SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 04 | Apr-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1408
Secure sharing of personal data on cloud Using key aggregation and
Cryptography
Amulya Sulake V1, Ashwini J V2, Kavya N Kumar3, Rakshitha M4
1,2,3,4 B.E Dept of CSE ,NIE, Mysuru, Karnataka, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - Cloud innovation is exceptionally productiveand
helpful in display new mechanical time, where a man utilizes
the web and the remote servers to give and keep up
information and in addition applications. Such applications
thusly can be utilized by the end clients through the cloud
correspondences with no establishment. Distributedstorageis
getting astoundingly popular these days. The two significant
workplaces that cloud give are data amassing and data
sharing. An ensured data sharing in cloud is a basic issue. This
paper goes with an idea of making the data sharing secure
and discharge adaptable. Distributed storage ought to have
the capacity to store and offer information safely, proficiently,
and adaptably with others in distributed storage.
We propose a basic, proficient, and freely irrefutable way to
deal with guarantee cloud information security while sharing
between various clients. The flow work centers around
decreasing key-estimate by creating a solitary total key,
however does not give accessible encryption,whichisrequired
for adaptable information sharing. Our proposed plottendsto
this issue by empowering a owner to circulate a solitary
consistent size total key to an information client for sharing
an expansive number of records and afterward clientpresents
a solitary total trapdoor to the cloud for seeking over
approved encoded archives.
Key Words: Personal data, secure data sharing, key-
aggregate encryption, searchable, cloud storage.
1. INTRODUCTION
Cloud systems can be used for providing data sharing
functionality because of its ubiquity, convenient and on
demand access facilities. So, it is used by owners to store
their data on the cloud. The cloud, because of its data
outsourcing feature hasmany privacy and securityissues.So
owners encrypt their sensitive data before outsourcing it to
the cloud and hence the data remains secure against the
cloud provider and other malicious users. But data
encryption makes searching and retrieving only theselected
data containing given keywords a challenging task.
The common information in cloud servers, in any case,
generally contains users‟ delicate data, for example,
individual profile, monetary information, wellbeingrecords,
and so forth and should be very much secured. As the
responsibility for information is isolated from the
organization of them, the cloud servers may move users‟
information to other cloud servers in outsourcing or offer
them in cloud seeking. Along these lines, it turnsintoamajor
test to secure the protection of those mutual information in
cloud, particularly in cross-cloud and huge information
condition. Keeping in mind the end goal to address this
difficulty, it is important to outline an extensive answer for
help client characterized approval period and to give fine-
grained get to control amid this period.
While sharing data, security is an importantconcern.Usually
we put stock in pariah server for giving security. Requesting
is sent to the server for approval, has getting to fogs are
constrained to trust the pariah for their security.
Cryptography of information is fundamentally the mistake
the substance of the information, for example, content,
picture, sound, video et cetera to make the information
unintelligible, imperceptible or useless amidtransmissionof
information. It is known as named Encryption. Fundamental
point of cryptography framework is to secure information
from assailant. In the meantime decoding is correct inverse
procedure of getting back the first information from
scrambled information, which restore the first information.
To encode information at distributed storage, both
symmetric and unbalanced key age calculations are utilized.
Symmetric-key calculations are calculations for
cryptography that utilization the same cryptographic keys
for both encryption of plaintext and unscrambling of
ciphertext. The keys might be indistinguishable or there
might be a straightforward change to go between the two
keys. The keys, practically speaking, speak to a common
mystery between at least two gatheringsthat can be utilized
to keep up a private data interface.
Public-key cryptography, also known as asymmetric
cryptography, is a class of cryptographic protocolsbased on
algorithms that require two separate keys, one of which is
secret (or private) and one of which is public. Although
different, the two parts of this key pair are mathematically
linked. The public key is used for encryption. This
prerequisite that the two gatherings approach the mystery
key is one of the principle disadvantages of symmetric key
encryption, in contrast with open key encryption.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 04 | Apr-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1409
2. RELATED WORK
As data privacy and security is the biggest obstacle in the
wide adoption of cloud services in a modern health care
environment [4], [5], many researchers have contributed to
this area. This section reviews several categories of existing
literature works.
