SlideShare a Scribd company logo
1 of 4
Download to read offline
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 04 Issue: 04 | Apr-2015, Available @ http://www.ijret.org 734
SECURED ARCHITECTURE FOR MULTI-CLOUD USING KEY
AGGREGATION TECHNIQUE
Suruchi Narote1
, Lokesh Bijole2
1
ME (Student), Department of Computer Engineering, Padm. Dr. V. B. Kolte College of Engineering Malkapur,
Maharashtra, India
2
Asst. Professors, Department of Computer Engineering, Padm. Dr. V. B. Kolte College of Engineering Malkapur,
Maharashtra, India
Abstract
Data storage and data sharing is the most important aspect in cloud computing, so sharing data and storing it in a secure way is
the biggest task when adopting cloud services. In this paper, we will discuss how to share and store data effectively which will
prevent the third party to access the secure data in cloud storage. This article provides a survey of using multiple clouds to
achieve a security. In this we are introducing a public-key encryption known as Key-aggregate Cryptosystem (KAC).
Cryptography is a technique which encodes a data using some key and produces unreadable data so that only a desired party is
able to decode that data. KAC produces a constant size ciphertexts (unreadable data) such that decryption right for any set of
ciphertexts are possible, means one can aggregate any set of secret keys and make them as compact as single key, but
encompassing the power of all the keys being aggregate. This aggregate key is sent to other via secure channel (or via email) for
decrypting the ciphertext set and remaining files outside the set are remains secret.
Keywords: Cloud, multicloud, key-aggregate encryption, data storage, data sharing and security.
--------------------------------------------------------------------***------------------------------------------------------------------
1. INTRODUCTION
In today’s world Cloud computing is the most emerging
technology used in the scientific and industrial workgroup.
Cloud computing provides scalable resources and services
over the internet which the third party can access as per their
requirement and have to pay rent for using these services as
per their usage, which is very cost effective as well as
expenditures for hardware and software. [1]Cloud can be
divided into 2 types based on their physical location from
the viewpoint of the user: public cloud and private cloud. A
public cloud is a cloud which is provided by the third party
and involves resources outside the user’s office and in
contrast to public cloud; private cloud is installed within the
user’s office. This article will concentrate on public cloud
due to highest security demand. Cloud provides various
types of Services. In this paper we are focusing on the
following two services provided by the cloud:
1.Software as a Service (SaaS): This allows cloud user to
access the provider’s application running on a cloud using
various client devices via interface such as web browser.
2.Platform as a Service (PaaS): This allow cloud user to
upload his own application and data on to the cloud without
installing any tools or platform on their local machine.
Data from various clients are stored on the single physical
machine, so there are various cryptographic techniques
which will allow unauthorised user to access data on behalf
of the owner without leaking anything about the data, or
without compromising the data owner’s anonymity [4]. The
cloud user don’t have the full faith on the cloud server or
cloud provider that they will not leak their data with the
others, so before uploading the data on the cloud server, the
cloud user encrypt their data using their own key. Sharing of
data is most important in cloud storage. For example, you
can let your friend so see some of your photos in which he is
present from your private pictures; an organization granted
an access rights to their employee to access some sensitive
data. The challenge is how encrypted data is to be shared
effectively.
1.1 Data Sharing in Cloud
For an example Alice keeps her private data i.e. photos on
Dropbox and she doesn’t want to share it with everyone.
Due to the possibility of data leakage, Alice does not fell to
only depend on the privacy preserving mechanism provided
by Dropbox, so before uploading the photos she encrypts
them by her own key. Some day Alice wants to share photos
to Bob in which he is present. Alice can share the photos by
using the share function of the Dropbox, but the problem is
how to share the decryption rights with the Bob. One option
is Alice sends an email to Bob in which the private key is
ivolved.There are 2 possible ways: [3]
1. Alice can encrypt all photos with one key and send to
Bob securely.
2. Alice encrypts each photo with different keys and sends
Bob the keys for each photo which she wants to share.
The first way is not proper method because all the photos of
Alice may be leaked to Bob. For the second way efficiency
is the major concern because it needs as many keys as the
number of photos she want to send to Bob. So transferring
these keys securely and storing them requires very
expensive secure storage, which is very heavy and
expensive. For the above problem the best solution is that
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 04 Issue: 04 | Apr-2015, Available @ http://www.ijret.org 735
Alice encrypts files with different public key but sends a
single constant size aggregate key to Bob for decrypting the
file.
Fig 1 Alice shares files with identifiers 2, 4 and 6 with Bob
by sending him a single aggregate key.
One way of reducing the threat and proving security to the
data and application in a public cloud is to use multiple
clouds simultaneously, one for storing the application and
the other for storage of the data. This triggered a lot of
research activities, resulting in various approaches which
differ in technologies, partitioning, encryption techniques
and distribution patterns as well as security levels. Public
key encryption requires different key both for encryption
and decryption. In this paper we are using multiple clouds
one for application and one for storage and a key
aggregation encryption for encrypting the data.
2. LITERATURE SERVEY
In 2013 Jens-Matthias Bohli, Nils Gruschka, Meiko Jensen,
Luigi Lo Lacono and Ninja Marnau, “Security and Privacy-
Enhancing Multicloud Architectures”, one idea on reducing
the risk for data and applications in a public cloud is the
simultaneous usage of multiple clouds. Several approaches
employing this paradigm have been proposed recently this
paper provides a servey on different security by multicloud
adoption approaches. It provides four distinct models in
form of abstracted multicloud architectures. These
developed multicloud architectures allow to categorize the
available schemes and to analyze them according to their
security benefits.[1]
In 2014 Cheng-Kang Chu, Sherman S. M. Chow, Wen-Guey
Tzeng, Jianying Zhou, and Robert H. Deng,” Key-
Aggregate Cryptosystem for Scalable Data Sharing in Cloud
Storage” In this paper, we study how to make a decryption
key more powerful in the sense that it allows decryption of
multiple cipher texts, without increasing its size.
“To design an efficient public-key encryption scheme which
supports flexible delegation in the sense that any subset of
the ciphertexts (produced by the encryption scheme) is
decryptable by a constant-size decryption key (generated by
the owner of the master-secret key)?” [2]
To ensure data integrity and security in cloud computing this
proposed architecture uses a primary cloud and a secondary
cloud to incorporate a multi cloud system, these are as
follows[5]:
1. Primary cloud: The primary cloud can be created using
centrally built software to fall under the category of SaaS
(software as a service) cloud computing model. The primary
cloud consists of a group of systems which are
interconnected through LAN which in turn forms the
primary cloud. The internal users can access the primary
cloud through the same LAN whereas the external users can
access the primary cloud through devices supporting a web
