SlideShare a Scribd company logo
International Journal of Advance Foundation and Research in Computer (IJAFRC)
Volume 2, Special Issue (NCRTIT 2015), January 2015. ISSN 2348 - 4853
610 | © 2015, IJAFRC and NCRTIT – 2015 All Rights Reserved www.ijafrc.org
A Survey on Attribute Based Data Hiding and Access
Policies in Cloud
Rajesh Muley, Ajinkya Andhale, Adit Jain, Vikas Khairnar
muleyrajesh007@gmail.com,ajinkyaandhale@gmail.com,aditiitjee04@gmail.com, vkskhrnr@gmail.com
Department Computer Engineering MIT Acadamy Of Engineering, Pune,India
A B S T R A C T
Cloud computing is the distributed computing technology on the internet which delivers the
computing service over the internet. A user can have varying amount of services as per
requirements; and the service is fully managed by the provider. Cloud computing attracts the
business because service providing companies give wide range of service at very cheaper cost.
Small-mid scale business groups migrating towards cloud computing. Through the service
provider’s point of view securing the clients sensitive data is very much important. So we present
the basics about the cloud architecture and discussing the different ways to ensure the data
security.
Index Terms: Cloud Computing, KDC, Data Hiding.
I. INTRODUCTION
Cloud computing is the new age of technology completely changing the face of growing industry. As client
is storing sensitive and important data on cloud, so to avoid the invalid access to the data and providing
protection to this data is primary concern .Data dispatched over the Internet which is accumulated in
storage units at remote site, to guard this information in better ways the data is dispersed on various
servers. For privacy protection of each client, access control mechanism is used through which only valid
users are allowed to access the data.
While understanding the cloud computing the terms like SaaS, PaaS, IaaS must be considered. According
to the need of organization they are allowed to choose any architecture.
A. Saas
Software as a Service is a very common type of cloud service usage. Service Provider Company manages
software’s operations and its performance. A user interface is provided through which user can access
the application, usually web browser is used to provide the access.
B. Paas
Platform as a Service, Vendor Company provides platform like operating system, development
frameworks and control structure. And user can deploy its own application according to its need. Client is
having control over the installing and managing the software. The vendor manages enabling the software,
manage background activities like cloud infrastructure and operating system.
C. Iaas
International Journal of Advance Foundation and Research in Computer (IJAFRC)
Volume 2, Special Issue (NCRTIT 2015), January 2015. ISSN 2348 - 4853
611 | © 2015, IJAFRC and NCRTIT – 2015 All Rights Reserved www.ijafrc.org
Infrastructure as a Service Vendor allocates whole infrastructure like network connections, ip addresses
and load balancers, client is free to deploy any operating system and deploying software. According to
need user can fluctuate the infrastructure usage.
The Cloud computing breaks down into 3 different models: public, private and hybrid. A public cloud sells
services to anyone on the Internet. Till date Amazon is the massive public cloud provider. Some of the
organizations have its own data center that supplies hosted services to a restricted number of people are
identified as private cloud. By using public cloud resources Clients can have their own cloud; this is
known as virtual private cloud. Private or public, the benefits of cloud computing is to contribute simple,
cheaper, scalable use of cloud computing assets and IT services.
A hybrid cloud is a cloud computing domain in which some of the resources are managed by service
provider and other resources are managed by clients. For example, a business group might use a public
cloud service, such as IBM for archived data but continue to maintain very own storage for operational
customer data.
II. VIRTUALIZATION
When client use cloud computing, client is accessing pooled resources using a technique called as a
Virtualization. Virtualization assigns a logical name for a physical resource and then provides a pointer to
that physical resource when a request is made. Resources are managed efficiently with the help of
virtualization as the mapping of virtual resources to physical resources can be both dynamic and
effortless. Virtualization is dynamic in that the mapping can be assigned based on rapidly changing
conditions, and it is easy to be done because changes to a mapping assignment can be nearly
instantaneous. Virtualization splits on the basis of characteristic of cloud computing:
• Access: A client can request access to a cloud service from any location.
• Application: A cloud has multiple application instances and directs requests to an instance based
on conditions.
• CPU: Computers can be segregated into a set of virtual machines with each machine being assigned