A PRE scheme allows data owners to delegate to the proxy
the ability to convert the cipher texts encrypted under his
public-key into ones for data users. But this schemerequires
the data owner to trust the proxy that it only convertscipher
texts according to his instruction. If the proxy colludes with
data users, some form of the data owner’s secret key can be
recovered which can decrypt data owner’s cipher texts. In
addition to this, proxy suffersfrom too many encryptionand
decryption operations, which increase computational
overhead [1].
Chu et al. [1] developed a scheme to allow encrypting asetof
documents with different keys, but be decrypted with a
single aggregate key. This scheme is based on a public key
cryptosystem and takes into account cipher textclassduring
encryption. The scheme [1] enables efficient delegation of
decryption rights for any set of cipher texts using a single
aggregate key and is the main inspiration of ourwork. But it
does not support keyword search over the encrypted data
which is required to achieve secure and selective data
sharing in the cloud.
Leng et al. [4] proposed a solution that enables patients to
enforce fine-grained accesscontrol. Patients useConditional
Proxy Re-encryption to provide data users with write
privileges for PHRs. When data users finished updating the
authorized PHRs, they signed the PHRs with the signature
key of the PHR owner and it is therefore difficult to correctly
verify who signed the PHRs.
Cipher Cloud provides a unified cloud encryption gateway
with award-winning technology to encrypt sensitivedata in
real time before it„s sent to the cloud. It also protects
enterprise data by using operations-preserving encryption
and tokenization in both private and public cloud
communication without affecting functionality, usability, or
performance.
3. IMPROVED KEY AGGREGATION
Proposed system :
Ensured information partaking in thecloudutilizingthetotal
key for Data proposed work points in sharing the
information without exchanging keys for every last record.
The deviated encryption standard is utilized for scrambling
every one of the information took after by open key
encryption. The end client can get to their information
utilizing their private key and the Global mystery key which
is exchanged amid the validation procedure. Despite thefact
that the Global mystery key is hacked amid transmission,
malignant assailant can't get the information since it can be
decoded just by utilizing a private key. Keys require not be
exchanged for every single document, information will be
encoded utilizing a Global mystery key. So the information
will be sheltered at remote place. The customers who
require the information will get to the information utilizing
their private key.
Architecture:
Presenting an extraordinary kind of open key encryption
which we call key-total cryptosystem (KAC). In KAC, clients
scramble a message under an open key, as well as under an
identifier of ciphertext called class. The key proprietorholds
an ace mystery called master secret key, which can be
utilized to extricate mystery keys for various classes. More
importantly, the extract key can be an aggregate key
which is compact as a secret key for a single class, but
aggregates the power of many such keys, i.e., the
decryption power for any subset of ciphertext classes.
Implementation modules:
1. Data Owners & Data User Registration Module:
Owner & Data Users(Doctor/Nurse/Insurance Broker) gets
registered to our storage service (With personal
information’s – Id, Name, Location, Contact, LoginPassword,
etc..)
