryptographic techniques for secure data sharing, including attribute-based encryption (ABE), key-policy attribute-based encryption (KP-ABE), and identity-based encryption (IBE). It also discusses proxy re-encryption as another technique that supports secure data sharing using a semi-trusted proxy to convert ciphertexts between users' public keys.
Advanced Multi-Encryption Technique in Cloud ComputingAM Publications
Cloud Computing is one of the latest technology and it is growing rapidly .Cloud Computing provides
service over the internet. In the existing approach the revoked users are not tracked properly and there is no extra
protection on the data that is uploaded to the cloud server. The users are not authenticated properly. The best
approach is that the users are authenticated twice. Once with the help of password users are authenticated and then
the secret code will be sent to the authenticated users mobile with the help of interfacing technology like GSM and
then the user’s should enter the secret code to authenticate they are the valid users. In this paper the data that is
uploaded to the cloud server is encrypted twice by the data-owner and that data is later re-encrypted by the cloud
server. Multi- layer encryption technique is performed in order to provide extra security for the data that is uploaded to
the cloud server. The data that is uploaded to the cloud server is highly secure and user’s authentication is validated
twice so that the valid user can access data flexibly and reliably.
IRJET - Reliable and Efficient Revocation and Data Sharing using Identity...IRJET Journal
This document discusses a proposed system for reliable and efficient revocation and data sharing using identity-based encryption over cloud. The system aims to securely store and share data in the cloud while allowing revocation of user access. It proposes using identity-based encryption where a user's public key is generated from unique identity information like their email address, without needing to pre-share keys. When a user's authorization expires, they can be revoked to prevent future access. The system encrypts files with keys generated from user identities before uploading to cloud servers. Authorized users can download and decrypt data, while unauthorized users and servers cannot access plaintext.
4.authentication and key agreement based on anonymous identity for peer to-pe...Venkat Projects
The document proposes a peer-to-peer cloud authentication and key agreement (PCAKA) scheme based on anonymous identity to enable secure data migration between cloud servers. The scheme uses elliptic curve cryptography without a trusted authority to establish session keys between cloud providers. It protects server and user privacy through anonymous identities while enabling identity traceability for malicious servers. The proposed approach aims to develop trust between clouds and facilitate efficient cross-cloud data migration for mobile users.
This document discusses enhancing security through token generation in a distributed environment. It proposes a new token generation scheme to encrypt user data with specified key parameters, making resources more robust. The token generation scheme would add security for both authentication and authorization. Existing algorithms focus on encrypting data on the user side, which incurs high computational and communication costs. The document suggests a token generation algorithm for distributed data files that provides secure and dependable server storage while maintaining low overhead. It analyzes related work on token-based authentication and security techniques to provide context.
A Survey on Assured deletion and Access ControlAM Publications
The document summarizes security issues related to assured deletion and access control for outsourced data stored in cloud storage. It discusses Perlman's concept of assured deletion using time-based expiration of files. It also discusses the Vanish system which uses threshold secret sharing to allow self-destructing of data objects after a predefined time period. For access control, it covers Wang's approach using key derivation hierarchies and attribute-based encryption, where ciphertexts are labeled with attributes and user keys are associated with access policies controlling which ciphertexts can be decrypted.
Fog computing a new concept to minimize the attacks and to provide security i...eSAT Publishing House
This document discusses fog computing as a new technique to provide security in cloud computing environments. It proposes using fog computing to extend cloud computing by placing user data closer to the end user and providing additional security features like validating authorized data access and confusing attackers with decoy documents. The key idea is to minimize damage from stolen data by decreasing its value to attackers through disinformation like decoys. This technique aims to make cloud systems more secure and transparent to users.
IRJET- Protection of Personal Data on Distributed Cloud using BiometricsIRJET Journal
This document proposes a system to securely store personal user files on distributed cloud servers using biometric authentication. The system splits user files into encrypted fragments that are stored across multiple cloud storages like AWS and Google Drive. When the user wants to access a file, their fingerprint is authenticated and the encrypted fragments are retrieved from the clouds, decrypted using Rijndael encryption, and merged back into the original file which is then downloaded to the user. The system aims to improve security over storing files on a single cloud by distributing encrypted fragments across multiple clouds and requiring biometric authentication to access the decrypted files.
This document describes a wireless SCADA system for industrial automation using M2M communication. The system uses various sensors to measure parameters like temperature, humidity, light, and LPG. An ADC converts the analog sensor readings to digital values, which a microcontroller processes and sends via GSM to a remote computer. The system allows monitoring and controlling industrial processes from anywhere via the internet. It aims to provide low-cost, low-power automation without distance barriers compared to traditional SCADAs. Future work may add switches/routers for networking and wireless cameras to improve security and monitoring capabilities.
IRJET- Securing Cloud Data Under Key ExposureIRJET Journal
This document proposes a new auditing mechanism to improve the efficiency and security of attribute-based encryption for securing cloud data. The existing single attribute authority model results in long wait times for users to obtain secret keys. The proposed approach employs multiple attribute authorities that can share the work of key distribution to reduce wait times. A central authority generates keys for verified users, while each attribute is managed by its own authority. The mechanism can also detect incorrectly verified users to enhance security. Analysis shows the auditing mechanism improves cloud security performance compared to previous single authority schemes.
IRJET- Secure Data Protection in Cloud ComputingIRJET Journal
This document proposes a system to securely store data in the cloud by using honeypot technology and cryptographic algorithms. The proposed system aims to provide better data security for users by only allowing authenticated users to access encrypted data stored in the cloud. If an unauthenticated user attempts to access the data, the system will send them garbage files using honeypot technology to detect unauthorized access attempts. The system uses RSA encryption to encrypt user files before storing them in the cloud, requiring the private key to decrypt files, ensuring only authenticated users can access the encrypted user data stored remotely.
Enabling Secure Data Sharing Scheme in the Cloud Storage GroupsIRJET Journal
This document proposes an identity-based ring signature scheme to enable secure data sharing in cloud storage groups. It aims to provide forward security, authenticity, and anonymity for massive data sharing in the cloud. The proposed scheme uses identity-based ring signatures that do not require certificate verification, unlike conventional public key infrastructure approaches. It also achieves secure key distribution, fine-grained access control, prevention of collusion attacks, and secure user revocation. The scheme allows data to be securely shared within groups in the cloud while preserving the privacy of users.
IRJET- Secure Sharing of Personal Data on Cloud using Key Aggregation and...IRJET Journal
This document proposes a method for secure sharing of personal data on cloud storage using key aggregation and cryptography. It discusses how traditional cloud storage raises privacy and security issues due to outsourcing of data. The proposed method uses key-aggregate encryption to encrypt data files and generate a single aggregate key, reducing the need to exchange keys for individual files. This allows data owners to selectively and securely share a large number of encrypted files with data users by distributing the aggregate encryption key. When data users search for files, a trapdoor is generated and sent to the cloud for searching over authorized encrypted files. The method aims to enable secure, efficient and flexible sharing of encrypted personal data on cloud storage.
Two Aspect Validation Control Frameworks for Online Distributed ServicesIRJET Journal
This document proposes a two-factor validation control framework for online distributed services. Specifically, it implements an attribute-based access control framework that requires both a customer secret key and a lightweight security device. This two-factor authentication mechanism enhances security, especially when multiple customers share the same computer. It also allows fine-grained access control based on user attributes while preserving privacy, as the cloud server only knows that a user satisfies certain attributes, not their identity. A simulation is performed to demonstrate the feasibility of the proposed two-factor framework.
The document summarizes key-aggregate cryptosystem (KAC), which allows efficient and flexible sharing of encrypted
data in cloud storage. KAC encrypts data under a public key and ciphertext class. The key owner can generate an
aggregate decryption key that decrypts any ciphertext whose class is contained in the key, while keeping a constant size.