browser using GPRS services. This model thus enables
multiple users to access the primary cloud simultaneously.
The primary cloud where application resides also maintains
security of data by authentication of the user who are using
the application. So only an authorized user can access data
.This is done by the cloud administrator and hence a user is
allowed to access only data relevant to him not the data of
others which is also stored in primary cloud.
2. Administrator: The cloud administrator is the most
important part of this architecture and is responsible for
proper working of both primary and secondary cloud. The
data so retrieved from the secondary cloud is in an
unreadable encrypted format. For the file to be back in its
original form data decryption takes place. The data retrieved
from the secondary cloud is uploaded to the administrator
who in turn performs decryption code to get the data in its
original form. This is then sent to the user. The data sent is
user specific and can only be sent to authenticated users.
The user authentication is done by the administrator to
maintain integrity of data.
3. Secondary cloud: The Secondary cloud falls under the
same SaaS (software as a service) cloud model similar to the
primary cloud. Secondary cloud is used for storing a backup
of the data stored in the primary cloud in an encrypted form.
This is done after the administrator performs data encryption
and segmentation on the data taken from the primary cloud.
The secondary cloud can only be controlled by the
administrator to ensure integrity of data. Each segmented
data known as chunks are stored in separate systems in the
secondary cloud. In case data is being retrieved from
secondary cloud, the encrypted and segmented data is sent to
the administrator for data decryption and de-segmentation
before sending it to the user. Thus, the proposed system
ensures security and integrity to the data saved in the cloud
and also provides an architecture which is secure and
reliable through the use of Linux as the OS.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 04 Issue: 04 | Apr-2015, Available @ http://www.ijret.org 736
3. PROPOSED WORK
Our main aim was to develop an encryption/decryption
program which will generate an encryption key. In today’s
world most of the application uses the concept of
cryptography. For example, if we have to protect
confidential data then this concept of cryptography provides
very high level of security to the data of individual or group.
Cryptography not only provides confidentiality service but
also provides many services like, data integrity, data
authentication etc. Cryptography is a method which securely
transfer data only to the relevant user not allow other to
access the data, in other words it is a way that allow access
to data only to the user who has a decryption key provided
by the sender to the receiving user via secure medium.
But rather than these advantages, now days there are various
methods to break an encryption through cryptanalytic
attacks. This is the main reason why we need strong
encryption algorithm. Cloud users will not have full faith on
the cloud service provider that they will not share their
confidential data with their competent or himself(service
provider) use his(users) data for own benefit. For this reason
we will use multiple clouds one for accessing the services
and one for storing data, so only relevant user can access his
data. For providing more security we are using Key-
aggregation Cryptography (KAC).
4. KEY-AGGREGATE CRYPTOSYSTEM (KAC)
In KAC, users not only encrypt a message under public key,
but also under an identifier of ciphertext called as class.
Ciphertext are divided into different classes. To extract the
corresponding secret key for different classes, a master
secret key is used which is hold by the key owner. More
importantly the extracted key is the aggregate key which is
as compact as the secret key for a single class, but
combining the power of many keys to decrypt the subset of
any ciphertext classes. In KAC the size of all the keys
(public key, master secret key and aggregate key) and
ciphertext are all constant. [2]
4.1 Framework
Key aggregate encryption schemes consist of five
polynomial time algorithms as follows:
1. Setup (1λ, n): The data owner establishes public system
parameter via Setup. On input of a security level parameter
1λ and number of ciphertext classes’ n, it outputs the public
system parameter param.
2. KeyGen: It is executed by data owner to randomly
generate a public/ master-secret key pair (Pk, msk).
3. Encrypt (pk, i, m): It is executed by anyone who wants
to encrypt the data. On input a public key, index I indicating
the ciphertext class and message m, to provide the ciphertext
C as output.
4. Extract (msk, S): It is executed by data owner for
delegating the decrypting power for a certain set of
ciphertext classes. On input the master secret key (msk) and
a set S indices corresponding to different ciphertext classes
and it output the aggregate key for set S denoted by Ks.
5. Decrypt (Ks, S, I, C): It is executed by a delegate who
received, an aggregate key Ks generated by Extract. On
input Ks, set S, an index i denoting the ciphertext class
ciphertext C belongs to and output is decrypted result m.[6]
4.2 Properties of KAC
1. Decryption key size: - constant.
2. Cipher text size: - constant.
3. Encryption type: - public-key
5. ADVANTAGES
1. It allows decryption of multiple cipher texts, without
raising its size.
2. The size of master-secret key, cipher text, public-key,
and aggregate key in our KAC schemes are all are kept
constant size.
3. KAC scheme is flexible in the sense that there is, no
special relation is required between the classes.
4. The delegation of decryption can be efficiently
implemented with the aggregate key.
5. Particular Member can view their messages.
6. We can provide rigorous security analysis, and
extensive performance.
6. CONCLUSION
Data privacy is the major question regarding cloud storage.
In this survey, we study how to compress secret keys in
public key cryptosystem which supports delegation of secret
keys for different cipher text classes in cloud storage. A
limitation in our work is the predefined bound of the number
of maximum ciphertext classes. In cloud storage, the number
of ciphertexts usually grows rapidly. So we have to reserve
enough ciphertext classes for the future extension. In this
paper we study the concept of multicloud which provides
extra security for the storage of data.
REFERENCES
[1]. Jens-Matthias Bohli, Nils Gruschka, Meiko Jensen,
Luigi Lo Lacono and Ninja Marnau, “Security and Privacy-
Enhancing Multicloud Architectures”, IEEE Transactions on
Dependable and Secure Computing, VOL. 10, NO. 4,
JULY?AUG 2013
[2]. Cheng-Kang Chu ,Chow, S.S.M, Wen-Guey Tzeng,
Jianying Zhou, and Robert H. Deng , “Key-Aggregate
Cryptosystem for Scalable Data Sharing in Cloud Storage”,
IEEE Transactions on Parallel and Distributed Systems.
Volume: 25, Issue: 2. Year :2014.
[3]. Arun Kumar S, S.Dhanasekar , “A Literature Survey On
Key Aggregation System for Secure Sharing of Cloud
Data”, International Journal of Advanced Research in
Electronics and Communication Engineering (IJARECE)
Volume 3, Issue 12, December 2014
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 04 Issue: 04 | Apr-2015, Available @ http://www.ijret.org 737
[4]. B. Wang, S. S. M. Chow, M. Li, and H. Li, “Storing
Shared Dataon the Cloud via Security-Mediator,” in
International Conference on Distributed Computing Systems
- ICDCS 2013. IEEE, 2013.
[5]. Nikhil Dutta , Himanshu Bakshi , Mujammill Mulla ,
Viraj Shinde, “Multi Cloud Architecture to Provide Data
Security And Integrity”, International Journal of Emerging
Technology and Advanced Engineering, ISSN 2250-2459,
ISO 9001:2008 Certified Journal, Volume 3, Issue 10,
October 2013)
[6]. Mrs. Komal Kate, Prof. S. D. Potdukhe, “Data sharing
in cloud storage with key-aggregate cryptosystem.”,
International Journal of Engineering Research and General
Science Volume 2, Issue 6, October-November, 2014