Generate Master Key for each patient (GenerateAsymmetric
Keys for Data Users). Store registration information’s and
key in Amazon Simple DB
2. data Upload Module:
Build Index file for the health record. Index file holds all
those keywords provide along with the number of
occurrence of each keyword in that health record (Based on
Binary Representation). GenerateSymmetricFile/Document
Encryption Key for Health Record (Unique Key for every
record derived from PatientsMaster Key) (Basic Polynomial
Equation). Perform Symmetric Key EncryptionontheHealth
Record (AES - Rijndael Algorithm). Upload Encrypted data
Record & its associated Index File to Cloud using Amazon S3
Service
Update Amazon Simple DB with Upload Information’s
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 04 | Apr-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1410
3. Record Sharing Module:
Owner are allowed to selectively share their personal
records to respective Data Users (Doctor/Nurse/Insurance
Broker). Aggregated Key getsgenerated for selectedrecords
[Lagrange Interpolating Polynomial]. EncryptAggregatekey
with Data Users Public Key, File sharing information & its
respective enc. aggregate key are stored at Amazon Simple
DB
4. Document Retrieval Module:
Download Enc. Aggregated Key at Data User
(Doctor/Nurse/Insurance Broker) Machine based on the
selected sharing. Decrypt Enc. Agg. Key with Users Private
Key. Data Users are allowed to provide Search Query –
Keywords (Single or Multiple) on selected health records
sharing. Generate Query Trapdoor. Generated Query
Trapdoor is sent to cloud for searching.CalculateDocuments
Relevance Score using Cosine Similarity Search [Euclidean
Dot Product Formula]. Download Records from Amazon S3
Storage. Generate File/Record Decryption Keys from
Aggregate Key. Decrypt all encrypted health records using
Symmetric Key Algorithm (AES - Rijndael Algorithm)
4.RESULT ANALYSIS
The Initial outcomes acquired for the given security display
is broke down thinking about Various Situation. Different
encryption procedures are contrasted and their handling
time for different document sizes. The chart demonstrates
the general assessment of the encryption systems. It
unmistakably demonstrates that the proposed calculation
works more productively than the other encryption
guidelines being looked at.
5.CONCLUSION
Proposed subject secured information sharing utilizing a
total key is Involve for preparing vital information. The Data
can be safely relieved in Cloud stockpiling utilizing these
Aggregate key procedures. Key Asymmetric Encryption
Protocol are more Protected than the Key Symmetric
Encryption Protocol which utilizes a solitary key on the two
sides for transmission of information. Utilizing a solitary
Global Secret key is an imperative element of the proposed
calculation. This lessens the utilization of different keys
sharing between the buyers and consequently guarantees
security of the information beingalleviated.Notwithstanding
being encoded, the information to be alleviated will be
protected in the remote place.
REFERENCES
[1] C. Chu, S. Chow, and W. Tzeng, “Key-Aggregate
Cryptosystem for Scalable Data Sharing in Cloud Storage,”
IEEE Transactions on Parallel and Distributed Systems,
2014, 25 (2): 468-477.
[2] P. Ferrie, Attacks on Virtual Machine Emulators, White
Paper, Symantec Corporation, January 2007,
http://www.symantec.com/avcenter/reference/Virtual_Mac
hine_Threats.pdf
[3] University of Melbourne, Australia 2005 [3]Q.Zhangand
Y. Wang, ”A Centralized Key Management Scheme for
Hierarchical Access Control,” in Proceedings of IEEE Global
Telecommunications Conference (GLOBECOM 04). IEEE,
2004, pp. 20672071.
[4] Leng, C., Yu, H., Wang, and J., Huang, “Securing Personal
Health Records in the Cloud by Enforcing Sticky Policies,”
TELKOMNIKA Indonesian Journal of Electrical Engineering,
11 (4), 2200-2208, 2013.
[5] J. Benaloh, M. Chase, E. Horvitz, and K. Lauter, “Patient
Controlled Encryption: Ensuring Privacy of Electronic
Medical Records,” Proc. ACM Workshop Cloud Computing
Security (CCSW 09), pp. 103-114, 2009.
[6] Kan Yang and Xiaohua Jia,”An Efficient DynamicAuditing
Protocol for Data Storage in Cloud Computing”, 2012 IEEE
Transactions on Parallel and Distributed Systems.
[7] Huiki Xu, Shumin Guo and Keke Chen,”Building
Confidential and Efficient Query Servicesin The Cloud using
Data Perturbation”, 2014 IEEE Transactions on Knowledge
and Data Engineering, VOL.26,NO.2.