This compact aggregate key can be shared to delegate decryption rights for a set of ciphertexts, without sharing individual
keys. KAC schemes aim to achieve constant-size ciphertexts, public keys, master secrets and aggregate keys to enable
flexible and efficient data sharing in cloud storage.
Secure Data Sharing In an Untrusted CloudIJERA Editor
Cloud computing is a huge area which basically provides many services on the basis of pay as you go. One of the fundamental services provided by cloud is data storage. Cloud provides cost efficiency and an efficient solution for sharing resource among cloud users. A secure and efficient data sharing scheme for groups in cloud is not an easy task. On one hand customers are not ready to share their identity but on other hand want to enjoy the cost efficiency provided by the cloud. It needs to provide identity privacy, multiple owner and dynamic data sharing without getting effected by the number of cloud users revoked. In this paper, any member of a group can completely enjoy the data storing and sharing services by the cloud. A secure data sharing scheme for dynamic cloud users is proposed in this paper. For which it uses group signature and dynamic broadcast encryption techniques such that any user in a group can share the information in a secured manner. Additionally the permission option is proposed for the security reasons. This means the file access permissions are generated by the admin and given to the user using Role Based Access Control (RBA) algorithm. The file access permissions are read, write and delete. In this, owner can provide files with options and accepts the users using that option. The revocation of cloud user is a function generated by the Admin for security purpose. The encryption computational cost and storage overhead is not dependent on the number of users revoked. We analyze the security by proofs and produce the cloud efficiency report using cloudsim.
A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...cscpconf
One of widely used cryptographic primitives for the cloud application is Attribute Based Encryption (ABE) where users can have their own attributes and a ciphertext encrypted by an access policy. Though ABE provides many benefits, the novelty often only exists in an academic world and it is often difficult to find a practical use of ABE for a real application. In this paper, we discuss the design and implementation of a cloud storage client application which supports the concept of ABE. Our proposed client provides an effective access control mechanism where it allows different types of access policy to be defined thus allowing large datasets to be shared by multiple users. Using different access policy, each user only needs to access only a small part of the big data. The goal of our experiment is to explore the right set of strategies for developing a practical ABE-based system. Through the implementation and evaluation, we have determined the various characteristics and issues associated with developing a practical ABEbased
application.
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...IJNSA Journal
This document proposes a cloud-based access control model for selectively encrypting documents with traitor detection. It aims to address the high computational overhead of key management and secret sharing in existing attribute-based encryption approaches for cloud data security. The proposed model uses efficient algorithms and protocols like aggregate equality oblivious commitment-based envelope protocol and fast access control vector broadcast group key management to reduce overhead. It also introduces a traitor tracing technique to identify any traitors in the two-layer encryption environment for cloud computing.
A review on key aggregate cryptosystem for scalable data sharing in cloud sto...eSAT Journals
This document summarizes a research paper on key-aggregate cryptosystem (KAC) for secure data sharing in cloud storage. KAC allows data owners to efficiently share decryption keys for selected ciphertext classes by generating an aggregate key of constant size. The data owner first encrypts data and generates keys, then can create an aggregate key over a set of ciphertexts to share with others. When received, the aggregate key allows downloading and accessing the selected encrypted data. KAC provides an efficient way to delegate decryption rights for cloud-stored data while maintaining security and flexibility in data sharing.
Towards Achieving Efficient and Secure Way to Share the DataIRJET Journal
This document discusses security and efficiency challenges with sharing data in the cloud. It notes that while cloud computing allows easy storage and sharing of data, this exposes user data to security attacks. When data is shared in the cloud, cryptographic and authentication techniques are needed to protect user data. Mechanisms for sharing data must also be efficient so they do not reduce cloud service performance or waste resources. The document reviews several existing approaches for secure and efficient data sharing in cloud computing and their limitations, noting the need for improved techniques that can handle multiple users and owners dynamically sharing data.
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASCIRJET Journal
1) The document proposes a Secure Data Sharing in Clouds (SeDaSC) methodology for secure data sharing in cloud computing.
2) SeDaSC provides data confidentiality and integrity, access control, secure data sharing without reencryption, protection from insider threats, and forward/backward access control.
3) It encrypts files with a single key, and generates two shares of the key - one given to the user and the other stored by a trusted third party, to prevent insider threats from malicious users.
This document discusses secure data access and sharing in cloud computing environments. It first outlines some security requirements for data sharing in clouds, including data security, privacy, confidentiality, access control, user revocation, and scalability. It then surveys several cryptographic techniques for secure data sharing, including attribute-based encryption (ABE), key-policy attribute-based encryption (KP-ABE), and identity-based encryption (IBE). It also discusses proxy re-encryption as another technique that supports secure data sharing using a semi-trusted proxy to convert ciphertexts between users' public keys.
Advanced Multi-Encryption Technique in Cloud ComputingAM Publications
Cloud Computing is one of the latest technology and it is growing rapidly .Cloud Computing provides
service over the internet. In the existing approach the revoked users are not tracked properly and there is no extra
protection on the data that is uploaded to the cloud server. The users are not authenticated properly. The best
approach is that the users are authenticated twice. Once with the help of password users are authenticated and then
the secret code will be sent to the authenticated users mobile with the help of interfacing technology like GSM and
then the user’s should enter the secret code to authenticate they are the valid users. In this paper the data that is
uploaded to the cloud server is encrypted twice by the data-owner and that data is later re-encrypted by the cloud
server. Multi- layer encryption technique is performed in order to provide extra security for the data that is uploaded to
the cloud server. The data that is uploaded to the cloud server is highly secure and user’s authentication is validated
twice so that the valid user can access data flexibly and reliably.
IRJET - Reliable and Efficient Revocation and Data Sharing using Identity...IRJET Journal
This document discusses a proposed system for reliable and efficient revocation and data sharing using identity-based encryption over cloud. The system aims to securely store and share data in the cloud while allowing revocation of user access. It proposes using identity-based encryption where a user's public key is generated from unique identity information like their email address, without needing to pre-share keys. When a user's authorization expires, they can be revoked to prevent future access. The system encrypts files with keys generated from user identities before uploading to cloud servers. Authorized users can download and decrypt data, while unauthorized users and servers cannot access plaintext.
4.authentication and key agreement based on anonymous identity for peer to-pe...Venkat Projects
The document proposes a peer-to-peer cloud authentication and key agreement (PCAKA) scheme based on anonymous identity to enable secure data migration between cloud servers. The scheme uses elliptic curve cryptography without a trusted authority to establish session keys between cloud providers. It protects server and user privacy through anonymous identities while enabling identity traceability for malicious servers. The proposed approach aims to develop trust between clouds and facilitate efficient cross-cloud data migration for mobile users.
This document discusses enhancing security through token generation in a distributed environment. It proposes a new token generation scheme to encrypt user data with specified key parameters, making resources more robust. The token generation scheme would add security for both authentication and authorization. Existing algorithms focus on encrypting data on the user side, which incurs high computational and communication costs. The document suggests a token generation algorithm for distributed data files that provides secure and dependable server storage while maintaining low overhead. It analyzes related work on token-based authentication and security techniques to provide context.
A Survey on Assured deletion and Access ControlAM Publications
The document summarizes security issues related to assured deletion and access control for outsourced data stored in cloud storage. It discusses Perlman's concept of assured deletion using time-based expiration of files. It also discusses the Vanish system which uses threshold secret sharing to allow self-destructing of data objects after a predefined time period. For access control, it covers Wang's approach using key derivation hierarchies and attribute-based encryption, where ciphertexts are labeled with attributes and user keys are associated with access policies controlling which ciphertexts can be decrypted.
