SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 3480
Secure Data Access Control with Cipher Text and It’s Outsourcing in
Fog Computing
Kirti Madhavi1, Neha Bhutkar2, Pratiksha Kadu3, Babita Bhagat4
1,2,3 Student, Computer of Engineering, PHCET College, Maharashtra ,India
4 Faculty, Computer of Engineering, PHCET College, Maharashtra, India
-------------------------------------------------------------------------------***--------------------------------------------------------------------------------
Abstract - In spite of the abundant advantages of storing
data on cloud, Security still remains a major hurdle which
needs to be conquered. The subsisting methods of protecting
data on cloud have failed in preventing data theft attacks. An
altered approach is carried out in our proposed system for
securing the data, which is fog computing, in addition to the
previous standard encryption mechanisms.Theusersusingthe
Cloud are monitored and their access patterns are recorded.
Every person who is trying to access the data is made to
answer the security questions. Also an OTP isprovidedtoavoid
shoulder sniffing of password.
Fog computing is nothing but cloud computing to the
extreme of the network security. It provides computation and
storage services via CSP (Cloud Service Provider) to end
devices in Internet of Things (IoT). Attribute-BasedEncryption
(ABE) is a public key encryption scheme that allows users to
encrypt and decrypt messages based on user attributes,which
guarantees data confidentiality and powerful data access
control. However, its computational cost for encryption and
decryption phase is directly proportional to the complexity of
the policies used.
Key Words: Access Control, Attribute BasedEncryption,
Attribute Based Signature, Cipher text-Policy Attribute
Based Encryption, Cloud ServiceProvider,DataSecurity,
Internet of Things, Fog Computing.
1. INTRODUCTION
Today, cloud computing is considered a promising
prototype of computing, since it can provide users with
elastic computing resources based on shared computing
techniques, virtualization, etc. However, the universality of
Internet of Things (IoT) applications is changing the main
factor of computing. Centralized computer systems suffer
from unacceptable transmission latency andreducedsystem
performance due to the extremely large volume traffic
between IoT nodes and the cloud. Cloud computing is an
encouraging technology that exploitsthe prototypesofcloud
computing and IoT.
Although the "fog computing" prototype generates many
benefits, security issues, including data privacy and access
control, are the same as cloud computing and information
technology. In addition, they are easier to compromise and
unreliable, since fog nodes are distributed at the edge of the
network and cost much less than servers in the cloud.
Another way to solve these problems is to encrypt user data
before uploading. Attribute-based encryption(ABE)isaone-
to-many cryptographic technique that meets these
requirements. It hastoolsand techniquesthatprovideaccess
control to the encrypted data through variousaccesspolicies
and attributes referring to private keys and cryptographic
texts. In particular, the ABE encryption text policy (CP-ABE)
allows the data owner to define the access policy on a
universe of attributes that the user must possess to decrypt
the encrypted text and apply it to the data. This ensures the
confidentiality and control of high-precision data access.
However, existing solutions based on ABE are mainly aimed
at managing secure access to data for users, few studies
believe that there is no other requirement that the owner of
the data you want to authenticate some usersto update data
encrypted. For example, Alice hasoutsourced cryptographic
data and data to the cloud, and expects only her many
friends who are authorized users can renew the
cryptography of the initial text. Therefore, the key update is
the secure encryption text that the user renews the cipher
text must be able to convince the cloud service provider
(CSP), which is a valid user. The traditional approach is to
sign changed data, which means that CSP shouldmaintainat
the same time a list of valid public key users to verify users'
identities. However, it would be a big burden to keep the list
of keys, if the current number of users and CSP can know the
identity of users in this way, revealing the user's privacy. A
recent cryptographic technique known as based on study
attributes(ABS) can help the CSP to verify if the user isvalid.
In an ABS system, the user can sign messageswith a political
request and its attributes. Then, with the signature, the CSP
can verify the signer attributes satisfy the affirmation policy
without even knowing the signer's identity.
Therefore, the adoption of ABE and ABS can guarantee
data privacy, detailed access control and user verification,
but at the same time also implies a high computational cost
