SlideShare a Scribd company logo
IDL - International Digital Library Of
Technology & Research
Volume 1, Issue 6, June 2017 Available at: www.dbpublications.org
International e-Journal For Technology And Research-2017
IDL - International Digital Library 1 | P a g e Copyright@IDL-2017
Role Based Access Control Model (RBACM)
With Efficient Genetic Algorithm (GA) For
Cloud Data Encoding, Encrypting and
Forwarding
B.Rex Cyril, DR.S.Britto Ramesh Kumar
Research scholar & Asst.Professor, Asst.Professor,
Deparment of Computer Science, Department of Computer Science,
St.Joseph’s College(Autonomous), St.Joseph’s College(Autonomous),
Tamilnadu, Trichy-620002, Tamilnadu, Trichy-620002,
rexcyrilsjc@gmail.com
Abstract
Cloud computing is one the promising and emerging field
in Information Technology because of its performance, low
cost and great availability. Cloud computing basically
gives services to an individual and the organization
through the network with the capability to scale down or
up their different kinds of services. The basic service of
cloud computing system is known as a cloud storage
system which containing a collection of storage servers.
These storage servers gives long-term storage services by
using the internet with free of cost. However, the storing
data using cloud system of third party causes very serious
problem over data confidentiality. Typically, different
kinds of encryption schemes are used to protect the cloud
data confidentiality, but it take more time to process even
a single operation. Thus, in this paper proposes cloud data
confidentiality by integrates encoding, encrypting and
forwarding. Token Based Data Security Algorithm
(TBDSA) along with RSA and AES is used for decryption
and encryption process and Role Based Access Control
Model (RBACM) is access at the time of data forwarding.
Here, cloud user’s accessing password is created by using
encoding process which is done by Genetic Algorithm
(GA) and process of GA is presented in this paper. This
TBDSA and GA algorithms takes minimum time to
execute and raises the system performance.
Keywords
Token Based Data Security Algorithm, RSA and AES,
Genetic Algorithm, Role Based Access Control Model
1. Introduction
The cloud is a term which is utilized for a virtual
collection of resources and it has wide range of
advantages. These advantages are offered for cloud users to
utilize the availability of vast array of software applications,
looking unlimited storage, to access the lightning fast power
of processing and the ability to effortlessly share information
across the world [1]. Cloud users access all of these
advantages over the internet at any place and any time. Cloud
computing is also allows corporate and consumers structure to
utilize all the cloud application without added any extra effort
for hardware and software installation. Additionally, it offers
personal files sharing process from any computer over the
internet access [2].
IDL - International Digital Library Of
Technology & Research
Volume 1, Issue 6, June 2017 Available at: www.dbpublications.org
International e-Journal For Technology And Research-2017
IDL - International Digital Library 2 | P a g e Copyright@IDL-2017
Cloud computing becomes a complex infrastructure because
of their hardware, software, storage and processing and which
are available in the form of service [3]. The cloud services are
included basically of application running remotely which is
made data available to all the cloud users.This kind of
technology offers access to a huge volume of advanced super
computers and connected at many locations around globally,
thus offering speed is tens of trillions of computations per
second.
Cloud promises tangible speed to customers and cost saving,
utilizing the technology of cloud, the organization can quickly
employ different kind of applications where contraction and
expansion. This can be achieved with the help of different
kinds of cloud enabler for example grid computing and
virtualization that allow application to be dynamically
employed onto the most appropriate infrastructure at run time.
The basic service of cloud computing system is known as a
cloud storage system which containing a collection of storage
servers. These storage servers gives long-term storage services
by using the internet with free of cost. However there remain
some issues of cloud data security, privacy, portability and
reliability.
However, the storing data using cloud system of third party
causes very serious problem over data confidentiality.
Typically, different kinds of encryption schemes are used to
protect the cloud data confidentiality, but it take more time to
process even a single operation. Thus, in this paper proposes
cloud data confidentiality by integrates encoding, encrypting
and forwarding. Token Based Data Security Algorithm
(TBDSA) along with RSA and AES is used for decryption and
encryption process and Role Based Access Control Model
(RBACM) is access at the time of data forwarding. Here,
cloud user’s accessing password is created by using encoding
process which is done by Genetic Algorithm (GAand process
of GA is presented in this paper. This TBDSA and GA
algorithms takes minimum time to execute and raises the
system performance.
2. Related work
In [4] author proposes a secure computation auditing protocol
(SecCloud) and a privacy cheating discouragement for
achieving privacy. This is a first protocol is used for secure
computation auditing and secure storage in the cloud. This
secures computation process achieved by verifier signature,
probabilistic sampling techniques and batch verification. The
main contribution of this work is to create secure-aware cloud
computing process or SecHDFS. The experimental results
show the promising result in term of cost, security and
efficiency of proposed work.
In [5] author develops a SaaS application to prevent the
leakage of information by giving risk assessment, multifactor
authentication and encryption is done based on the enhanced
elliptic curve cryptography where a cryptographically
generated random number is utilized for make the
unpredictable number, key management, secure disposal of
information, and data integrity. In this work the Google App
Engine is used for deployment process. In this work basically
analysis the cloud security challenges for example account
hijacking, information leakage and denial of service.
In [6] author proposes a cloud data integrity model in the
distributed multi-cloud environment. In this method the
experimental process is done by using prototype application
which shows the proof of concepts. Mainly in this work
concentrated on a cloud security concern such as secure data
storage. Here also consider the virtualization technology
which is used for computer resources has become a reality.
The experimental work shows that the promising results in
term of higher performance in security concern when
compared with other existing solution.
In [7] author constructed a system which comprises of proxy
re-encryption scheme combined with decentralized erasure
code such that a secure storage system. In this proposed
system not only used for robust and secure data, but it also
used for data forwarding and retrieving process. This process
is fully integrates forwarding, encoding and encryption
process. This work suggests and analyzes suitable parameters
for a number of storage servers queried by key server and
number of messages delivered to storage servers.
In [8] author proposes artificial immune algorithm based novel
data security strategy system which is process in architecture
of Hadoop Distributed File System (HDFS). In this work
introduce a new framework such as HDFS which is known as
data security model. This proposed model used for improve
the cloud security process. Additionally, the artificial immune
algorithm related with data security and this algorithm also
IDL - International Digital Library Of
Technology & Research
Volume 1, Issue 6, June 2017 Available at: www.dbpublications.org
International e-Journal For Technology And Research-2017
IDL - International Digital Library 3 | P a g e Copyright@IDL-2017
termed as dynamic selection algorithm and negative selection
algorithm. The experimental work done by using Cloudsim
platform and the results shows promising results in term of
cloud data security strategy which is depends on the artificial
immune system algorithm.
In [9] author analyzes the characteristics of present cloud
computing process and then develops a comprehensive real-
time network risk evaluation model.This model effectively
used in cloud computing process and this process is based on
the relation between pathogen invasion intensity and artificial
immune systems antibody. In this work considered the Trojan
virus which is used for check the single terminal. The
experimental work evaluate network by using integration
evaluation system. This evaluation work considered the three
kind of layer such as network layer, host layer, and application
layer. The experimental results show this proposed work
enhances the ability of intrusion detection and it can use for
present cloud computer security process.
3. Proposed System
The proposed system has four main entities such as Hybrid
Cloud, Administrator, Role Manager, and Owner. Initially the
setup a hybrid cloud in the process, the administrator is known
as main authority and the authority creates the cloud user’s
username and password for and generates the secret key for
role corresponding role manager, here have to define the role
hierarchy. Manage the given user name and password by using
role manager and the owner is the cloud user who has the
authority to store or upload the cloud data securely in the
cloud system. The users want to decrypt to access the stored
cloud data. The proposed cloud storage and accessing system
is as shown in figure 1.