Fog computing a new concept to minimize the attacks and to provide security i...eSAT Publishing House
This document discusses fog computing as a new technique to provide security in cloud computing environments. It proposes using fog computing to extend cloud computing by placing user data closer to the end user and providing additional security features like validating authorized data access and confusing attackers with decoy documents. The key idea is to minimize damage from stolen data by decreasing its value to attackers through disinformation like decoys. This technique aims to make cloud systems more secure and transparent to users.
IRJET- Protection of Personal Data on Distributed Cloud using BiometricsIRJET Journal
This document proposes a system to securely store personal user files on distributed cloud servers using biometric authentication. The system splits user files into encrypted fragments that are stored across multiple cloud storages like AWS and Google Drive. When the user wants to access a file, their fingerprint is authenticated and the encrypted fragments are retrieved from the clouds, decrypted using Rijndael encryption, and merged back into the original file which is then downloaded to the user. The system aims to improve security over storing files on a single cloud by distributing encrypted fragments across multiple clouds and requiring biometric authentication to access the decrypted files.
This document describes a wireless SCADA system for industrial automation using M2M communication. The system uses various sensors to measure parameters like temperature, humidity, light, and LPG. An ADC converts the analog sensor readings to digital values, which a microcontroller processes and sends via GSM to a remote computer. The system allows monitoring and controlling industrial processes from anywhere via the internet. It aims to provide low-cost, low-power automation without distance barriers compared to traditional SCADAs. Future work may add switches/routers for networking and wireless cameras to improve security and monitoring capabilities.
This document discusses security challenges in underwater wireless communication networks (UWCNs). It provides an overview of the characteristics of underwater acoustic channels that make UWCNs vulnerable to attacks, such as high bit error rates and low bandwidth. Several common attacks on UWCNs are described, such as jamming, wormhole attacks, and selective forwarding. The document also outlines security requirements for UWCNs, including authentication, confidentiality, integrity, and availability. It provides a survey of existing literature on securing UWCNs and discusses open challenges in providing security for these networks.
The document discusses the benefits of meditation for reducing stress and anxiety. Regular meditation practice can help calm the mind and body by lowering heart rate and blood pressure. Making meditation a part of a daily routine, even if just 10-15 minutes per day, can have mental and physical health benefits over time by helping people feel more relaxed and better able to handle life's stresses.
This document describes a microcontroller-based gas flow alert system for an industrial furnace. The system monitors the furnace's gas flow mode (manual vs automatic) and uses a GSM modem to send alert messages if the mode is not changed on schedule. This helps reduce wasted nitrogen gas flow and lower production costs by ensuring the optimal gas flow level is maintained based on whether items are actively being loaded into the furnace. The system was designed and assembled with a microcontroller board connected to a GSM modem. It provides alerts if the operator fails to change the furnace mode between shifts, allowing nitrogen usage and costs to be reduced by an estimated Rs. 10,407.93 per month.
This document proposes an Android application that uses Huffman encoding to compress SMS messages. It summarizes that Huffman coding assigns shorter code words to more frequently used symbols, allowing SMS text to be compressed. The application requires installation on both the sender and receiver's phones to decompress messages. Testing showed the technique achieved up to 89% compression, reducing the size of example SMS texts. The summary provides an overview of the key points about using Huffman coding for SMS compression and the proposed mobile application.
This document contains facts about Rachael H. and Ukraine. It provides biographical details about Rachael H., such as where she is from, her major, and hobbies. It then discusses facts about Ukraine, including its population, capital, independence from the Soviet Union in 1991, and constitution protecting human rights. The document also addresses issues in Ukraine such as the Chernobyl disaster, women's rights, human trafficking being a problem after independence, and Ukrainian women being the main targets of trafficking.
This document summarizes current research on morphological analysis techniques for the Assamese language. It discusses prior work using rule-based and unsupervised methods for morphological analysis of several Indian languages, including Hindi, Bengali, Punjabi, Marathi, Tamil, Malayalam, Kannada, and Assamese. For Assamese specifically, it describes several studies that used suffix stripping and rule-based approaches to develop morphological analyzers, as well as some initial work on unsupervised techniques. The document concludes that while most existing work on Assamese has used supervised suffix stripping methods, unsupervised techniques show promise but have not been fully explored.
This document summarizes the synthesis and characterization of thin films of pure TiO2 and Sr-doped TiO2 prepared by spin coating technique. Transparent thin films were prepared on glass substrates and annealed at different temperatures from 3000C to 6000C. Structural analysis using GIXRD and Raman spectroscopy confirmed the anatase phase of TiO2. AFM showed a homogeneous globular surface morphology. UV-Vis analysis demonstrated that the optical band gap increased with higher annealing temperatures. Photoluminescence study showed variation in emission peaks for different annealing temperatures and Sr concentrations. Electrical, gas sensing, wettability and self-cleaning properties were also investigated.
The document details the author's journey from having his football career cut short due to injury to pursuing a degree in computer graphics. It describes his struggles with changing paths, including facing doubts from family. However, he was determined to achieve his goals. After graduating soon, he will be the first in his family to earn a college degree, showing that success is achieving one's goals through perseverance.
1. The document describes the development of an "On Panel Signalling System in trains with Auxiliary Warning System" to provide real-time signal status to train operators.
2. The system uses microcontrollers, radiofrequency and infrared transmitters and receivers to transmit signal status from signals to a panel in the train cabin.
3. If the operator fails to respond to a red signal, the train will automatically apply brakes to halt the train, improving safety over the existing system.
This document describes an experimental study of heat transfer in a rectangular duct with and without internal V-shaped ribs. Experiments were conducted with air flow in turbulent regime (Reynolds numbers 3000-18000) in smooth duct and ducts with continuous or discrete internal V-shaped ribs. Temperature and pressure measurements were taken to determine heat transfer coefficients and friction factors for different configurations. Results showed that continuous ribs enhanced heat transfer more than discrete ribs, but also increased pressure drop more substantially. Heat transfer enhancement was dependent on rib geometry and position.
This paper proposes a method for image denoising using wavelet thresholding while preserving edge information. It first detects edges in the noisy image using Canny edge detection. It then applies a wavelet transform and thresholds the coefficients, preserving values near detected edges. Two thresholding methods are discussed: Visushrink for sparse images and Sureshrink for others. The inverse wavelet transform is applied to obtain the denoised image with preserved edges. The goal is to remove noise while maintaining important image features like edges. The method is described to provide better denoising than alternatives that oversmooth edges.
This document discusses the theoretical and numerical analysis of a vibration isolator subjected to harmonic excitation. It presents equations to model the isolator and calculate the force and displacement transmissibility. The analysis considers varying the damping coefficient and spring stiffness. MATLAB is used to generate transmissibility curves matching the theoretical analysis. An experimental setup is proposed to validate the results and consider nonlinearities not included in the theoretical model.
The document summarizes a research paper that evaluates the Infrastructure Leakage Index (ILI) and non-revenue water from the water distribution system of Surat city, India using the BENCHLEAK water balance software. It provides details of the methodology used, including collecting system data, calculating the unavoidable annual real losses (UARL) benchmark, and determining the annual water balance to derive the ILI performance indicator. The results obtained from the BENCHLEAK analysis show that the software is effective for evaluating and comparing leakage levels across water supply systems in a standardized manner.
This document presents a study evaluating the performance of machine learning algorithms for network intrusion detection systems (NIDS) using benchmark datasets. Specifically, it applies an AdaBoost-based machine learning algorithm to NIDS and tests its detection accuracy on the KDD Cup 99 and NSL-KDD intrusion detection datasets. The experimental results show that the AdaBoost-based NIDS performs better on the NSL-KDD dataset compared to the KDD Cup 99 dataset, achieving a higher detection rate and lower false alarm rate.