More Related Content

PDF
IRJET- Review on Privacy Preserving on Multi Keyword Search over Encrypte...
PDF
SECURE SENSITIVE DATA SHARING ON BIG DATA PLATFORM
PDF
Protection Saving Positioned Multi-Keyword Scan for Different Information in ...
PDF
IRJET- Efficient Traceable Authorization Search System for Secure Cloud Storage
PDF
Secure Privacy Preserving Using Multilevel Trust For Cloud Storage
PDF
Carrying out safe exploration short of the actual data of codes and trapdoors
PDF
Paper id 27201446
PDF
F018133640.key aggregate paper
IRJET- Review on Privacy Preserving on Multi Keyword Search over Encrypte...
SECURE SENSITIVE DATA SHARING ON BIG DATA PLATFORM
Protection Saving Positioned Multi-Keyword Scan for Different Information in ...
IRJET- Efficient Traceable Authorization Search System for Secure Cloud Storage
Secure Privacy Preserving Using Multilevel Trust For Cloud Storage
Carrying out safe exploration short of the actual data of codes and trapdoors
Paper id 27201446
F018133640.key aggregate paper

What's hot (20)

PDF
Paper id 27201448
PDF
PDF
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
PDF
Secure retrieval of files using homomorphic encryption for cloud computing
PDF
J018145862
PDF
Attribute-Based Data Sharing
PDF
IRJET- Data Security in Cloud Computing using Cryptographic Algorithms
PDF
IRJET- Adaptable Wildcard Searchable Encryption System
PDF
Towards Secure Data Distribution Systems in Mobile Cloud Computing: A Survey
PDF
Implementation of De-Duplication Algorithm
PDF
IRJET- A Novel and Secure Approach to Control and Access Data in Cloud St...
PDF
Secure Medical Data Computation using Virtual_ID Authentication and File Swap...
PDF
PDF
Multi-part Dynamic Key Generation For Secure Data Encryption
PDF
IRJET - Reliable and Efficient Revocation and Data Sharing using Identity...
PDF
IJSRED-V2I3P52
PDF
Accessing secured data in cloud computing environment
PDF
Kp3419221926
PDF
Bio-Cryptography Based Secured Data Replication Management in Cloud Storage
DOCX
15.secure keyword search and data sharing mechanism for cloud computing
Paper id 27201448
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
Secure retrieval of files using homomorphic encryption for cloud computing
J018145862
Attribute-Based Data Sharing
IRJET- Data Security in Cloud Computing using Cryptographic Algorithms
IRJET- Adaptable Wildcard Searchable Encryption System
Towards Secure Data Distribution Systems in Mobile Cloud Computing: A Survey
Implementation of De-Duplication Algorithm
IRJET- A Novel and Secure Approach to Control and Access Data in Cloud St...
Secure Medical Data Computation using Virtual_ID Authentication and File Swap...
Multi-part Dynamic Key Generation For Secure Data Encryption
IRJET - Reliable and Efficient Revocation and Data Sharing using Identity...
IJSRED-V2I3P52
Accessing secured data in cloud computing environment
Kp3419221926
Bio-Cryptography Based Secured Data Replication Management in Cloud Storage
15.secure keyword search and data sharing mechanism for cloud computing
Ad

Similar to IRJET- Secure Sharing of Personal Data on Cloud using Key Aggregation and Cryptography (20)

PDF
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
PDF
IRJET- Security Enhancement for Sharing Data within Group Members in Cloud
PDF
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
PDF
Secure Data Sharing In an Untrusted Cloud
PDF
Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cl...
PDF
IRJET-Using Downtoken Secure Group Data Sharing on Cloud
PDF
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
PDF
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
PDF
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
PDF
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
PDF
IRJET- Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
PDF
EXPLORING WOMEN SECURITY BY DEDUPLICATION OF DATA
PDF
A review on key aggregate cryptosystem for scalable data sharing in cloud sto...