Figure 1Secure Cloud Storage System with Trust
Management
Hybrid Cloud:
In this proposed system two main cloud frameworks are used
such as private and public cloud. In this integration may
overcome the each other disadvantages. The private cloud will
not be exists from the user, so the user only interact with the
public cloud over the administrator. The administrator will be
permit to access the private cloud.
Administrator:
The main authority of secure cloud storage system is termed
as administrator and the administrator has all the credentials
and system parameters to manage the secure cloud.
Additionally, the administrator adds cloud users and role
manager in the framework and provides fundamental
credentials to access the secure cloud system. The
Cloud Users
User Login
User
Registration
Admin
Upload
RSA+ AES
Download
RSA+ AES
Unique ID Provided
by Cloud Service
Provider to Cloud
User
Register/Login
Again
IF (Success) Else (Fail)
Send request for
data transfer
THEN
Verify Token_ID
before data transfer
Generate One
Time Password
(OTP) using GA
Mobile or MailOTP
Verification
Exit
No
YES
Send on
IDL - International Digital Library Of
Technology & Research
Volume 1, Issue 6, June 2017 Available at: www.dbpublications.org
International e-Journal For Technology And Research-2017
IDL - International Digital Library 4 | P a g e Copyright@IDL-2017
administrator generates the role hierarchy and specifies the
organization structure according to cloud framework.
Role Manager:
A role manager is used to manage the relationship between
specific roles and cloud users. When updating the user roles,
the role manager required to enter the password given by the
administrator. No one of the cloud users are affected by this
operation, therefore the role managers do not required to
communicate with the cloud users, and they only required to
interact with private cloud. Beforehand a user is involvedinto
a given role and the role manager required authenticating the
cloud user so as to ensure that the user is authorized user.
Owner:
Owner can be a user who has the authority to upload and
encrypt the data in the cloud. The owners particularize who
can access the data rendering to the role based procedures. In
this work the owner manages the relationship between roles
and their permission. Owner performs the encryption process
for that it does not need any password or secret key.
User:
Users are known as general cloud users who have specific
work according to their skills. Every user is authenticated by
the administrator. Users are permitted only for downloading
the secure data based on their assigned roles.
3.1 Data Storage
In this proposed work Role Based Access Control Model
(RBACM) is proposed. Thus, the roles manager assigns the
each role to the cloud user who can work with their
appropriate role. The cloud provider is not able to find the data
which is stored in the form of encrypted data. A role manager
is able to allocate a role for specific user after the data owner
has encrypted the data. A user allocated to specific role can be
revoked at any time, the revoked user have not any access
permission to data. The user revocation will not affect other
cloud users. This work, achieves a great encryption and
decryption process on client side.
In this, initially required to create the cloud user, allocate the
specific roles to the user and this process comprises
subsequent operation. In the proposed work Advanced
Encryption Standard (AES) [10] [11] algorithm utilized for
encrypt the cloud data and the secret key generated by AES is
encrypted by using Rivest-Shamir-Adleman(RSA) algorithm
[12]. When the roles in the proposed framework defined then
the each and every roles have one private key and public key.
The private key is utilized by the cloud user to access the
cloud data from different cloud server. The public key is
utilized by the cloud data owner to encrypt and upload or store
the cloud data in public cloud.
The AES algorithm is high speed algorithm and it needs low
RAM requirements, however here same secret key used for
encryption and decryption process. It faces the main problem
because of key exchange. To overcome this issue, in this work
use RSA algorithm for generating encrypted secret key with
the help of user’s public key.
Figure 2 AES Cipher
Basically, the AES algorithm initiated with Add round key
stage than it will followed by nine rounds of four different
stages and a 10th round of three different stages. Here, the
four different stages are defined as Substitute bytes, Mix
Columns,Shift rows, and Add Round Key. AES working
process is as shown in figure 2. Initially, the nine rounds of
AES decryption process contain Inverse Substitute
bytes,Inverse Shift rows,Inverse Mix Columns andInverse
Add Round Key. Again the 10th
round not executesthe Inverse
Mix Columns stage as same as 9th
round as shown in figure 2.
The RSA algorithm used for measured the encoding and
decoding AES secret key. Let S is defined as the secret key
and C is defined as the cipher key then at encryption is defined
Pre-round Transformation
Round 1
Round 2
Round
KeyExpansion
128 bit plaintext
Round Key (128 bit)
AES
Cipher Key (128,
192, or 256 bits)
𝑁𝑟 Key size
10 128
12 192
14 256
Relationship between
number of rounds and
cipher key size
128 bit Cipher text
IDL - International Digital Library Of
Technology & Research
Volume 1, Issue 6, June 2017 Available at: www.dbpublications.org
International e-Journal For Technology And Research-2017
IDL - International Digital Library 5 | P a g e Copyright@IDL-2017
𝑎𝑠 𝐶 = 𝑆 𝑚𝑜𝑑 𝑛 as the same time the decryption is defined as
𝑆 = 𝐶 𝑚𝑜𝑑 𝑛. Where n is defined as the very huge prime
number which is generated at the time of key generation
process is shown in Figure 3.
RSA key Generation
RSA
(𝒊𝒏𝒕𝒆𝒈𝒆𝒓 𝒆, 𝒎𝒐𝒅𝒖𝒍𝒖𝒔 𝒏 =
𝒑 ∗ 𝒒, 𝒕𝒘𝒐 𝒍𝒂𝒓𝒈𝒆 𝒑𝒓𝒊𝒎𝒆 𝒏𝒖𝒎𝒃𝒆𝒓𝒔 𝒑 𝒂𝒏𝒅 𝒒)
𝑛is known as the modulus.
𝑒is known as the public exponent.
Step 1:𝑆𝑒𝑙𝑒𝑐𝑡 𝑡𝑤𝑜 𝑝𝑟𝑖𝑚𝑒 𝑛𝑢𝑚𝑏𝑒𝑟𝑠.
Step 2: 𝐶𝑎𝑙𝑐𝑢𝑙𝑎𝑡𝑒 𝑛 = 𝑝 ∗ 𝑞.
Step 3: 𝐶𝑎𝑙𝑐𝑢𝑙𝑎𝑡𝑒 𝑓(𝑛) = (𝑝 − 1)(𝑞 − 1)
Step 4:
𝑆𝑒𝑙𝑒𝑐𝑡 𝑒 𝑠𝑢𝑐𝑕 𝑡𝑕𝑎𝑡 𝑒 𝑖𝑠 𝑑𝑒𝑓𝑖𝑛𝑒𝑑 𝑎𝑠 𝑟𝑒𝑙𝑎𝑡𝑖𝑣𝑒𝑙𝑦 𝑝𝑟𝑖𝑚𝑒 𝑡𝑜 𝑓 𝑛 𝑎𝑛𝑑 ≤
𝑓(𝑛).
Step 5:
𝐷𝑒𝑓𝑖𝑛𝑒 𝑑 𝑠𝑢𝑐𝑕 𝑡𝑕𝑎𝑡 𝑐𝑜𝑛𝑔𝑟𝑢𝑒𝑛𝑡 𝑚𝑜𝑑𝑢𝑙𝑜 1 (𝑚𝑜𝑑 𝑓(𝑛)) 𝑎𝑛𝑑 𝑑 <
𝑓(𝑛).
Step 6: 𝑃𝑢𝑏𝑙𝑖𝑐 𝑘𝑒𝑦 = {𝑒, 𝑛}, 𝑃𝑟𝑖𝑣𝑎𝑡𝑒 𝐾𝑒𝑦 = {𝑑, 𝑛}
Figure 3 RSA Key Generation Process
In this proposed system, the RBACM is utilized for
authentication the users to access appropriate files and
maintain the data integrity and privacy and which is achieved
by using AES and RSA algorithm.