a workload. Alternatively, systems can be virtualized through load-balancing technologies.
• Storage: Data which are stored in storage units are often imitated for redundancy.
Different Term Related To Model:
A. AES
The plaintext input and cipher text output for the AES (Advanced Encryption Standard) algorithms are
blocks of 128 bits. The cipher key input is an ordering of 128 bits, 192 bits or 256 bits. In other words
the length of the cipher key, Nk, is either 4, 6 or 8 words which represent the number of columns in the
cipher key. Cipher key length is used to categorize AES algorithm into different versions. On the basis of
cipher key size the number of rounds of encryption for each AES version depends.
B. TPS
International Journal of Advance Foundation and Research in Computer (IJAFRC)
Volume 2, Special Issue (NCRTIT 2015), January 2015. ISSN 2348 - 4853
612 | © 2015, IJAFRC and NCRTIT – 2015 All Rights Reserved www.ijafrc.org
TPS is nothing but a Transaction Processing System which gives an assurance scalable operation between
client servers as well as distributed architecture.
C. Upload The Files
In proposed approach, there are three main steps to save a file. Firstly, make a hash value at the client;
secondly, convert it into different blogs on cloud servers; thirdly, save the file. Given architecture shows
the procedures for storing a file. Firstly, users select the files or folders which are going to be uploaded
and saved by using our application. The application use the AES (Advanced Encryption Standard) and
RSA to calculate the secrete key value. Central server will disperse the given file into number of blocks
depending on the numbers of cloud servers, then encrypt all the data using RSA algorithm and store on
different cloud servers using TPS algorithm.
D. Policy Revocation For File Assured Deletion
The policy-based file secured deletion, the major design building block of POLICY BASE architecture.
Here associate file with a single atomic file access policy or policy for short, or more generally, a Boolean
combination of atomic policies. Each atomic policy is associated with a control key and all the control
keys are maintained by the key Administrator. Similar to time-based deletion, the file content is
encrypted with an information key and the information key is further encrypted with the control keys
corresponding to the policy combination. When a policy is revoked, the corresponding control key will be
removed from the key Administrator. Thus, when the policy combination associated with a file is revoked
and no longer holds the data key. Hence the encrypted content of the file cannot be recovered with the
control keys of the policies
III. CONCLUSION
In this paper, we addressed the security and storage issues simultaneously based on the type of
architecture, access control methods and the authentication techniques. By implementing multiple KDC
structure the key distribution is done in a distributed way. The users are anonymously authenticated and
their attributes are hidden from the cloud. The access policies associated with individual files are hidden
from other users by implementing a Query based approach. Further, storage related security issues are
enhanced by implementing a Homomorphic encryption technique to encrypting the outsourced data.
Also, the cloud servers are prone to various types of attacks that can cause data loss or leakage. This issue
is addressed by implementing a string matching algorithm that detects deviations and automatically
retrieves the lost data using backed-up data.
IV. ACKNOWLDEGMENT
We would like to thank Mr. Mayur Patil, Department of Computer Engineering, MIT Academy of
Engineering, and Alandi (D) for their valuable comments and guidance.
V. REFERENCES
[1] Sushmita Ruj, Milos Stojmenovic, Amiya Nayak, "Decentralized Access Control with Anonymous
Authentication for Securing Data in Clouds,"IEEE Transactions on Parallel and Distributed
Systems, pp. 1045-9219, 2013.
International Journal of Advance Foundation and Research in Computer (IJAFRC)
Volume 2, Special Issue (NCRTIT 2015), January 2015. ISSN 2348 - 4853
613 | © 2015, IJAFRC and NCRTIT – 2015 All Rights Reserved www.ijafrc.org
[2] S. Ruj, M. Stojmenovic and A. Nayak, ―Privacy Preserving Access Control with Authentication for
Securing Data in Clouds‖, IEEE/ACM International Symposium on Cluster, Cloud and Grid
Computing, pp. 556–563, 2012.
[3] C. Wang, Q. Wang, K. Ren, N. Cao and W. Lou, ―Toward Secure and Dependable Storage Services
in Cloud Computing‖, IEEE T. Services Computing, vol. 5, no. 2, pp. 220–232, 2012.
[4] J. Li, Q. Wang, C. Wang, N. Cao, K. Ren, and W. Lou, ―Fuzzy keyword search over encrypted data in
cloud computing,‖ in IEEE INFOCOM. , pp. 441–445, 2010.
[5] Keerthi B,V Rajesh kannan ,“ Implementation of Attribute Hiding Strategy and Key Revocation in
Cloud Environment “IJISET - International Journal of Innovative Science, Engineering &
Technology, Vol. 1 Issue 2, April 2014,ISSN 2348 - 7968.