More Related Content

What's hot

Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishekEr. rahul abhishek
 
Cloud Data Security using Elliptic Curve Cryptography
Cloud Data Security using Elliptic Curve CryptographyCloud Data Security using Elliptic Curve Cryptography
Cloud Data Security using Elliptic Curve CryptographyIRJET Journal
 
A survey on cloud security issues and techniques
A survey on cloud security issues and techniquesA survey on cloud security issues and techniques
A survey on cloud security issues and techniquesijcsa
 
Secure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted CloudSecure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted CloudIJERA Editor
 
A review on key aggregate cryptosystem for scalable data sharing in cloud sto...
A review on key aggregate cryptosystem for scalable data sharing in cloud sto...A review on key aggregate cryptosystem for scalable data sharing in cloud sto...
A review on key aggregate cryptosystem for scalable data sharing in cloud sto...eSAT Journals
 
Enhanced security framework to ensure data security
Enhanced security framework to ensure data securityEnhanced security framework to ensure data security
Enhanced security framework to ensure data securityeSAT Publishing House
 
Iaetsd an efficient secure scheme for multi user in cloud
Iaetsd an efficient secure scheme for multi user in cloudIaetsd an efficient secure scheme for multi user in cloud
Iaetsd an efficient secure scheme for multi user in cloudIaetsd Iaetsd
 
A self destruction system for dynamic group data sharing in cloud
A self destruction system for dynamic group data sharing in cloudA self destruction system for dynamic group data sharing in cloud
A self destruction system for dynamic group data sharing in cloudeSAT Publishing House
 
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...eSAT Journals
 
IRJET-Using Downtoken Secure Group Data Sharing on Cloud
IRJET-Using Downtoken Secure Group Data Sharing on CloudIRJET-Using Downtoken Secure Group Data Sharing on Cloud
IRJET-Using Downtoken Secure Group Data Sharing on CloudIRJET Journal
 
Paper id 27201446
Paper id 27201446Paper id 27201446
Paper id 27201446IJRAT
 
IRJET- Protection of Personal Data on Distributed Cloud using Biometrics
IRJET- Protection of Personal Data on Distributed Cloud using BiometricsIRJET- Protection of Personal Data on Distributed Cloud using Biometrics
IRJET- Protection of Personal Data on Distributed Cloud using BiometricsIRJET Journal
 
IRJET- Key Exchange Privacy Preserving Technique in Cloud Computing
IRJET-  	  Key Exchange Privacy Preserving Technique in Cloud ComputingIRJET-  	  Key Exchange Privacy Preserving Technique in Cloud Computing
IRJET- Key Exchange Privacy Preserving Technique in Cloud ComputingIRJET Journal
 
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...IRJET Journal
 
Measurable, safe and secure data management for sensitive users in cloud comp...
Measurable, safe and secure data management for sensitive users in cloud comp...Measurable, safe and secure data management for sensitive users in cloud comp...
Measurable, safe and secure data management for sensitive users in cloud comp...eSAT Publishing House
 
Iaetsd secure data sharing of multi-owner groups in cloud
Iaetsd secure data sharing of multi-owner groups in cloudIaetsd secure data sharing of multi-owner groups in cloud
Iaetsd secure data sharing of multi-owner groups in cloudIaetsd Iaetsd
 
Secure File Sharing In Cloud Using Encryption with Digital Signature
Secure File Sharing In Cloud Using Encryption with Digital  Signature Secure File Sharing In Cloud Using Encryption with Digital  Signature
Secure File Sharing In Cloud Using Encryption with Digital Signature IJMER
 
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...Editor IJCATR
 
Multi Owner Data Sharing & Outsourced Revocation Using Identity Based Encrypt...
Multi Owner Data Sharing & Outsourced Revocation Using Identity Based Encrypt...Multi Owner Data Sharing & Outsourced Revocation Using Identity Based Encrypt...
Multi Owner Data Sharing & Outsourced Revocation Using Identity Based Encrypt...Eswar Publications
 

What's hot (20)

Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishek
 
Cloud Data Security using Elliptic Curve Cryptography
Cloud Data Security using Elliptic Curve CryptographyCloud Data Security using Elliptic Curve Cryptography
Cloud Data Security using Elliptic Curve Cryptography
 
A survey on cloud security issues and techniques
A survey on cloud security issues and techniquesA survey on cloud security issues and techniques
A survey on cloud security issues and techniques
 
[IJET-V2I1P12] Authors:Nikesh Pansare, Akash Somkuwar , Adil Shaikh and Satya...
[IJET-V2I1P12] Authors:Nikesh Pansare, Akash Somkuwar , Adil Shaikh and Satya...[IJET-V2I1P12] Authors:Nikesh Pansare, Akash Somkuwar , Adil Shaikh and Satya...
[IJET-V2I1P12] Authors:Nikesh Pansare, Akash Somkuwar , Adil Shaikh and Satya...
 