PDF
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
PDF
A Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud Data
PDF
IRJET- Secure Cloud Data Using Attribute Based Encryption
PDF
Efficient and Empiric Keyword Search Using Cloud
PDF
IRJET- Anchoring of Cloud Information under Key Presentation
PDF
IRJET- A Review Paper on an Efficient File Hierarchy Attribute Based Encr...
PDF
IRJET- Attribute based Access Control for Cloud Data Storage
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET- Security Enhancement for Sharing Data within Group Members in Cloud
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Secure Data Sharing In an Untrusted Cloud
Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cl...
IRJET-Using Downtoken Secure Group Data Sharing on Cloud
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
IRJET- Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
EXPLORING WOMEN SECURITY BY DEDUPLICATION OF DATA
A review on key aggregate cryptosystem for scalable data sharing in cloud sto...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
A Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud Data
IRJET- Secure Cloud Data Using Attribute Based Encryption
Efficient and Empiric Keyword Search Using Cloud
IRJET- Anchoring of Cloud Information under Key Presentation
IRJET- A Review Paper on an Efficient File Hierarchy Attribute Based Encr...
IRJET- Attribute based Access Control for Cloud Data Storage
Ad

More from IRJET Journal (20)

PDF
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
PDF
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
PDF
Kiona – A Smart Society Automation Project
PDF
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
PDF
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
PDF
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
PDF
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
PDF
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
PDF
BRAIN TUMOUR DETECTION AND CLASSIFICATION
PDF
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
PDF
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
PDF
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
PDF
Breast Cancer Detection using Computer Vision
PDF
Auto-Charging E-Vehicle with its battery Management.
PDF
Analysis of high energy charge particle in the Heliosphere
PDF
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
PDF
Auto-Charging E-Vehicle with its battery Management.
PDF
Analysis of high energy charge particle in the Heliosphere
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
Kiona – A Smart Society Automation Project
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
BRAIN TUMOUR DETECTION AND CLASSIFICATION
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
Breast Cancer Detection using Computer Vision
Auto-Charging E-Vehicle with its battery Management.
Analysis of high energy charge particle in the Heliosphere
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
Auto-Charging E-Vehicle with its battery Management.
Analysis of high energy charge particle in the Heliosphere
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...

Recently uploaded (20)

PPTX
Internship_Presentation_Final engineering.pptx
PPTX
CYBER-CRIMES AND SECURITY A guide to understanding
PDF
Embodied AI: Ushering in the Next Era of Intelligent Systems
PDF
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
PPTX
Lecture Notes Electrical Wiring System Components
PPTX
CH1 Production IntroductoryConcepts.pptx
PPTX
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
PPTX
bas. eng. economics group 4 presentation 1.pptx
PPTX
UNIT-1 - COAL BASED THERMAL POWER PLANTS
DOCX
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
PDF
오픈소스 LLM, vLLM으로 Production까지 (Instruct.KR Summer Meetup, 2025)
PPTX
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
PDF
Structs to JSON How Go Powers REST APIs.pdf
PPTX
Road Safety tips for School Kids by a k maurya.pptx
PPTX
“Next-Gen AI: Trends Reshaping Our World”
PDF
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
PDF
Operating System & Kernel Study Guide-1 - converted.pdf
DOCX
573137875-Attendance-Management-System-original
PDF
Model Code of Practice - Construction Work - 21102022 .pdf
PPTX
Simulation of electric circuit laws using tinkercad.pptx
Internship_Presentation_Final engineering.pptx
CYBER-CRIMES AND SECURITY A guide to understanding
Embodied AI: Ushering in the Next Era of Intelligent Systems
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
Lecture Notes Electrical Wiring System Components
CH1 Production IntroductoryConcepts.pptx
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
bas. eng. economics group 4 presentation 1.pptx
