Documente Academic
Documente Profesional
Documente Cultură
ABSTRACT
Cloud is one of the key driving forces behind the growth in todays digital era. But it always leaves traces of worry about the
security of the data at the storage area. So to maintain this most of the cloud service providers are well equipped with highly secured
encryption and data shuffling techniques, but these techniques are not sufficient to control the data malfunctioning by the third
parties. Many methods are been introduced to control this deficiency but one or the other fail to prevent data access modification in
run time. So proposed system introduces a method of privacy preserving in cloud using high level encryption method like reverse
circle cipher technique for providing security in the cloud which is powered with random key generation based on time entity. Again
the data privacy is been provide with tiled bitmap process on data stored in cloud which is not only identifies the illegal access
entities of the data and it also restore the data efficiently.
Keywords: Random Key,Reverse circle cipher, Tiled bitmap, validattion, Cloud computing.
1. INTRODUCTION
In this world of globalization the size of the data being generated is increasing tremendously. With this increasing size, it
becomes tedious to manage such huge data. Apart from this management problem the security of the data is also at breach.
So to overcome this complex task cloud computing is used as a medium to store and the retrieve data remotely. The main
reason behind the success of cloud is the user friendliness. It hides all the internal implementation details from the users
and allows them to store and retrieve data from remote locations. As the data is stored across remote location, the problem
of huge data management gets solved.
Out of the number of advantages offered by the cloud computing paradigm, following are the some dominant factors.
1. Usability: The entire cloud computing paradigm offers easy usability where only simple drag and drop options are
available for deploying the data to cloud.
2. Bandwidth: in cloud we can avoid sending files to the individual users and instead of that we can send the link where
that file is resides. This reduces the bandwidth to the great extent
3. Accessibility: it is easier to have access to the stored files from any location of the world with the internet connection.
4. Disaster Recovery: Cloud storage allows the backup option for the cloud data as the emergency situation required it.
5. Cost Saving: Cloud follows the policy of Pay only for what you used. By this policy users need to pay only the amount
for the storage which he /she required instead of buying complete storage.
Page 8
Page 9
DE duplication: DE duplication is a technique of avoiding extra cloud space by opposing the uploading of same file. As the
deduplication saves the space to the great extent, it is used by many cloud service provider as an additional facility to
theirusers. Apart from CSP it is being used by the cloud services such as Drop Box. Deduplication is one of the best behind
the slashing of cloud storage prices. Suppose Alice stores file A to the cloud C, Bob comes and store same file F which will
be rejected by cloud D. Instead of saving file F, C only updates the metadata associated with file F indicating that both Alice
and Bob are associated with the same file. Depending on the types of deduplication i.e. whether it is happened at client side
or server side, whether it is a file level block level, it is classified in three types as shown in figure 2.
Encryption: Sharing plain data across cloud is an open invitation to the intruders as the confidential information is
exposed. Encryptions are of two types: encryption with keys, encryption without keys. Encryption with key is much secured
than encryption without keys. Encryption key is normal string which is randomly generated for encryption and decryption
of data. For the generation of this key number of algorithms are proposed which ensures the uniqueness of the key as
performance of the encryption algorithm is completely depends on the generated key. Based on the used key encryption
algorithms are classified as symmetric and asymmetric.
Symmetric encryption algorithm makes use of single key for the encryption and decryption purpose. It is also known as a
secret encryption. Generally the symmetric algorithms are used for the encryption of data having large size. Asymmetric
algorithms are also known as private/public encryption where two keys are maintained. Here one key is used for the
encryption purpose while other key of the same pair is used for the decryption. Public key is generally used for the
encryption while private key is used for both encryption and decryption.
By using these key encryption can be effectively performed. Figure 3 illustrates the working of reverse circle cipher
algorithms.
Page 10
2. LITERATURE SURVEY
Here we are going to illustrates some of the previous works done by the researchers in same domain and also the supporting
techniques used in our project.
Encryption:
[1] explains the techniques of rotations which are performed multiple times to ensure the security of the data in networks.
Difference issues associated with the prior encryption schemes like encryption cost, complexity of data organization etc. are
tried to overcome here by proposing the brand new approach. Author implements the technique of multi rotational rather
than the linear rotation to accomplish the task. So to have the complete idea of the system from the scratch, detail
architectures diagram is provided by the author.
Coarse gain level encryption has many breaches in their implementation. Coarse gain is the only encryption type where
private key i.e. secret key is distributed across the intended audience. Hence to rid out of this problem a new research is
proposed by the [2] known as key policy based encryption. Here cipher text encrypted texts have key and attribute labeling
for the increased security. Because of this provision system can easily controls the cipher text which user can decrypt. As the
key sharing scheme is based on the secret sharing scheme, the center difference associated with these two schemes is
narrated by the author. Coordination among the different parties is acceptable in the secret sharing scheme while it is
completely prohibited in proposed mechanism.