Secure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted CloudSecure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted Cloud
 
A review on key aggregate cryptosystem for scalable data sharing in cloud sto...
A review on key aggregate cryptosystem for scalable data sharing in cloud sto...A review on key aggregate cryptosystem for scalable data sharing in cloud sto...
A review on key aggregate cryptosystem for scalable data sharing in cloud sto...
 
Enhanced security framework to ensure data security
Enhanced security framework to ensure data securityEnhanced security framework to ensure data security
Enhanced security framework to ensure data security
 
Iaetsd an efficient secure scheme for multi user in cloud
Iaetsd an efficient secure scheme for multi user in cloudIaetsd an efficient secure scheme for multi user in cloud
Iaetsd an efficient secure scheme for multi user in cloud
 
A self destruction system for dynamic group data sharing in cloud
A self destruction system for dynamic group data sharing in cloudA self destruction system for dynamic group data sharing in cloud
A self destruction system for dynamic group data sharing in cloud
 
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...
 
IRJET-Using Downtoken Secure Group Data Sharing on Cloud
IRJET-Using Downtoken Secure Group Data Sharing on CloudIRJET-Using Downtoken Secure Group Data Sharing on Cloud
IRJET-Using Downtoken Secure Group Data Sharing on Cloud
 
Paper id 27201446
Paper id 27201446Paper id 27201446
Paper id 27201446
 
IRJET- Protection of Personal Data on Distributed Cloud using Biometrics
IRJET- Protection of Personal Data on Distributed Cloud using BiometricsIRJET- Protection of Personal Data on Distributed Cloud using Biometrics
IRJET- Protection of Personal Data on Distributed Cloud using Biometrics
 
IRJET- Key Exchange Privacy Preserving Technique in Cloud Computing
IRJET-  	  Key Exchange Privacy Preserving Technique in Cloud ComputingIRJET-  	  Key Exchange Privacy Preserving Technique in Cloud Computing
IRJET- Key Exchange Privacy Preserving Technique in Cloud Computing
 
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
 
Measurable, safe and secure data management for sensitive users in cloud comp...
Measurable, safe and secure data management for sensitive users in cloud comp...Measurable, safe and secure data management for sensitive users in cloud comp...
Measurable, safe and secure data management for sensitive users in cloud comp...
 
Iaetsd secure data sharing of multi-owner groups in cloud
Iaetsd secure data sharing of multi-owner groups in cloudIaetsd secure data sharing of multi-owner groups in cloud
Iaetsd secure data sharing of multi-owner groups in cloud
 
Secure File Sharing In Cloud Using Encryption with Digital Signature
Secure File Sharing In Cloud Using Encryption with Digital  Signature Secure File Sharing In Cloud Using Encryption with Digital  Signature
Secure File Sharing In Cloud Using Encryption with Digital Signature
 
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
 
Multi Owner Data Sharing & Outsourced Revocation Using Identity Based Encrypt...
Multi Owner Data Sharing & Outsourced Revocation Using Identity Based Encrypt...Multi Owner Data Sharing & Outsourced Revocation Using Identity Based Encrypt...
Multi Owner Data Sharing & Outsourced Revocation Using Identity Based Encrypt...
 

Viewers also liked

Balogh gyorgy modern_big_data_megoldasok_sec_world_2014
Balogh gyorgy modern_big_data_megoldasok_sec_world_2014Balogh gyorgy modern_big_data_megoldasok_sec_world_2014
Balogh gyorgy modern_big_data_megoldasok_sec_world_2014LogDrill
 
Gyorgy balogh modern_big_data_technologies_sec_world_2014
Gyorgy balogh modern_big_data_technologies_sec_world_2014Gyorgy balogh modern_big_data_technologies_sec_world_2014
Gyorgy balogh modern_big_data_technologies_sec_world_2014LogDrill
 
Kansas City Big Data: The Future Of Insights - Keynote: "Big Data Technologie...
Kansas City Big Data: The Future Of Insights - Keynote: "Big Data Technologie...Kansas City Big Data: The Future Of Insights - Keynote: "Big Data Technologie...
Kansas City Big Data: The Future Of Insights - Keynote: "Big Data Technologie...kcitp
 
Introduction to Big Data Technologies & Applications
Introduction to Big Data Technologies & ApplicationsIntroduction to Big Data Technologies & Applications
Introduction to Big Data Technologies & ApplicationsNguyen Cao
 
Big Data Ecosystem- Impetus Technologies
Big Data Ecosystem-  Impetus TechnologiesBig Data Ecosystem-  Impetus Technologies
Big Data Ecosystem- Impetus TechnologiesImpetus Technologies
 
Key aggregate cryptosystem for scalable data sharing in cloud
Key aggregate cryptosystem for scalable data sharing in cloudKey aggregate cryptosystem for scalable data sharing in cloud
Key aggregate cryptosystem for scalable data sharing in cloudMeka Subramanyam
 
Key aggregate cryptosystem for scalable data sharing in cloud storage
Key aggregate cryptosystem for scalable data sharing in cloud storageKey aggregate cryptosystem for scalable data sharing in cloud storage
Key aggregate cryptosystem for scalable data sharing in cloud storageShruthi Iyer
 

Viewers also liked (7)

Balogh gyorgy modern_big_data_megoldasok_sec_world_2014
Balogh gyorgy modern_big_data_megoldasok_sec_world_2014Balogh gyorgy modern_big_data_megoldasok_sec_world_2014
Balogh gyorgy modern_big_data_megoldasok_sec_world_2014
 
Gyorgy balogh modern_big_data_technologies_sec_world_2014
Gyorgy balogh modern_big_data_technologies_sec_world_2014Gyorgy balogh modern_big_data_technologies_sec_world_2014
Gyorgy balogh modern_big_data_technologies_sec_world_2014
 
Kansas City Big Data: The Future Of Insights - Keynote: "Big Data Technologie...
Kansas City Big Data: The Future Of Insights - Keynote: "Big Data Technologie...Kansas City Big Data: The Future Of Insights - Keynote: "Big Data Technologie...
Kansas City Big Data: The Future Of Insights - Keynote: "Big Data Technologie...
 