3.2 Data Recovery
In this work the secure data storage is done by using
integration of AES and RSA algorithm and the secure data
recovery processing achieved with the help of Genetic
algorithm. In this proposed work the GA is used for obtaining
data privacy with the help of creating dynamic password.
Basically, the GA is defined as heuristics optimization
algorithm it has four different processes such as Initialization,
Selection, Cross-Over, Mutation and their fitness function is
used for evaluation function.
Initialization:initially select the chromosomes population
then calculate the fitness function for each and every
chromosome. An initial population size is generated randomly
and then then that can also “seeding” the initial population
which means select some initial population from exiting
research.
Selection:After initialization process chromosomes or the
parents are to be choosing for reproduction is select based on
their fitness value.
Crossover:after finding the fitness, select the high fitness
value for next process such as crossover operation. In this
crossover, replace with one highest fitness value to another
highest fitness value if it is greater than that, so here new
offspring should be generated. For example here have two
chromosomes or parents P1 and P2 as:
𝑃1 = 1 0 0 1 0 0 0 1
𝑃2 = 1 1 0 1 1 0 0 0
After crossover the offspring’s are as:
𝑋3 = 1 0 0 1 1 0 0 0
𝑋4 = 1 1 0 1 0 0 0 1.
Mutation:After done the crossover operation, it will move on
the mutation process. In some cases there is not required for
crossover directly go for mutation operation. From the above
example two same generations are produced after that random
bit from one generation is mutated to the produce different
generation.
Suppose here have generation 𝑋3 = 1 0 1 1 0 0 0 and here
required to mutate it 4 𝑎𝑛𝑑 8 𝑏𝑖𝑡 finally here get new
offspring such as 𝑋5 = 1 0 0 0 1 0 0 1
From this process providing data security to user and also
multi cloud transaction process and each time of data
transaction the GA will generate the dynamic One Time
Password (OTP). This dynamic OTP is treating as a single
time transaction so each time of transaction the GA is
automatically created a new password. This password not easy
to crack like static password it is also time based which means
after specific time span the generated OTP is become expired
or invalid. So, the unauthorized user may not use the cloud
data and also the authorized user if wrongly enters the OTP in
three times means the system is automatically logout.
So that the GA done a good job of obtaining dynamic OTP on
each and every request of the cloud user for accessing their
cloud data from different kind of cloud server. By utilizing
GA it will generate optimized random value and this random
value can be utilized as a “password”. Each time the password
IDL - International Digital Library Of
Technology & Research
Volume 1, Issue 6, June 2017 Available at: www.dbpublications.org
International e-Journal For Technology And Research-2017
IDL - International Digital Library 6 | P a g e Copyright@IDL-2017
will mutate different values, therefore it must be altered which
means it is not reversible. Thus, the security level of cloud
storage is very high and data recovery is also secured by using
obtaining OTP.
As the architecture of proposed system shows cloud security
utilizing OTP by using GA in figure 1. Initially Admin upload
the data on cloud so that each and every register cloud user
can access the cloud data with using their specific role. For
accessing data user required to do two important processes
such as user registration and submission of OTP. From the
architecture registered user want to access the cloud data, the
user must be logged in. After login the user gets their OTP on
mail or mobile and when user gets the OTP they should enter
in the system correctly. If OTP correct the system will permit
for data accessing otherwise the system will ask correct OTP.
The data recovery using GA is as shown in Figure 4.
Data Recovery using Genetic Algorithm
Step 1: When cloud user𝑆𝐸𝑁𝐷 𝑅𝐸𝑄: = 𝑐𝑙𝑜𝑢𝑑 𝑠𝑒𝑟𝑣𝑒𝑟,
THEN NEW ACCOUNT CREATED & CLIENT
REGISTERED.
Step 2: IF cloud
𝑢𝑠𝑒𝑟: = 𝐶𝑂𝑁 𝑇𝐻𝐸𝑁 𝑈𝑁𝐼𝑄𝑈𝐸 𝑇𝑂𝐾𝐸𝑁_𝐼𝐷 is generated on
that “Token” FOR SPECIFIC CLOUD SERVICE.
Steps 3: THEN cloud user
SEND
𝑅𝐸𝑄: =
𝑆𝑇𝑅𝐼𝑁𝐺 𝑇𝐻𝐸𝑁 𝐶𝐻𝐸𝐶𝐾 𝐹𝑂𝑅 𝑇𝐻𝐸 𝑉𝐸𝑅𝐼𝐹𝐼𝐸𝐷 𝑇𝑂𝐾𝐸𝑁_𝐼𝐷
with Data Security.
Step 4:𝐼𝐹 (𝑇𝑂𝐾𝐸𝑁_𝐼𝐷: = 𝐶𝑂𝑅𝑅𝐸𝐶𝑇)
{
Authenticated user.
}
ELSE
{
Intruder (Fake user).
}
Step 5:𝐼𝐹 𝑇𝑜𝑘𝑒𝑛_𝐼𝐷 does 𝑛𝑜𝑡 𝑀𝐴𝑇𝐶𝐻 with the database
entry for a specific cloud service that indicated existence of
𝐼𝑁𝑇𝑅𝑈𝐷𝐸𝑅 𝐴𝑁𝐷 𝑅𝐸𝑃𝐸𝐴𝑇 𝑆𝑇𝐸𝑃 1 𝑇𝑂 4.O
Otherwise Data transferred through Secure Channel and
𝑅𝐸𝐶𝐸𝐼𝑉𝐸 𝐴𝐶𝐾.
Step 6:Verify the 𝑇𝑂𝐾𝐸𝑁_𝐼𝐷 before transfer the data
Step 7: Generate the one time password by using the
Genetic Algorithm
Step 8: send the generated password to could user’s mobile
or mail
Step 9:REPEATSTEP 4 TO 5
Figure 4 Data Recovery Process
4. Results and discussion
Different kind of methods are utilized to employing RBACM
and encryption and decryption processes to cloud secure
storage system such as Anonymous HIBE [14],HDFS with
AIS [8] and these algorithm are compared with proposed
system such as RBACM with GA. In this work successful
done in Netbeans JAVA version 7.0 as a frontend and backend
is used as DERBY database.
In figure 5 shows the comparison of communication
complexity in three different algorithms such asAnonymous
HIBE,HDFS with AIS and proposed RBACM with GA. From
the figure 6 results can see that the communication cost
riseswhen the data block size increases, but in the proposed
system shows promising results in term of communication
cost when compared with other two algorithms such as
Anonymous HIBE,HDFS with AIS.
Figure 5 Communication Cost
Figure 6 shows that the comparison results in term of
execution timewith three different algorithms such assuch
IDL - International Digital Library Of
Technology & Research
Volume 1, Issue 6, June 2017 Available at: www.dbpublications.org
International e-Journal For Technology And Research-2017
IDL - International Digital Library 7 | P a g e Copyright@IDL-2017
asAnonymous HIBE,HDFS with AIS and proposed RBACM
with GA. Here the execution time is treated as both encryption
and decryption time. From the figure 6 results, here conclude
that the proposed system shows the promising results in term
of encryption time and decryption time which means whole
execution time when compared with other two algorithms
such as Anonymous HIBE,HDFS with AIS. The proposed
algorithm shows the minimum execution time.
Figure 6 Execution Time
Figure 7 User request /Load
Figure 7 shows that the comparison results in term of User
request /Load by using three different algorithms such assuch
asAnonymous HIBE,HDFS with AIS and proposed RBACM
with GA. Here the user request is treated as both uploading
and downloading processes. From the figure 6 results, here
conclude that the proposed system shows the promising results
in term of both uploading and downloading processes when
compared with other two algorithms such as Anonymous
HIBE,HDFS with AIS.