More Related Content

What's hot

Security policy enforcement in cloud infrastructure
Security policy enforcement in cloud infrastructureSecurity policy enforcement in cloud infrastructure
Security policy enforcement in cloud infrastructurecsandit
 
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET Journal
 
Ppt 1
Ppt 1Ppt 1
DATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTING
DATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTINGDATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTING
DATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTING
ijsptm
 
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generationImprove HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
Editor IJMTER
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through Steganography
IDES Editor
 
Data Storage Issues in Cloud Computing
Data Storage Issues in Cloud ComputingData Storage Issues in Cloud Computing
Data Storage Issues in Cloud Computing
ijtsrd
 
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET Journal
 
Analysis-of-Security-Algorithms-in-Cloud-Computing [Autosaved]
Analysis-of-Security-Algorithms-in-Cloud-Computing [Autosaved]Analysis-of-Security-Algorithms-in-Cloud-Computing [Autosaved]
Analysis-of-Security-Algorithms-in-Cloud-Computing [Autosaved]Mahmuda Rahman
 
Proposed Model for Enhancing Data Storage Security in Cloud Computing Systems
Proposed Model for Enhancing Data Storage Security in Cloud Computing SystemsProposed Model for Enhancing Data Storage Security in Cloud Computing Systems
Proposed Model for Enhancing Data Storage Security in Cloud Computing Systems
Hossam Al-Ansary
 
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...
IJCNCJournal
 
Cloud Auditing With Zero Knowledge Privacy
Cloud Auditing With Zero Knowledge PrivacyCloud Auditing With Zero Knowledge Privacy
Cloud Auditing With Zero Knowledge Privacy
IJERA Editor
 
Cloud Computing Using Encryption and Intrusion Detection
Cloud Computing Using Encryption and Intrusion DetectionCloud Computing Using Encryption and Intrusion Detection
Cloud Computing Using Encryption and Intrusion Detection
ijsrd.com
 
data storage security technique for cloud computing
data storage security technique for cloud computingdata storage security technique for cloud computing
data storage security technique for cloud computing
hasimshah
 
Kp3419221926
Kp3419221926Kp3419221926
Kp3419221926
IJERA Editor
 
Comparison of data security in grid and cloud
Comparison of data security in grid and cloudComparison of data security in grid and cloud
Comparison of data security in grid and cloud
eSAT Publishing House
 
Comparison of data security in grid and cloud computing
Comparison of data security in grid and cloud computingComparison of data security in grid and cloud computing
Comparison of data security in grid and cloud computing
eSAT Journals
 
Secure data sharing in cloud computing using revocable storage identity-based...
Secure data sharing in cloud computing using revocable storage identity-based...Secure data sharing in cloud computing using revocable storage identity-based...
Secure data sharing in cloud computing using revocable storage identity-based...
Shakas Technologies
 
Moving to the Cloud When & Where
Moving to the Cloud When & WhereMoving to the Cloud When & Where
Moving to the Cloud When & Where
Mohammed Sajjad Ali
 

What's hot (19)

Security policy enforcement in cloud infrastructure
Security policy enforcement in cloud infrastructureSecurity policy enforcement in cloud infrastructure
Security policy enforcement in cloud infrastructure
 
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
 
Ppt 1
Ppt 1Ppt 1
Ppt 1
 
DATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTING
DATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTINGDATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTING
DATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTING
 
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generationImprove HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through Steganography
 
Data Storage Issues in Cloud Computing
Data Storage Issues in Cloud ComputingData Storage Issues in Cloud Computing
Data Storage Issues in Cloud Computing
 
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
 
Analysis-of-Security-Algorithms-in-Cloud-Computing [Autosaved]
Analysis-of-Security-Algorithms-in-Cloud-Computing [Autosaved]Analysis-of-Security-Algorithms-in-Cloud-Computing [Autosaved]
Analysis-of-Security-Algorithms-in-Cloud-Computing [Autosaved]
 
Proposed Model for Enhancing Data Storage Security in Cloud Computing Systems
Proposed Model for Enhancing Data Storage Security in Cloud Computing SystemsProposed Model for Enhancing Data Storage Security in Cloud Computing Systems
Proposed Model for Enhancing Data Storage Security in Cloud Computing Systems
 
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...
 
