SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 10 | Oct -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1428
Survey on Lightweight Secured Data Sharing Scheme for cloud
computing
Shubham Chandugade1, Prachi More2, Shaikh Mohammad Shafi Rafiq3
1,2,3 Indira College of Engineering and Management, Dept. of Computer Engineering, Maharashtra, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - Cloud has been around for two decades and it
consists of the vast amount of data from all over the world.
Most of the people at a personal level and organization level
have moved their data to the cloud and share data across all
around the world. The main challenge faced by everyone is to
share the data all over the world or at organizational level
securely without giving away the important data to any
exploiters. To overcome the challenge to share the data
securely over the cloud, an efficient data encryptionalgorithm
for encrypting data before sending it to the cloud. In this
proposed we are using a combination of Attribute-Based
Encryption and Byte Rotation Encryption Algorithm for
encrypting the data before sending it to the cloud. This will
help the user to securely store and share the data in encrypted
form.
Key Words: Cloud Computing, Data Privacy, Encryption,
Data Security, Data Sharing, Access Control.
1.INTRODUCTION
Cloud computing means storing data andaccessingthatdata
from the Internet instead of Using Traditional hardware for
most of the operations. More than 50%ofITcompanieshave
moved their Business to the cloud. Sharing of data over the
cloud is the new trend that is being set on. The amount of
data generated on a day to day life is increasing and to store
that all of the data in traditional hardware is not possible
because of limited storage capacity. Therefore, transferring
the data to the cloud is a necessity where the user can get
unlimited storage. Security of that data over is the next big
concern for most of us. After uploading the data to the cloud
use loses its control over that data. [1] Since personal data
files are sensitive, data owners are allowed to choose
whether to make their data files public or can onlybeshared
with specific data users. Therefore, privacy of the personal
sensitive data is a big concern for many data owners. When
any of the people upload the data onto the cloud they are
leaving their data in a place where monitoringoverthat data
is out of their control, the cloud service providercanalsospy
on the personal data of the users. When someone has to
share data over the data they have to share the password to
each and every user for accessing the encrypted data which
is cumbersome. Therefore, to solve thisproblemdata should
be encrypted before uploadingitontothecloudwhichcanbe
safe from everyone. Now the data encryption part brings
some new problems such as we have to provide an efficient
encryption algorithm such that if the data Is in encrypted
format it cannot be easily to get break or get accessed byany
exploiters. The next big concern is time consumption for
encryption. Traditional Hardware withbigconfiguration can
encrypt data in short amount of time but limited resource
devices suffers from this problem. They require more
amount of time of encryption and decryption. So,anefficient
crypto system is to be proposed which can worked equally
or heterogeneously on all of the devices.
2.RELATED WORK
Attribute-based encryption (ABE) is proposed by Sahai and
Waters. Attribute-based encryption (ABE) is a moderately
late approach that re-evaluates the idea of public key
cryptography.
Attribute-based encryption is also referred to as ABE is a
sort of public-key encryption wherein the secret key of a
person and the cipher-text is established upon attributes. In
an ABE, a person’s keys and cipher-texts are labeled with
units of descriptive attributes and a symmetric key can
decrypt a selected cipher-text only if there's a match
between the attributes of the cipher-text and the person’s
key. It reduces the quantity of key used and hence makes
encryption and decryption technique faster
3.PROPOSED SYSTEM
To address privacy issue in existing system we propose a
crypto-system for secure sharing of data over the cloud,
which uses combination Attribute Based Encryption and
Byte Rotation Encryption Algorithmforsecure encryption of
the data over cloud.
The main three works are as follows:
1. Identify the issues in cloud system for data storage
on cloud. Since data is not secure on cloud user can
upload the data in encrypted format.
2. Propose a crypto-system which can run on all
limited resources devices. It can take data from the
user and provide off-line-online service.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 10 | Oct -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1429
3. Apply Attribute Based Encryption Algorithm and
Byte Rotation Algorithm for encryption of data to
securely transfer the data between the users.
3.1ADVANTAGES