5. Conclusion
In this paper successfully proposes cloud data confidentiality
by integrates encoding, encrypting and forwarding. The
TBDSA along with RSA and AES is used for decryption and
encryption process and Role Based Access Control Model is
access at the time of data forwarding. Here, cloud user’s
accessing password is created by using encoding process
which is done by GA and process of GA is presented in this
paper. This TBDSA and GA algorithms takes minimum time
to execute and raises the system performance. Experimental
results shows that the promising result in term of
Communication Cost, Execution Time and User request
/Load.
References
[1]FatemehArabalidousti, TourajBanirostam, “A Security
Model For Cloud Computing Based On Autonomous
Biological Agents”, International Journal on Cloud
Computing: Services and Architecture (IJCCSA), Vol.3, No.5,
PP. 19-26, 2013.
[2] AnshikaNegi, Mayank Singh, Sanjeev Kumar, “An
Efficent Security Farmework Design for Cloud Computing
using Artificial Neural Networks”, International Journal of
Computer Applications,Vol.129, No.4, 2015.
[3] Kolenchery. J, “Parallel phrase matching for cloud based
security services”, International Conference of Soft
Computing and Pattern Recognition (SoCPaR), IEEE, PP. 481
– 485, 2011.
[4] LifeiWeia, HaojinZhua, ZhenfuCaoa, Xiaolei Donga,
WeiweiJiaa, Yunlu Chena, Athanasios V. Vasilakosb,
“Security and privacy for storage and computation in cloud
computing”, Information Sciences,Vol.258, PP.371–386,
2014.
[5] Nina Pearl Doe, Sumaila Alfa, V. Suganya, “An Efficient
Method to Prevent Information Leakage in Cloud”, IOSR
Journal of Computer Engineering (IOSR-JCE), 7Volume 16,
Issue 3, Ver. III, PP.134-139, 2014.
IDL - International Digital Library Of
Technology & Research
Volume 1, Issue 6, June 2017 Available at: www.dbpublications.org
International e-Journal For Technology And Research-2017
IDL - International Digital Library 8 | P a g e Copyright@IDL-2017
[6] Ali Mohammed Hameed Al-Saffar, “Identity Based
Approach for Cloud Data Integrity in Multi-Cloud
Environment”, International Journal of Advanced Research in
Computer and Communication Engineering, Vol. 4, Issue 8,
2015.
[7] AsadiSrinivasulu, Ch.D.V.Subbarao, A.Bhudevi,
“Dynamic Data Storage Publishing and Forwarding in Cloud
Using Fusion Security Algorithms”, Computer Science and
Information Technology, Vol.2, No.4, PP.203-210, 2014.
[8] Chen Jinyin, Yang Dongyong, “Data Security Strategy
Based on Artificial Immune Algorithm for Cloud Computing”,
Applied Mathematics & Information Sciences, Vol. 7, No. 1L,
PP.149-153, 2013.
[9] Jin Yang, Cilin Wang, Caiming Liu, Le Yu, “Cloud
Computing for Network Security Intrusion Detection System”,
Journal Of Networks, Vol. 8, No. 1, PP.140-147, 2013.
[10]R. H. Sakr, F. Omara, O. Nomir, “An Optimized
Technique for Secure Data Over Cloud OS”, International
Journal of Emerging Trends & Technology in Computer
Science (IJETTCS),Volume 3, Issue 3, PP.278-284, 2014.
[11] M. Sudha, Bandaru Rama Krishna Rao, M. Monica, “A
Comprehensive Approach to Ensure Secure Data
Communication in Cloud Environment”, International Journal
of Computer Applications (0975 – 8887), Vol.12, No.8, PP.
19-23,2010.
[12]AbhaSachdev,MohitBhansali, “Enhancing Cloud
Computing Security using AES Algorithm”, International
Journal of Computer Applications, Vol.67, No.9, PP. 19-23,
2013.
[13] Poornima G. Naik,Girish R. Naik, “A Framework for
Secure 3D Password using Genetic Algorithm”,International
Journal of Advance Research inComputer Science and
Management Studies,Vol.3, Issue 1,PP. 7-23, 2015.
[14] Kwangsu Lee, Jong Hwan Park, Dong Hoon Lee,
“Anonymous HIBE with Short Ciphertexts: Full Security in
Prime Order Groups∗”, arXiv:1502.07812v1 [cs.CR], 2015.

More Related Content

PDF
IJARCCE 20
PDF
Improving security for data migration in cloud computing using randomized enc...
PDF
Data Search in Cloud using the Encrypted Keywords
PDF
Improving Data Storage Security in Cloud using Hadoop
PDF
IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud
PDF
A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp...
PDF
3 ijece 1 ed iqbal qc
PDF
C017421624
IJARCCE 20
Improving security for data migration in cloud computing using randomized enc...
Data Search in Cloud using the Encrypted Keywords
Improving Data Storage Security in Cloud using Hadoop
IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud
A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp...
3 ijece 1 ed iqbal qc
C017421624

What's hot (20)

PDF
A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...
PDF
Research Paper Digital Forensics on Google Cloud Platform
PDF
An proficient and Confidentiality-Preserving Multi- Keyword Ranked Search ove...
PDF
Review on Key Based Encryption Scheme for Secure Data Sharing on Cloud
PDF
Exploring Cloud Encryption
PPTX
Secry poster
PDF
IRJET- A Survey: Data Security in Cloud using Cryptography and Steganography
PDF
IRJET- Secure File Storage on Cloud using Cryptography
PPTX
Secure cloud storage
PDF
Secure Data Sharing In an Untrusted Cloud
PDF
IRJET - Multimedia Security on Cloud Computing using Cryptography
PDF
H1803035056
PDF
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
PDF
Privacy Preserving in Cloud Using Distinctive Elliptic Curve Cryptosystem (DECC)
PDF
survey paper on cp abe cloud computing
PDF
Efficient technique for privacy preserving publishing of set valued data on c...
PDF
IRJET- Privacy Preserving Cloud Storage based on a Three Layer Security M...
PDF
A Privacy Preserving Three-Layer Cloud Storage Scheme Based On Computational ...
PDF
An Efficient and Safe Data Sharing Scheme for Mobile Cloud Computing
PDF
Secure Privacy Preserving Using Multilevel Trust For Cloud Storage
A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...
Research Paper Digital Forensics on Google Cloud Platform
An proficient and Confidentiality-Preserving Multi- Keyword Ranked Search ove...
Review on Key Based Encryption Scheme for Secure Data Sharing on Cloud
Exploring Cloud Encryption
Secry poster
IRJET- A Survey: Data Security in Cloud using Cryptography and Steganography
IRJET- Secure File Storage on Cloud using Cryptography
Secure cloud storage
Secure Data Sharing In an Untrusted Cloud
IRJET - Multimedia Security on Cloud Computing using Cryptography
H1803035056
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
Privacy Preserving in Cloud Using Distinctive Elliptic Curve Cryptosystem (DECC)
survey paper on cp abe cloud computing
Efficient technique for privacy preserving publishing of set valued data on c...
IRJET- Privacy Preserving Cloud Storage based on a Three Layer Security M...
A Privacy Preserving Three-Layer Cloud Storage Scheme Based On Computational ...
An Efficient and Safe Data Sharing Scheme for Mobile Cloud Computing
Secure Privacy Preserving Using Multilevel Trust For Cloud Storage
Ad

Similar to Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA) For Cloud Data Encoding, Encrypting and Forwarding (20)

PDF
Mitigating the Integrity Issues in Cloud Computing Utilizing Cryptography Alg...