Cloud Auditing With Zero Knowledge Privacy
Cloud Auditing With Zero Knowledge PrivacyCloud Auditing With Zero Knowledge Privacy
Cloud Auditing With Zero Knowledge Privacy
 
Cloud Computing Using Encryption and Intrusion Detection
Cloud Computing Using Encryption and Intrusion DetectionCloud Computing Using Encryption and Intrusion Detection
Cloud Computing Using Encryption and Intrusion Detection
 
data storage security technique for cloud computing
data storage security technique for cloud computingdata storage security technique for cloud computing
data storage security technique for cloud computing
 
Kp3419221926
Kp3419221926Kp3419221926
Kp3419221926
 
Comparison of data security in grid and cloud
Comparison of data security in grid and cloudComparison of data security in grid and cloud
Comparison of data security in grid and cloud
 
Comparison of data security in grid and cloud computing
Comparison of data security in grid and cloud computingComparison of data security in grid and cloud computing
Comparison of data security in grid and cloud computing
 
Secure data sharing in cloud computing using revocable storage identity-based...
Secure data sharing in cloud computing using revocable storage identity-based...Secure data sharing in cloud computing using revocable storage identity-based...
Secure data sharing in cloud computing using revocable storage identity-based...
 
Moving to the Cloud When & Where
Moving to the Cloud When & WhereMoving to the Cloud When & Where
Moving to the Cloud When & Where
 

Viewers also liked

Module 5 lesson 1
Module 5 lesson 1Module 5 lesson 1
Module 5 lesson 1deisy0527
 
Like vs-as
Like vs-asLike vs-as
Like vs-as
JAV77
 
Blue foods
Blue foodsBlue foods
Blue foods
PPRC AYUR
 
Mary_Casella_Photography
Mary_Casella_PhotographyMary_Casella_Photography
Mary_Casella_PhotographyMary Casella
 
7 special binomial operations and formulas
7 special binomial operations and formulas7 special binomial operations and formulas
7 special binomial operations and formulas
elem-alg-sample
 
Exposicion 1
Exposicion 1Exposicion 1
Exposicion 1
JAV77
 
Prepositions after verbs
Prepositions after verbsPrepositions after verbs
Prepositions after verbs
JAV77
 
Step 3 aptitude
Step 3   aptitudeStep 3   aptitude
Step 3 aptitude
Judi Adams
 
Aed mentorship
Aed mentorshipAed mentorship
Aed mentorship
Adri BC
 
Final Report- Draft five (2)
Final Report- Draft five (2)Final Report- Draft five (2)
Final Report- Draft five (2)Kathy Jackson
 
Presentation1
Presentation1 Presentation1
Presentation1
ACR
 
Common mistakes-with-plurals
Common mistakes-with-pluralsCommon mistakes-with-plurals
Common mistakes-with-plurals
Edward Freire
 
Visual Guide to T-shirt Blends
Visual Guide to T-shirt BlendsVisual Guide to T-shirt Blends
Visual Guide to T-shirt BlendsSheryl Bordenga
 
Laporan pencapaian kokurikulum tahun 2015
Laporan pencapaian kokurikulum tahun 2015Laporan pencapaian kokurikulum tahun 2015
Laporan pencapaian kokurikulum tahun 2015
Ramli Baba
 
ASSESSING REFUGEE COMMUNICATIVE ECOLOGY to CRITIQUE and GUIDE HEALTH COMMUN...
ASSESSING REFUGEE COMMUNICATIVE ECOLOGY to CRITIQUE and GUIDE HEALTH COMMUN...ASSESSING REFUGEE COMMUNICATIVE ECOLOGY to CRITIQUE and GUIDE HEALTH COMMUN...
ASSESSING REFUGEE COMMUNICATIVE ECOLOGY to CRITIQUE and GUIDE HEALTH COMMUN...
Nakia Matthias
 