 Here data can be transferred from one user to
another securely over the cloud.
 The system cost will be decreased.
 It will work on all limited resource devices.
3.2ARCHITECTURE AND MODULES DETAILS
Figure 1: System model
The architecture of the proposed system is shown in the
figure which shows the users and the operations involved.
The detailed description of the architecture is explained as
follows:
 Nodes: The User is responsible for uploading and
sharing its personal data on the cloud.
 On-line and Off-line Services: In On-line Service
data will encrypted and directly transfer to the
respective user. In Off-line Service if there is no
Internet Connection the data will getencryptedfirst
and then it will get stored in Main Server. Until the
system does not comes on-line the data will not be
shared over the cloud
 Cloud Service Provider: Cloud service provider is
responsible for providing all the required services
to its users according to their demands.
 Encryption and Decryption:Hereweareusingthe
combination of ABE and BRE algorithm to encrypt
and decrypt the files.
 File Upload and Download: The file which are
uploaded on cloud are encrypted form. Users can
download the file which are decrypted if he is
authorized.
4. PROPOSED SYSTEM ENCRYPTION ALGORITHM
Figure 2: Encryption Diagram
In our proposed system data is encrypted before uploading
to the cloud. Combination of Attribute BasedEncryptionand
Byte Rotation Algorithm are used for the encryption of the
data. ABE will help to identify the attributes of the data and
BREA will perform matrix operations on the block of the
data to be encrypted. Afterperforming encryptionoperation,
a random key is generated alongside the encrypted data.
Data will be send in encrypted format to respective user. To
decrypt this data receiver has to enter the One Time
Password (OTP) which will be matched with key generated
using ABE algorithm.
Figure 3: Decryption Diagram
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 10 | Oct -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1430
4.1 Proposed System Algorithm
Step-1: Start
Step-2: Accept the data from the user.
Step-3: The Attributes of the data fromtheusers’formats are
obtained by the Attribute-Based Encryption.
Step-4: With the help of these Attributes, Random Key is
generated, and type of data is obtained for encryption by
BRE algorithm.
Step-5: The data is converted into equal number of blocks
and N x N matrix will be generated on the basis of these
blocks.
Step-6: Based on no. of blocks, pool of threads will be
created.
Step-7: Run the threads in multi core system to create
encrypted data in short amount of time.
Step-8: A secret key is generated in order to open the
encrypted file which is stored in the cloud.
Step-9: The secret key is shared to the user via email or
mobile number of the authorised user. This key will be used
to decrypt the encrypted file.
Step-10: The file selected will be decrypted in the original
form using the key.
Step-11: Stop.
Figure 4: Flow Diagram
4.2. IMPLEMENTATION
This period of the venture is critical in light of the fact thatat
this stage the hypothetical plan is changed over into
functional one. This stage is a basic stage since this stage
require exceptionally exact arranging and need the learning
of existing framework and its detriments.
The execution stage oughtto becreatedbyconsidering every
one of the prerequisites, imperatives. The new framework
ought to be successful and work appropriately.
5. CONCLUSION
In this paper, the issue of sharing the data in cloud
computing securely is resolved. Data privacy can be
maintained by combination of ABE and BRE algorithm.
Authentication is used to guarantee data privacy and data
integrity. This indicates that the proposed system can be
used to enhance privacy preservation in cloud services.
6. REFERENCES
[1] “A Lightweight Secure Data Sharing Scheme for Mobile
Cloud Computing “Ruixuan Li, Member,IEEE, Chenglin
Shen, Heng He, Zhiyong Xu, and Cheng-Zhong Xu,
Member, IEEE
[2] “Towards Se-cure Data Sharing in Cloud Computing
Using Attribute Based Proxy Re-Encryption with
Keyword Search” Hanshu Hong; Zhixin Sun
[3] X. Liang, Z. Cao, H. Lin, and 1. Shao, "Attribute based
proxy re-encryption with delegating capa-bilities," in
Proc. 4th ACM Int. Symp.
[4] Priya Dudhale Pise,Dr. Nilesh J Uke,”Efficient Security
Protocol for Sensitive Data Sharing on Cloud Platforms”
in 2017 IEEE.
[5] K. Liang et aI., "A OFA -based functional proxy re-
encryption scheme for securepublicclouddatasharing,"
IEEE Trans. Inf. Forensics Security,vol. 9, no. 10, pp.
1667-1680, Oct. 2014.
[6] H. Hong, Z. Sun. "An efficient and traceable KP-ABS
scheme with untrusted attribute authority in cloud
computing", JoCCASA, 5(2).pp.I -8,201 6.
[7] J. Liu, X. Huang, and 1. K. Liu, "Secure sharingof personal
health records in cloud computing: Ciphertext-policy
attribute-based signcryption," Future Generat.Comput.
Syst., vol. 52, pp. 67-76,Nov. 2015.
Ad