This document proposes a hybrid optimization algorithm using ant colony optimization and particle swarm optimization to solve the multiobjective multicast routing problem in wireless sensor networks. The goal is to optimize two objectives simultaneously - end-to-end delay and total transmitted power. ACO and PSO are combined to find Pareto-optimal solutions efficiently. Simulation results show the algorithm can find near-optimal solutions for minimizing delay and power consumption when routing data from a source to multiple destinations in wireless sensor networks.
This document discusses barriers to integrating information and communication technologies (ICT) into teaching and learning environments. It identifies several common barriers at the teacher and infrastructure levels. At the teacher level, barriers include lack of teacher confidence, competency, and motivation to change their practices. At the infrastructure level, common barriers are lack of adequate ICT resources, effective training, and infrastructure support. To improve ICT integration, the document argues that education systems must address these barriers by enhancing teacher skills and confidence, providing sufficient resources and training, and strengthening infrastructure support.
This document provides a review of different techniques for image retrieval from large databases, including text-based image retrieval and content-based image retrieval (CBIR). CBIR uses visual features extracted from images like color, texture, and shape to search for similar images. The document discusses some limitations of CBIR and proposes video-based image retrieval as a new direction. It also surveys recent research in areas like feature extraction, indexing, and discusses future directions like reducing the semantic gap between low-level features and high-level meanings.
766 a secure-data-sharing-in-cloud-storage-with-independent-key-generation-ce...revathirram
This document summarizes a research paper that proposes a mediated certificateless public key encryption (mCL-PKE) scheme for secure data sharing in cloud storage. The key points are:
1) The mCL-PKE scheme solves problems of key escrow and certificate revocation without using computationally expensive bilinear pairing operations.
2) It uses a security mediator to instantly revoke compromised users and enforce access policies. The mediator also supports partial decryption to preserve data confidentiality.
3) The scheme extends mCL-PKE with an access control list to allow the data owner to encrypt data only once for multiple authorized users, improving efficiency over previous pairing-based schemes.
Cloud computing is the emerging trend in todays world. Cloud computing is not a separate technology, it is platform which provides platform as a service, Infrastructure as a service and Software as a service. The most important thing with cloud is that we hire everything from a third party or store our important datas in a third parties place .Here comes the major issue of how our datas are secured. In this paper, we discuss about how to protect our datas in the cloud with various cryptographic techniques. Padmapriya I | Ragini H "Cloud Cryptography" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-2 , February 2019, URL: https://www.ijtsrd.com/papers/ijtsrd21547.pdf
Paper URL: https://www.ijtsrd.com/computer-science/computer-network/21547/cloud-cryptography/padmapriya-i
Attribute-Based Encryption for Access of Secured Data in Cloud StorageIJSRD
This document summarizes an article about attribute-based encryption for securing data access in cloud storage. It discusses how attribute-based encryption (ABE) can allow users to encrypt data in the cloud in a way that only authorized users who match certain attributes can decrypt and access the data. The document provides background on ABE and homomorphic encryption, which allows computations on encrypted data. It proposes a system using partial homomorphic encryption with RSA and user-generated keys to provide security while allowing data operations without decryption. Evaluation results show the proposed approach provides faster encryption times and less overhead compared to traditional methods.
This document discusses security issues in cloud computing and proposes a solution using authentication and encryption. It first describes common cloud deployment models and layers. It then discusses major security concerns like privacy, confidentiality and data integrity. The proposed solution uses EAP-CHAP for authentication and the Rijndael encryption algorithm to encrypt user data at rest and in transit in the cloud, providing security while allowing authorized access. The methodology describes authentication using EAP-CHAP and encryption/decryption of data using Rijndael before it is sent to or retrieved from the cloud.
This document discusses security issues in cloud computing and proposes a solution using authentication and encryption. It first describes common cloud deployment models and layers. It then discusses major security concerns like privacy, confidentiality and data integrity. The proposed solution uses EAP-CHAP for authentication at the user end and Rijndael encryption algorithm to encrypt user data before it is sent to the cloud. The encryption ensures security of data at rest and in transit, while EAP-CHAP handles authentication of users with the cloud service provider. Pseudocode for the Rijndael encryption/decryption process is also provided.
This document discusses securely sharing data in multi-owner cloud environments for dynamic groups. It proposes a method for securely sharing data files with other users in a group on an untrusted cloud. The method supports dynamic groups where new users can access files uploaded before joining without contacting owners. User revocation is achieved through a revocation list without updating other users' secret keys. Encryption overhead is constant, independent of revoked users. The scheme provides secure access control and preserves user privacy by hiding identities from the cloud.
Improving Efficiency of Security in Multi-CloudIJTET Journal
Abstract--Due to risk in service availability failure and the possibilities of malicious insiders in the single cloud, a movement towards “Multi-clouds” has emerged recently. In general a multi-cloud security system there is a possibility for third party to access the user files. Ensuring security in this stage has become tedious since, most of the activities are done in network. In this paper, an enhanced security methodology has been introduced in order to make the data stored in cloud more secure. Duple authentication process introduced in this concept defends malicious insiders and shields the private data. Various disadvantages in traditional systems like unauthorized access, hacking have been overcome in this proposed system and a comparison made with the traditional systems in terms of performance and computational time have shown better results.
Secure Redundant Data Avoidance over Multi-Cloud Architecture. IJCERT JOURNAL
Redundant data avoidance systems, the Private Cloud are involved as a proxy to allow data owner/users to securely perform duplicate check with differential privileges. Such architecture is practical and has attracted much attention from researchers. The data owners only outsource their data storage by utilizing public cloud while the data operation is managed in private cloud, in this connection our presented system has follows traditional encryption while providing data confidentiality, is incompatible with redundant data avoidance. Identical data copies of different users will lead to different ciphertexts, making data avoidance impossible. To address above issues convergent encryption technique has been proposed to encrypt the data before outsourcing. To better protect data security, this paper makes the first attempt to formally address the problem of authorized redundant data avoidance. Different from traditional redundant data avoidance systems, the differential privileges of users are further considered in duplicate check besides the data itself. We also present several new redundant data avoidance constructions supporting authorized duplicate check in a multi-cloud architecture. Security analysis demonstrates that our scheme is secure in terms of the definitions specified in the proposed security model. In order to perform secure access controlling scheme user may satisfy fine-grained approach at cloud level towards access restricting from unauthorized users or adversaries.
Homomorphic encryption algorithms and schemes for secure computations in the ...MajedahAlkharji
This article provides:
1. A detailed survey of homomorphic encryption (HE) using public key algorithms such as RSA, El-Gamal, and Paillier algorithms.
2. Fully homomorphic encryption (FHE) schemes.
This work can be helpful as a guide to principles, properties of FHE as researchers believe in the possibility of advancement in the FHE area.
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...IRJET Journal
The document proposes a secured data integrity technique for cloud storage using 3DES encryption algorithm. 3DES is a symmetric cryptosystem that encrypts data using three iterations of the DES algorithm. The proposed system uses 3DES along with a random key generator and graphical password to add extra security layers. This makes the system difficult to hack by protecting the data stored in the cloud. The document discusses related work on ensuring data integrity and possession in cloud storage. It then describes the proposed methodology which uses cryptography algorithms like 3DES to encrypt data sent over the network, making intercepted or replaced data impossible. The system is designed to be acceptably secure against current threats but may require stronger encryption with increasing computing power over time.