UNIT-1 - COAL BASED THERMAL POWER PLANTS
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
오픈소스 LLM, vLLM으로 Production까지 (Instruct.KR Summer Meetup, 2025)
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
Structs to JSON How Go Powers REST APIs.pdf
Road Safety tips for School Kids by a k maurya.pptx
“Next-Gen AI: Trends Reshaping Our World”
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
Operating System & Kernel Study Guide-1 - converted.pdf
573137875-Attendance-Management-System-original
Model Code of Practice - Construction Work - 21102022 .pdf
Simulation of electric circuit laws using tinkercad.pptx

IRJET- Secure Sharing of Personal Data on Cloud using Key Aggregation and Cryptography

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 04 | Apr-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1408 Secure sharing of personal data on cloud Using key aggregation and Cryptography Amulya Sulake V1, Ashwini J V2, Kavya N Kumar3, Rakshitha M4 1,2,3,4 B.E Dept of CSE ,NIE, Mysuru, Karnataka, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Cloud innovation is exceptionally productiveand helpful in display new mechanical time, where a man utilizes the web and the remote servers to give and keep up information and in addition applications. Such applications thusly can be utilized by the end clients through the cloud correspondences with no establishment. Distributedstorageis getting astoundingly popular these days. The two significant workplaces that cloud give are data amassing and data sharing. An ensured data sharing in cloud is a basic issue. This paper goes with an idea of making the data sharing secure and discharge adaptable. Distributed storage ought to have the capacity to store and offer information safely, proficiently, and adaptably with others in distributed storage. We propose a basic, proficient, and freely irrefutable way to deal with guarantee cloud information security while sharing between various clients. The flow work centers around decreasing key-estimate by creating a solitary total key, however does not give accessible encryption,whichisrequired for adaptable information sharing. Our proposed plottendsto this issue by empowering a owner to circulate a solitary consistent size total key to an information client for sharing an expansive number of records and afterward clientpresents a solitary total trapdoor to the cloud for seeking over approved encoded archives. Key Words: Personal data, secure data sharing, key- aggregate encryption, searchable, cloud storage. 1. INTRODUCTION Cloud systems can be used for providing data sharing functionality because of its ubiquity, convenient and on demand access facilities. So, it is used by owners to store their data on the cloud. The cloud, because of its data outsourcing feature hasmany privacy and securityissues.So owners encrypt their sensitive data before outsourcing it to the cloud and hence the data remains secure against the cloud provider and other malicious users. But data encryption makes searching and retrieving only theselected data containing given keywords a challenging task. The common information in cloud servers, in any case, generally contains users‟ delicate data, for example, individual profile, monetary information, wellbeingrecords, and so forth and should be very much secured. As the responsibility for information is isolated from the organization of them, the cloud servers may move users‟ information to other cloud servers in outsourcing or offer them in cloud seeking. Along these lines, it turnsintoamajor test to secure the protection of those mutual information in cloud, particularly in cross-cloud and huge information condition. Keeping in mind the end goal to address this difficulty, it is important to outline an extensive answer for help client characterized approval period and to give fine- grained get to control amid this period. While sharing data, security is an importantconcern.Usually we put stock in pariah server for giving security. Requesting is sent to the server for approval, has getting to fogs are constrained to trust the pariah for their security. Cryptography of information is fundamentally the mistake the substance of the information, for example, content, picture, sound, video et cetera to make the information unintelligible, imperceptible or useless amidtransmissionof information. It is known as named Encryption. Fundamental point of cryptography framework is to secure information from assailant. In the meantime decoding is correct inverse procedure of getting back the first information from scrambled information, which restore the first information. To encode information at distributed storage, both symmetric