Home
Call For Papers
Submission
Author
Registration
Publications
About
Contact Us

  Securing Shared Data with Efficient User Revocation using OTP in Cloud  
  Authors : Pranoti Kulkarni; Dipa Dharmadhikari
  Cite as:

 

Need for storing large amount of data in the cloud is increasing day by day. So, this makes securing data in the cloud more important. Several methods used to sign each block present in the cloud and user had to sign each block for getting access to the data from the cloud. For some security and privacy issues, when a user leaves the cloud or misbehaves in cloud, the respective user must be revoked from the cloud. So, this revoked user should no longer be able to access and modify shared data, and the signatures generated by this revoked user are no longer valid in the cloud. Therefore, although the content of the data is not changed during user revocation, the blocks, which were previously signed by the revoked user, still need to be signed again by an existing user in the group. Again signing each block is very tedious task to be done. So, to overcome the above disadvantages a new concept of one time password is to be used here so as to protect the files that are been stored in the cloud. Any user, either new or already registered user, he/she will have to login to the system first. Another new algorithm namely AROcrypt encryption method is to be implemented in this system. Also one more encryption technique as Rijndael technique is also implemented so as to provide better security for the data stored in cloud.

 

Published In : IJCSN Journal Volume 6, Issue 3

Date of Publication : June 2017

Pages : 446-449

Figures :01

Tables : 04

 

Pranoti Kulkarni : Computer Science and Engineering, Dr. BAMU, MIT Aurangabad, Maharashtra, India.

Dipa Dharmadhikari : Computer Science and Engineering, Dr. BAMU, MIT Aurangabad, Maharashtra, India.

 

Cloud Computing, AROcrypt, Rijndael Technique, One Time Password

Several methods which were studied and implemented had various improved mechanisms that were implemented but also had a few drawbacks such as resigning each block was a tedious job. It worked on semi trusted servers & reducing average workload was extremely difficult. So, here a new security mechanism of using one time password for providing security is to be implemented in this paper respectively. Cloud computing provides efficient storage setting to store and retrieve the cloud user’s data. Ensuring data security is a vital role to cloud users as well as cloud providers. . Recommended security benefits processes the data and then data is acknowledged to the cloud storage. Data encryption is done by choosing AROcrypt security service algorithm and Rijndael technique. It also describes Security as a Service in cloud environment. It also ensure security and confidentiality of data stored in the cloud. These techniques works on text and document files, so the future scope would be that encryption can be applied on other file formats too.

 

[1] X. Wu, L. Xu and X. Zhang, “CL-PRE: A Certificate less Proxy Re encryption Scheme for Secure Data Sharing with Public Cloud,” Proc. Seventh ACM Symp Information, Computer and Communication Security, pp. 87-88, 2012. [2] A. Fox, R. Griffith, A.D. Joseph, M. Armbrust, R.H. Katz, A. Rabkin, I. Stoica, A. Konwinski, J. Lee and M. Zaharia, “A view of Cloud computing,” Communication ACM, vol 53, pp.50-58, 2010. [3] A. Kupco, D. Wichs, D. Cash “Dynamic proofs of retrievability via Oblivious RAM,” Proc Theory and Applications of Cryptographic Techniques, pp. 279-295, 2013. [4] M. Strauss, G. Bleumer, M. Blaze, “Divertible Protocols and Atomic Proxy Cryptography,” Proc. Intl Conf. Theory and application of cryptographic techniques, pp. 127-144, 1998. [5] H. Wang, G.J. Ahn, Y. Zhu, H. Hu, S.S. Yau, “Dynamic Audit services for integrity verification of outsorced storages in cloud,” Proc. ACM Symp Applied computing, pp. 1550-1557, 2011. [6] H. Li, B. Wang, B. Li, “Knox, A Privacy preserving auditing for shared data with large groups in cloud,” Proc. Applied cryptography and network security, pp. 507-525, 2012. [7] S. Yu, W. Lou, N. Cao, Y.T. Hou, Z. Yang, “LT Codes based secure and reliable cloud storage service,” Proc. IEEE Infocom, pp. 693-701, 2012. [8] L.V. Mancini, G. Ateniese, R.D. Pietro, G. Tsudik, “Scalable and efficient provable data possesion,” Proc Security and privacy in Communication. Networks, pp. 65, 2008.