Recommended

Paper id 27201446
Paper id 27201446
IJRAT
 
IRJET- Securing Cloud Data Under Key Exposure
IRJET- Securing Cloud Data Under Key Exposure
IRJET Journal
 
IRJET- A Review on Lightweight Secure Data Sharing Scheme for Mobile Cloud Co...
IRJET- A Review on Lightweight Secure Data Sharing Scheme for Mobile Cloud Co...
IRJET Journal
 
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET Journal
 
IRJET - Providing High Securtiy for Encrypted Data in Cloud
IRJET - Providing High Securtiy for Encrypted Data in Cloud
IRJET Journal
 
Secure Data Sharing in Cloud through Limiting Trust in Third Party/Server
Secure Data Sharing in Cloud through Limiting Trust in Third Party/Server
IRJET Journal
 
Towards Secure Data Distribution Systems in Mobile Cloud Computing: A Survey
Towards Secure Data Distribution Systems in Mobile Cloud Computing: A Survey
IRJET Journal
 
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET Journal
 
Two Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed Services
IRJET Journal
 
5.[40 44]enhancing security in cloud computing
5.[40 44]enhancing security in cloud computing
Alexander Decker
 
J018145862
J018145862
IOSR Journals
 
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET Journal
 
IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...
IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...
IRJET Journal
 
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
Editor IJCATR
 
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IRJET Journal
 
Secure data sharing in cloud computing using revocable storage identity-based...
Secure data sharing in cloud computing using revocable storage identity-based...
Shakas Technologies
 
Enabling Secure Data Sharing Scheme in the Cloud Storage Groups
Enabling Secure Data Sharing Scheme in the Cloud Storage Groups
IRJET Journal
 
IRJET - Reliable and Efficient Revocation and Data Sharing using Identity...
IRJET - Reliable and Efficient Revocation and Data Sharing using Identity...
IRJET Journal
 
Ranking Efficient Attribute Based Keyword Searching Over Encrypted Data Along...
Ranking Efficient Attribute Based Keyword Searching Over Encrypted Data Along...
IRJET Journal
 
Secure Privacy Preserving Using Multilevel Trust For Cloud Storage
Secure Privacy Preserving Using Multilevel Trust For Cloud Storage
IRJET Journal
 
Ijariie1196
Ijariie1196
IJARIIE JOURNAL
 
IRJET- Secure Data Protection in Cloud Computing
IRJET- Secure Data Protection in Cloud Computing
IRJET Journal
 
Insuring Security for Outsourced Data Stored in Cloud Environment
Insuring Security for Outsourced Data Stored in Cloud Environment
Editor IJCATR
 
IJSRED-V2I3P52
IJSRED-V2I3P52
IJSRED
 
Attribute-Based Encryption for Access of Secured Data in Cloud Storage
Attribute-Based Encryption for Access of Secured Data in Cloud Storage
IJSRD
 
Privacy Preserving Delegated Access Control in Public Clouds
Privacy Preserving Delegated Access Control in Public Clouds
Md Uddin
 
Cloud Auditing With Zero Knowledge Privacy
Cloud Auditing With Zero Knowledge Privacy
IJERA Editor
 
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET Journal
 
IRJET- Compress and Secure Data Sharing for Mobile Cloud Computing
IRJET- Compress and Secure Data Sharing for Mobile Cloud Computing
IRJET Journal
 
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET Journal
 

More Related Content

What's hot (20)

Two Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed Services
IRJET Journal
 
5.[40 44]enhancing security in cloud computing
5.[40 44]enhancing security in cloud computing
Alexander Decker
 
J018145862
J018145862
IOSR Journals
 
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET Journal
 
IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...
IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...
IRJET Journal
 
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
Editor IJCATR
 
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IRJET Journal
 
Secure data sharing in cloud computing using revocable storage identity-based...
Secure data sharing in cloud computing using revocable storage identity-based...
Shakas Technologies
 
Enabling Secure Data Sharing Scheme in the Cloud Storage Groups
Enabling Secure Data Sharing Scheme in the Cloud Storage Groups
IRJET Journal
 
IRJET - Reliable and Efficient Revocation and Data Sharing using Identity...
IRJET - Reliable and Efficient Revocation and Data Sharing using Identity...
IRJET Journal
 
Ranking Efficient Attribute Based Keyword Searching Over Encrypted Data Along...
Ranking Efficient Attribute Based Keyword Searching Over Encrypted Data Along...
IRJET Journal
 
Secure Privacy Preserving Using Multilevel Trust For Cloud Storage
Secure Privacy Preserving Using Multilevel Trust For Cloud Storage
IRJET Journal
 
Ijariie1196
Ijariie1196
IJARIIE JOURNAL
 
IRJET- Secure Data Protection in Cloud Computing
IRJET- Secure Data Protection in Cloud Computing
IRJET Journal
 
Insuring Security for Outsourced Data Stored in Cloud Environment
Insuring Security for Outsourced Data Stored in Cloud Environment
Editor IJCATR
 
IJSRED-V2I3P52
IJSRED-V2I3P52
IJSRED
 
Attribute-Based Encryption for Access of Secured Data in Cloud Storage
Attribute-Based Encryption for Access of Secured Data in Cloud Storage
IJSRD
 