in cloud computing. The encryption, decryption and
signature operations of ABE and ABS require a largenumber
of module exponents, which normally grow linearly withthe
number of attributes in the policies. This is a significant
challenge for users who access and modify data on IoT
devices with limited resources with limited computing and
archiving capabilities.
In this paper, we propose a secure control scheme for
accessing data in cloud computing for IoT. The main
contributions are as follows:
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 3481
1]. we propose a detailed data access control scheme with
updated cryptography text based on CP-ABE and ABS in fog
computing. First, the confidential data of IoT devices are
encrypted with multiple policiesand then outsourced to the
servers in the cloud through the nearby fog nodes. The
authorized user whose attributesmeet the accesspolicy can
decrypt the encryption text stored on servers in the cloud.
Secondly, the authorized user can modify the decrypteddata
and re-subcontract them with his signature. If the user's
attributes in the signature match the update policy, cloud
servers can renew the encryption text.
2]. We provide a secure outsourcing framework that
outsources most encryption, decryption and signature
processes from the final IoT devices to fog nodes.
2. RELATED WORKS
Cloud computing is considered asa level in the middle of the
cloud and end users are formed by fog nodes, such as
routers, switches, etc. hardened. It is immediate for end
users that servers in the cloud and some of the workloads
and services that the cloud transfersto fog nodes. Fog nodes
are semi-independent, aswell asnodesin the cloud anddata
security would cause great concern to userswhen theystore
sensitive data on cloud serversthroughfognodes.Therefore,
a new access control system with cloud, fogandusersshould
be considered, since the network structures and system
prototypes are different, in which the fog nodesshouldserve
the user to provide less computing complexity and greater
flexibility for users.
ABE is an encouraging cryptographic technique to provide
end users with scalable, flexible and fine-grained access
control. The concept of ABE was initially proposed by Sahai
and Waters as a new method for fuzzy identity based
encryption. ABE has two variants, the key to the ABE
(KPABE) and CP-ABE policy. In fact, it becomes a powerful
mechanism that can be applied to perform access control in
many IoT applications. Yu et al. introduced for the first time
the problem of controlling access to fine-grained data in
wireless sensor networks and adopted KP-ABE to protect
data. Unlike KP-ABE, CP-ABE is very suitable for access
control in IoT because of its expressivenessin describingthe
cryptographic text accesspolicy. Hu et al. I designedasecure
data communication scheme between portable sensors and
data consumers through the use of CP-ABE in wireless
networks for body areas. Jiang et al. introduced a CP-ABE
scheme against the abuse of key delegation in cloud
computing. Yeh et al. proposed a detailed framework for
controlling access to health information in the cloud for
lightweight IoT devices.
However, the most important drawback of theuseofABEin
fog computing is the computational cost in the encryption
and decryptions phase that is directly proportional to the
complexity of the policy. Fog nodes, the edgeofthecloudand
closer to end users, are one of the best options for
outsourcing proxy, which can be used to make massive
calculations to reduce the computational overhead required
in IoT devices with limited resources. The main solution of
the current schemes is to distribute the calculations of the
CP-ABE encryption and decryption phase, so thatthelimited
IoT devicescan delegate most of theconsumptionoperations
to the nodes of the network. Louniset al. has designed a
cloud based architecture for medical WSNs, where sensor
nodes outsource cryptographic operations to a reliable
gateway that encrypts CP-ABE-based data before sending it
to the cloud.
However, this solution adopts a completely reliable entityto
perform data encryption that does not achieve the
outsourcing of the practical calculation. Zuo et al. They
designed a concrete ABE schemewithoutsourceddecryption
for fog computing. Yang et al. proposed a concrete
construction with a light computational overheadfortheIoT
health system, where a semi-reliable computing center is
introduced to apply most of the heavy calculations in the
data encryption phase. Yang and others have proposed two
multiple cloud-based ABE schemes for IoT, which allow
receiversto outsource computational decoding to the cloud.
However, these schemes can only support outsourced
encryption or in-work decryption. Zhang et al. hasproposed
an access control system for fog computing, which
outsources the heavy calculation of cryptography and
decoding in fog nodes, so the calculations to encrypt and
decrypt are irrelevant to the number of attributes in the
