Need for storing large amount of data in the cloud is increasing day by day. So, this makes securing data in the cloud more
important. Several methods used to sign each block present in the cloud and user had to sign each block for getting access to the data
from the cloud. For some security and privacy issues, when a user leaves the cloud or misbehaves in cloud, the respective user must be
revoked from the cloud. So, this revoked user should no longer be able to access and modify shared data, and the signatures generated by
this revoked user are no longer valid in the cloud. Therefore, although the content of the data is not changed during user revocation, the
blocks, which were previously signed by the revoked user, still need to be signed again by an existing user in the group. Again signing
each block is very tedious task to be done. So, to overcome the above disadvantages a new concept of one time password is to be used
here so as to protect the files that are been stored in the cloud. Any user, either new or already registered user, he/she will have to login to
the system first. Another new algorithm namely AROcrypt encryption method is to be implemented in this system. Also one more
encryption technique as Rijndael technique is also implemented so as to provide better security for the data stored in cloud.
Published In:IJCSN Journal Volume 6, Issue 3
Date of Publication : June 2017
Pages : 446-449
Figures :01
Tables : 04
Pranoti Kulkarni : Computer Science and Engineering, Dr. BAMU, MIT
Aurangabad, Maharashtra, India.
Dipa Dharmadhikari : Computer Science and Engineering, Dr. BAMU, MIT
Aurangabad, Maharashtra, India.
Cloud Computing, AROcrypt, Rijndael Technique, One Time Password
Several methods which were studied and implemented had
various improved mechanisms that were implemented but
also had a few drawbacks such as resigning each block
was a tedious job. It worked on semi trusted servers &
reducing average workload was extremely difficult. So,
here a new security mechanism of using one time
password for providing security is to be implemented in
this paper respectively. Cloud computing provides
efficient storage setting to store and retrieve the cloud
user’s data. Ensuring data security is a vital role to cloud
users as well as cloud providers. . Recommended security
benefits processes the data and then data is acknowledged
to the cloud storage. Data encryption is done by choosing
AROcrypt security service algorithm and Rijndael
technique. It also describes Security as a Service in cloud
environment. It also ensure security and confidentiality of
data stored in the cloud. These techniques works on text
and document files, so the future scope would be that
encryption can be applied on other file formats too.
[1] X. Wu, L. Xu and X. Zhang, “CL-PRE: A Certificate less
Proxy Re encryption Scheme for Secure Data Sharing
with Public Cloud,” Proc. Seventh ACM Symp
Information, Computer and Communication Security, pp.
87-88, 2012.
[2] A. Fox, R. Griffith, A.D. Joseph, M. Armbrust, R.H.
Katz, A. Rabkin, I. Stoica, A. Konwinski, J. Lee and M.
Zaharia, “A view of Cloud computing,” Communication
ACM, vol 53, pp.50-58, 2010.
[3] A. Kupco, D. Wichs, D. Cash “Dynamic proofs of
retrievability via Oblivious RAM,” Proc Theory and
Applications of Cryptographic Techniques, pp. 279-295,
2013.
[4] M. Strauss, G. Bleumer, M. Blaze, “Divertible Protocols
and Atomic Proxy Cryptography,” Proc. Intl Conf.
Theory and application of cryptographic techniques, pp.
127-144, 1998.
[5] H. Wang, G.J. Ahn, Y. Zhu, H. Hu, S.S. Yau, “Dynamic
Audit services for integrity verification of outsorced
storages in cloud,” Proc. ACM Symp Applied computing,
pp. 1550-1557, 2011.
[6] H. Li, B. Wang, B. Li, “Knox, A Privacy preserving
auditing for shared data with large groups in cloud,” Proc.
Applied cryptography and network security, pp. 507-525,
2012.
[7] S. Yu, W. Lou, N. Cao, Y.T. Hou, Z. Yang, “LT Codes
based secure and reliable cloud storage service,” Proc.
IEEE Infocom, pp. 693-701, 2012.
[8] L.V. Mancini, G. Ateniese, R.D. Pietro, G. Tsudik,
“Scalable and efficient provable data possesion,” Proc
Security and privacy in Communication. Networks, pp.
65, 2008.