Introduction to Big Data Technologies & Applications
Introduction to Big Data Technologies & ApplicationsIntroduction to Big Data Technologies & Applications
Introduction to Big Data Technologies & Applications
 
Big Data Ecosystem- Impetus Technologies
Big Data Ecosystem-  Impetus TechnologiesBig Data Ecosystem-  Impetus Technologies
Big Data Ecosystem- Impetus Technologies
 
Key aggregate cryptosystem for scalable data sharing in cloud
Key aggregate cryptosystem for scalable data sharing in cloudKey aggregate cryptosystem for scalable data sharing in cloud
Key aggregate cryptosystem for scalable data sharing in cloud
 
Key aggregate cryptosystem for scalable data sharing in cloud storage
Key aggregate cryptosystem for scalable data sharing in cloud storageKey aggregate cryptosystem for scalable data sharing in cloud storage
Key aggregate cryptosystem for scalable data sharing in cloud storage
 

Similar to Secured architecture for multi cloud using key aggregation technique

Encryption based multi user manner
Encryption based multi user mannerEncryption based multi user manner
Encryption based multi user mannerprj_publication
 
Secure retrieval of files using homomorphic encryption for cloud computing
Secure retrieval of files using homomorphic encryption for cloud computingSecure retrieval of files using homomorphic encryption for cloud computing
Secure retrieval of files using homomorphic encryption for cloud computingeSAT Publishing House
 
A Privacy Preserving Attribute Based Access Control Mechanism In Distributed ...
A Privacy Preserving Attribute Based Access Control Mechanism In Distributed ...A Privacy Preserving Attribute Based Access Control Mechanism In Distributed ...
A Privacy Preserving Attribute Based Access Control Mechanism In Distributed ...Editor IJCATR
 
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud. A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud. IJCERT JOURNAL
 
Mona secure multi owner data sharing for dynamic groups in the cloud
Mona secure multi owner data sharing for dynamic groups in the cloudMona secure multi owner data sharing for dynamic groups in the cloud
Mona secure multi owner data sharing for dynamic groups in the cloudAvinash K S
 
Efficient and Empiric Keyword Search Using Cloud
Efficient and Empiric Keyword Search Using CloudEfficient and Empiric Keyword Search Using Cloud
Efficient and Empiric Keyword Search Using CloudIRJET Journal
 
An efficient, secure deduplication data storing in cloud storage environment
An efficient, secure deduplication data storing in cloud storage environmentAn efficient, secure deduplication data storing in cloud storage environment
An efficient, secure deduplication data storing in cloud storage environmenteSAT Journals
 
Anonymous Key Based Secure File Encryption in Cloud
Anonymous Key Based Secure File Encryption in CloudAnonymous Key Based Secure File Encryption in Cloud
Anonymous Key Based Secure File Encryption in CloudIRJET Journal
 
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET-  	  Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASCIRJET-  	  Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASCIRJET Journal
 
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASCIRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASCIRJET Journal
 
IRJET- A Research Paper on Block Design-based Key Agreement for Group Dat...
IRJET-  	  A Research Paper on Block Design-based Key Agreement for Group Dat...IRJET-  	  A Research Paper on Block Design-based Key Agreement for Group Dat...
IRJET- A Research Paper on Block Design-based Key Agreement for Group Dat...IRJET Journal
 
Paper id 712019116
Paper id 712019116Paper id 712019116
Paper id 712019116IJRAT
 
IJSRED-V2I2P10
IJSRED-V2I2P10IJSRED-V2I2P10
IJSRED-V2I2P10IJSRED
 
Security Issues’ in Cloud Computing and its Solutions.
Security Issues’ in Cloud Computing and its Solutions. Security Issues’ in Cloud Computing and its Solutions.
Security Issues’ in Cloud Computing and its Solutions. IJCERT JOURNAL
 
Issues of cloud security and its implications
Issues of cloud security and its implicationsIssues of cloud security and its implications
Issues of cloud security and its implicationseSAT Publishing House
 
fog computing provide security to the data in cloud
fog computing provide security to the data in cloudfog computing provide security to the data in cloud
fog computing provide security to the data in cloudpriyanka reddy
 
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...Editor IJMTER
 
Ensuring secure transfer, access and storage over the cloud storage
Ensuring secure transfer, access and storage over the cloud storageEnsuring secure transfer, access and storage over the cloud storage
Ensuring secure transfer, access and storage over the cloud storageeSAT Publishing House
 
Ensuring secure transfer, access and storage over the cloud storage
Ensuring secure transfer, access and storage over the cloud storageEnsuring secure transfer, access and storage over the cloud storage
Ensuring secure transfer, access and storage over the cloud storageeSAT Journals
 

Similar to Secured architecture for multi cloud using key aggregation technique (20)

Encryption based multi user manner
Encryption based multi user mannerEncryption based multi user manner
Encryption based multi user manner
 
Secure retrieval of files using homomorphic encryption for cloud computing
Secure retrieval of files using homomorphic encryption for cloud computingSecure retrieval of files using homomorphic encryption for cloud computing
Secure retrieval of files using homomorphic encryption for cloud computing
 
A Privacy Preserving Attribute Based Access Control Mechanism In Distributed ...
A Privacy Preserving Attribute Based Access Control Mechanism In Distributed ...A Privacy Preserving Attribute Based Access Control Mechanism In Distributed ...
A Privacy Preserving Attribute Based Access Control Mechanism In Distributed ...
 