access policy.
To perform cryptographic text update services in fog
computing, the CSP must be able to verify the user's test
before accepting the modified cryptographic text. ABS is an
emerging signature algorithm to ensure anonymous user
authentication. It wasintroduced for the first time by Majiet
al. Provide authentication without revealing user identities.
Based on ABS, Ruj et al. has proposed a new decentralized
access control system for the secure reading and writing of
data in the cloud, which supports the authentication of
anonymous users. In this scheme, the cloud verifies
authenticity without knowing the user's identity before
storing data. His et al. proposed an expressiveschemeofABS
in IoT, which usesan attribute tree to ensure that onlyauser
with the appropriate attributes that meet the access policy
can approve the message.
However, in existing ABS works, a large computational cost
is needed during the signature phase, which also grows
linearly with the size of the predicate formula. Chen et al.
they are the first to present two ABS outsourced schemes in
which the computational load on the user's side is greatly
reduced by outsourcing intensive calculations for CSP that
are not reliable. Inspired by this, our schema performs
anonymous authentication of the user during the update of
the encryption text and delegates most of the signature
operations to the fog nodes.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 3482
3. SYSTEM MODEL
System Model
1]. Attribute authority. The attribute authority is a fully
trusted party which is in charge of generating system
parameters as well as secret key for each user.
2]. CSP. The CSP is a semi-trusted party which provideshigh-
capacity and online data storage service. It is also
responsible for verifying the signature before accepting the
updated cipher text.
3]. Fog node. The fog nodes are also semi-trusted parties
which are deployed at the network edge and offer a variety
of services. They are in charge of generating part of the
cipher text and uploading the whole cipher text to the CSP,
and also helping users to decrypt the cipher text from the
CSP. Moreover, they assist end users to sign the cipher text
update request.
4]. Data owner. The data owner has a great amount of data
from the IoT devices to be uploaded to cloud. Itisdesignedto
define access and update policies to generate the whole
cipher text with the fog nodes.
5]. User. The user is attached to fog nodesandequippedwith
IoT devices such as smart cameras, medical sensors and
smart meters.
FIGURE 1: SYSTEM MODEL
SYSTEM DEFINITION
We define our proposed scheme by describing the following
five phases and nine algorithms.
Phase 1: System setup
1) Setup 1: The attribute authority takes as input security
Parameter k, and outputs the system public key (PK) and
master secret key (MK).
Phase 2: Key generation
2) Key Gen (PK, MK, S). The attribute authoritytakesasinput
PK, MK, a set of attributes S, outputs the secret key SK forthe
user. And the outsourcing key SK' is sent to fog nodes.
Phase 3: Data symmetric encryption
3) Fog. Encrypt (PK, T). The fog node takes as input PK, an
access policy T, outputs a partial cipher text CT’.
4) Owner. Encrypt (PK, M, Tu, CT). The data owner takes as
input PK, a data M, an update policy Tu, a partial cipher text
CT’, and outputs the cipher text CT.
Phase 4: Data decryption
5) Fog. Decrypt (PK, CT, SK'). The fog node takes asinput PK,
a cipher text CT and a user’s SK’, and outputs a partial
decrypted cipher text T if the attributes satisfy access policy
T.
In the cipher text CT.
6) User. Decrypt (T, SK). The user takes as input a partial
decrypted cipher text T and SK, then recovers the MK and
outputs the plaintext M.
Phase 5: Cipher text update
7) Fog. Sign (PK, U, Tu, SK’). The fog node takes asinputPK,a
user’s cipher text update request U and
SK’, update policy Tu. It outputs a partial signature ST' and
the global key GK.
8) User. Sign (PK, ST’, SK). The user takes as input PK, a
partial signature ST' and SK, outputs the signature ST.
9) Verify (Public key, ST, GK). The CSP takes as input PK, a
signature ST and a global key GK. It outputs true if ST is a
valid signature by the signer whose attributes satisfying Tu.
The workflow of our scheme is shown in the figure. In the
initialization phase, the attribute authority uses the
configuration algorithm to generate the system parameter.
Generating keys with the algorithm, the authority attribute
generates secret keys for owners and users of the data. To
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 3483
achieve high encryption efficiency, the ownerentersthedata
collected first with a random DK applying a symmetric
encryption algorithm and defines an access policy and a
policy update, the node usesthe fog algorithm Encryptionto
encrypt partially data accesspolicy, and then the dataowner
uses a proprietary .Encrypt algorithm to terminate the
