ID-Based Cryptography for Secure Cloud Data1

download ID-Based Cryptography for Secure Cloud Data1

of 6

Transcript of ID-Based Cryptography for Secure Cloud Data1

  • 8/11/2019 ID-Based Cryptography for Secure Cloud Data1

    1/6

    SYNOPSIS

    Name of Student : Mr. Deepak Dilip Mahajan

    Course Name : ME (CSE) PAR !""

    Name of "nstitute : D. #. Patil Colle$e of En$ineerin$ and e%hnolo$&' olhapur

    Name of uide : Prof. A. *. Chou$ule

    Date of Re$istration : +ul& ,-

    itle for Dissertation : /"D0*ased Cr&pto$raph& for Se%ure Cloud Data Stora$e1

    1. Abstract

    he se%urit& issues of storin$ sensiti2e data in a %loud stora$e ser2i%e and the need for

    users to trust the %ommer%ial %loud pro2iders. "t proposes a %r&pto$raphi% s%heme for %loud

    stora$e' 3ased on an ori$inal usa$e of "D0*ased Cr&pto$raph&. 4ur solution has se2eral

    ad2anta$es. 5irst' it pro2ides se%re%& for en%r&pted data 6hi%h are stored in pu3li% ser2ers.

    Se%ond' it offers %ontrolled data a%%ess and sharin$ amon$ users' so that unauthori7ed users or

    untrusted ser2ers %annot a%%ess or sear%h o2er data 6ithout %lient8s authori7ation.

    2. Introduction

    he $ro6in$ need for se%ure %loud stora$e ser2i%es and the attra%ti2e properties of "D03ased

    %r&pto$raph& lead us to %om3ine them' thus' definin$ an inno2ati2e solution to the data

    outsour%in$ se%urit& issue. 4ur solution is 3ased on a spe%ifi% usa$e of "*C. 5irst' the %loud

    stora$e %lients are assi$ned the "*C!P fun%tion. So' the& %an issue their o6n pu3li%

    elements' and %an keep %onfidential their resultin$ "*C se%ret. Se%ond' a per data ke& 6hi%h is

    deri2ed from a data identifier is used to en%ipher data.

  • 8/11/2019 ID-Based Cryptography for Secure Cloud Data1

    2/6

    3. Literature Survey

    he appli%ation of "D0*ased Cr&pto$raph&' in a distri3uted en2ironment' is an emer$in$ and

    interestin$ area' 6hi%h has 3een partiall& in2esti$ated in the literature. he idea of appl&in$"*C to $rid se%urit& 6as e9plored 3& im and Ro3sha6. "n their proposal' ea%h 2irtual

    or$ani7ation has its o6n P' and all of its users share the same "*C! PE %ertified 3& a $rid

    %ertifi%ation authorit&. heir s%heme offers to the en%r&ptin$ entit& more fle9i3ilit& durin$ the

    ke& $eneration pro%ess' and permits to add $ranularit& to the "D03ased pu3li% ke&. "n fa%t' im

    and Ro3sha6 propose to in%lude the se%urit& poli%& into the identifier used as input for the

    pu3li% ke& %omputation al$orithm.

    4. Comments:

    "*C properties' this %ontri3ution is sho6n to support data pri2a%& and %onfidentialit&' as it

    emplo&s

    an ori$inal "D03ased %lient side en%r&ption approa%h. "n addition' due to the li$ht6ei$ht "D0

    3ased pu3li% ke& %omputation pro%ess and %ontrar& to the e9istin$ %lassi%al sharin$ s%hemes'

    our proposal does not re;uire for the depositor to 3e %onne%ted' 6hen the re%ipients 6ant to

    retrie2e the shared data. Moreo2er' our solution is also sho6n to 3e resistant to unauthori7ed

    a%%ess to data and to an& data dis%losure durin$ the sharin$ pro%ess. 5inall&' 6e 3elie2e that

    %loud data stora$e se%urit& is still full of %hallen$es and of paramount importan%e' and man&

    resear%h pro3lems remain to 3e identified.

    . Pro!osed "or#

    he $ro6in$ need for se%ure %loud stora$e ser2i%es and the attra%ti2e properties of "D03ased

    %r&pto$raph& lead us to %om3ine them' thus' definin$ an inno2ati2e solution to the data

    outsour%in$ se%urit& issue. 4ur solution is 3ased on a spe%ifi% usa$e of "*C. 5irst' the %loud

    stora$e %lients are assi$ned the "*C!P fun%tion. So' the& %an issue their o6n pu3li%

    elements' and %an keep %onfidential their resultin$ "*C se%ret. Se%ond' a per data ke& 6hi%h is

    deri2ed from a data identifier is used to en%ipher data.

    ,

  • 8/11/2019 ID-Based Cryptography for Secure Cloud Data1

    3/6

    Cloud Ser2i%e Pro2ider (CSP): a CSP has si$nifi%ant resour%es to $o2ern distri3uted %loud

    stora$e ser2ers and to mana$e its data3ase ser2ers. "t also pro2ides 2irtual infrastru%ture to host

    appli%ation ser2i%es. hese ser2i%es %an 3e used 3& the %lient to mana$e his data stored in the

    %loud ser2ers.

    Client: a %lient makes use of pro2ider8s resour%es to store' retrie2e and share data 6ith

    multiple users. A

    %lient %an 3e either an indi2idual or an enterprise.

  • 8/11/2019 ID-Based Cryptography for Secure Cloud Data1

    4/6

    >andle the Data3ase .

    All data store on %loud usin$ AES %r&pto$raph&

    Che%k for ke& of file

    Pro2ide file upload and do6nload .

    Client:

    Deplo&ed the ser2i%es on %loud.

    Pro2ide the a%%ess permission to all user

    Pro2ide file upload and do6nload.

    User :

    7

    RAM 0 *

    >ard Disk 0 ,- *

    5lopp& Dri2e 0 .?? M*

    ?

  • 8/11/2019 ID-Based Cryptography for Secure Cloud Data1

    5/6

    e& *oard 0 Standard @indo6s e&3oard

    Mouse 0 6o or hree *utton Mouse

    Monitor 0 SA

    SO-)A'* '*+,I'*$*N-S:

    4peratin$ S&stem : @indo6s

    e%hnolo$& : ASP.NEBC

    @e3 e%hnolo$ies : >tml' +a2aS%ript' CSS

    "DE : isual Studio

    @e3 Ser2er : ""S

    Data3ase : Ms S -B-F

    7. Expected date of completion:April 2014

    /. 'e0erences:

    Ama7on' /Ama7on simple stora$e ser2i%e (ama7on s=).1 G4nlineH. A2aila3le:

    http:BBa6s.ama7on.%omBs=B

    P. Mell and . ran%e' /he N"S Definition of Cloud Computin$'1National Institute of

    Standards and Technology' 2ol. =' no. I' p. -' ,--J. G4nlineH. A2aila3le:

    http:BB%sr%.nist.$o2B$roupsBSNSB%loud0%omputin$B%loud0def02.do%

    Pla%e:0olhapur.

    http://aws.amazon.com/s3/http://csrc.nist.gov/groups/SNS/cloud-computing/cloud-def-v15.dochttp://aws.amazon.com/s3/http://csrc.nist.gov/groups/SNS/cloud-computing/cloud-def-v15.doc
  • 8/11/2019 ID-Based Cryptography for Secure Cloud Data1

    6/6

    Prof. A.*. Chou$ule Mr. Deepak Dilip Mahajan

    uide Student

    .

    Prof. . A. Patil Prof. Dr. .R. horapade

    >4D Prin%ipal

    .

    I