and unbalanced key age calculations are utilized. Symmetric-key calculations are calculations for cryptography that utilization the same cryptographic keys for both encryption of plaintext and unscrambling of ciphertext. The keys might be indistinguishable or there might be a straightforward change to go between the two keys. The keys, practically speaking, speak to a common mystery between at least two gatheringsthat can be utilized to keep up a private data interface. Public-key cryptography, also known as asymmetric cryptography, is a class of cryptographic protocolsbased on algorithms that require two separate keys, one of which is secret (or private) and one of which is public. Although different, the two parts of this key pair are mathematically linked. The public key is used for encryption. This prerequisite that the two gatherings approach the mystery key is one of the principle disadvantages of symmetric key encryption, in contrast with open key encryption.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 04 | Apr-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1409 2. RELATED WORK As data privacy and security is the biggest obstacle in the wide adoption of cloud services in a modern health care environment [4], [5], many researchers have contributed to this area. This section reviews several categories of existing literature works. A PRE scheme allows data owners to delegate to the proxy the ability to convert the cipher texts encrypted under his public-key into ones for data users. But this schemerequires the data owner to trust the proxy that it only convertscipher texts according to his instruction. If the proxy colludes with data users, some form of the data owner’s secret key can be recovered which can decrypt data owner’s cipher texts. In addition to this, proxy suffersfrom too many encryptionand decryption operations, which increase computational overhead [1]. Chu et al. [1] developed a scheme to allow encrypting asetof documents with different keys, but be decrypted with a single aggregate key. This scheme is based on a public key cryptosystem and takes into account cipher textclassduring encryption. The scheme [1] enables efficient delegation of decryption rights for any set of cipher texts using a single aggregate key and is the main inspiration of ourwork. But it does not support keyword search over the encrypted data which is required to achieve secure and selective data sharing in the cloud. Leng et al. [4] proposed a solution that enables patients to enforce fine-grained accesscontrol. Patients useConditional Proxy Re-encryption to provide data users with write privileges for PHRs. When data users finished updating the authorized PHRs, they signed the PHRs with the signature key of the PHR owner and it is therefore difficult to correctly verify who signed the PHRs. Cipher Cloud provides a unified cloud encryption gateway with award-winning technology to encrypt sensitivedata in real time before it„s sent to the cloud. It also protects enterprise data by using operations-preserving encryption and tokenization in both private and public cloud communication without affecting functionality, usability, or performance. 3. IMPROVED KEY AGGREGATION Proposed system : Ensured information partaking in thecloudutilizingthetotal key for Data proposed work points in sharing the information without exchanging keys for every last record. The deviated encryption standard is utilized for scrambling every one of the information took after by open key encryption. The end client can get to their information utilizing their private key and the Global mystery key which is exchanged amid the validation procedure. Despite thefact that the Global mystery key is hacked amid transmission, malignant assailant can't get the information since it can be decoded just by utilizing a private key. Keys require not be exchanged for every single document, information will be encoded utilizing a Global mystery key. So the information will be sheltered at remote place. The customers who require the information will get to the information utilizing their private key. Architecture: Presenting an extraordinary kind of open key encryption which we call key-total cryptosystem (KAC). In KAC, clients scramble a message under an open key, as well as under an identifier of ciphertext called class. The key proprietorholds an ace mystery called master secret key, which can be utilized to extricate mystery keys for various classes. More importantly, the extract key can be an aggregate key which is compact as a secret key for a single class, but aggregates the power of many such keys, i.e., the decryption power for any subset of