Viewers also liked (17)

Module 5 lesson 1
Module 5 lesson 1Module 5 lesson 1
Module 5 lesson 1
 
Like vs-as
Like vs-asLike vs-as
Like vs-as
 
59 tren lop
59 tren lop59 tren lop
59 tren lop
 
Blue foods
Blue foodsBlue foods
Blue foods
 
Mary_Casella_Photography
Mary_Casella_PhotographyMary_Casella_Photography
Mary_Casella_Photography
 
LD CV docx
LD CV docxLD CV docx
LD CV docx
 
7 special binomial operations and formulas
7 special binomial operations and formulas7 special binomial operations and formulas
7 special binomial operations and formulas
 
Exposicion 1
Exposicion 1Exposicion 1
Exposicion 1
 
Prepositions after verbs
Prepositions after verbsPrepositions after verbs
Prepositions after verbs
 
Step 3 aptitude
Step 3   aptitudeStep 3   aptitude
Step 3 aptitude
 
Aed mentorship
Aed mentorshipAed mentorship
Aed mentorship
 
Final Report- Draft five (2)
Final Report- Draft five (2)Final Report- Draft five (2)
Final Report- Draft five (2)
 
Presentation1
Presentation1 Presentation1
Presentation1
 
Common mistakes-with-plurals
Common mistakes-with-pluralsCommon mistakes-with-plurals
Common mistakes-with-plurals
 
Visual Guide to T-shirt Blends
Visual Guide to T-shirt BlendsVisual Guide to T-shirt Blends
Visual Guide to T-shirt Blends
 
Laporan pencapaian kokurikulum tahun 2015
Laporan pencapaian kokurikulum tahun 2015Laporan pencapaian kokurikulum tahun 2015
Laporan pencapaian kokurikulum tahun 2015
 
ASSESSING REFUGEE COMMUNICATIVE ECOLOGY to CRITIQUE and GUIDE HEALTH COMMUN...
ASSESSING REFUGEE COMMUNICATIVE ECOLOGY to CRITIQUE and GUIDE HEALTH COMMUN...ASSESSING REFUGEE COMMUNICATIVE ECOLOGY to CRITIQUE and GUIDE HEALTH COMMUN...
ASSESSING REFUGEE COMMUNICATIVE ECOLOGY to CRITIQUE and GUIDE HEALTH COMMUN...
 

Similar to Paper1

Ijirsm ashok-kumar-h-problems-and-solutions-infrastructure-as-service-securit...
Ijirsm ashok-kumar-h-problems-and-solutions-infrastructure-as-service-securit...Ijirsm ashok-kumar-h-problems-and-solutions-infrastructure-as-service-securit...
Ijirsm ashok-kumar-h-problems-and-solutions-infrastructure-as-service-securit...
IJIR JOURNALS IJIRUSA
 
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Editor IJMTER
 
Excellent Manner of Using Secure way of data storage in cloud computing
Excellent Manner of Using Secure way of data storage in cloud computingExcellent Manner of Using Secure way of data storage in cloud computing
Excellent Manner of Using Secure way of data storage in cloud computing
Editor IJMTER
 
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
Editor IJCATR
 
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARINGSURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING
Editor IJMTER
 
Data security in cloud computing
Data security in cloud computingData security in cloud computing
Data security in cloud computingPrince Chandu
 
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...
eSAT Journals
 
An efficient and secure data storage in cloud computing using modified RSA pu...
An efficient and secure data storage in cloud computing using modified RSA pu...An efficient and secure data storage in cloud computing using modified RSA pu...
An efficient and secure data storage in cloud computing using modified RSA pu...
IJECEIAES
 
Enhanced security framework to ensure data security
Enhanced security framework to ensure data securityEnhanced security framework to ensure data security
Enhanced security framework to ensure data security
eSAT Publishing House
 
Cloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher modelCloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher model
ijcsit
 
IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET- An Effective Protection on Content based Retrieval in Cloud StorehouseIRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET Journal
 
IRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET- Secure Cloud Data Using Attribute Based EncryptionIRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET Journal
 
A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...
A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...
A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...
IJSRD
 