Privacy Preserving Delegated Access Control in Public Clouds
Privacy Preserving Delegated Access Control in Public Clouds
Md Uddin
 
Cloud Auditing With Zero Knowledge Privacy
Cloud Auditing With Zero Knowledge Privacy
IJERA Editor
 
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET Journal
 
Two Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed Services
IRJET Journal
 
5.[40 44]enhancing security in cloud computing
5.[40 44]enhancing security in cloud computing
Alexander Decker
 
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET Journal
 
IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...
IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...
IRJET Journal
 
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
Editor IJCATR
 
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IRJET Journal
 
Secure data sharing in cloud computing using revocable storage identity-based...
Secure data sharing in cloud computing using revocable storage identity-based...
Shakas Technologies
 
Enabling Secure Data Sharing Scheme in the Cloud Storage Groups
Enabling Secure Data Sharing Scheme in the Cloud Storage Groups
IRJET Journal
 
IRJET - Reliable and Efficient Revocation and Data Sharing using Identity...
IRJET - Reliable and Efficient Revocation and Data Sharing using Identity...
IRJET Journal
 
Ranking Efficient Attribute Based Keyword Searching Over Encrypted Data Along...
Ranking Efficient Attribute Based Keyword Searching Over Encrypted Data Along...
IRJET Journal
 
Secure Privacy Preserving Using Multilevel Trust For Cloud Storage
Secure Privacy Preserving Using Multilevel Trust For Cloud Storage
IRJET Journal
 
IRJET- Secure Data Protection in Cloud Computing
IRJET- Secure Data Protection in Cloud Computing
IRJET Journal
 
Insuring Security for Outsourced Data Stored in Cloud Environment
Insuring Security for Outsourced Data Stored in Cloud Environment
Editor IJCATR
 
IJSRED-V2I3P52
IJSRED-V2I3P52
IJSRED
 
Attribute-Based Encryption for Access of Secured Data in Cloud Storage
Attribute-Based Encryption for Access of Secured Data in Cloud Storage
IJSRD
 
Privacy Preserving Delegated Access Control in Public Clouds
Privacy Preserving Delegated Access Control in Public Clouds
Md Uddin
 
Cloud Auditing With Zero Knowledge Privacy
Cloud Auditing With Zero Knowledge Privacy
IJERA Editor
 
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET Journal
 

Similar to Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing (20)

IRJET- Compress and Secure Data Sharing for Mobile Cloud Computing
IRJET- Compress and Secure Data Sharing for Mobile Cloud Computing
IRJET Journal
 
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET Journal
 
IRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET Journal
 
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET Journal
 
IRJET- Key Exchange Privacy Preserving Technique in Cloud Computing
IRJET- Key Exchange Privacy Preserving Technique in Cloud Computing
IRJET Journal
 
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud Systems
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud Systems
IRJET Journal
 
An Approach towards Shuffling of Data to Avoid Tampering in Cloud
An Approach towards Shuffling of Data to Avoid Tampering in Cloud
IRJET Journal
 
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET Journal
 
IRJET- A Review Paper on an Efficient File Hierarchy Attribute Based Encr...
IRJET- A Review Paper on an Efficient File Hierarchy Attribute Based Encr...
IRJET Journal
 
Towards Achieving Efficient and Secure Way to Share the Data
Towards Achieving Efficient and Secure Way to Share the Data
IRJET Journal
 
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
IRJET Journal
 
IRJET- Secure Sharing of Personal Data on Cloud using Key Aggregation and...
IRJET- Secure Sharing of Personal Data on Cloud using Key Aggregation and...
IRJET Journal
 
IRJET-Using Downtoken Secure Group Data Sharing on Cloud
IRJET-Using Downtoken Secure Group Data Sharing on Cloud
IRJET Journal
 
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Editor IJMTER
 
IRJET- Secure Data Access Control with Cipher Text and It’s Outsourcing in Fo...
IRJET- Secure Data Access Control with Cipher Text and It’s Outsourcing in Fo...
IRJET Journal
 
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET Journal
 
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
Editor IJCATR
 
IRJET- Efficient Privacy-Preserving using Novel Based Secure Protocol in SVM
IRJET- Efficient Privacy-Preserving using Novel Based Secure Protocol in SVM
IRJET Journal
 
Protection Saving Positioned Multi-Keyword Scan for Different Information in ...
Protection Saving Positioned Multi-Keyword Scan for Different Information in ...
IRJET Journal
 
IRJET- Review on Privacy Preserving on Multi Keyword Search over Encrypte...
IRJET- Review on Privacy Preserving on Multi Keyword Search over Encrypte...
IRJET Journal
 
IRJET- Compress and Secure Data Sharing for Mobile Cloud Computing
IRJET- Compress and Secure Data Sharing for Mobile Cloud Computing
IRJET Journal
 
