Quantitative Data1 1. Numbers 2. Counts 3. Measurements Quantitative Data1.
ID-Based Cryptography for Secure Cloud Data1
-
Upload
ajay-tarade -
Category
Documents
-
view
217 -
download
0
Transcript of ID-Based Cryptography for Secure Cloud Data1
-
8/11/2019 ID-Based Cryptography for Secure Cloud Data1
1/6
SYNOPSIS
Name of Student : Mr. Deepak Dilip Mahajan
Course Name : ME (CSE) PAR !""
Name of "nstitute : D. #. Patil Colle$e of En$ineerin$ and e%hnolo$&' olhapur
Name of uide : Prof. A. *. Chou$ule
Date of Re$istration : +ul& ,-
itle for Dissertation : /"D0*ased Cr&pto$raph& for Se%ure Cloud Data Stora$e1
1. Abstract
he se%urit& issues of storin$ sensiti2e data in a %loud stora$e ser2i%e and the need for
users to trust the %ommer%ial %loud pro2iders. "t proposes a %r&pto$raphi% s%heme for %loud
stora$e' 3ased on an ori$inal usa$e of "D0*ased Cr&pto$raph&. 4ur solution has se2eral
ad2anta$es. 5irst' it pro2ides se%re%& for en%r&pted data 6hi%h are stored in pu3li% ser2ers.
Se%ond' it offers %ontrolled data a%%ess and sharin$ amon$ users' so that unauthori7ed users or
untrusted ser2ers %annot a%%ess or sear%h o2er data 6ithout %lient8s authori7ation.
2. Introduction
he $ro6in$ need for se%ure %loud stora$e ser2i%es and the attra%ti2e properties of "D03ased
%r&pto$raph& lead us to %om3ine them' thus' definin$ an inno2ati2e solution to the data
outsour%in$ se%urit& issue. 4ur solution is 3ased on a spe%ifi% usa$e of "*C. 5irst' the %loud
stora$e %lients are assi$ned the "*C!P fun%tion. So' the& %an issue their o6n pu3li%
elements' and %an keep %onfidential their resultin$ "*C se%ret. Se%ond' a per data ke& 6hi%h is
deri2ed from a data identifier is used to en%ipher data.
-
8/11/2019 ID-Based Cryptography for Secure Cloud Data1
2/6
3. Literature Survey
he appli%ation of "D0*ased Cr&pto$raph&' in a distri3uted en2ironment' is an emer$in$ and
interestin$ area' 6hi%h has 3een partiall& in2esti$ated in the literature. he idea of appl&in$"*C to $rid se%urit& 6as e9plored 3& im and Ro3sha6. "n their proposal' ea%h 2irtual
or$ani7ation has its o6n P' and all of its users share the same "*C! PE %ertified 3& a $rid
%ertifi%ation authorit&. heir s%heme offers to the en%r&ptin$ entit& more fle9i3ilit& durin$ the
ke& $eneration pro%ess' and permits to add $ranularit& to the "D03ased pu3li% ke&. "n fa%t' im
and Ro3sha6 propose to in%lude the se%urit& poli%& into the identifier used as input for the
pu3li% ke& %omputation al$orithm.
4. Comments:
"*C properties' this %ontri3ution is sho6n to support data pri2a%& and %onfidentialit&' as it
emplo&s
an ori$inal "D03ased %lient side en%r&ption approa%h. "n addition' due to the li$ht6ei$ht "D0
3ased pu3li% ke& %omputation pro%ess and %ontrar& to the e9istin$ %lassi%al sharin$ s%hemes'
our proposal does not re;uire for the depositor to 3e %onne%ted' 6hen the re%ipients 6ant to
retrie2e the shared data. Moreo2er' our solution is also sho6n to 3e resistant to unauthori7ed
a%%ess to data and to an& data dis%losure durin$ the sharin$ pro%ess. 5inall&' 6e 3elie2e that
%loud data stora$e se%urit& is still full of %hallen$es and of paramount importan%e' and man&
resear%h pro3lems remain to 3e identified.
. Pro!osed "or#
he $ro6in$ need for se%ure %loud stora$e ser2i%es and the attra%ti2e properties of "D03ased
%r&pto$raph& lead us to %om3ine them' thus' definin$ an inno2ati2e solution to the data
outsour%in$ se%urit& issue. 4ur solution is 3ased on a spe%ifi% usa$e of "*C. 5irst' the %loud
stora$e %lients are assi$ned the "*C!P fun%tion. So' the& %an issue their o6n pu3li%
elements' and %an keep %onfidential their resultin$ "*C se%ret. Se%ond' a per data ke& 6hi%h is
deri2ed from a data identifier is used to en%ipher data.
,
-
8/11/2019 ID-Based Cryptography for Secure Cloud Data1
3/6
Cloud Ser2i%e Pro2ider (CSP): a CSP has si$nifi%ant resour%es to $o2ern distri3uted %loud
stora$e ser2ers and to mana$e its data3ase ser2ers. "t also pro2ides 2irtual infrastru%ture to host
appli%ation ser2i%es. hese ser2i%es %an 3e used 3& the %lient to mana$e his data stored in the
%loud ser2ers.
Client: a %lient makes use of pro2ider8s resour%es to store' retrie2e and share data 6ith
multiple users. A
%lient %an 3e either an indi2idual or an enterprise.
-
8/11/2019 ID-Based Cryptography for Secure Cloud Data1
4/6
>andle the Data3ase .
All data store on %loud usin$ AES %r&pto$raph&
Che%k for ke& of file
Pro2ide file upload and do6nload .
Client:
Deplo&ed the ser2i%es on %loud.
Pro2ide the a%%ess permission to all user
Pro2ide file upload and do6nload.
User :
7
RAM 0 *
>ard Disk 0 ,- *
5lopp& Dri2e 0 .?? M*
?
-
8/11/2019 ID-Based Cryptography for Secure Cloud Data1
5/6
e& *oard 0 Standard @indo6s e&3oard
Mouse 0 6o or hree *utton Mouse
Monitor 0 SA
SO-)A'* '*+,I'*$*N-S:
4peratin$ S&stem : @indo6s
e%hnolo$& : ASP.NEBC
@e3 e%hnolo$ies : >tml' +a2aS%ript' CSS
"DE : isual Studio
@e3 Ser2er : ""S
Data3ase : Ms S -B-F
7. Expected date of completion:April 2014
/. 'e0erences:
Ama7on' /Ama7on simple stora$e ser2i%e (ama7on s=).1 G4nlineH. A2aila3le:
http:BBa6s.ama7on.%omBs=B
P. Mell and . ran%e' /he N"S Definition of Cloud Computin$'1National Institute of
Standards and Technology' 2ol. =' no. I' p. -' ,--J. G4nlineH. A2aila3le:
http:BB%sr%.nist.$o2B$roupsBSNSB%loud0%omputin$B%loud0def02.do%
Pla%e:0olhapur.
http://aws.amazon.com/s3/http://csrc.nist.gov/groups/SNS/cloud-computing/cloud-def-v15.dochttp://aws.amazon.com/s3/http://csrc.nist.gov/groups/SNS/cloud-computing/cloud-def-v15.doc -
8/11/2019 ID-Based Cryptography for Secure Cloud Data1
6/6
Prof. A.*. Chou$ule Mr. Deepak Dilip Mahajan
uide Student
.
Prof. . A. Patil Prof. Dr. .R. horapade
>4D Prin%ipal
.
I