PDF
International Journal of Computational Engineering Research(IJCER)
PDF
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
PDF
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
PDF
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
PDF
El35782786
PDF
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
PDF
Improving Efficiency of Security in Multi-Cloud
PDF
Paper id 27201448
PDF
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
PDF
Bio-Cryptography Based Secured Data Replication Management in Cloud Storage
PDF
Efficient Privacy Preserving Clustering Based Multi Keyword Search
PDF
ACCESSING SECURED DATA IN CLOUD COMPUTING ENVIRONMENT
PDF
Accessing secured data in cloud computing environment
PDF
deep dive down on how NCLA works in IOTs
PDF
Secure_Data_Distribution_Algorithm_for_Fog_Computing.pdf
PDF
Proposed system for data security in distributed computing in using triple d...
PDF
Efficient and Empiric Keyword Search Using Cloud
PDF
SECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTING
PDF
SECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTING
Mitigating the Integrity Issues in Cloud Computing Utilizing Cryptography Alg...
International Journal of Computational Engineering Research(IJCER)
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
El35782786
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
Improving Efficiency of Security in Multi-Cloud
Paper id 27201448
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
Bio-Cryptography Based Secured Data Replication Management in Cloud Storage
Efficient Privacy Preserving Clustering Based Multi Keyword Search
ACCESSING SECURED DATA IN CLOUD COMPUTING ENVIRONMENT
Accessing secured data in cloud computing environment
deep dive down on how NCLA works in IOTs
Secure_Data_Distribution_Algorithm_for_Fog_Computing.pdf
Proposed system for data security in distributed computing in using triple d...
Efficient and Empiric Keyword Search Using Cloud
SECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTING
SECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTING
Ad

Recently uploaded (20)

PDF
August -2025_Top10 Read_Articles_ijait.pdf
PPTX
"Array and Linked List in Data Structures with Types, Operations, Implementat...
PPTX
introduction to high performance computing
PPTX
Management Information system : MIS-e-Business Systems.pptx
PPTX
6ME3A-Unit-II-Sensors and Actuators_Handouts.pptx
PPTX
AUTOMOTIVE ENGINE MANAGEMENT (MECHATRONICS).pptx
PDF
ChapteR012372321DFGDSFGDFGDFSGDFGDFGDFGSDFGDFGFD
PPTX
Sorting and Hashing in Data Structures with Algorithms, Techniques, Implement...
PDF
SMART SIGNAL TIMING FOR URBAN INTERSECTIONS USING REAL-TIME VEHICLE DETECTI...
PPTX
Graph Data Structures with Types, Traversals, Connectivity, and Real-Life App...
PDF
UNIT no 1 INTRODUCTION TO DBMS NOTES.pdf
PDF
PREDICTION OF DIABETES FROM ELECTRONIC HEALTH RECORDS
PDF
Human-AI Collaboration: Balancing Agentic AI and Autonomy in Hybrid Systems
PDF
BIO-INSPIRED ARCHITECTURE FOR PARSIMONIOUS CONVERSATIONAL INTELLIGENCE : THE ...
PDF
Accra-Kumasi Expressway - Prefeasibility Report Volume 1 of 7.11.2018.pdf
PPTX
CyberSecurity Mobile and Wireless Devices
PDF
Influence of Green Infrastructure on Residents’ Endorsement of the New Ecolog...
PDF
August 2025 - Top 10 Read Articles in Network Security & Its Applications
PPTX
Module 8- Technological and Communication Skills.pptx
PDF
Design Guidelines and solutions for Plastics parts
August -2025_Top10 Read_Articles_ijait.pdf
"Array and Linked List in Data Structures with Types, Operations, Implementat...
introduction to high performance computing
Management Information system : MIS-e-Business Systems.pptx
6ME3A-Unit-II-Sensors and Actuators_Handouts.pptx
AUTOMOTIVE ENGINE MANAGEMENT (MECHATRONICS).pptx
ChapteR012372321DFGDSFGDFGDFSGDFGDFGDFGSDFGDFGFD
Sorting and Hashing in Data Structures with Algorithms, Techniques, Implement...
SMART SIGNAL TIMING FOR URBAN INTERSECTIONS USING REAL-TIME VEHICLE DETECTI...
Graph Data Structures with Types, Traversals, Connectivity, and Real-Life App...
UNIT no 1 INTRODUCTION TO DBMS NOTES.pdf
PREDICTION OF DIABETES FROM ELECTRONIC HEALTH RECORDS
Human-AI Collaboration: Balancing Agentic AI and Autonomy in Hybrid Systems
BIO-INSPIRED ARCHITECTURE FOR PARSIMONIOUS CONVERSATIONAL INTELLIGENCE : THE ...
Accra-Kumasi Expressway - Prefeasibility Report Volume 1 of 7.11.2018.pdf
CyberSecurity Mobile and Wireless Devices
Influence of Green Infrastructure on Residents’ Endorsement of the New Ecolog...
August 2025 - Top 10 Read Articles in Network Security & Its Applications
Module 8- Technological and Communication Skills.pptx
Design Guidelines and solutions for Plastics parts

Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA) For Cloud Data Encoding, Encrypting and Forwarding

  • 1. IDL - International Digital Library Of Technology & Research Volume 1, Issue 6, June 2017 Available at: www.dbpublications.org International e-Journal For Technology And Research-2017 IDL - International Digital Library 1 | P a g e Copyright@IDL-2017 Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA) For Cloud Data Encoding, Encrypting and Forwarding B.Rex Cyril, DR.S.Britto Ramesh Kumar Research scholar & Asst.Professor, Asst.Professor, Deparment of Computer Science, Department of Computer Science, St.Joseph’s College(Autonomous), St.Joseph’s College(Autonomous), Tamilnadu, Trichy-620002, Tamilnadu, Trichy-620002, [email protected] Abstract Cloud computing is one the promising and emerging field in Information Technology because of its performance, low cost and great availability. Cloud computing basically gives services to an individual and the organization through the network with the capability to scale down or up their different kinds of services. The basic service of cloud computing system is known as a cloud storage system which containing a collection of storage servers. These storage servers gives long-term storage services by using the internet with free of cost. However, the storing data using cloud system of third party causes very serious problem over data confidentiality. Typically, different kinds of encryption schemes are used to protect the cloud data confidentiality, but it take more time to process even a single operation. Thus, in this paper proposes cloud data confidentiality by integrates encoding, encrypting and forwarding. Token Based Data Security Algorithm (TBDSA) along with RSA and AES is used for decryption and encryption process and Role Based Access Control Model (RBACM) is access at the time of data forwarding. Here, cloud user’s accessing password is created by using encoding process which is done by Genetic Algorithm (GA) and process of GA is presented in this paper. This TBDSA and GA algorithms takes minimum time to execute and raises the system performance. Keywords Token Based Data Security Algorithm, RSA and AES, Genetic Algorithm, Role Based Access Control Model 1. Introduction The cloud is a term which is utilized for a virtual collection of resources and it has wide range of advantages. These advantages are offered for cloud users to utilize the availability of vast array of software applications, looking unlimited storage, to access the lightning fast power of processing and the ability to effortlessly share information across the world [1]. Cloud users access all of these advantages over the internet at any place and any time. Cloud computing is also allows corporate and consumers structure to utilize all the cloud application without added any extra effort for hardware and software installation. Additionally, it offers personal files sharing process from any computer over the internet access [2].
