SlideShare a Scribd company logo
1 of 3
Secure Overlay Cloud Storage with Access Control and
                                Assured Deletion


Abstract—

We can now outsource data backups off-site to third-party cloud storage services
so as to reduce data management costs.However, we must provide security
guarantees for the outsourced data, which is now maintained by third parties. We
design and implement FADE, a secure overlay cloud storage system that achieves
fine-grained, policy-based access control and file assured deletion. It associates
outsourced files with file access policies, and assuredly deletes files to make them
unrecoverable to anyone upon revocations of file access policies. To achieve such
security goals, FADE is built upon a set of cryptographic key operations that are
self-maintained by a quorum of key managers that are independent of third-party
clouds. In particular, FADE acts as an overlay system that works seamlessly atop
today’s cloud storage services.

Reasons for the proposal :

security concerns become relevant as we now outsource the storage of possibly
sensitive data to third parities. we are particularly interested in two security issues.

First, we need to provide guarantees of access control, in which we must ensure
that only authorized parties can access the outsourced data on the cloud. In
particular, we must prohibit third-party cloud storage providers from mining any
sensitive information of their clients’ data for their own marketing purposes.

Second, it is important to provide guarantees of assured deletion, meaning that
outsourced data is permanently inaccessible to anybody (including the data owner)
upon requests of deletion of data. Keeping data permanently is undesirable, as data
may be unexpectedly disclosed in the future due to malicious attacks on the cloud
or careless management of cloud operators.

Proposed system :

In this paper, we present FADE, a secure overlay cloud storage system that
provides fine-grained access control and assured deletion for outsourced data on
the cloud, while working seamlessly atop today’s cloud storage services. In FADE,
active data files that remain on the cloud are associated with a set of user-defined
file access policies (e.g., time expiration, read/write permissions of authorized
users), such that data files are accessible only to users who satisfy the file access
policies. In addition, FADE generalizes time-based file assured deletion (i.e., data
files are assuredly deleted upon time expiration) into a more fine-grained approach
called policy-based file assured deletion, in which data files are assuredly deleted
when the associated file access policies are revoked and become obsolete. The
design intuition of FADE is to decouple the management of encrypted data and
cryptographic keys, such that encrypted data remains on third-party (untrusted)
cloud storage providers, while cryptographic keys are independently maintained
and operated by a quorum of key managers that altogether form trustworthiness.
To provide guarantees of access control and assured deletion, FADE leverages off-
theshelf cryptographic schemes including threshold secret sharing [29] and
attribute-based encryption.

Advantages :

Time-based file assured deletion, which is first introduced in [23], means that files
can be securely deleted and remain permanently inaccessible after a pre-defined
duration. The main idea is that a file is encrypted with a data key by the owner of
the file, and this data key is further encrypted with a control key by a separate key
manager (known as Ephemerizer). The key manager is a server that is responsible
for cryptographic key management. In [23], the control key is time-based, meaning
that it will be completely removed by the key manager when an expiration time is
reached, where the expiration time is specified when the file is first declared.
Without the control key, the data key and hence the data file remain encrypted and
are deemed to be inaccessible. Thus, the main security property of file assured
deletion is that even if a cloud provider does not remove expired file copies from
its storage, those files remain encrypted and unrecoverable.

More Related Content

What's hot

A secure erasure code based cloud storage
A secure erasure code based cloud storageA secure erasure code based cloud storage
A secure erasure code based cloud storageIMPULSE_TECHNOLOGY
 
Privacy preserving delegated access control in public clouds
Privacy preserving delegated access control in public cloudsPrivacy preserving delegated access control in public clouds
Privacy preserving delegated access control in public cloudsIEEEFINALYEARPROJECTS
 
multiple encryption in clouud computing
multiple encryption in clouud computingmultiple encryption in clouud computing
multiple encryption in clouud computingRauf Wani
 
SMONA: Secure Multi Owner Data Sharing for Dynamic Groups in the Cloud
SMONA: Secure Multi Owner Data Sharing for Dynamic Groups in the CloudSMONA: Secure Multi Owner Data Sharing for Dynamic Groups in the Cloud
SMONA: Secure Multi Owner Data Sharing for Dynamic Groups in the Cloudijsrd.com
 
Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...ieeepondy
 
Privacy preserving delegated access control in public cloud
Privacy preserving delegated access control in public cloudPrivacy preserving delegated access control in public cloud
Privacy preserving delegated access control in public cloudAswathy Rajan
 
Hasbe a hierarchical attribute based solution for flexible and scalable acces...
Hasbe a hierarchical attribute based solution for flexible and scalable acces...Hasbe a hierarchical attribute based solution for flexible and scalable acces...
Hasbe a hierarchical attribute based solution for flexible and scalable acces...JPINFOTECH JAYAPRAKASH
 
Privacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud dataPrivacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud dataIGEEKS TECHNOLOGIES
 
Database Security & Encryption
Database Security & EncryptionDatabase Security & Encryption
Database Security & EncryptionTech Sanhita
 
Analysis-of-Security-Algorithms-in-Cloud-Computing [Autosaved]
Analysis-of-Security-Algorithms-in-Cloud-Computing [Autosaved]Analysis-of-Security-Algorithms-in-Cloud-Computing [Autosaved]
Analysis-of-Security-Algorithms-in-Cloud-Computing [Autosaved]Mahmuda Rahman
 
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud. A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud. IJCERT JOURNAL
 
2.achieving practical symmetric searchable encryption with search pattern pri...
2.achieving practical symmetric searchable encryption with search pattern pri...2.achieving practical symmetric searchable encryption with search pattern pri...
2.achieving practical symmetric searchable encryption with search pattern pri...Venkat Projects
 
Mona secure multi owner data sharing for dynamic groups in the cloud
Mona secure multi owner data sharing for dynamic groups in the cloudMona secure multi owner data sharing for dynamic groups in the cloud
Mona secure multi owner data sharing for dynamic groups in the cloudKrushna Panda
 
Privacy Preserving Public Auditing for Data Storage Security in Cloud.ppt
Privacy Preserving Public Auditing for Data Storage Security in Cloud.pptPrivacy Preserving Public Auditing for Data Storage Security in Cloud.ppt
Privacy Preserving Public Auditing for Data Storage Security in Cloud.pptGirish Chandra
 
Securing data in the cloud
Securing data in the cloudSecuring data in the cloud
Securing data in the cloudEyal Estrin
 
Choosing Encryption for Microsoft SQL Server
Choosing Encryption for Microsoft SQL ServerChoosing Encryption for Microsoft SQL Server
Choosing Encryption for Microsoft SQL ServerJerome J. Penna
 
Mona secure multi owner data sharing for dynamic groups in the cloud
Mona secure multi owner data sharing for dynamic groups in the cloudMona secure multi owner data sharing for dynamic groups in the cloud
Mona secure multi owner data sharing for dynamic groups in the cloudJPINFOTECH JAYAPRAKASH
 

What's hot (19)

A secure erasure code based cloud storage
A secure erasure code based cloud storageA secure erasure code based cloud storage
A secure erasure code based cloud storage
 
Privacy preserving delegated access control in public clouds
Privacy preserving delegated access control in public cloudsPrivacy preserving delegated access control in public clouds
Privacy preserving delegated access control in public clouds
 
multiple encryption in clouud computing
multiple encryption in clouud computingmultiple encryption in clouud computing
multiple encryption in clouud computing
 
SMONA: Secure Multi Owner Data Sharing for Dynamic Groups in the Cloud
SMONA: Secure Multi Owner Data Sharing for Dynamic Groups in the CloudSMONA: Secure Multi Owner Data Sharing for Dynamic Groups in the Cloud
SMONA: Secure Multi Owner Data Sharing for Dynamic Groups in the Cloud
 
Cloud security
Cloud securityCloud security
Cloud security
 
Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...
 
Privacy preserving delegated access control in public cloud
Privacy preserving delegated access control in public cloudPrivacy preserving delegated access control in public cloud
Privacy preserving delegated access control in public cloud
 
Hasbe a hierarchical attribute based solution for flexible and scalable acces...
Hasbe a hierarchical attribute based solution for flexible and scalable acces...Hasbe a hierarchical attribute based solution for flexible and scalable acces...
Hasbe a hierarchical attribute based solution for flexible and scalable acces...
 
Privacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud dataPrivacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud data
 
Database Security & Encryption
Database Security & EncryptionDatabase Security & Encryption
Database Security & Encryption
 
Analysis-of-Security-Algorithms-in-Cloud-Computing [Autosaved]
Analysis-of-Security-Algorithms-in-Cloud-Computing [Autosaved]Analysis-of-Security-Algorithms-in-Cloud-Computing [Autosaved]
Analysis-of-Security-Algorithms-in-Cloud-Computing [Autosaved]
 
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud. A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
 
2.achieving practical symmetric searchable encryption with search pattern pri...
2.achieving practical symmetric searchable encryption with search pattern pri...2.achieving practical symmetric searchable encryption with search pattern pri...
2.achieving practical symmetric searchable encryption with search pattern pri...
 
Mona secure multi owner data sharing for dynamic groups in the cloud
Mona secure multi owner data sharing for dynamic groups in the cloudMona secure multi owner data sharing for dynamic groups in the cloud
Mona secure multi owner data sharing for dynamic groups in the cloud
 
Privacy Preserving Public Auditing for Data Storage Security in Cloud.ppt
Privacy Preserving Public Auditing for Data Storage Security in Cloud.pptPrivacy Preserving Public Auditing for Data Storage Security in Cloud.ppt
Privacy Preserving Public Auditing for Data Storage Security in Cloud.ppt
 
Securing data
Securing dataSecuring data
Securing data
 
Securing data in the cloud
Securing data in the cloudSecuring data in the cloud
Securing data in the cloud
 
Choosing Encryption for Microsoft SQL Server
Choosing Encryption for Microsoft SQL ServerChoosing Encryption for Microsoft SQL Server
Choosing Encryption for Microsoft SQL Server
 
Mona secure multi owner data sharing for dynamic groups in the cloud
Mona secure multi owner data sharing for dynamic groups in the cloudMona secure multi owner data sharing for dynamic groups in the cloud
Mona secure multi owner data sharing for dynamic groups in the cloud
 

Similar to Secure overlay cloud storage with access

A Secured Cloud Data Storage with Access Privilages
A Secured Cloud Data Storage with Access PrivilagesA Secured Cloud Data Storage with Access Privilages
A Secured Cloud Data Storage with Access Privilagesijeei-iaes
 
Secure auditing and deduplicating data in cloud
Secure auditing and deduplicating data in cloudSecure auditing and deduplicating data in cloud
Secure auditing and deduplicating data in cloudCloudTechnologies
 
A Survey on Assured deletion and Access Control
A Survey on Assured deletion and Access ControlA Survey on Assured deletion and Access Control
A Survey on Assured deletion and Access ControlAM Publications
 
Achieving Secure, sclable and finegrained Cloud computing report
Achieving Secure, sclable and finegrained Cloud computing reportAchieving Secure, sclable and finegrained Cloud computing report
Achieving Secure, sclable and finegrained Cloud computing reportKiran Girase
 
A robust and verifiable threshold multi authority access control system in pu...
A robust and verifiable threshold multi authority access control system in pu...A robust and verifiable threshold multi authority access control system in pu...
A robust and verifiable threshold multi authority access control system in pu...IJARIIT
 
Iaetsd time constrained self-destructing
Iaetsd time constrained self-destructingIaetsd time constrained self-destructing
Iaetsd time constrained self-destructingIaetsd Iaetsd
 
Bio-Cryptography Based Secured Data Replication Management in Cloud Storage
Bio-Cryptography Based Secured Data Replication Management in Cloud StorageBio-Cryptography Based Secured Data Replication Management in Cloud Storage
Bio-Cryptography Based Secured Data Replication Management in Cloud StorageIJERA Editor
 
111906665 ensuring-distributed-accountability-for-data-sharing-in-the-cloud
111906665 ensuring-distributed-accountability-for-data-sharing-in-the-cloud111906665 ensuring-distributed-accountability-for-data-sharing-in-the-cloud
111906665 ensuring-distributed-accountability-for-data-sharing-in-the-cloudNag Nani
 
Secured Multi Cloud Storage Using CPDP
Secured Multi Cloud Storage Using CPDPSecured Multi Cloud Storage Using CPDP
Secured Multi Cloud Storage Using CPDPIJSRD
 