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET Journal
 
IRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET Journal
 
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET Journal
 
IRJET- Key Exchange Privacy Preserving Technique in Cloud Computing
IRJET- Key Exchange Privacy Preserving Technique in Cloud Computing
IRJET Journal
 
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud Systems
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud Systems
IRJET Journal
 
An Approach towards Shuffling of Data to Avoid Tampering in Cloud
An Approach towards Shuffling of Data to Avoid Tampering in Cloud
IRJET Journal
 
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET Journal
 
IRJET- A Review Paper on an Efficient File Hierarchy Attribute Based Encr...
IRJET- A Review Paper on an Efficient File Hierarchy Attribute Based Encr...
IRJET Journal
 
Towards Achieving Efficient and Secure Way to Share the Data
Towards Achieving Efficient and Secure Way to Share the Data
IRJET Journal
 
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
IRJET Journal
 
IRJET- Secure Sharing of Personal Data on Cloud using Key Aggregation and...
IRJET- Secure Sharing of Personal Data on Cloud using Key Aggregation and...
IRJET Journal
 
IRJET-Using Downtoken Secure Group Data Sharing on Cloud
IRJET-Using Downtoken Secure Group Data Sharing on Cloud
IRJET Journal
 
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Editor IJMTER
 
IRJET- Secure Data Access Control with Cipher Text and It’s Outsourcing in Fo...
IRJET- Secure Data Access Control with Cipher Text and It’s Outsourcing in Fo...
IRJET Journal
 
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET Journal
 
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
Editor IJCATR
 
IRJET- Efficient Privacy-Preserving using Novel Based Secure Protocol in SVM
IRJET- Efficient Privacy-Preserving using Novel Based Secure Protocol in SVM
IRJET Journal
 
Protection Saving Positioned Multi-Keyword Scan for Different Information in ...
Protection Saving Positioned Multi-Keyword Scan for Different Information in ...
IRJET Journal
 
IRJET- Review on Privacy Preserving on Multi Keyword Search over Encrypte...
IRJET- Review on Privacy Preserving on Multi Keyword Search over Encrypte...
IRJET Journal
 
Ad

More from IRJET Journal (20)

Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
IRJET Journal
 
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
IRJET Journal
 
Kiona – A Smart Society Automation Project
Kiona – A Smart Society Automation Project
IRJET Journal
 
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
IRJET Journal
 
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
IRJET Journal
 
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
IRJET Journal
 
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
IRJET Journal
 
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
IRJET Journal
 
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
IRJET Journal
 
BRAIN TUMOUR DETECTION AND CLASSIFICATION
BRAIN TUMOUR DETECTION AND CLASSIFICATION
IRJET Journal
 
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
IRJET Journal
 
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
IRJET Journal
 
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
IRJET Journal
 
Breast Cancer Detection using Computer Vision
Breast Cancer Detection using Computer Vision
IRJET Journal
 
Auto-Charging E-Vehicle with its battery Management.
Auto-Charging E-Vehicle with its battery Management.
IRJET Journal
 
Analysis of high energy charge particle in the Heliosphere
Analysis of high energy charge particle in the Heliosphere
IRJET Journal
 
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
IRJET Journal
 
Auto-Charging E-Vehicle with its battery Management.
Auto-Charging E-Vehicle with its battery Management.
IRJET Journal
 
Analysis of high energy charge particle in the Heliosphere
Analysis of high energy charge particle in the Heliosphere
IRJET Journal
 
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
IRJET Journal
 
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
IRJET Journal
 
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
IRJET Journal
 
Kiona – A Smart Society Automation Project
Kiona – A Smart Society Automation Project
IRJET Journal
 
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
IRJET Journal
 
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
IRJET Journal
 
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
IRJET Journal
 
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
IRJET Journal
 
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
IRJET Journal
 
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
IRJET Journal
 
BRAIN TUMOUR DETECTION AND CLASSIFICATION
BRAIN TUMOUR DETECTION AND CLASSIFICATION
IRJET Journal
 
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
IRJET Journal
 
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
IRJET Journal
 
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
IRJET Journal
 
Breast Cancer Detection using Computer Vision
Breast Cancer Detection using Computer Vision
IRJET Journal
 
Auto-Charging E-Vehicle with its battery Management.
Auto-Charging E-Vehicle with its battery Management.
IRJET Journal
 
Analysis of high energy charge particle in the Heliosphere
Analysis of high energy charge particle in the Heliosphere
IRJET Journal
 
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
IRJET Journal
 
Auto-Charging E-Vehicle with its battery Management.
Auto-Charging E-Vehicle with its battery Management.
IRJET Journal
 