  • 2. IDL - International Digital Library Of Technology & Research Volume 1, Issue 6, June 2017 Available at: www.dbpublications.org International e-Journal For Technology And Research-2017 IDL - International Digital Library 2 | P a g e Copyright@IDL-2017 Cloud computing becomes a complex infrastructure because of their hardware, software, storage and processing and which are available in the form of service [3]. The cloud services are included basically of application running remotely which is made data available to all the cloud users.This kind of technology offers access to a huge volume of advanced super computers and connected at many locations around globally, thus offering speed is tens of trillions of computations per second. Cloud promises tangible speed to customers and cost saving, utilizing the technology of cloud, the organization can quickly employ different kind of applications where contraction and expansion. This can be achieved with the help of different kinds of cloud enabler for example grid computing and virtualization that allow application to be dynamically employed onto the most appropriate infrastructure at run time. The basic service of cloud computing system is known as a cloud storage system which containing a collection of storage servers. These storage servers gives long-term storage services by using the internet with free of cost. However there remain some issues of cloud data security, privacy, portability and reliability. However, the storing data using cloud system of third party causes very serious problem over data confidentiality. Typically, different kinds of encryption schemes are used to protect the cloud data confidentiality, but it take more time to process even a single operation. Thus, in this paper proposes cloud data confidentiality by integrates encoding, encrypting and forwarding. Token Based Data Security Algorithm (TBDSA) along with RSA and AES is used for decryption and encryption process and Role Based Access Control Model (RBACM) is access at the time of data forwarding. Here, cloud user’s accessing password is created by using encoding process which is done by Genetic Algorithm (GAand process of GA is presented in this paper. This TBDSA and GA algorithms takes minimum time to execute and raises the system performance. 2. Related work In [4] author proposes a secure computation auditing protocol (SecCloud) and a privacy cheating discouragement for achieving privacy. This is a first protocol is used for secure computation auditing and secure storage in the cloud. This secures computation process achieved by verifier signature, probabilistic sampling techniques and batch verification. The main contribution of this work is to create secure-aware cloud computing process or SecHDFS. The experimental results show the promising result in term of cost, security and efficiency of proposed work. In [5] author develops a SaaS application to prevent the leakage of information by giving risk assessment, multifactor authentication and encryption is done based on the enhanced elliptic curve cryptography where a cryptographically generated random number is utilized for make the unpredictable number, key management, secure disposal of information, and data integrity. In this work the Google App Engine is used for deployment process. In this work basically analysis the cloud security challenges for example account hijacking, information leakage and denial of service. In [6] author proposes a cloud data integrity model in the distributed multi-cloud environment. In this method the experimental process is done by using prototype application which shows the proof of concepts. Mainly in this work concentrated on a cloud security concern such as secure data storage. Here also consider the virtualization technology which is used for computer resources has become a reality. The experimental work shows that the promising results in term of higher performance in security concern when compared with other existing solution. In [7] author constructed a system which comprises of proxy re-encryption scheme combined with decentralized erasure code such that a secure storage system. In this proposed system not only used for robust and secure data, but it also used for data forwarding and retrieving process. This process is fully integrates forwarding, encoding and encryption process. This work suggests and analyzes suitable parameters for a number of storage servers queried by key server and number of messages delivered to storage servers. In [8] author proposes artificial immune algorithm based novel data security strategy system which is process in architecture of Hadoop Distributed File System (HDFS). In this work introduce a new framework such as HDFS which is known as data security model. This proposed model used for improve the cloud security process. Additionally, the artificial immune algorithm related with data security and this algorithm also
  • 3. IDL - International Digital Library Of Technology & Research Volume 1, Issue 6, June 2017 Available at: www.dbpublications.org International e-Journal For Technology And Research-2017 IDL - International Digital Library 3 | P a g e Copyright@IDL-2017 termed as dynamic selection algorithm and negative selection algorithm. The experimental work done by using Cloudsim platform and the results shows promising results in term of cloud data security strategy which is depends on the artificial immune system algorithm. In [9] author analyzes the characteristics of present cloud computing process and then develops a comprehensive real- time network risk evaluation model.This model effectively used in cloud computing process and this process is based on the relation between pathogen invasion intensity and artificial immune systems antibody. In this work considered the Trojan virus which is used for check the single terminal. The experimental work evaluate network by using integration evaluation system. This evaluation work considered the three kind of layer such as network layer, host layer, and application layer. The experimental results show this proposed work enhances the ability of intrusion detection and it can use for present cloud computer security process. 3. Proposed System The proposed system has four main entities such as Hybrid Cloud, Administrator, Role Manager, and Owner. Initially the setup a hybrid cloud in the process, the administrator is known as main authority and the authority creates the cloud user’s username and password for and generates the secret key for role corresponding role manager, here have to define the role hierarchy. Manage the given user name and password by using role manager and the owner is the cloud user who has the authority to store or upload the cloud data securely in the cloud system. The users want to decrypt to access the stored cloud data. The proposed cloud storage and accessing system is as shown in figure 1. Figure 1Secure Cloud Storage System with Trust Management Hybrid Cloud: In this proposed system two main cloud frameworks are used such as private and public cloud. In this integration may overcome the each other disadvantages. The private cloud will not be exists from the user, so the user only interact with the public cloud over the administrator. The administrator will be permit to access the private cloud. Administrator: The main authority of secure cloud storage system is termed as administrator and the administrator has all the credentials and system parameters to manage the secure cloud. Additionally, the administrator adds cloud users and role manager in the framework and provides fundamental credentials to access the secure cloud system. The Cloud Users User Login User Registration Admin Upload RSA+ AES Download RSA+ AES Unique ID Provided by Cloud Service Provider to Cloud User Register/Login Again IF (Success) Else (Fail) Send request for data transfer THEN Verify Token_ID before data transfer Generate One Time Password (OTP) using GA Mobile or MailOTP Verification Exit No YES Send on