FinalCode-At-A-Glance-Webcopy-Optimized
FinalCode-At-A-Glance-Webcopy-OptimizedFinalCode-At-A-Glance-Webcopy-Optimized
FinalCode-At-A-Glance-Webcopy-OptimizedPhillip Stalnaker
 
Secure File SharingSecure File Sharing Using Access Contro.docx
Secure File SharingSecure File Sharing Using Access Contro.docxSecure File SharingSecure File Sharing Using Access Contro.docx
Secure File SharingSecure File Sharing Using Access Contro.docxjeffreye3
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishekEr. rahul abhishek
 
Mcafee CASB/DLP + Seclore Rights Management Solutions
Mcafee CASB/DLP + Seclore Rights Management Solutions Mcafee CASB/DLP + Seclore Rights Management Solutions
Mcafee CASB/DLP + Seclore Rights Management Solutions Seclore
 
Cloud Auditing With Zero Knowledge Privacy
Cloud Auditing With Zero Knowledge PrivacyCloud Auditing With Zero Knowledge Privacy
Cloud Auditing With Zero Knowledge PrivacyIJERA Editor
 

Similar to Secure overlay cloud storage with access (20)

4
44
4
 
A Secured Cloud Data Storage with Access Privilages
A Secured Cloud Data Storage with Access PrivilagesA Secured Cloud Data Storage with Access Privilages
A Secured Cloud Data Storage with Access Privilages
 
Fade
FadeFade
Fade
 
Cloud security (domain11 14)
Cloud security (domain11 14)Cloud security (domain11 14)
Cloud security (domain11 14)
 
Secure auditing and deduplicating data in cloud
Secure auditing and deduplicating data in cloudSecure auditing and deduplicating data in cloud
Secure auditing and deduplicating data in cloud
 
A Survey on Assured deletion and Access Control
A Survey on Assured deletion and Access ControlA Survey on Assured deletion and Access Control
A Survey on Assured deletion and Access Control
 
Achieving Secure, sclable and finegrained Cloud computing report
Achieving Secure, sclable and finegrained Cloud computing reportAchieving Secure, sclable and finegrained Cloud computing report
Achieving Secure, sclable and finegrained Cloud computing report
 
A robust and verifiable threshold multi authority access control system in pu...
A robust and verifiable threshold multi authority access control system in pu...A robust and verifiable threshold multi authority access control system in pu...
A robust and verifiable threshold multi authority access control system in pu...
 
1784 1788
1784 17881784 1788
1784 1788
 
1784 1788
1784 17881784 1788
1784 1788
 
Iaetsd time constrained self-destructing
Iaetsd time constrained self-destructingIaetsd time constrained self-destructing
Iaetsd time constrained self-destructing
 
Bio-Cryptography Based Secured Data Replication Management in Cloud Storage
Bio-Cryptography Based Secured Data Replication Management in Cloud StorageBio-Cryptography Based Secured Data Replication Management in Cloud Storage
Bio-Cryptography Based Secured Data Replication Management in Cloud Storage
 
111906665 ensuring-distributed-accountability-for-data-sharing-in-the-cloud
111906665 ensuring-distributed-accountability-for-data-sharing-in-the-cloud111906665 ensuring-distributed-accountability-for-data-sharing-in-the-cloud
111906665 ensuring-distributed-accountability-for-data-sharing-in-the-cloud
 
Secured Multi Cloud Storage Using CPDP
Secured Multi Cloud Storage Using CPDPSecured Multi Cloud Storage Using CPDP
Secured Multi Cloud Storage Using CPDP
 
FinalCode-At-A-Glance-Webcopy-Optimized
FinalCode-At-A-Glance-Webcopy-OptimizedFinalCode-At-A-Glance-Webcopy-Optimized
FinalCode-At-A-Glance-Webcopy-Optimized
 
Secure File SharingSecure File Sharing Using Access Contro.docx
Secure File SharingSecure File Sharing Using Access Contro.docxSecure File SharingSecure File Sharing Using Access Contro.docx
Secure File SharingSecure File Sharing Using Access Contro.docx
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishek
 