Analysis of high energy charge particle in the Heliosphere
Analysis of high energy charge particle in the Heliosphere
IRJET Journal
 
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
IRJET Journal
 
Ad

Recently uploaded (20)

Modern multi-proposer consensus implementations
Modern multi-proposer consensus implementations
François Garillot
 
Structural Wonderers_new and ancient.pptx
Structural Wonderers_new and ancient.pptx
nikopapa113
 
Deep Learning for Natural Language Processing_FDP on 16 June 2025 MITS.pptx
Deep Learning for Natural Language Processing_FDP on 16 June 2025 MITS.pptx
resming1
 
IntroSlides-June-GDG-Cloud-Munich community [email protected]
IntroSlides-June-GDG-Cloud-Munich community [email protected]
Luiz Carneiro
 
machine learning is a advance technology
machine learning is a advance technology
ynancy893
 
Introduction to Natural Language Processing - Stages in NLP Pipeline, Challen...
Introduction to Natural Language Processing - Stages in NLP Pipeline, Challen...
resming1
 
ElysiumPro Company Profile 2025-2026.pdf
ElysiumPro Company Profile 2025-2026.pdf
info751436
 
Decoding Kotlin - Your Guide to Solving the Mysterious in Kotlin - Devoxx PL ...
Decoding Kotlin - Your Guide to Solving the Mysterious in Kotlin - Devoxx PL ...
João Esperancinha
 
How Binning Affects LED Performance & Consistency.pdf
How Binning Affects LED Performance & Consistency.pdf
Mina Anis
 
Stay Safe Women Security Android App Project Report.pdf
Stay Safe Women Security Android App Project Report.pdf
Kamal Acharya
 
AI_Presentation (1). Artificial intelligence
AI_Presentation (1). Artificial intelligence
RoselynKaur8thD34
 
362 Alec Data Center Solutions-Slysium Data Center-AUH-Adaptaflex.pdf
362 Alec Data Center Solutions-Slysium Data Center-AUH-Adaptaflex.pdf
djiceramil
 
System design handwritten notes guidance
System design handwritten notes guidance
Shabista Imam
 
Unit III_One Dimensional Consolidation theory
Unit III_One Dimensional Consolidation theory
saravananr808639
 
David Boutry - Mentors Junior Developers
David Boutry - Mentors Junior Developers
David Boutry
 
IPL_Logic_Flow.pdf Mainframe IPLMainframe IPL
IPL_Logic_Flow.pdf Mainframe IPLMainframe IPL
KhadijaKhadijaAouadi
 
362 Alec Data Center Solutions-Slysium Data Center-AUH-Adaptaflex.pdf
362 Alec Data Center Solutions-Slysium Data Center-AUH-Adaptaflex.pdf
djiceramil
 
special_edition_using_visual_foxpro_6.pdf
special_edition_using_visual_foxpro_6.pdf
Shabista Imam
 
Industrial internet of things IOT Week-3.pptx
Industrial internet of things IOT Week-3.pptx
KNaveenKumarECE
 
Complete University of Calculus :: 2nd edition
Complete University of Calculus :: 2nd edition
Shabista Imam
 
Modern multi-proposer consensus implementations
Modern multi-proposer consensus implementations
François Garillot
 
Structural Wonderers_new and ancient.pptx
Structural Wonderers_new and ancient.pptx
nikopapa113
 
Deep Learning for Natural Language Processing_FDP on 16 June 2025 MITS.pptx
Deep Learning for Natural Language Processing_FDP on 16 June 2025 MITS.pptx
resming1
 
machine learning is a advance technology
machine learning is a advance technology
ynancy893
 
Introduction to Natural Language Processing - Stages in NLP Pipeline, Challen...
Introduction to Natural Language Processing - Stages in NLP Pipeline, Challen...
resming1
 
ElysiumPro Company Profile 2025-2026.pdf
ElysiumPro Company Profile 2025-2026.pdf
info751436
 
Decoding Kotlin - Your Guide to Solving the Mysterious in Kotlin - Devoxx PL ...
Decoding Kotlin - Your Guide to Solving the Mysterious in Kotlin - Devoxx PL ...
João Esperancinha
 
How Binning Affects LED Performance & Consistency.pdf
How Binning Affects LED Performance & Consistency.pdf
Mina Anis
 
Stay Safe Women Security Android App Project Report.pdf
Stay Safe Women Security Android App Project Report.pdf
Kamal Acharya
 
AI_Presentation (1). Artificial intelligence
AI_Presentation (1). Artificial intelligence
RoselynKaur8thD34
 
362 Alec Data Center Solutions-Slysium Data Center-AUH-Adaptaflex.pdf
362 Alec Data Center Solutions-Slysium Data Center-AUH-Adaptaflex.pdf
djiceramil
 