  • 4. IDL - International Digital Library Of Technology & Research Volume 1, Issue 6, June 2017 Available at: www.dbpublications.org International e-Journal For Technology And Research-2017 IDL - International Digital Library 4 | P a g e Copyright@IDL-2017 administrator generates the role hierarchy and specifies the organization structure according to cloud framework. Role Manager: A role manager is used to manage the relationship between specific roles and cloud users. When updating the user roles, the role manager required to enter the password given by the administrator. No one of the cloud users are affected by this operation, therefore the role managers do not required to communicate with the cloud users, and they only required to interact with private cloud. Beforehand a user is involvedinto a given role and the role manager required authenticating the cloud user so as to ensure that the user is authorized user. Owner: Owner can be a user who has the authority to upload and encrypt the data in the cloud. The owners particularize who can access the data rendering to the role based procedures. In this work the owner manages the relationship between roles and their permission. Owner performs the encryption process for that it does not need any password or secret key. User: Users are known as general cloud users who have specific work according to their skills. Every user is authenticated by the administrator. Users are permitted only for downloading the secure data based on their assigned roles. 3.1 Data Storage In this proposed work Role Based Access Control Model (RBACM) is proposed. Thus, the roles manager assigns the each role to the cloud user who can work with their appropriate role. The cloud provider is not able to find the data which is stored in the form of encrypted data. A role manager is able to allocate a role for specific user after the data owner has encrypted the data. A user allocated to specific role can be revoked at any time, the revoked user have not any access permission to data. The user revocation will not affect other cloud users. This work, achieves a great encryption and decryption process on client side. In this, initially required to create the cloud user, allocate the specific roles to the user and this process comprises subsequent operation. In the proposed work Advanced Encryption Standard (AES) [10] [11] algorithm utilized for encrypt the cloud data and the secret key generated by AES is encrypted by using Rivest-Shamir-Adleman(RSA) algorithm [12]. When the roles in the proposed framework defined then the each and every roles have one private key and public key. The private key is utilized by the cloud user to access the cloud data from different cloud server. The public key is utilized by the cloud data owner to encrypt and upload or store the cloud data in public cloud. The AES algorithm is high speed algorithm and it needs low RAM requirements, however here same secret key used for encryption and decryption process. It faces the main problem because of key exchange. To overcome this issue, in this work use RSA algorithm for generating encrypted secret key with the help of user’s public key. Figure 2 AES Cipher Basically, the AES algorithm initiated with Add round key stage than it will followed by nine rounds of four different stages and a 10th round of three different stages. Here, the four different stages are defined as Substitute bytes, Mix Columns,Shift rows, and Add Round Key. AES working process is as shown in figure 2. Initially, the nine rounds of AES decryption process contain Inverse Substitute bytes,Inverse Shift rows,Inverse Mix Columns andInverse Add Round Key. Again the 10th round not executesthe Inverse Mix Columns stage as same as 9th round as shown in figure 2. The RSA algorithm used for measured the encoding and decoding AES secret key. Let S is defined as the secret key and C is defined as the cipher key then at encryption is defined Pre-round Transformation Round 1 Round 2 Round KeyExpansion 128 bit plaintext Round Key (128 bit) AES Cipher Key (128, 192, or 256 bits) 𝑁𝑟 Key size 10 128 12 192 14 256 Relationship between number of rounds and cipher key size 128 bit Cipher text
  • 5. IDL - International Digital Library Of Technology & Research Volume 1, Issue 6, June 2017 Available at: www.dbpublications.org International e-Journal For Technology And Research-2017 IDL - International Digital Library 5 | P a g e Copyright@IDL-2017 𝑎𝑠 𝐶 = 𝑆 𝑚𝑜𝑑 𝑛 as the same time the decryption is defined as 𝑆 = 𝐶 𝑚𝑜𝑑 𝑛. Where n is defined as the very huge prime number which is generated at the time of key generation process is shown in Figure 3. RSA key Generation RSA (𝒊𝒏𝒕𝒆𝒈𝒆𝒓 𝒆, 𝒎𝒐𝒅𝒖𝒍𝒖𝒔 𝒏 = 𝒑 ∗ 𝒒, 𝒕𝒘𝒐 𝒍𝒂𝒓𝒈𝒆 𝒑𝒓𝒊𝒎𝒆 𝒏𝒖𝒎𝒃𝒆𝒓𝒔 𝒑 𝒂𝒏𝒅 𝒒) 𝑛is known as the modulus. 𝑒is known as the public exponent. Step 1:𝑆𝑒𝑙𝑒𝑐𝑡 𝑡𝑤𝑜 𝑝𝑟𝑖𝑚𝑒 𝑛𝑢𝑚𝑏𝑒𝑟𝑠. Step 2: 𝐶𝑎𝑙𝑐𝑢𝑙𝑎𝑡𝑒 𝑛 = 𝑝 ∗ 𝑞. Step 3: 𝐶𝑎𝑙𝑐𝑢𝑙𝑎𝑡𝑒 𝑓(𝑛) = (𝑝 − 1)(𝑞 − 1) Step 4: 𝑆𝑒𝑙𝑒𝑐𝑡 𝑒 𝑠𝑢𝑐𝑕 𝑡𝑕𝑎𝑡 𝑒 𝑖𝑠 𝑑𝑒𝑓𝑖𝑛𝑒𝑑 𝑎𝑠 𝑟𝑒𝑙𝑎𝑡𝑖𝑣𝑒𝑙𝑦 𝑝𝑟𝑖𝑚𝑒 𝑡𝑜 𝑓 𝑛 𝑎𝑛𝑑 ≤ 𝑓(𝑛). Step 5: 𝐷𝑒𝑓𝑖𝑛𝑒 𝑑 𝑠𝑢𝑐𝑕 𝑡𝑕𝑎𝑡 𝑐𝑜𝑛𝑔𝑟𝑢𝑒𝑛𝑡 𝑚𝑜𝑑𝑢𝑙𝑜 1 (𝑚𝑜𝑑 𝑓(𝑛)) 𝑎𝑛𝑑 𝑑 < 𝑓(𝑛). Step 6: 𝑃𝑢𝑏𝑙𝑖𝑐 𝑘𝑒𝑦 = {𝑒, 𝑛}, 𝑃𝑟𝑖𝑣𝑎𝑡𝑒 𝐾𝑒𝑦 = {𝑑, 𝑛} Figure 3 RSA Key Generation Process In this proposed system, the RBACM is utilized for authentication the users to access appropriate files and maintain the data integrity and privacy and which is achieved by using AES and RSA algorithm. 3.2 Data Recovery In this work the secure data storage is done by using integration of AES and RSA algorithm and the secure data recovery processing achieved with the help of Genetic algorithm. In this proposed work the GA is used for obtaining data privacy with the help of creating dynamic password. Basically, the GA is defined as heuristics optimization algorithm it has four different processes such as Initialization, Selection, Cross-Over, Mutation and their fitness function is used for evaluation function. Initialization:initially select the chromosomes population then calculate the fitness function for each and every chromosome. An initial population size is generated randomly and then then that can also “seeding” the initial population which means select some initial population from exiting research. Selection:After initialization process chromosomes or the parents are to be choosing for reproduction is select based on their fitness value. Crossover:after finding the fitness, select the high fitness value for next process such as crossover operation. In this crossover, replace with one highest fitness value to another highest fitness value if it is greater than that, so here new offspring should be generated. For example here have two chromosomes or parents P1 and P2 as: 𝑃1 = 1 0 0 1 0 0 0 1 𝑃2 = 1 1 0 1 1 0 0 0 After crossover the offspring’s are as: 𝑋3 = 1 0 0 1 1 0 0 0 𝑋4 = 1 1 0 1 0 0 0 1. Mutation:After done the crossover operation, it will move on the mutation process. In some cases there is not required for crossover directly go for mutation operation. From the above example two same generations are produced after that random bit from one generation is mutated to the produce different generation. Suppose here have generation 𝑋3 = 1 0 1 1 0 0 0 and here required to mutate it 4 𝑎𝑛𝑑 8 𝑏𝑖𝑡 finally here get new offspring such as 𝑋5 = 1 0 0 0 1 0 0 1 From this process providing data security to user and also multi cloud transaction process and each time of data transaction the GA will generate the dynamic One Time Password (OTP). This dynamic OTP is treating as a single time transaction so each time of transaction the GA is automatically created a new password. This password not easy to crack like static password it is also time based which means after specific time span the generated OTP is become expired or invalid. So, the unauthorized user may not use the cloud data and also the authorized user if wrongly enters the OTP in three times means the system is automatically logout. So that the GA done a good job of obtaining dynamic OTP on each and every request of the cloud user for accessing their cloud data from different kind of cloud server. By utilizing GA it will generate optimized random value and this random value can be utilized as a “password”. Each time the password