ciphertext classes. Implementation modules: 1. Data Owners & Data User Registration Module: Owner & Data Users(Doctor/Nurse/Insurance Broker) gets registered to our storage service (With personal information’s – Id, Name, Location, Contact, LoginPassword, etc..) Generate Master Key for each patient (GenerateAsymmetric Keys for Data Users). Store registration information’s and key in Amazon Simple DB 2. data Upload Module: Build Index file for the health record. Index file holds all those keywords provide along with the number of occurrence of each keyword in that health record (Based on Binary Representation). GenerateSymmetricFile/Document Encryption Key for Health Record (Unique Key for every record derived from PatientsMaster Key) (Basic Polynomial Equation). Perform Symmetric Key EncryptionontheHealth Record (AES - Rijndael Algorithm). Upload Encrypted data Record & its associated Index File to Cloud using Amazon S3 Service Update Amazon Simple DB with Upload Information’s
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 04 | Apr-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1410 3. Record Sharing Module: Owner are allowed to selectively share their personal records to respective Data Users (Doctor/Nurse/Insurance Broker). Aggregated Key getsgenerated for selectedrecords [Lagrange Interpolating Polynomial]. EncryptAggregatekey with Data Users Public Key, File sharing information & its respective enc. aggregate key are stored at Amazon Simple DB 4. Document Retrieval Module: Download Enc. Aggregated Key at Data User (Doctor/Nurse/Insurance Broker) Machine based on the selected sharing. Decrypt Enc. Agg. Key with Users Private Key. Data Users are allowed to provide Search Query – Keywords (Single or Multiple) on selected health records sharing. Generate Query Trapdoor. Generated Query Trapdoor is sent to cloud for searching.CalculateDocuments Relevance Score using Cosine Similarity Search [Euclidean Dot Product Formula]. Download Records from Amazon S3 Storage. Generate File/Record Decryption Keys from Aggregate Key. Decrypt all encrypted health records using Symmetric Key Algorithm (AES - Rijndael Algorithm) 4.RESULT ANALYSIS The Initial outcomes acquired for the given security display is broke down thinking about Various Situation. Different encryption procedures are contrasted and their handling time for different document sizes. The chart demonstrates the general assessment of the encryption systems. It unmistakably demonstrates that the proposed calculation works more productively than the other encryption guidelines being looked at. 5.CONCLUSION Proposed subject secured information sharing utilizing a total key is Involve for preparing vital information. The Data can be safely relieved in Cloud stockpiling utilizing these Aggregate key procedures. Key Asymmetric Encryption Protocol are more Protected than the Key Symmetric Encryption Protocol which utilizes a solitary key on the two sides for transmission of information. Utilizing a solitary Global Secret key is an imperative element of the proposed calculation. This lessens the utilization of different keys sharing between the buyers and consequently guarantees security of the information beingalleviated.Notwithstanding being encoded, the information to be alleviated will be protected in the remote place. REFERENCES [1] C. Chu, S. Chow, and W. Tzeng, “Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage,” IEEE Transactions on Parallel and Distributed Systems, 2014, 25 (2): 468-477. [2] P. Ferrie, Attacks on Virtual Machine Emulators, White Paper, Symantec Corporation, January 2007, http://www.symantec.com/avcenter/reference/Virtual_Mac hine_Threats.pdf [3] University of Melbourne, Australia 2005 [3]Q.Zhangand Y. Wang, ”A Centralized Key Management Scheme for Hierarchical Access Control,” in Proceedings of IEEE Global Telecommunications Conference (GLOBECOM 04). IEEE, 2004, pp. 20672071. [4] Leng, C., Yu, H., Wang, and J., Huang, “Securing Personal Health Records in the Cloud by Enforcing Sticky Policies,” TELKOMNIKA Indonesian Journal of Electrical Engineering, 11 (4), 2200-2208, 2013. [5] J. Benaloh, M. Chase, E. Horvitz, and K. Lauter, “Patient Controlled Encryption: Ensuring Privacy of Electronic Medical Records,” Proc. ACM Workshop Cloud Computing Security (CCSW 09), pp. 103-114, 2009. [6] Kan Yang and Xiaohua Jia,”An Efficient DynamicAuditing Protocol for Data Storage in Cloud Computing”, 2012 IEEE Transactions on Parallel and Distributed Systems. [7] Huiki Xu, Shumin Guo and Keke Chen,”Building Confidential and Efficient Query Servicesin The Cloud using Data Perturbation”, 2014 IEEE Transactions on Knowledge and Data Engineering, VOL.26,NO.2.