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud. A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
 
Mona secure multi owner data sharing for dynamic groups in the cloud
Mona secure multi owner data sharing for dynamic groups in the cloudMona secure multi owner data sharing for dynamic groups in the cloud
Mona secure multi owner data sharing for dynamic groups in the cloud
 
Efficient and Empiric Keyword Search Using Cloud
Efficient and Empiric Keyword Search Using CloudEfficient and Empiric Keyword Search Using Cloud
Efficient and Empiric Keyword Search Using Cloud
 
An efficient, secure deduplication data storing in cloud storage environment
An efficient, secure deduplication data storing in cloud storage environmentAn efficient, secure deduplication data storing in cloud storage environment
An efficient, secure deduplication data storing in cloud storage environment
 
Anonymous Key Based Secure File Encryption in Cloud
Anonymous Key Based Secure File Encryption in CloudAnonymous Key Based Secure File Encryption in Cloud
Anonymous Key Based Secure File Encryption in Cloud
 
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET-  	  Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASCIRJET-  	  Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
 
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASCIRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
 
IRJET- A Research Paper on Block Design-based Key Agreement for Group Dat...
IRJET-  	  A Research Paper on Block Design-based Key Agreement for Group Dat...IRJET-  	  A Research Paper on Block Design-based Key Agreement for Group Dat...
IRJET- A Research Paper on Block Design-based Key Agreement for Group Dat...
 
Paper id 712019116
Paper id 712019116Paper id 712019116
Paper id 712019116
 
IJSRED-V2I2P10
IJSRED-V2I2P10IJSRED-V2I2P10
IJSRED-V2I2P10
 
Security Issues’ in Cloud Computing and its Solutions.
Security Issues’ in Cloud Computing and its Solutions. Security Issues’ in Cloud Computing and its Solutions.
Security Issues’ in Cloud Computing and its Solutions.
 
Issues of cloud security and its implications
Issues of cloud security and its implicationsIssues of cloud security and its implications
Issues of cloud security and its implications
 
fog computing provide security to the data in cloud
fog computing provide security to the data in cloudfog computing provide security to the data in cloud
fog computing provide security to the data in cloud
 
Fog doc
Fog doc Fog doc
Fog doc
 
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
 
Ensuring secure transfer, access and storage over the cloud storage
Ensuring secure transfer, access and storage over the cloud storageEnsuring secure transfer, access and storage over the cloud storage
Ensuring secure transfer, access and storage over the cloud storage
 
Ensuring secure transfer, access and storage over the cloud storage
Ensuring secure transfer, access and storage over the cloud storageEnsuring secure transfer, access and storage over the cloud storage
Ensuring secure transfer, access and storage over the cloud storage
 

More from eSAT Journals

Mechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavementsMechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavementseSAT Journals
 
Material management in construction – a case study
Material management in construction – a case studyMaterial management in construction – a case study
Material management in construction – a case studyeSAT Journals
 
Managing drought short term strategies in semi arid regions a case study
Managing drought    short term strategies in semi arid regions  a case studyManaging drought    short term strategies in semi arid regions  a case study
Managing drought short term strategies in semi arid regions a case studyeSAT Journals
 
Life cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangaloreLife cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangaloreeSAT Journals
 
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialsLaboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialseSAT Journals
 
Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...eSAT Journals
 
Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...eSAT Journals
 
Influence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizerInfluence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizereSAT Journals
 
Geographical information system (gis) for water resources management
Geographical information system (gis) for water resources managementGeographical information system (gis) for water resources management
Geographical information system (gis) for water resources managementeSAT Journals
 
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...eSAT Journals
 
Factors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concreteFactors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concreteeSAT Journals
 
Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...eSAT Journals
 
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...eSAT Journals
 
Evaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabsEvaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabseSAT Journals
 
Evaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in indiaEvaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in indiaeSAT Journals
 
Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...eSAT Journals
 
Estimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn methodEstimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn methodeSAT Journals
 
Estimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniquesEstimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniqueseSAT Journals
 
Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...eSAT Journals
 
Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...eSAT Journals
 

More from eSAT Journals (20)

Mechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavementsMechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavements
 
Material management in construction – a case study
Material management in construction – a case studyMaterial management in construction – a case study
Material management in construction – a case study
 
Managing drought short term strategies in semi arid regions a case study
Managing drought    short term strategies in semi arid regions  a case studyManaging drought    short term strategies in semi arid regions  a case study
Managing drought short term strategies in semi arid regions a case study
 
Life cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangaloreLife cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangalore
 
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialsLaboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
 
Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...
 
Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...
 
Influence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizerInfluence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizer
 
Geographical information system (gis) for water resources management
Geographical information system (gis) for water resources managementGeographical information system (gis) for water resources management
Geographical information system (gis) for water resources management
 
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
 
Factors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concreteFactors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concrete
 
Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...
 
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
 
Evaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabsEvaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabs
 
Evaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in indiaEvaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in india
 
Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...
 
Estimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn methodEstimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn method
 
Estimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniquesEstimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniques
 
Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...
 
Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...
 

Recently uploaded

Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZTE
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 

Recently uploaded (20)