  • 6. IDL - International Digital Library Of Technology & Research Volume 1, Issue 6, June 2017 Available at: www.dbpublications.org International e-Journal For Technology And Research-2017 IDL - International Digital Library 6 | P a g e Copyright@IDL-2017 will mutate different values, therefore it must be altered which means it is not reversible. Thus, the security level of cloud storage is very high and data recovery is also secured by using obtaining OTP. As the architecture of proposed system shows cloud security utilizing OTP by using GA in figure 1. Initially Admin upload the data on cloud so that each and every register cloud user can access the cloud data with using their specific role. For accessing data user required to do two important processes such as user registration and submission of OTP. From the architecture registered user want to access the cloud data, the user must be logged in. After login the user gets their OTP on mail or mobile and when user gets the OTP they should enter in the system correctly. If OTP correct the system will permit for data accessing otherwise the system will ask correct OTP. The data recovery using GA is as shown in Figure 4. Data Recovery using Genetic Algorithm Step 1: When cloud user𝑆𝐸𝑁𝐷 𝑅𝐸𝑄: = 𝑐𝑙𝑜𝑢𝑑 𝑠𝑒𝑟𝑣𝑒𝑟, THEN NEW ACCOUNT CREATED & CLIENT REGISTERED. Step 2: IF cloud 𝑢𝑠𝑒𝑟: = 𝐶𝑂𝑁 𝑇𝐻𝐸𝑁 𝑈𝑁𝐼𝑄𝑈𝐸 𝑇𝑂𝐾𝐸𝑁_𝐼𝐷 is generated on that “Token” FOR SPECIFIC CLOUD SERVICE. Steps 3: THEN cloud user SEND 𝑅𝐸𝑄: = 𝑆𝑇𝑅𝐼𝑁𝐺 𝑇𝐻𝐸𝑁 𝐶𝐻𝐸𝐶𝐾 𝐹𝑂𝑅 𝑇𝐻𝐸 𝑉𝐸𝑅𝐼𝐹𝐼𝐸𝐷 𝑇𝑂𝐾𝐸𝑁_𝐼𝐷 with Data Security. Step 4:𝐼𝐹 (𝑇𝑂𝐾𝐸𝑁_𝐼𝐷: = 𝐶𝑂𝑅𝑅𝐸𝐶𝑇) { Authenticated user. } ELSE { Intruder (Fake user). } Step 5:𝐼𝐹 𝑇𝑜𝑘𝑒𝑛_𝐼𝐷 does 𝑛𝑜𝑡 𝑀𝐴𝑇𝐶𝐻 with the database entry for a specific cloud service that indicated existence of 𝐼𝑁𝑇𝑅𝑈𝐷𝐸𝑅 𝐴𝑁𝐷 𝑅𝐸𝑃𝐸𝐴𝑇 𝑆𝑇𝐸𝑃 1 𝑇𝑂 4.O Otherwise Data transferred through Secure Channel and 𝑅𝐸𝐶𝐸𝐼𝑉𝐸 𝐴𝐶𝐾. Step 6:Verify the 𝑇𝑂𝐾𝐸𝑁_𝐼𝐷 before transfer the data Step 7: Generate the one time password by using the Genetic Algorithm Step 8: send the generated password to could user’s mobile or mail Step 9:REPEATSTEP 4 TO 5 Figure 4 Data Recovery Process 4. Results and discussion Different kind of methods are utilized to employing RBACM and encryption and decryption processes to cloud secure storage system such as Anonymous HIBE [14],HDFS with AIS [8] and these algorithm are compared with proposed system such as RBACM with GA. In this work successful done in Netbeans JAVA version 7.0 as a frontend and backend is used as DERBY database. In figure 5 shows the comparison of communication complexity in three different algorithms such asAnonymous HIBE,HDFS with AIS and proposed RBACM with GA. From the figure 6 results can see that the communication cost riseswhen the data block size increases, but in the proposed system shows promising results in term of communication cost when compared with other two algorithms such as Anonymous HIBE,HDFS with AIS. Figure 5 Communication Cost Figure 6 shows that the comparison results in term of execution timewith three different algorithms such assuch
  • 7. IDL - International Digital Library Of Technology & Research Volume 1, Issue 6, June 2017 Available at: www.dbpublications.org International e-Journal For Technology And Research-2017 IDL - International Digital Library 7 | P a g e Copyright@IDL-2017 asAnonymous HIBE,HDFS with AIS and proposed RBACM with GA. Here the execution time is treated as both encryption and decryption time. From the figure 6 results, here conclude that the proposed system shows the promising results in term of encryption time and decryption time which means whole execution time when compared with other two algorithms such as Anonymous HIBE,HDFS with AIS. The proposed algorithm shows the minimum execution time. Figure 6 Execution Time Figure 7 User request /Load Figure 7 shows that the comparison results in term of User request /Load by using three different algorithms such assuch asAnonymous HIBE,HDFS with AIS and proposed RBACM with GA. Here the user request is treated as both uploading and downloading processes. From the figure 6 results, here conclude that the proposed system shows the promising results in term of both uploading and downloading processes when compared with other two algorithms such as Anonymous HIBE,HDFS with AIS. 5. Conclusion In this paper successfully proposes cloud data confidentiality by integrates encoding, encrypting and forwarding. The TBDSA along with RSA and AES is used for decryption and encryption process and Role Based Access Control Model is access at the time of data forwarding. Here, cloud user’s accessing password is created by using encoding process which is done by GA and process of GA is presented in this paper. This TBDSA and GA algorithms takes minimum time to execute and raises the system performance. Experimental results shows that the promising result in term of Communication Cost, Execution Time and User request /Load. References [1]FatemehArabalidousti, TourajBanirostam, “A Security Model For Cloud Computing Based On Autonomous Biological Agents”, International Journal on Cloud Computing: Services and Architecture (IJCCSA), Vol.3, No.5, PP. 19-26, 2013. [2] AnshikaNegi, Mayank Singh, Sanjeev Kumar, “An Efficent Security Farmework Design for Cloud Computing using Artificial Neural Networks”, International Journal of Computer Applications,Vol.129, No.4, 2015. [3] Kolenchery. J, “Parallel phrase matching for cloud based security services”, International Conference of Soft Computing and Pattern Recognition (SoCPaR), IEEE, PP. 481 – 485, 2011. [4] LifeiWeia, HaojinZhua, ZhenfuCaoa, Xiaolei Donga, WeiweiJiaa, Yunlu Chena, Athanasios V. Vasilakosb, “Security and privacy for storage and computation in cloud computing”, Information Sciences,Vol.258, PP.371–386, 2014. [5] Nina Pearl Doe, Sumaila Alfa, V. Suganya, “An Efficient Method to Prevent Information Leakage in Cloud”, IOSR Journal of Computer Engineering (IOSR-JCE), 7Volume 16, Issue 3, Ver. III, PP.134-139, 2014.
  • 8. IDL - International Digital Library Of Technology & Research Volume 1, Issue 6, June 2017 Available at: www.dbpublications.org International e-Journal For Technology And Research-2017 IDL - International Digital Library 8 | P a g e Copyright@IDL-2017 [6] Ali Mohammed Hameed Al-Saffar, “Identity Based Approach for Cloud Data Integrity in Multi-Cloud Environment”, International Journal of Advanced Research in Computer and Communication Engineering, Vol. 4, Issue 8, 2015. [7] AsadiSrinivasulu, Ch.D.V.Subbarao, A.Bhudevi, “Dynamic Data Storage Publishing and Forwarding in Cloud Using Fusion Security Algorithms”, Computer Science and Information Technology, Vol.2, No.4, PP.203-210, 2014. [8] Chen Jinyin, Yang Dongyong, “Data Security Strategy Based on Artificial Immune Algorithm for Cloud Computing”, Applied Mathematics & Information Sciences, Vol. 7, No. 1L, PP.149-153, 2013. [9] Jin Yang, Cilin Wang, Caiming Liu, Le Yu, “Cloud Computing for Network Security Intrusion Detection System”, Journal Of Networks, Vol. 8, No. 1, PP.140-147, 2013. [10]R. H. Sakr, F. Omara, O. Nomir, “An Optimized Technique for Secure Data Over Cloud OS”, International Journal of Emerging Trends & Technology in Computer Science (IJETTCS),Volume 3, Issue 3, PP.278-284, 2014. [11] M. Sudha, Bandaru Rama Krishna Rao, M. Monica, “A Comprehensive Approach to Ensure Secure Data Communication in Cloud Environment”, International Journal of Computer Applications (0975 – 8887), Vol.12, No.8, PP. 19-23,2010. [12]AbhaSachdev,MohitBhansali, “Enhancing Cloud Computing Security using AES Algorithm”, International Journal of Computer Applications, Vol.67, No.9, PP. 19-23, 2013. [13] Poornima G. Naik,Girish R. Naik, “A Framework for Secure 3D Password using Genetic Algorithm”,International Journal of Advance Research inComputer Science and Management Studies,Vol.3, Issue 1,PP. 7-23, 2015. [14] Kwangsu Lee, Jong Hwan Park, Dong Hoon Lee, “Anonymous HIBE with Short Ciphertexts: Full Security in Prime Order Groups∗”, arXiv:1502.07812v1 [cs.CR], 2015.