This document discusses cloud cryptography and provides an overview of how it works. It is presented by Sir Abbas Rahman to students Muhammad Ahmad, Waqas Zahid, and Saqib Ali. Cloud cryptography uses encryption to secure data stored in the cloud and allows users to access shared cloud services securely. It can encrypt data in several ways including pre-encrypting data before uploading it, end-to-end encryption between senders and receivers, file encryption, and full disk encryption. Popular cryptographic algorithms used for cloud security include symmetric key algorithms like AES, asymmetric key algorithms like RSA, and hashing algorithms. The advantages of cloud cryptography are that it keeps data private, detects unauthorized access, and complies with security regulations
This document discusses enforcing multi-user security policies in cloud computing. It describes using key-policy attribute-based encryption (KP-ABE) to allow flexible and fine-grained access control of encrypted data stored on cloud servers. The database is encrypted using KP-ABE before being stored. A key management authority generates key sets for authorized users to decrypt portions of the database according to assigned access policies. This allows complex queries to be run on the encrypted database while protecting data confidentiality even from the cloud server.
This document discusses enforcing multi-user security policies in cloud computing. It describes using key-policy attribute-based encryption (KP-ABE) to allow flexible and fine-grained access control of encrypted data stored on cloud servers. The database is encrypted using KP-ABE before being stored. The key management authority generates key sets for authorized users that determine which attributes they can access. This allows complex queries to be run on the encrypted database while maintaining security and privacy.
1. The document proposes a system for secure user authentication and access control for encrypted data stored in the cloud. It aims to address issues with centralized access control and storing data in plaintext.
2. The proposed system uses a key distribution center to generate public, private, and access keys for authentication at different levels. Data is encrypted before being fragmented and distributed across multiple servers.
3. Only authorized users with proper keys can decrypt the data. Access policies set by data creators restrict which users can access files. Storing encrypted and distributed data along with key-based authentication aims to improve security over existing cloud storage systems.
IRJET- A Review on Lightweight Secure Data Sharing Scheme for Mobile Cloud Co...IRJET Journal
This document reviews a proposed lightweight secure data sharing scheme (LDSS) for mobile cloud computing. It aims to address the problems of high computational overhead for mobile devices and lack of security when data is stored and shared in the cloud. The proposed LDSS framework uses attribute-based encryption and proxy servers to perform intensive encryption and decryption tasks, reducing the computational load on mobile clients. It also introduces lazy re-encryption and attribute fields to help efficiently revoke user access privileges. The goal is to provide secure yet lightweight data sharing capabilities for mobile cloud applications and services.
Achieving Secure, sclable and finegrained Cloud computing reportKiran Girase
cloud computing is also facing many challenges that, if not well resolved, may impede its fast growth. Data security, as it exists in many other applications, is among these challenges that would raise great concerns from users when they store sensitive information on cloud servers. These concerns originate from the fact that cloud servers are usually operated by commercial providers which are very likely to be outside of the trusted domain of the users. Data confidential against cloud servers is hence frequently desired when users outsource data for storage in the cloud.
An Efficient Scheme for Data Sharing Among Dynamic Cloud MembersIRJET Journal
The document proposes an efficient scheme for secure data sharing among dynamic cloud members. It aims to address key challenges in sharing private data in the cloud due to frequent changes in group membership. The proposed scheme uses techniques like elliptic curve cryptography to securely distribute private keys to users without relying on secure communication channels or certificate authorities. It also enables fine-grained access control and protects against collusion attacks where revoked users cannot access original data even by joining with third parties. The scheme achieves efficient dynamic operations to handle user additions and revocations without requiring key updates for other users.
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...IJNSA Journal
Cloud computing refers to a type of networked computing whereby an application can be run on connected servers instead of local servers. Cloud can be used to store data, share resources and also to provide services. Technically, there is very little difference between public and private cloud architecture. However, the security and privacy of the data is a very big issue when sensitive data is being entrusted to third party cloud service providers. Thus encryption with a fine grained access control is inevitable to enforce security in clouds. Several techniques implementing attribute based encryption for fine grained access control have been proposed. Under such approaches, the key management overhead is a little bit high in terms of computational complexity. Also, secret sharing mechanisms have added complexity. Moreover, they lack mechanisms to handle existence of traitors. Our proposed approach addresses these requirements and reduces the overhead of the key management as well as secret sharing by using efficient algorithms and protocols. Also, a traitor tracing technique is introduced into the cloud computing two layer encryption environment.
IRJET- Data Security in Cloud Computing using Cryptographic AlgorithmsIRJET Journal
This document discusses data security in cloud computing using cryptographic algorithms. It begins by introducing cloud computing and cryptography. Cryptography is used to securely store and transmit data in the cloud since the data is no longer under the user's direct control. The document then discusses how AES (Advanced Encryption Standard) can be used to encrypt data for secure storage and transmission in cloud computing. It provides an overview of the AES algorithm, including the encryption process which involves sub-processes like byte substitution, shift rows, mix columns and adding round keys over multiple rounds. The document also provides pseudocode for the AES encryption process and discusses how AES encryption provides stronger security than other algorithms like DES.
Abstract: Cloud computing model are obtaining ubiquitous authorization due to the heterogeneous convenience they provide. Although, the
security & privacy problems are the main considerable encumbrance holding back the universal adoption of this new emerging technology.
Various researches are concentrated on enhancing the security on Software as well as Hardware levels on the cloud. But these interpretations do
not mainly furnish the complete security way and therefore the data security compute (measure) are still kept under the access control of service
provider. Trusted Computing is another research concept. In actuality, these furnish a set of tools controlled by the third party technologies to
secure the Virtual Machines from the cloud computing providers. These approaches provides the tools to its consumers to assess and monitor the
aspects of security their data, they don’t allocate the cloud consumers with high control capability. While as the new emerging DCS approach
aims to provide the security of data owners of their data. But the DCS approach concept is elucidate in many ways and there is not a
standardized framework of cloud computing environment model for applying this approach.
This document summarizes a research paper that examines pricing strategy in a two-stage supply chain consisting of a supplier and retailer. The supplier offers a credit period to the retailer, who then offers credit to customers. A mathematical model is formulated to maximize total profit for the integrated supply chain system. The model considers three cases based on the relative lengths of the credit periods offered at each stage. Equations are developed to represent the profit functions for the supplier, retailer and overall system in each case. The goal is to determine the optimal selling price that maximizes total integrated profit.
The document discusses melanoma skin cancer detection using a computer-aided diagnosis system based on dermoscopic images. It begins with an introduction to skin cancer and melanoma. It then reviews existing literature on automated melanoma detection systems that use techniques like image preprocessing, segmentation, feature extraction and classification. Features extracted in other studies include asymmetry, border irregularity, color, diameter and texture-based features. The proposed system collects dermoscopic images and performs preprocessing, segmentation, extracts 9 features based on the ABCD rule, and classifies images using a neural network classifier to detect melanoma. It aims to develop an automated diagnosis system to eliminate invasive biopsy procedures.
This document summarizes various techniques for image segmentation that have been studied and proposed in previous research. It discusses edge-based, threshold-based, region-based, clustering-based, and other common segmentation methods. It also reviews applications of segmentation in medical imaging, plant disease detection, and other fields. While no single technique can segment all images perfectly, hybrid and adaptive methods combining multiple approaches may provide better results. Overall, image segmentation remains an important but challenging task in digital image processing and computer vision.
This document presents a test for detecting a single upper outlier in a sample from a Johnson SB distribution when the parameters of the distribution are unknown. The test statistic proposed is based on maximum likelihood estimates of the four parameters (location, scale, and two shape) of the Johnson SB distribution. Critical values of the test statistic are obtained through simulation for different sample sizes. The performance of the test is investigated through simulation, showing it performs well at detecting outliers when the contaminant observation represents a large shift from the original distribution parameters. An example application to census data is also provided.
This document summarizes a research paper that proposes a portable device called the "Disha Device" to improve women's safety. The device has features like live location tracking, audio/video recording, automatic messaging to emergency contacts, a buzzer, flashlight, and pepper spray. It is designed using an Arduino microcontroller connected to GPS and GSM modules. When the button is pressed, it sends an alert message with the woman's location, sets off an alarm, activates the flashlight and pepper spray for self-defense. The goal is to provide women a compact, one-click safety system to help them escape dangerous situations or call for help with just a single press of a button.