young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 

Secured architecture for multi cloud using key aggregation technique

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 04 Issue: 04 | Apr-2015, Available @ http://www.ijret.org 734 SECURED ARCHITECTURE FOR MULTI-CLOUD USING KEY AGGREGATION TECHNIQUE Suruchi Narote1 , Lokesh Bijole2 1 ME (Student), Department of Computer Engineering, Padm. Dr. V. B. Kolte College of Engineering Malkapur, Maharashtra, India 2 Asst. Professors, Department of Computer Engineering, Padm. Dr. V. B. Kolte College of Engineering Malkapur, Maharashtra, India Abstract Data storage and data sharing is the most important aspect in cloud computing, so sharing data and storing it in a secure way is the biggest task when adopting cloud services. In this paper, we will discuss how to share and store data effectively which will prevent the third party to access the secure data in cloud storage. This article provides a survey of using multiple clouds to achieve a security. In this we are introducing a public-key encryption known as Key-aggregate Cryptosystem (KAC). Cryptography is a technique which encodes a data using some key and produces unreadable data so that only a desired party is able to decode that data. KAC produces a constant size ciphertexts (unreadable data) such that decryption right for any set of ciphertexts are possible, means one can aggregate any set of secret keys and make them as compact as single key, but encompassing the power of all the keys being aggregate. This aggregate key is sent to other via secure channel (or via email) for decrypting the ciphertext set and remaining files outside the set are remains secret. Keywords: Cloud, multicloud, key-aggregate encryption, data storage, data sharing and security. --------------------------------------------------------------------***------------------------------------------------------------------ 1. INTRODUCTION In today’s world Cloud computing is the most emerging technology used in the scientific and industrial workgroup. Cloud computing provides scalable resources and services over the internet which the third party can access as per their requirement and have to pay rent for using these services as per their usage, which is very cost effective as well as expenditures for hardware and software. [1]Cloud can be divided into 2 types based on their physical location from the viewpoint of the user: public cloud and private cloud. A public cloud is a cloud which is provided by the third party and involves resources outside the user’s office and in contrast to public cloud; private cloud is installed within the user’s office. This article will concentrate on public cloud due to highest security demand. Cloud provides various types of Services. In this paper we are focusing on the following two services provided by the cloud: 1.Software as a Service (SaaS): This allows cloud user to access the provider’s application running on a cloud using various client devices via interface such as web browser. 2.Platform as a Service (PaaS): This allow cloud user to upload his own application and data on to the cloud without installing any tools or platform on their local machine. Data from various clients are stored on the single physical machine, so there are various cryptographic techniques which will allow unauthorised user to access data on behalf of the owner without leaking anything about the data, or without compromising the data owner’s anonymity [4]. The cloud user don’t have the full faith on the cloud server or cloud provider that they will not leak their data with the others, so before uploading the data on the cloud server, the cloud user encrypt their data using their own key. Sharing of data is most important in cloud storage. For example, you can let your friend so see some of your photos in which he is present from your private pictures; an organization granted an access rights to their employee to access some sensitive data. The challenge is how encrypted data is to be shared effectively. 1.1 Data Sharing in Cloud For an example Alice keeps her private data i.e. photos on Dropbox and she doesn’t want to share it with everyone. Due to the possibility of data leakage, Alice does not fell to only depend on the privacy preserving mechanism provided by Dropbox, so before uploading the photos she encrypts them by her own key. Some day Alice wants to share photos to Bob in which he is present. Alice can share the photos by using the share function of the Dropbox, but the problem is how to share the decryption rights with the Bob. One option is Alice sends an email to Bob in which the private key is ivolved.There are 2 possible ways: [3] 1. Alice can encrypt all photos with one key and send to Bob securely. 2. Alice encrypts each photo with different keys and sends Bob the keys for each photo which she wants to share. The first way is not proper method because all the photos of Alice may be leaked to Bob. For the second way efficiency is the major concern because it needs as many keys as the number of photos she want to send to Bob. So transferring these keys securely and storing them requires very expensive secure storage, which is very heavy and expensive. For the above problem the best solution is that
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 04 Issue: 04 | Apr-2015, Available @ http://www.ijret.org 735 Alice encrypts files with different public key but sends a single constant size aggregate key to Bob for decrypting the file. Fig 1 Alice shares files with identifiers 2, 4 and 6 with Bob by sending him a single aggregate key. One way of reducing the threat and proving security to the data and application in a public cloud is to use multiple clouds simultaneously, one for storing the application and the other for storage of the data. This triggered a lot of research activities, resulting in various approaches which differ in technologies, partitioning, encryption techniques and distribution patterns as well as security levels. Public key encryption requires different key both for encryption and decryption. In this paper we are using multiple clouds one for application and one for storage and a key aggregation encryption for encrypting the data. 2. LITERATURE SERVEY In 2013 Jens-Matthias Bohli, Nils Gruschka, Meiko Jensen, Luigi Lo Lacono and Ninja Marnau, “Security and Privacy- Enhancing Multicloud Architectures”, one idea on reducing the risk for data and applications in a public cloud is the simultaneous usage of multiple clouds. Several approaches employing this paradigm have been proposed recently this paper provides a servey on different security by multicloud adoption approaches. It provides four distinct models in form of abstracted multicloud architectures. These developed multicloud architectures allow to categorize the available schemes and to analyze them according to their security benefits.[1] In 2014 Cheng-Kang Chu, Sherman S. M. Chow, Wen-Guey Tzeng, Jianying Zhou, and Robert H. Deng,” Key- Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage” In this paper, we study how to make a decryption key more powerful in the sense that it allows decryption of multiple cipher texts, without increasing its size. “To design an efficient public-key encryption scheme which supports flexible delegation in the sense that any subset of the ciphertexts (produced by the encryption scheme) is decryptable by a constant-size decryption key (generated by the owner of the master-secret key)?” [2] To ensure data integrity and security in cloud computing this proposed architecture uses a primary cloud and a secondary cloud to incorporate a multi cloud system, these are as follows[5]: 1. Primary cloud: The primary cloud can be created using centrally built software to fall under the category of SaaS (software as a service) cloud computing model. The primary cloud consists of a group of systems which are interconnected through LAN which in turn forms the primary cloud. The internal users can access the primary cloud through the same LAN whereas the external users can access the primary cloud through devices supporting a web browser using GPRS services. This model thus enables multiple users to access the primary cloud simultaneously. The primary cloud where application resides also maintains security of data by authentication of the user who are using the application. So only an authorized user can access data .This is done by the cloud administrator and hence a user is allowed to access only data relevant to him not the data of others which is also stored in primary cloud. 