Theory based on single authority attribute based encryption is proposed by Sahai and Waters where multi authority
encryption is put as next work. By taking the contribution of Sahai as a base of our work [3] extends the future work of
Sahai by giving the theory of multi authority based encryption. Here sharing of public keys can be done by any number of
users as they can monitor the attributes of ciphered data. This number of users sharing the public keys is fixed in advance by
the data owner. While transferring the data along with the encrypted text, N which was set is also passed. After getting the
Page 11
message by the receiver if he wants to decrypt the data then he should have at least N number of same attributes. This
condition imposes an extra security layer
[4] Gives a system based on attribute based encryption, which does not sent the access control polices along with the
ciphered text. This gives a higher edge in the security of the transferred data. Also the cipher data does not have any
attached data, the speed of the transmission is very fast compare to the other. For the experimental performance of the
system. It is compared with the Bilinear Diffie-Hellman assumption
[5] Illustrates a deep survey on different attribute based encryption schemes. In this paper each of this policy is well
explained along with the advantage and disadvantage of each policy with other policies.
Different attribute based encryption policies are
Attribute based encryption (ABE)
Key policy attribute based encryption (KP-ABE) scheme
Cipher text policy attribute based (CP-ABE) scheme
Attribute-based Encryption Scheme with Non-Monotonic Access Structures
hierarchical attribute-based encryption scheme(HABE)
multi-authorities attribute-based encryption scheme (MA-ABE)
Oruta
As discussed above, increasing nature of data gives many problems regarding the data management, so the user outsourced
their data to the cloud service providers for the better storage. Art from storage, users get all the benefits of cloud i.e. remote
access, better usability etc. But when the user outsourced their data to the cloud they give open invitation to many attacks.
So to maintain the security of the data third party auditors are available which checks the integrity of the data throughput
the lifetime of data. Again the main assumption is the third party auditors are trustworthy and reliable so that they will not
harm the data.
So to perform the auditing there are public verifiers are available. These public verifiers did not download the complete file
content which saves the cost of the operation. This mechanism is known as public auditing. In the public auditing
mechanism, all the data is divided in to the small blocks where each of these blocks are signed by the data owner. The
random blocks are retrieved by the public auditor while checking the integrity of the data. This public auditor may be the
user of the data who wants to use the data through cloud or third party auditor.
Page 12
[8] Presents secure scheme of data auditing which maintains the data privacy. As per the paper if system wants to audit the
cloud data securely the third party auditors should meet the following requirement.
1. TPA should not ask for the local copy of data while auditing the cloud data.
2. The data auditing system should not add new threats to the data.
Here the random masking scheme is combined with the homomorphic authenticator to bring extra security to the process of
auditing. Also the technique of bilinear aggregate signature is added here which ensure the multiple users can be handle by
the system.
3. PROPOSED METHODOLOGY
In this section, we describe our framework for privacy preservation of data in cloud using tiled bitmap signatures with the
below mentioned steps as shown in figure 5.
Page 13
Page 14
Fig 7: No of File character v/s No of Using different characters for the encryption and decryption
Page 15
References
[1.] Enforcing Reverse Circle Cipher for Network Security Using Multirotational Technique , SajjadeZeba S.
International Journal of Advanced Research in Computer Science and Software Engineering
[2.] Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data VipulGoyal
OmkantPandeyAmitSahaiBrent Waters
[3.] Multi-Authority Attribute Based Encryption Melissa Chase Computer Science Department Brown University
Providence, RI 02912
[4.] Ciphertext policy Attribute based Encryption with anonymous access policy A.Balu1, K.Kuppusamy2 Research
Associate, 2 Associate Professor Department of Computer Science &Engg.,Alagappa University, Karaikudi, Tamil
Nadu, India.
[5.] A Survey on Attribute Based Encryption Scheme in Cloud Computing Minu George1, Dr. C.Suresh Gnanadhas2,
Saranya.K3 International Journal of Advanced Research in Computer and Communication Engineering Vol. 2, Issue
11, November 2013
Page 16
[6.] Zhang, Yuan, et al. "SCLPV: Secure Certificateless Public Verification for Cloud Storage in Cyber-physical-social
System."
[7.] Wang, Cong, et al. "Privacy-preserving public auditing for secure cloud storage." Computers, IEEE Transactions
on 62.2 (2013): 362-375.
[8.] Wang, Cong, et al. "Privacy-preserving public auditing for data storage security in cloud computing." INFOCOM, 2010
Proceedings IEEE. 2010.
[9.] Reverse Circle Cipher for Personal and Network Security ,Ebenezer R.H.P. Isaac, Joseph H.R. Isaac and J. Visumathi
Jeppiaar Engineering College Chennai, Tamil Nadu, India ebeisaac@gmail.com
Page 17