- The document describes a study that constructed physical fitness norms for female students attending social welfare schools in Andhra Pradesh, India.
- Researchers tested 339 students in classes 6-10 on speed, strength, agility and flexibility tests. Tests included 50m run, bend and reach, medicine ball throw, broad jump, shuttle run, and vertical jump.
- The results showed that 9th class students had the best average time for the 50m run. 10th class students had the highest flexibility on average. Strength and performance generally improved with increased class level.
This document summarizes research on downdraft gasification of biomass. It discusses how downdraft gasifiers effectively convert solid biomass into a combustible producer gas. The gasification process involves pyrolysis and reactions between hot char and gases that produce CO, H2, and CH4. Downdraft gasifiers are well-suited for biomass gasification due to their simple design and ability to manage the gasification process with low tar production. The document also reviews previous studies on gasifier configuration upgrades and their impact on performance, and the principles of downdraft gasifier operation.
This document summarizes the design and manufacturing of a twin spindle drilling attachment. Key points:
- The attachment allows a drilling machine to simultaneously drill two holes in a single setting, improving productivity over a single spindle setup.
- It uses a sun and planet gear arrangement to transmit power from the main spindle to two drilling spindles.
- Components like gears, shafts, and housing were designed using Creo software and manufactured. Drill chucks, bearings, and bits were purchased.
- The attachment was assembled and installed on a vertical drilling machine. It is aimed at improving productivity in mass production applications by combining two drilling operations into one setup.
The document presents a comparative study of different gantry girder profiles for various crane capacities and gantry spans. Bending moments, shear forces, and section properties are calculated and tabulated for 'I'-section with top and bottom plates, symmetrical plate girder, 'I'-section with 'C'-section top flange, plate girder with rolled 'C'-section top flange, and unsymmetrical plate girder sections. Graphs of steel weight required per meter length are presented. The 'I'-section with 'C'-section top flange profile is found to be optimized for biaxial bending but rolled sections may not be available for all spans.
This document summarizes research on analyzing the first ply failure of laminated composite skew plates under concentrated load using finite element analysis. It first describes how a finite element model was developed using shell elements to analyze skew plates of varying skew angles, laminations, and boundary conditions. Three failure criteria (maximum stress, maximum strain, Tsai-Wu) were used to evaluate first ply failure loads. The minimum load from the criteria was taken as the governing failure load. The research aims to determine the effects of various parameters on first ply failure loads and validate the numerical approach through benchmark problems.
This document summarizes a study that investigated the larvicidal effects of Aegle marmelos (bael tree) leaf extracts on Aedes aegypti mosquitoes. Specifically, it assessed the efficacy of methanol extracts from A. marmelos leaves in killing A. aegypti larvae (at the third instar stage) and altering their midgut proteins. The study found that the leaf extract achieved 50% larval mortality (LC50) at a concentration of 49 ppm. Proteomic analysis of larval midguts revealed changes in protein expression levels after exposure to the extract, suggesting its bioactive compounds can disrupt the midgut. The aim is to identify specific inhibitor proteins in the midg
This document presents a system for classifying electrocardiogram (ECG) signals using a convolutional neural network (CNN). The system first preprocesses raw ECG data by removing noise and segmenting the signals. It then uses a CNN to extract features directly from the ECG data and classify arrhythmias without requiring complex feature engineering. The CNN architecture contains 11 convolutional layers and is optimized using techniques like batch normalization and dropout. The system was tested on ECG datasets and achieved classification accuracy of over 93%, demonstrating its effectiveness at automated ECG classification.
This document presents a new algorithm for extracting and summarizing news from online newspapers. The algorithm first extracts news related to the topic using keyword matching. It then distinguishes different types of news about the same topic. A term frequency-based summarization method is used to generate summaries. Sentences are scored based on term frequency and the highest scoring sentences are selected for the summary. The algorithm was evaluated on news datasets from various newspapers and showed good performance in intrinsic evaluation metrics like precision, recall and F-score. Thus, the proposed method can effectively extract and summarize online news for a given keyword or topic.
artificial intelligence and data science contents.pptxGauravCar
What is artificial intelligence? Artificial intelligence is the ability of a computer or computer-controlled robot to perform tasks that are commonly associated with the intellectual processes characteristic of humans, such as the ability to reason.
› ...
Artificial intelligence (AI) | Definitio
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Sinan KOZAK
Sinan from the Delivery Hero mobile infrastructure engineering team shares a deep dive into performance acceleration with Gradle build cache optimizations. Sinan shares their journey into solving complex build-cache problems that affect Gradle builds. By understanding the challenges and solutions found in our journey, we aim to demonstrate the possibilities for faster builds. The case study reveals how overlapping outputs and cache misconfigurations led to significant increases in build times, especially as the project scaled up with numerous modules using Paparazzi tests. The journey from diagnosing to defeating cache issues offers invaluable lessons on maintaining cache integrity without sacrificing functionality.
Comparative analysis between traditional aquaponics and reconstructed aquapon...bijceesjournal
The aquaponic system of planting is a method that does not require soil usage. It is a method that only needs water, fish, lava rocks (a substitute for soil), and plants. Aquaponic systems are sustainable and environmentally friendly. Its use not only helps to plant in small spaces but also helps reduce artificial chemical use and minimizes excess water use, as aquaponics consumes 90% less water than soil-based gardening. The study applied a descriptive and experimental design to assess and compare conventional and reconstructed aquaponic methods for reproducing tomatoes. The researchers created an observation checklist to determine the significant factors of the study. The study aims to determine the significant difference between traditional aquaponics and reconstructed aquaponics systems propagating tomatoes in terms of height, weight, girth, and number of fruits. The reconstructed aquaponics system’s higher growth yield results in a much more nourished crop than the traditional aquaponics system. It is superior in its number of fruits, height, weight, and girth measurement. Moreover, the reconstructed aquaponics system is proven to eliminate all the hindrances present in the traditional aquaponics system, which are overcrowding of fish, algae growth, pest problems, contaminated water, and dead fish.
Introduction- e - waste – definition - sources of e-waste– hazardous substances in e-waste - effects of e-waste on environment and human health- need for e-waste management– e-waste handling rules - waste minimization techniques for managing e-waste – recycling of e-waste - disposal treatment methods of e- waste – mechanism of extraction of precious metal from leaching solution-global Scenario of E-waste – E-waste in India- case studies.
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsVictor Morales
K8sGPT is a tool that analyzes and diagnoses Kubernetes clusters. This presentation was used to share the requirements and dependencies to deploy K8sGPT in a local environment.
International Conference on NLP, Artificial Intelligence, Machine Learning an...gerogepatton
International Conference on NLP, Artificial Intelligence, Machine Learning and Applications (NLAIM 2024) offers a premier global platform for exchanging insights and findings in the theory, methodology, and applications of NLP, Artificial Intelligence, Machine Learning, and their applications. The conference seeks substantial contributions across all key domains of NLP, Artificial Intelligence, Machine Learning, and their practical applications, aiming to foster both theoretical advancements and real-world implementations. With a focus on facilitating collaboration between researchers and practitioners from academia and industry, the conference serves as a nexus for sharing the latest developments in the field.
The CBC machine is a common diagnostic tool used by doctors to measure a patient's red blood cell count, white blood cell count and platelet count. The machine uses a small sample of the patient's blood, which is then placed into special tubes and analyzed. The results of the analysis are then displayed on a screen for the doctor to review. The CBC machine is an important tool for diagnosing various conditions, such as anemia, infection and leukemia. It can also help to monitor a patient's response to treatment.