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
IRJET Journal
 
A Novel Computing Paradigm for Data Protection in Cloud Computing
A Novel Computing Paradigm for Data Protection in Cloud ComputingA Novel Computing Paradigm for Data Protection in Cloud Computing
A Novel Computing Paradigm for Data Protection in Cloud Computing
IJMER
 
Data Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud EnvironmentData Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud Environment
IOSR Journals
 
A Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
A Trusted TPA Model, to Improve Security & Reliability for Cloud StorageA Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
A Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
IRJET Journal
 
Understanding the Determinants of Security and Privacy in Cloud Computing Arc...
Understanding the Determinants of Security and Privacy in Cloud Computing Arc...Understanding the Determinants of Security and Privacy in Cloud Computing Arc...
Understanding the Determinants of Security and Privacy in Cloud Computing Arc...
ijtsrd
 
IRJET- Improving Data Storage Security and Performance in Cloud Environment
IRJET- Improving Data Storage Security and Performance in Cloud EnvironmentIRJET- Improving Data Storage Security and Performance in Cloud Environment
IRJET- Improving Data Storage Security and Performance in Cloud Environment
IRJET Journal
 
Information Leakage Prevention In Cloud Computing
Information Leakage Prevention In Cloud ComputingInformation Leakage Prevention In Cloud Computing
Information Leakage Prevention In Cloud Computing
IJERA Editor
 

Similar to Paper1 (20)

Ijirsm ashok-kumar-h-problems-and-solutions-infrastructure-as-service-securit...
Ijirsm ashok-kumar-h-problems-and-solutions-infrastructure-as-service-securit...Ijirsm ashok-kumar-h-problems-and-solutions-infrastructure-as-service-securit...
Ijirsm ashok-kumar-h-problems-and-solutions-infrastructure-as-service-securit...
 
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
 
Excellent Manner of Using Secure way of data storage in cloud computing
Excellent Manner of Using Secure way of data storage in cloud computingExcellent Manner of Using Secure way of data storage in cloud computing
Excellent Manner of Using Secure way of data storage in cloud computing
 
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
 
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARINGSURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING
 
Data security in cloud computing
Data security in cloud computingData security in cloud computing
Data security in cloud computing
 
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...
 
An efficient and secure data storage in cloud computing using modified RSA pu...
An efficient and secure data storage in cloud computing using modified RSA pu...An efficient and secure data storage in cloud computing using modified RSA pu...
An efficient and secure data storage in cloud computing using modified RSA pu...
 
Enhanced security framework to ensure data security
Enhanced security framework to ensure data securityEnhanced security framework to ensure data security
Enhanced security framework to ensure data security
 
Cloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher modelCloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher model
 
IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET- An Effective Protection on Content based Retrieval in Cloud StorehouseIRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
 
IRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET- Secure Cloud Data Using Attribute Based EncryptionIRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET- Secure Cloud Data Using Attribute Based Encryption
 
A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...
A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...
A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...
 
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
 
A Novel Computing Paradigm for Data Protection in Cloud Computing
A Novel Computing Paradigm for Data Protection in Cloud ComputingA Novel Computing Paradigm for Data Protection in Cloud Computing
A Novel Computing Paradigm for Data Protection in Cloud Computing
 
Data Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud EnvironmentData Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud Environment
 
A Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
A Trusted TPA Model, to Improve Security & Reliability for Cloud StorageA Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
A Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
 
Understanding the Determinants of Security and Privacy in Cloud Computing Arc...
Understanding the Determinants of Security and Privacy in Cloud Computing Arc...Understanding the Determinants of Security and Privacy in Cloud Computing Arc...
Understanding the Determinants of Security and Privacy in Cloud Computing Arc...
 