encryption with access to the policy and policy update and
stored in the CSP. When accessing data, the fog node first
uses the fog algorithm. Decryption to decipher partially
encrypted text, the user can use the user. Decryption
algorithm to recover data. After modifying the data, the user
also uses phase encryption algorithms to encrypt the
updated data. Before making the final modification, the user
uses the user. Join algorithm to generate the signature with
the return of partial signature of fog node. Algorithm of the
sign. Then, the CSP uses the Verify algorithm to verify the
signature and finally accepts the updated encrypted text if
the signature is true. In the end, other users can get the
updated data with the decryption algorithms. Therefore,
users with Think Internet devices can access and efficiently
update sensitive data in fog computing.
4. SYSTEM WORKFLOW
Security Model
In our scheme, cloud serversand fog nodesare curious, they
execute the tasks and may collude to get the unauthorized
data. Specifically, the security model covers the following
aspects.
1) Data confidentiality: The unauthorized users which are
not the intended receivers defined by data owner should be
prevented from accessing the data.
2) Fine-grained access control: The data owner can custom
expressive and flexible policies so that the data only can be
accessed and updated by the users whose attributes satisfy
these policies.
3) Authentication: If userscould not satisfytheupdatepolicy
in cipher texts, it should also be preventedfromupdatingthe
cipher texts.
4) Collusion resistance: Two or more users cannot combine
their secret and outsourcing keys and get access to the data
they cannot access individually.
Figure 2: Work flow our scheme
5. CONCLUSION
In this paper, we put forward a secure data access control
scheme in fog computing for IoT based on CP-ABE and ABS.
The sensitive data of users are first encrypted with both
access policy and update policy, and then outsourced to
cloud serversvia fog nodes. Thus, the userswhoseattributes
meet the access policy can decrypt the cipher text. In order
to address the problem of data changes, the CSP will check
the signature, to ensure that only the users whose attributes
meet the update policy can renew the cipher text. Hence,our
scheme attains both fine-grained data access control and
secures cipher text update. Also we use decoy information
and user behavior profiling to secure data on Cloud. We
launch a disinformation attack against malicious intruder
using these two technologiesthusgiving them fake data and
keeping the original data safe and intact.
Also, our scheme provides an outsourced encryption,
decryption and signing construction by assigningmostofthe
operations to fog nodes. The comprehensive performance
analysis and experiments are performed, and the results
show that our scheme can easily handle the increasing
number of attributes, which is suitable for the resource-
constrained IoT devices in fog computing.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 3484
6. REFERENCES
[1] Data collaboration in cloud computing,” in Proc.
IEEE/ACM 21st International Symposium on Quality of
Service, Montreal, QC, 2013, pp.195-200.
[2]. F. Zhao, T. Nishide, and K. Sakurai, “Realizing fine-
grained and flexible access control to outsourced data with
attribute-based cryptosystems,” in Proc. Information
Security Practice and Experience - 7th International
Conference, Guangzhou, China, 2011, pp. 83-97.
[3]J. Li, M.H. Au, W. Susilo, D. Xie, and K. Ren, “Attribute-
based signature and its applications,” in Proc. 5th
International Symposium of Information, Computer and
Communications Security, Guangzhou, China,2010, pp. 60-
69.
[4]Y. Jiang, W. Susilo, Y. Mu, and F. Guo. (2017, Jan.).Cipher
text-policy attribute-based encryption against key-
delegation abuse in fog computing. Future Generation
Computer Systems. [Online].Available:
https://doi.org/10.1016/j.future.2017.01.026
[5]L. Yeh, P. Chiang, Y. Tsai, and J. Huang. (2015, Oct.).Cloud-
based fine-grained health information access control
framework for lightweight IoT devices with dynamic
auditing and attribute revocation. IEEET transactions on
Cloud Computing. [Online]. Available:
https://doi.org/10.1109/TCC.2015. 2485199
[6]C. Zuo, J. Shao, G. Wei, M. Xie, and M. Ji. (2016, Nov.). CCA-
secure ABE with outsourced decryption for fog computing.
Future Generation Computer Systems. [Online]. Available:
https://doi.org/10.1016/j.future.2016.10.028
[7]Y. Yang, X. Zheng, and C. Tang. (2016, Nov.). Lightweight
distributed secure data management system for health
internet of things. Journal of Network and Computer
Applications. [Online]. Available: https://doi.org/ 10.1016/
j.jnca.2016.11.017
[8]A. Sahai and B. Waters, “Fuzzy identity-basedencryption,”
in Proc. 24th Annual International ConferenceontheTheory
and Applications of Cryptographic Techniques Aarhus,
Denmark, 2005, pp. 457-473.