1. International Journal of Research in Advent Technology, Vol.2, No.7, July 2014
E-ISSN: 2321-9637
Data Encryption by Blowfish Encryption Algorithm to
120
Protect Data in Public Cloud
Mr. Bhavesh Rahulkar#1, Mr. Praveen Shende#2
CSE, Chhatrapati Shivaji Institute of Technology Durg, CSVTU Bhilai, India
1er.bvsbvs@gmail.com
2praveenshende@csitdurg.in
Abstract— Modern trends have set grow to the status and achievement of cloud computing. Cloud computing
tool gives facility of data storage and access for cloud users, but when outsourcing the data to a third party
causes safety issue of cloud data so data is protected by restricting the data. Proposed idea is encryption of data
to defend and for safe delivery of data in public cloud. Encryption of data is done by Blowfish algorithm of
symmetric key technique to protect data from external attacks. In this scheme there is registration for the user to
use the data of cloud, with no registration there is no authority for user to use data of cloud because without
registration any malicious user can use the data. Encryption is done by the Blowfish algorithm by this technique
the data is encrypted/decrypted fast. Aim of this system is “Protecting the Data of public cloud by encryption of
data by applying symmetric key algorithm”.
Index Terms— Encryption; cloud computing; Blowfish; Symmetric key; data security; BE.
1. INTRODUCTION
Cloud computing development has taken the entire
attention of several communities like researchers,
student, end user, trade, industry, and government
business. Huge data is the most important cause for
coming of cloud computing in the time-consuming,
everyday lots of data of big amount are uploaded in
the digital world which required lots of storage space
& computing resources [13]. The word cloud is
analogical to internet, the name cloud computing is
based on cloud drawings used in the earlier period to
be a representation of telephone networks and
afterward to symbolize internet in [10]. Nowadays,
cloud computing is very famous in Information
Technology; it provides enormously huge storage to
all variety of data. Cloud computing is the technology
that many companies are shifting toward and it is
becoming very essential for the IT business [9],
around all the companies are adopting this to grip
their effort competently.
Fig. 1. Cloud Computing
But security issue is most significant concern to
protect data in the cloud. The concerns of data
security are growing because the existing progress of
the internet and the simplicity of data delivery and
communication. Data safety is serious in every
aspects of our lives; banking information, private
documents and businesses. Nearly all of those are
processed with technologies and all through network
communication. A very essential cause safety
concerns are raising is as companies are running core
and non-core business functions from side to side
other companies [9]. To guarantee confidentiality of
responsive data stored in public cloud; a frequently
adopted scheme is to encrypt data previously to
uploading it to the cloud. As the cloud does not see
the keys used to encrypt the data, the privacy of the
data as of the cloud is protected [1]. Cryptography is
the procedure of achieving security by
encrypting/encoding data to make them non-readable,
the method of encoding plain text messages into
cipher text messages is called as Encryption, there are
a number of methods to encrypt the data. Encryption
of the data is the way to defend the data from
malevolent and not permitted users, encryption of the
data can be more than one level, and several levels of
the encryption improve the security of the data but
increase the encryption charge for the owner. So,
there are a number of scheme to care for the data
items, and ‘Encryption of the Data’ is one of them.
Two kinds of encryption system is used in
cryptography i) Symmetric key, ii) Asymmetric key.
To encrypt/decrypt the data secret or public/private
key is used, in symmetric key approach single key is
used to encrypt and decrypt the data but in
asymmetric key approach dissimilar keys are used to
encrypt and decrypt the data. Symmetric key
technique is quicker than asymmetric key technique
in encryption and decryption of the data. But
asymmetric key system is better than symmetric key
in security, key management & distribution
2. International Journal of Research in Advent Technology, Vol.2, No.7, July 2014
E-ISSN: 2321-9637
121
standpoint. Asymmetric key is accepted for security
of the data since asymmetric key system provides
more protection than symmetric key system. This
paper proposes the certification of the users and
revocation of the malevolent users, revocation of the
spiteful users is very much important to defend the
data from malicious use; for that cause in this system
cloud does revocation of the malevolent users and it
is set for the aim that registration of the users. In
symmetric key system secret key must be kept private
and this key only accessible for two mutual users but
in asymmetric key system it is not necessary of the
public key to be kept confidential because public key
is used to show anyone who gives data to the private
key owner. There are several symmetric key
algorithms, Blowfish is used for fast
encryption/decryption of data [11] and it is symmetric
key method thus there is no need of maintaining the
public and private key both.
The extremely important thing is that, if more than
one user are accepted and they want to get the same
document then encryption rate will be enormously
high for data owner since owner has to encrypt the
same document several times for different users using
the user’s public key in prior mCL-PKE scheme [1].
To overcome this trouble the extended mCL-PKE
system is, data owner encrypts the data only one time
and sends the extra information to the cloud for
certified users to decrypt the data [1]. But in this
proposed system there is no need of extra information
for the user to decrypt the encrypted data. Document
is decrypted only by secret key given by the owner of
the data. After getting the requested data from the
cloud user has to decrypt encrypted data by secret
key.
2. RELATED EXISTING SCHEME
The previous existing encryption system (mCL-PKE)
is certificate-less approach consists of three main
parts [1]:
(1) Owner
(2) Cloud
(3) User.
The cloud has three subordinate parts, Encrypted
Content Storage, Key Generation Center (KGC), and
Security Mediation Server (SEM). Encrypted Content
Storage stores the encrypted data, Key Generation
Center generates the KGC-key for encryption and
Security Mediation Server partially decrypts the
encrypted data [1].
Fig. 2. The basic mCL-PKE scheme [1]
Earlier existing system of mCL-PKE projected single
encryption on the data where data-owner encrypts the
data and sends to the encrypted content storage with
additional information for users now user requests for
desired data to the cloud but cloud first checks the
correlate information of the requested user if there is
existing information then cloud fetches the requested
data from the encrypted content storage, but before
sending this data to the user cloud decrypts the
encrypted data half (cloud partially decrypts the
encrypted data not fully) and sends this partially
decrypted data to the requested user now user
decrypts this data finally by his private key. This
process of decryption reduces the time required for
decryption by the user, in public key encryption user
generates the public & private key and sends public
key to the KGC, now KGC generates SEM key for
decryption and sends it to the SEM as well as
generates KGC-key to send to the owner and owner
encrypts the document by this KGC-key. This entire
procedure reduces time of the user decryption but the
weakness of this scheme is that data can be
uncovered by the cloud because cloud has the extra
information of the decryption which has to send to
the user so cloud can decrypt the complete data as
cloud partially decrypts the data and cloud is not fully
trusted entity but in this paper cloud brings the data
for user and data is still in encrypted form since the
requested data is completely decrypted only by the
user. The shortcomings of the existing scheme are:
1. There is no registration for the user, so
unauthorized users also use the confidential data.
Due to this cloud data is not safe.
2. Data is encrypted by the public key as already
defined that public key encryption algorithm
takes much time in encryption and decryption of
the data, so whole process becomes very slow.
3. Here the encrypted data is partly decrypted by
the cloud but cloud is not considered as trusted
unit, so data is not safe in this way of this system.
3. International Journal of Research in Advent Technology, Vol.2, No.7, July 2014
E-ISSN: 2321-9637
122
Private data can be seen by the cloud that owner
and user never want.
3. PROPOSED SCHEME
In this paper the proposed method is data encryption
by blowfish algorithm and it is extended from the
previous proposal of mCL-PKE, mCL-PKE system
is based on certificate-less encryption and user is not
certified by any authorized entity but in this plan
there is registration for user, registration of the user
also assures security of the data in cloud, accordingly
only certified one can use the data. This scheme
addresses the drawbacks of the mCL-PKE scheme.
In this system user has to register first by the owner
to get the confidential data. The elementary process
is, owner encrypts the data by secret key and sends
to encrypted storage, cloud fetches the requested
data from encrypted storage and gives this document
to the requested user.