System design handwritten notes guidance
System design handwritten notes guidance
Shabista Imam
 
Unit III_One Dimensional Consolidation theory
Unit III_One Dimensional Consolidation theory
saravananr808639
 
David Boutry - Mentors Junior Developers
David Boutry - Mentors Junior Developers
David Boutry
 
IPL_Logic_Flow.pdf Mainframe IPLMainframe IPL
IPL_Logic_Flow.pdf Mainframe IPLMainframe IPL
KhadijaKhadijaAouadi
 
362 Alec Data Center Solutions-Slysium Data Center-AUH-Adaptaflex.pdf
362 Alec Data Center Solutions-Slysium Data Center-AUH-Adaptaflex.pdf
djiceramil
 
special_edition_using_visual_foxpro_6.pdf
special_edition_using_visual_foxpro_6.pdf
Shabista Imam
 
Industrial internet of things IOT Week-3.pptx
Industrial internet of things IOT Week-3.pptx
KNaveenKumarECE
 
Complete University of Calculus :: 2nd edition
Complete University of Calculus :: 2nd edition
Shabista Imam
 

Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 10 | Oct -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1428 Survey on Lightweight Secured Data Sharing Scheme for cloud computing Shubham Chandugade1, Prachi More2, Shaikh Mohammad Shafi Rafiq3 1,2,3 Indira College of Engineering and Management, Dept. of Computer Engineering, Maharashtra, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Cloud has been around for two decades and it consists of the vast amount of data from all over the world. Most of the people at a personal level and organization level have moved their data to the cloud and share data across all around the world. The main challenge faced by everyone is to share the data all over the world or at organizational level securely without giving away the important data to any exploiters. To overcome the challenge to share the data securely over the cloud, an efficient data encryptionalgorithm for encrypting data before sending it to the cloud. In this proposed we are using a combination of Attribute-Based Encryption and Byte Rotation Encryption Algorithm for encrypting the data before sending it to the cloud. This will help the user to securely store and share the data in encrypted form. Key Words: Cloud Computing, Data Privacy, Encryption, Data Security, Data Sharing, Access Control. 1.INTRODUCTION Cloud computing means storing data andaccessingthatdata from the Internet instead of Using Traditional hardware for most of the operations. More than 50%ofITcompanieshave moved their Business to the cloud. Sharing of data over the cloud is the new trend that is being set on. The amount of data generated on a day to day life is increasing and to store that all of the data in traditional hardware is not possible because of limited storage capacity. Therefore, transferring the data to the cloud is a necessity where the user can get unlimited storage. Security of that data over is the next big concern for most of us. After uploading the data to the cloud use loses its control over that data. [1] Since personal data files are sensitive, data owners are allowed to choose whether to make their data files public or can onlybeshared with specific data users. Therefore, privacy of the personal sensitive data is a big concern for many data owners. When any of the people upload the data onto the cloud they are leaving their data in a place where monitoringoverthat data is out of their control, the cloud service providercanalsospy on the personal data of the users. When someone has to share data over the data they have to share the password to each and every user for accessing the encrypted data which is cumbersome. Therefore, to solve thisproblemdata should be encrypted before uploadingitontothecloudwhichcanbe safe from everyone. Now the data encryption part brings some new problems such as we have to provide an efficient encryption algorithm such that if the data Is in encrypted format it cannot be easily to get break or get accessed byany exploiters. The next big concern is time consumption for encryption. Traditional Hardware withbigconfiguration can encrypt data in short amount of time but limited resource devices suffers from this problem. They require more amount of time of encryption and decryption. So,anefficient crypto system is to be proposed which can worked equally or heterogeneously on all of the devices. 2.RELATED WORK Attribute-based encryption (ABE) is proposed by Sahai and Waters. Attribute-based encryption (ABE) is a moderately late approach that re-evaluates the idea of public key cryptography. Attribute-based encryption is also referred to as ABE is a sort of public-key encryption wherein the secret key of a person and the cipher-text is established upon attributes. In an ABE, a person’s keys and cipher-texts are labeled with units of descriptive attributes and a symmetric key can decrypt a selected cipher-text only if there's a match between the attributes of the cipher-text and the person’s key. It reduces the quantity of key used and hence makes encryption and decryption technique faster 3.PROPOSED SYSTEM To address privacy issue in existing system we propose a crypto-system for secure sharing of data over the cloud, which uses combination Attribute Based Encryption and Byte Rotation Encryption Algorithmforsecure encryption of the data over cloud. The main three works are as follows: 1. Identify the issues in cloud system for data storage on cloud. Since data is not secure on cloud user can upload the data in encrypted format. 