More Related Content

PDF
IRJET- Secure Cloud Data Using Attribute Based Encryption
PDF
Deep Learning Approaches for Information Centric Network and Internet of Things
PDF
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
PDF
5.[40 44]enhancing security in cloud computing
PDF
IRJET- Revisiting Security Aspects of Internet of Things for Self-Managed...
PDF
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud Systems
PDF
2013 14-dotnet-titles-pantech-proed-for-me-mtech
PDF
EPLQ:Efficient privacy preserving spatial range query for smart phones
IRJET- Secure Cloud Data Using Attribute Based Encryption
Deep Learning Approaches for Information Centric Network and Internet of Things
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
5.[40 44]enhancing security in cloud computing
IRJET- Revisiting Security Aspects of Internet of Things for Self-Managed...
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud Systems
2013 14-dotnet-titles-pantech-proed-for-me-mtech
EPLQ:Efficient privacy preserving spatial range query for smart phones

What's hot (20)

PDF
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
PPTX
Lecture 10
PDF
Crypto Mechanism to Provide Secure to the IOT Data
PDF
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
PPTX
Lecture 4
PDF
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
PDF
IRJET- Cost Effective Scheme for Delay Tolerant Data Transmission
PDF
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
PDF
IRJET- Multi-Owner Keyword Search over Cloud with Cryptography
PDF
IRJET - DOD Data Hiding Technique using Advanced LSB with AES-256 Algorithm
PDF
Fog computing a new concept to minimize the attacks and to provide security i...
PDF
15CS81 Module1 IoT
PDF
IRJET- Blockchain for Large-Scale Internet of Things Data Storage and Protection
PDF
IRJET- Compress and Secure Data Sharing for Mobile Cloud Computing
PDF
Comparison of data security in grid and cloud computing
PDF
50120140503020
PDF
Comparison of data security in grid and cloud
PDF
IRJET - Security Model for Preserving the Privacy of Medical Big Data in ...
PPTX
Lecture 15
PDF
International Journal of Engineering Research and Development
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
Lecture 10
Crypto Mechanism to Provide Secure to the IOT Data
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Lecture 4
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET- Cost Effective Scheme for Delay Tolerant Data Transmission
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
IRJET- Multi-Owner Keyword Search over Cloud with Cryptography
IRJET - DOD Data Hiding Technique using Advanced LSB with AES-256 Algorithm
Fog computing a new concept to minimize the attacks and to provide security i...
15CS81 Module1 IoT
IRJET- Blockchain for Large-Scale Internet of Things Data Storage and Protection
IRJET- Compress and Secure Data Sharing for Mobile Cloud Computing
Comparison of data security in grid and cloud computing
50120140503020
Comparison of data security in grid and cloud
IRJET - Security Model for Preserving the Privacy of Medical Big Data in ...
Lecture 15
International Journal of Engineering Research and Development
Ad

Similar to IRJET- Secure Data Access Control with Cipher Text and It’s Outsourcing in Fog Computing (20)