Mcafee CASB/DLP + Seclore Rights Management Solutions
Mcafee CASB/DLP + Seclore Rights Management Solutions Mcafee CASB/DLP + Seclore Rights Management Solutions
Mcafee CASB/DLP + Seclore Rights Management Solutions
 
G044053337
G044053337G044053337
G044053337
 
Cloud Auditing With Zero Knowledge Privacy
Cloud Auditing With Zero Knowledge PrivacyCloud Auditing With Zero Knowledge Privacy
Cloud Auditing With Zero Knowledge Privacy
 

More from IMPULSE_TECHNOLOGY (20)

17
1717
17
 
16
1616
16
 
15
1515
15
 
25
2525
25
 
24
2424
24
 
23
2323
23
 
22
2222
22
 
21
2121
21
 
20
2020
20
 
19
1919
19
 
18
1818
18
 
16
1616
16
 
15
1515
15
 
14
1414
14
 
13
1313
13
 
12
1212
12
 
11
1111
11
 
10
1010
10
 
9
99
9
 
8
88
8
 

Secure overlay cloud storage with access

  • 1. Secure Overlay Cloud Storage with Access Control and Assured Deletion Abstract— We can now outsource data backups off-site to third-party cloud storage services so as to reduce data management costs.However, we must provide security guarantees for the outsourced data, which is now maintained by third parties. We design and implement FADE, a secure overlay cloud storage system that achieves fine-grained, policy-based access control and file assured deletion. It associates outsourced files with file access policies, and assuredly deletes files to make them unrecoverable to anyone upon revocations of file access policies. To achieve such security goals, FADE is built upon a set of cryptographic key operations that are self-maintained by a quorum of key managers that are independent of third-party clouds. In particular, FADE acts as an overlay system that works seamlessly atop today’s cloud storage services. Reasons for the proposal : security concerns become relevant as we now outsource the storage of possibly sensitive data to third parities. we are particularly interested in two security issues. First, we need to provide guarantees of access control, in which we must ensure that only authorized parties can access the outsourced data on the cloud. In particular, we must prohibit third-party cloud storage providers from mining any sensitive information of their clients’ data for their own marketing purposes. Second, it is important to provide guarantees of assured deletion, meaning that outsourced data is permanently inaccessible to anybody (including the data owner)
  • 2. upon requests of deletion of data. Keeping data permanently is undesirable, as data may be unexpectedly disclosed in the future due to malicious attacks on the cloud or careless management of cloud operators. Proposed system : In this paper, we present FADE, a secure overlay cloud storage system that provides fine-grained access control and assured deletion for outsourced data on the cloud, while working seamlessly atop today’s cloud storage services. In FADE, active data files that remain on the cloud are associated with a set of user-defined file access policies (e.g., time expiration, read/write permissions of authorized users), such that data files are accessible only to users who satisfy the file access policies. In addition, FADE generalizes time-based file assured deletion (i.e., data files are assuredly deleted upon time expiration) into a more fine-grained approach called policy-based file assured deletion, in which data files are assuredly deleted when the associated file access policies are revoked and become obsolete. The design intuition of FADE is to decouple the management of encrypted data and cryptographic keys, such that encrypted data remains on third-party (untrusted) cloud storage providers, while cryptographic keys are independently maintained and operated by a quorum of key managers that altogether form trustworthiness. To provide guarantees of access control and assured deletion, FADE leverages off- theshelf cryptographic schemes including threshold secret sharing [29] and attribute-based encryption. Advantages : Time-based file assured deletion, which is first introduced in [23], means that files can be securely deleted and remain permanently inaccessible after a pre-defined duration. The main idea is that a file is encrypted with a data key by the owner of the file, and this data key is further encrypted with a control key by a separate key
  • 3. manager (known as Ephemerizer). The key manager is a server that is responsible for cryptographic key management. In [23], the control key is time-based, meaning that it will be completely removed by the key manager when an expiration time is reached, where the expiration time is specified when the file is first declared. Without the control key, the data key and hence the data file remain encrypted and are deemed to be inaccessible. Thus, the main security property of file assured deletion is that even if a cloud provider does not remove expired file copies from its storage, those files remain encrypted and unrecoverable.