2. Propose a crypto-system which can run on all limited resources devices. It can take data from the user and provide off-line-online service.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 10 | Oct -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1429 3. Apply Attribute Based Encryption Algorithm and Byte Rotation Algorithm for encryption of data to securely transfer the data between the users. 3.1ADVANTAGES  Here data can be transferred from one user to another securely over the cloud.  The system cost will be decreased.  It will work on all limited resource devices. 3.2ARCHITECTURE AND MODULES DETAILS Figure 1: System model The architecture of the proposed system is shown in the figure which shows the users and the operations involved. The detailed description of the architecture is explained as follows:  Nodes: The User is responsible for uploading and sharing its personal data on the cloud.  On-line and Off-line Services: In On-line Service data will encrypted and directly transfer to the respective user. In Off-line Service if there is no Internet Connection the data will getencryptedfirst and then it will get stored in Main Server. Until the system does not comes on-line the data will not be shared over the cloud  Cloud Service Provider: Cloud service provider is responsible for providing all the required services to its users according to their demands.  Encryption and Decryption:Hereweareusingthe combination of ABE and BRE algorithm to encrypt and decrypt the files.  File Upload and Download: The file which are uploaded on cloud are encrypted form. Users can download the file which are decrypted if he is authorized. 4. PROPOSED SYSTEM ENCRYPTION ALGORITHM Figure 2: Encryption Diagram In our proposed system data is encrypted before uploading to the cloud. Combination of Attribute BasedEncryptionand Byte Rotation Algorithm are used for the encryption of the data. ABE will help to identify the attributes of the data and BREA will perform matrix operations on the block of the data to be encrypted. Afterperforming encryptionoperation, a random key is generated alongside the encrypted data. Data will be send in encrypted format to respective user. To decrypt this data receiver has to enter the One Time Password (OTP) which will be matched with key generated using ABE algorithm. Figure 3: Decryption Diagram
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 10 | Oct -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1430 4.1 Proposed System Algorithm Step-1: Start Step-2: Accept the data from the user. Step-3: The Attributes of the data fromtheusers’formats are obtained by the Attribute-Based Encryption. Step-4: With the help of these Attributes, Random Key is generated, and type of data is obtained for encryption by BRE algorithm. Step-5: The data is converted into equal number of blocks and N x N matrix will be generated on the basis of these blocks. Step-6: Based on no. of blocks, pool of threads will be created. Step-7: Run the threads in multi core system to create encrypted data in short amount of time. Step-8: A secret key is generated in order to open the encrypted file which is stored in the cloud. Step-9: The secret key is shared to the user via email or mobile number of the authorised user. This key will be used to decrypt the encrypted file. Step-10: The file selected will be decrypted in the original form using the key. Step-11: Stop. Figure 4: Flow Diagram 4.2. IMPLEMENTATION This period of the venture is critical in light of the fact thatat this stage the hypothetical plan is changed over into functional one. This stage is a basic stage since this stage require exceptionally exact arranging and need the learning of existing framework and its detriments. The execution stage oughtto becreatedbyconsidering every one of the prerequisites, imperatives. The new framework ought to be successful and work appropriately. 5. CONCLUSION In this paper, the issue of sharing the data in cloud computing securely is resolved. Data privacy can be maintained by combination of ABE and BRE algorithm. Authentication is used to guarantee data privacy and data integrity. This indicates that the proposed system can be used to enhance privacy preservation in cloud services. 6. REFERENCES [1] “A Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing “Ruixuan Li, Member,IEEE, Chenglin Shen, Heng He, Zhiyong Xu, and Cheng-Zhong Xu, Member, IEEE [2] “Towards Se-cure Data Sharing in Cloud Computing Using Attribute Based Proxy Re-Encryption with Keyword Search” Hanshu Hong; Zhixin Sun [3] X. Liang, Z. Cao, H. Lin, and 1. Shao, "Attribute based proxy re-encryption with delegating capa-bilities," in Proc. 4th ACM Int. Symp. [4] Priya Dudhale Pise,Dr. Nilesh J Uke,”Efficient Security Protocol for Sensitive Data Sharing on Cloud Platforms” in 2017 IEEE. [5] K. Liang et aI., "A OFA -based functional proxy re- encryption scheme for securepublicclouddatasharing," IEEE Trans. Inf. Forensics Security,vol. 9, no. 10, pp. 1667-1680, Oct. 2014. [6] H. Hong, Z. Sun. "An efficient and traceable KP-ABS scheme with untrusted attribute authority in cloud computing", JoCCASA, 5(2).pp.I -8,201 6. [7] J. Liu, X. Huang, and 1. K. Liu, "Secure sharingof personal health records in cloud computing: Ciphertext-policy attribute-based signcryption," Future Generat.Comput. Syst., vol. 52, pp. 67-76,Nov. 2015.