IRJET- Improving Data Storage Security and Performance in Cloud Environment
IRJET- Improving Data Storage Security and Performance in Cloud EnvironmentIRJET- Improving Data Storage Security and Performance in Cloud Environment
IRJET- Improving Data Storage Security and Performance in Cloud Environment
 
Information Leakage Prevention In Cloud Computing
Information Leakage Prevention In Cloud ComputingInformation Leakage Prevention In Cloud Computing
Information Leakage Prevention In Cloud Computing
 

Paper1

  • 1. International Journal of Advance Foundation and Research in Computer (IJAFRC) Volume 2, Special Issue (NCRTIT 2015), January 2015. ISSN 2348 - 4853 610 | © 2015, IJAFRC and NCRTIT – 2015 All Rights Reserved www.ijafrc.org A Survey on Attribute Based Data Hiding and Access Policies in Cloud Rajesh Muley, Ajinkya Andhale, Adit Jain, Vikas Khairnar muleyrajesh007@gmail.com,ajinkyaandhale@gmail.com,aditiitjee04@gmail.com, vkskhrnr@gmail.com Department Computer Engineering MIT Acadamy Of Engineering, Pune,India A B S T R A C T Cloud computing is the distributed computing technology on the internet which delivers the computing service over the internet. A user can have varying amount of services as per requirements; and the service is fully managed by the provider. Cloud computing attracts the business because service providing companies give wide range of service at very cheaper cost. Small-mid scale business groups migrating towards cloud computing. Through the service provider’s point of view securing the clients sensitive data is very much important. So we present the basics about the cloud architecture and discussing the different ways to ensure the data security. Index Terms: Cloud Computing, KDC, Data Hiding. I. INTRODUCTION Cloud computing is the new age of technology completely changing the face of growing industry. As client is storing sensitive and important data on cloud, so to avoid the invalid access to the data and providing protection to this data is primary concern .Data dispatched over the Internet which is accumulated in storage units at remote site, to guard this information in better ways the data is dispersed on various servers. For privacy protection of each client, access control mechanism is used through which only valid users are allowed to access the data. While understanding the cloud computing the terms like SaaS, PaaS, IaaS must be considered. According to the need of organization they are allowed to choose any architecture. A. Saas Software as a Service is a very common type of cloud service usage. Service Provider Company manages software’s operations and its performance. A user interface is provided through which user can access the application, usually web browser is used to provide the access. B. Paas Platform as a Service, Vendor Company provides platform like operating system, development frameworks and control structure. And user can deploy its own application according to its need. Client is having control over the installing and managing the software. The vendor manages enabling the software, manage background activities like cloud infrastructure and operating system. C. Iaas
  • 2. International Journal of Advance Foundation and Research in Computer (IJAFRC) Volume 2, Special Issue (NCRTIT 2015), January 2015. ISSN 2348 - 4853 611 | © 2015, IJAFRC and NCRTIT – 2015 All Rights Reserved www.ijafrc.org Infrastructure as a Service Vendor allocates whole infrastructure like network connections, ip addresses and load balancers, client is free to deploy any operating system and deploying software. According to need user can fluctuate the infrastructure usage. The Cloud computing breaks down into 3 different models: public, private and hybrid. A public cloud sells services to anyone on the Internet. Till date Amazon is the massive public cloud provider. Some of the organizations have its own data center that supplies hosted services to a restricted number of people are identified as private cloud. By using public cloud resources Clients can have their own cloud; this is known as virtual private cloud. Private or public, the benefits of cloud computing is to contribute simple, cheaper, scalable use of cloud computing assets and IT services. A hybrid cloud is a cloud computing domain in which some of the resources are managed by service provider and other resources are managed by clients. For example, a business group might use a public cloud service, such as IBM for archived data but continue to maintain very own storage for operational customer data. II. VIRTUALIZATION When client use cloud computing, client is accessing pooled resources using a technique called as a Virtualization. Virtualization assigns a logical name for a physical resource and then provides a pointer to that physical resource when a request is made. Resources are managed efficiently with the help of virtualization as the mapping of virtual resources to physical resources can be both dynamic and effortless. Virtualization is dynamic in that the mapping can be assigned based on rapidly changing conditions, and it is easy to be done because changes to a mapping assignment can be nearly instantaneous. Virtualization splits on the basis of characteristic of cloud computing: • Access: A client can request access to a cloud service from any location. • Application: A cloud has multiple application instances and directs requests to an instance based on conditions. • CPU: Computers can be segregated into a set of virtual machines with each machine being assigned a workload. Alternatively, systems can be virtualized through load-balancing technologies. • Storage: Data which are stored in storage units are often imitated for redundancy. Different Term Related To Model: A. AES The plaintext input and cipher text output for the AES (Advanced Encryption Standard) algorithms are blocks of 128 bits. The cipher key input is an ordering of 128 bits, 192 bits or 256 bits. In other words the length of the cipher key, Nk, is either 4, 6 or 8 words which represent the number of columns in the cipher key. Cipher key length is used to categorize AES algorithm into different versions. On the basis of cipher key size the number of rounds of encryption for each AES version depends. B. TPS
  • 3. International Journal of Advance Foundation and Research in Computer (IJAFRC) Volume 2, Special Issue (NCRTIT 2015), January 2015. ISSN 2348 - 4853 612 | © 2015, IJAFRC and NCRTIT – 2015 All Rights Reserved www.ijafrc.org TPS is nothing but a Transaction Processing System which gives an assurance scalable operation between client servers as well as distributed architecture. C. Upload The Files In proposed approach, there are three main steps to save a file. Firstly, make a hash value at the client; secondly, convert it into different blogs on cloud servers; thirdly, save the file. Given architecture shows the procedures for storing a file. Firstly, users select the files or folders which are going to be uploaded and saved by using our application. The application use the AES (Advanced Encryption Standard) and RSA to calculate the secrete key value. Central server will disperse the given file into number of blocks depending on the numbers of cloud servers, then encrypt all the data using RSA algorithm and store on different cloud servers using TPS algorithm. D. Policy Revocation For File Assured Deletion The policy-based file secured deletion, the major design building block of POLICY BASE architecture. Here associate file with a single atomic file access policy or policy for short, or more generally, a Boolean combination of atomic policies. Each atomic policy is associated with a control key and all the control keys are maintained by the key Administrator. Similar to time-based deletion, the file content is encrypted with an information key and the information key is further encrypted with the control keys corresponding to the policy combination. When a policy is revoked, the corresponding control key will be removed from the key Administrator. Thus, when the policy combination associated with a file is revoked and no longer holds the data key. Hence the encrypted content of the file cannot be recovered with the control keys of the policies III. CONCLUSION In this paper, we addressed the security and storage issues simultaneously based on the type of architecture, access control methods and the authentication techniques. By implementing multiple KDC structure the key distribution is done in a distributed way. The users are anonymously authenticated and their attributes are hidden from the cloud. The access policies associated with individual files are hidden from other users by implementing a Query based approach. Further, storage related security issues are enhanced by implementing a Homomorphic encryption technique to encrypting the outsourced data. Also, the cloud servers are prone to various types of attacks that can cause data loss or leakage. This issue is addressed by implementing a string matching algorithm that detects deviations and automatically retrieves the lost data using backed-up data. IV. ACKNOWLDEGMENT We would like to thank Mr. Mayur Patil, Department of Computer Engineering, MIT Academy of Engineering, and Alandi (D) for their valuable comments and guidance. V. REFERENCES [1] Sushmita Ruj, Milos Stojmenovic, Amiya Nayak, "Decentralized Access Control with Anonymous Authentication for Securing Data in Clouds,"IEEE Transactions on Parallel and Distributed Systems, pp. 1045-9219, 2013.
  • 4. International Journal of Advance Foundation and Research in Computer (IJAFRC) Volume 2, Special Issue (NCRTIT 2015), January 2015. ISSN 2348 - 4853 613 | © 2015, IJAFRC and NCRTIT – 2015 All Rights Reserved www.ijafrc.org [2] S. Ruj, M. Stojmenovic and A. Nayak, ―Privacy Preserving Access Control with Authentication for Securing Data in Clouds‖, IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing, pp. 556–563, 2012. [3] C. Wang, Q. Wang, K. Ren, N. Cao and W. Lou, ―Toward Secure and Dependable Storage Services in Cloud Computing‖, IEEE T. Services Computing, vol. 5, no. 2, pp. 220–232, 2012. [4] J. Li, Q. Wang, C. Wang, N. Cao, K. Ren, and W. Lou, ―Fuzzy keyword search over encrypted data in cloud computing,‖ in IEEE INFOCOM. , pp. 441–445, 2010. [5] Keerthi B,V Rajesh kannan ,“ Implementation of Attribute Hiding Strategy and Key Revocation in Cloud Environment “IJISET - International Journal of Innovative Science, Engineering & Technology, Vol. 1 Issue 2, April 2014,ISSN 2348 - 7968.