Fig. 3. Certification of the user
Now user decrypts that encrypted data which is still
in encrypted form unlike decryption of the data by
cloud of existing scheme since cloud does not
decrypt the data i.e. user only decrypts encrypted
data through the given secret key, after finishing the
decryption by the user data is finally decrypted.
Using blowfish encryption method the data is
secured and entire practice becomes fast also since
data is encrypted/decrypted by secret key and secret
key encryption/decryption is extremely quick as
compare to public key encryption. In this planned
scheme there are three entities (1) Owner, (2) Cloud
and (3) User, Cloud has two sub parts they are (1)
Encrypted storage (2) Verification center.
Encrypted Storage is used as storage space for
data, data is encrypted and sent in encrypted storage
by the owner and Verification Center ensures
requested user is authorized or not if user is
registered by owner then only user is authorized for
using data otherwise user is revoked by verified
center. Cloud is divided into two units to lessen the
time required for entire process. Storage of the
encrypted data into encrypted storage and
verification of the users by Verification center lessen
the entire time of the complete method.
Fig. 4. Blowfish Encryption (BE) scheme
The fundamental method is Encryption of the
documents means cryptography technique is applied
on the data, for encryption secret-key method is used
in this BE scheme and to apply secret-key approach
blowfish algorithm is used in this system because
blowfish algorithm is very fast in encryption &
decryption as compare to other secret-key algorithms
[11]. It is extended from the previous schemes of
“Privacy Preserving Delegated Access Control in
Public clouds” and the mCL-PKE scheme of “An
Efficient Certificate-less Encryption for Secure Data
Sharing in Public Clouds” but in BE scheme there is
certification of the users which is not in mCL-PKE
scheme. In this technique owner encrypts the data
using secret key, here the encryption is done by only
owner of data, and decryption is done only by the
user. After encryption owner stores the documents to
the Encrypted Storage, when user requests any
document to the cloud, verification center first
checks the user whether user authorised or not, if
user is authorised then it fetches the requested
document from the encrypted storage and sends this
data to the user, now user downloads & decrypts that
encrypted document. In this technique the Blowfish
algorithm is used which supports symmetric key
approach, Blowfish algorithm is very easy to
implement and it enhances the speed of the complete
process of BE scheme [11], here Blowfish algorithm
is used for data encryption & decryption.
4. EXPECTED RESULTS
In this section, first presents the basic mCL-PKE
scheme and compares with improved BE scheme, the
existing scheme of public key encryption is
certificate-less scheme (mCL-PKE), in which user’s
certification is not necessary which reduces the
management cost but this scheme compromises to
the malicious users, any malicious user can access
the data for malicious use. The shortcomings of this
scheme is addressed by the improved scheme of BE
4. International Journal of Research in Advent Technology, Vol.2, No.7, July 2014
E-ISSN: 2321-9637
123
system, in which user must be registered by the
owner then only is able to access the documents. So
this ideology enhances the security of the data. The
previous mCL-PKE scheme proposed the single
encryption and half decryption is done by the cloud
and remaining half is decrypted by the user, this
scheme is proposed to reduce the decryption time of
the user, but partially decryption of the data by cloud
reduces the security of the contents, but in BE
scheme there is registration is needed for using the
cloud data and decryption of the data is done only by
the user, hence security is high in enhanced BE
scheme and overall process is very easy and fast to
execute. The overall result comes that security is
very high as well as complete process is fast in this
proposed BE system as compare to previous mCL-PKE
scheme.
5. CONCLUSION
In scheme of blowfish encryption the certification of
the user offers high security to the data, and
symmetric key approach (Blowfish Algorithm) is
very easy to implement and also offers high speed to
the whole process [11]. The future enhancement of
this scheme is that blowfish algorithm can also be
used for large size of data for fast encryption and
decryption, so it will be helpful for improving the
speed and security of the big size data. BE scheme
offers security as well as fast encryption & decryption
in which Blowfish algorithm is used to
encrypt/decrypt the data because this symmetric key
algorithm is so fast [11], so BE system uses
symmetric key algorithm to provide security and
reduce the overall process time.
REFERENCES
[1]. Mohamed Nabeel, Elisa Bertino, Seung-Hyun
Seo, Xiaoyu Ding Members of IEEE “An
Efficient Certificate-less Encryption for Secure
Data Sharing in Public Clouds” June 2013.
[2]. Zhiguo Wan, Jun’e Liu and Robert H. Deng.
Senior Member, IEEE “HASBE: A Hierarchical
Attribute-Based Solution for Flexible and
Scalable Access Control in Cloud Computing”
April 2012.
[3]. Mohamed Nabeel, Student Member, IEEE, Ning
Shang, Elisa Bertino Fellow, IEEE “Privacy
Preserving Policy Based Content Sharing in
Public Clouds” 2013.
[4]. Mohamed Nabeel, Elisa Bertino Fellow, IEEE
“Privacy Preserving Delegated Access Control in
Public Clouds” 2013.
[5]. Yang Tang, Patrick P.C. Lee, Member, IEEE,
John C.S. Lui, Fellow, IEEE, and Radia Perlman,
Fellow, IEEE “Secure Overlay Cloud Storage
With Access Control and Assured Deletion”
November/December 2012.
[6]. Sushmita Ruj, CSE, Indian Institute of
Technology, Indore, India, Milos Stojmenovic,
Singidunum University, Belgrade, Serbia, Amiya
Nayak, SEECS, University of Ottawa, Canada,
“Decentralized Access Control with Anonymous
Authentication of Data Stored in Clouds” 2013.
[7]. Smitha Sundareswaran, Anna C. Squicciarini,
Member, IEEE, and Dan Lin, “Ensuring
Distributed Accountability for Data Sharing in
the Cloud” March 2012.
[8]. Junzuo Lai, Robert H. Deng, Chaowen Guan, and
Jian Weng “Attribute-Based Encryption with
Verifiable Outsourced Decryption” 2013.
[9]. Amal AlKadi, Hanouf AlYahya, CIS
Department, Prince Sultan University, Riyadh,
Saudi Arabia, “Data Security in Cloud
Computing”.
[10]. Luit Infotech Private Limited Bangalore, India,
“Luit Infotech SaaS Business Software”.
[11]. Diaa Salama, Hatem Abdual Kader, Jazan
University, Kingdom of Saudi Arabia, and
Mohity Hadhoud, Minufiya University, Egypt,
“Studying the Effects of Most Common
Encryption Algorithms”.
[12]. Atul Kahate, Tata McGraw Hill Education
Private Limited, Second Edition, “Cryptography
and Network Security”.
[13]. Ajith Singh. N, Department of computer
science, Karpagam University, Coimbatore,
India, M. Hemalatha, Department of software
systems & research, Karpagam University,
Coimbatore, India, “Cloud computing for
Academic Environment”.
First Author
Mr. Bhavesh Rahulkar received
the BE (Computer Technology)
From RTM Nagpur University,
Nagpur (M.H.) in 2008 and pursuit
for M.Tech. (Computer Science)
From Chhatrapati Shivaji Institute of
Technology (CSIT), Durg, Chhattisgarh, India. He is
now attending the M.Tech.-CS course in CSIT and
his research interest include Computer Networks,
with Cloud Computing and programming languages
(JAVA, PHP, .NET) and Web Development, DBMS.
Second Author
Mr. Praveen Shende, Asst. Prof.
CSE Dept. C.S.I.T. Durg, India,
received B.E. (Computer Sc.) in
year 2009 and in pursuit for
M.Tech. (Computer Sc.) From
Chhatrapati Shivaji Institute of
Technology (CSIT), Durg,
Chhattisgarh, India, His interests are Programming
Languages (Java, PHP, Joomla) Cloud Computing
and DBMS, Computer Networks, Computer System
Architecture.