2. Administrator: The cloud administrator is the most important part of this architecture and is responsible for proper working of both primary and secondary cloud. The data so retrieved from the secondary cloud is in an unreadable encrypted format. For the file to be back in its original form data decryption takes place. The data retrieved from the secondary cloud is uploaded to the administrator who in turn performs decryption code to get the data in its original form. This is then sent to the user. The data sent is user specific and can only be sent to authenticated users. The user authentication is done by the administrator to maintain integrity of data. 3. Secondary cloud: The Secondary cloud falls under the same SaaS (software as a service) cloud model similar to the primary cloud. Secondary cloud is used for storing a backup of the data stored in the primary cloud in an encrypted form. This is done after the administrator performs data encryption and segmentation on the data taken from the primary cloud. The secondary cloud can only be controlled by the administrator to ensure integrity of data. Each segmented data known as chunks are stored in separate systems in the secondary cloud. In case data is being retrieved from secondary cloud, the encrypted and segmented data is sent to the administrator for data decryption and de-segmentation before sending it to the user. Thus, the proposed system ensures security and integrity to the data saved in the cloud and also provides an architecture which is secure and reliable through the use of Linux as the OS.
  • 3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 04 Issue: 04 | Apr-2015, Available @ http://www.ijret.org 736 3. PROPOSED WORK Our main aim was to develop an encryption/decryption program which will generate an encryption key. In today’s world most of the application uses the concept of cryptography. For example, if we have to protect confidential data then this concept of cryptography provides very high level of security to the data of individual or group. Cryptography not only provides confidentiality service but also provides many services like, data integrity, data authentication etc. Cryptography is a method which securely transfer data only to the relevant user not allow other to access the data, in other words it is a way that allow access to data only to the user who has a decryption key provided by the sender to the receiving user via secure medium. But rather than these advantages, now days there are various methods to break an encryption through cryptanalytic attacks. This is the main reason why we need strong encryption algorithm. Cloud users will not have full faith on the cloud service provider that they will not share their confidential data with their competent or himself(service provider) use his(users) data for own benefit. For this reason we will use multiple clouds one for accessing the services and one for storing data, so only relevant user can access his data. For providing more security we are using Key- aggregation Cryptography (KAC). 4. KEY-AGGREGATE CRYPTOSYSTEM (KAC) In KAC, users not only encrypt a message under public key, but also under an identifier of ciphertext called as class. Ciphertext are divided into different classes. To extract the corresponding secret key for different classes, a master secret key is used which is hold by the key owner. More importantly the extracted key is the aggregate key which is as compact as the secret key for a single class, but combining the power of many keys to decrypt the subset of any ciphertext classes. In KAC the size of all the keys (public key, master secret key and aggregate key) and ciphertext are all constant. [2] 4.1 Framework Key aggregate encryption schemes consist of five polynomial time algorithms as follows: 1. Setup (1λ, n): The data owner establishes public system parameter via Setup. On input of a security level parameter 1λ and number of ciphertext classes’ n, it outputs the public system parameter param. 2. KeyGen: It is executed by data owner to randomly generate a public/ master-secret key pair (Pk, msk). 3. Encrypt (pk, i, m): It is executed by anyone who wants to encrypt the data. On input a public key, index I indicating the ciphertext class and message m, to provide the ciphertext C as output. 4. Extract (msk, S): It is executed by data owner for delegating the decrypting power for a certain set of ciphertext classes. On input the master secret key (msk) and a set S indices corresponding to different ciphertext classes and it output the aggregate key for set S denoted by Ks. 5. Decrypt (Ks, S, I, C): It is executed by a delegate who received, an aggregate key Ks generated by Extract. On input Ks, set S, an index i denoting the ciphertext class ciphertext C belongs to and output is decrypted result m.[6] 4.2 Properties of KAC 1. Decryption key size: - constant. 2. Cipher text size: - constant. 3. Encryption type: - public-key 5. ADVANTAGES 1. It allows decryption of multiple cipher texts, without raising its size. 2. The size of master-secret key, cipher text, public-key, and aggregate key in our KAC schemes are all are kept constant size. 3. KAC scheme is flexible in the sense that there is, no special relation is required between the classes. 4. The delegation of decryption can be efficiently implemented with the aggregate key. 5. Particular Member can view their messages. 6. We can provide rigorous security analysis, and extensive performance. 6. CONCLUSION Data privacy is the major question regarding cloud storage. In this survey, we study how to compress secret keys in public key cryptosystem which supports delegation of secret keys for different cipher text classes in cloud storage. A limitation in our work is the predefined bound of the number of maximum ciphertext classes. In cloud storage, the number of ciphertexts usually grows rapidly. So we have to reserve enough ciphertext classes for the future extension. In this paper we study the concept of multicloud which provides extra security for the storage of data. REFERENCES [1]. Jens-Matthias Bohli, Nils Gruschka, Meiko Jensen, Luigi Lo Lacono and Ninja Marnau, “Security and Privacy- Enhancing Multicloud Architectures”, IEEE Transactions on Dependable and Secure Computing, VOL. 10, NO. 4, JULY?AUG 2013 [2]. Cheng-Kang Chu ,Chow, S.S.M, Wen-Guey Tzeng, Jianying Zhou, and Robert H. Deng , “Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage”, IEEE Transactions on Parallel and Distributed Systems. Volume: 25, Issue: 2. Year :2014. [3]. Arun Kumar S, S.Dhanasekar , “A Literature Survey On Key Aggregation System for Secure Sharing of Cloud Data”, International Journal of Advanced Research in Electronics and Communication Engineering (IJARECE) Volume 3, Issue 12, December 2014
  • 4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 04 Issue: 04 | Apr-2015, Available @ http://www.ijret.org 737 [4]. B. Wang, S. S. M. Chow, M. Li, and H. Li, “Storing Shared Dataon the Cloud via Security-Mediator,” in International Conference on Distributed Computing Systems - ICDCS 2013. IEEE, 2013. [5]. Nikhil Dutta , Himanshu Bakshi , Mujammill Mulla , Viraj Shinde, “Multi Cloud Architecture to Provide Data Security And Integrity”, International Journal of Emerging Technology and Advanced Engineering, ISSN 2250-2459, ISO 9001:2008 Certified Journal, Volume 3, Issue 10, October 2013) [6]. Mrs. Komal Kate, Prof. S. D. Potdukhe, “Data sharing in cloud storage with key-aggregate cryptosystem.”, International Journal of Engineering Research and General Science Volume 2, Issue 6, October-November, 2014