PDF
A Survey on Access Control Scheme for Data in Cloud with Anonymous Authentica...
PDF
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
PDF
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
PDF
IRJET- A Review Paper on an Efficient File Hierarchy Attribute Based Encr...
PDF
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
PDF
IRJET- Deduplication of Encrypted Bigdata on Cloud
PDF
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
PDF
IJRAR1BHP007bbhjkmmgcxxfhnjkjkmmgfgvhjjjvv
PDF
SECURE FILE STORAGE IN THE CLOUD WITH HYBRID ENCRYPTION
PDF
Secure cloud storage privacy preserving public auditing for data storage secu...
PDF
SECURE DATA TRANSFER BASED ON CLOUD COMPUTING
PDF
A Robust finger Print Authentication Scheme viaBlockchain to retrieve Citizen...
PDF
A Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
PDF
IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
PDF
IRJET- Secure Cloud Storage through Dual Protection
PDF
A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...
PDF
Data Security in Cloud Computing Using Linear Programming
PDF
Two Aspect Validation Control Frameworks for Online Distributed Services
PDF
Enhanced security framework to ensure data security in cloud using security b...
PDF
R180203114117
A Survey on Access Control Scheme for Data in Cloud with Anonymous Authentica...
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
IRJET- A Review Paper on an Efficient File Hierarchy Attribute Based Encr...
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Deduplication of Encrypted Bigdata on Cloud
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IJRAR1BHP007bbhjkmmgcxxfhnjkjkmmgfgvhjjjvv
SECURE FILE STORAGE IN THE CLOUD WITH HYBRID ENCRYPTION
Secure cloud storage privacy preserving public auditing for data storage secu...
SECURE DATA TRANSFER BASED ON CLOUD COMPUTING
A Robust finger Print Authentication Scheme viaBlockchain to retrieve Citizen...
A Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET- Secure Cloud Storage through Dual Protection
A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...
Data Security in Cloud Computing Using Linear Programming
Two Aspect Validation Control Frameworks for Online Distributed Services
Enhanced security framework to ensure data security in cloud using security b...
R180203114117
Ad

More from IRJET Journal (20)

PDF
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
PDF
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
PDF
Kiona – A Smart Society Automation Project
PDF
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
PDF
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
PDF
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
PDF
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
PDF
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
PDF
BRAIN TUMOUR DETECTION AND CLASSIFICATION
PDF
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
PDF
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
PDF
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
PDF
Breast Cancer Detection using Computer Vision
PDF
Auto-Charging E-Vehicle with its battery Management.
PDF
Analysis of high energy charge particle in the Heliosphere
PDF
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
PDF
Auto-Charging E-Vehicle with its battery Management.
PDF
Analysis of high energy charge particle in the Heliosphere
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
Kiona – A Smart Society Automation Project
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
BRAIN TUMOUR DETECTION AND CLASSIFICATION
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
Breast Cancer Detection using Computer Vision
Auto-Charging E-Vehicle with its battery Management.
Analysis of high energy charge particle in the Heliosphere
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
Auto-Charging E-Vehicle with its battery Management.
Analysis of high energy charge particle in the Heliosphere
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...

Recently uploaded (20)

PDF
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
PDF
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
PDF
Well-logging-methods_new................
PPTX
Construction Project Organization Group 2.pptx
PDF
composite construction of structures.pdf
PPTX
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
PPTX
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
PDF
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
PDF
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
PPTX
Internet of Things (IOT) - A guide to understanding
PPTX
OOP with Java - Java Introduction (Basics)
PPTX
Foundation to blockchain - A guide to Blockchain Tech
PPTX
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
PPTX
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
PDF
Digital Logic Computer Design lecture notes
DOCX
573137875-Attendance-Management-System-original
PDF
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
PPT
CRASH COURSE IN ALTERNATIVE PLUMBING CLASS
PPTX
additive manufacturing of ss316l using mig welding
PDF
Embodied AI: Ushering in the Next Era of Intelligent Systems
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
Well-logging-methods_new................
Construction Project Organization Group 2.pptx
composite construction of structures.pdf
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
Internet of Things (IOT) - A guide to understanding
OOP with Java - Java Introduction (Basics)
Foundation to blockchain - A guide to Blockchain Tech
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
Digital Logic Computer Design lecture notes
573137875-Attendance-Management-System-original
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
CRASH COURSE IN ALTERNATIVE PLUMBING CLASS
additive manufacturing of ss316l using mig welding
Embodied AI: Ushering in the Next Era of Intelligent Systems

IRJET- Secure Data Access Control with Cipher Text and It’s Outsourcing in Fog Computing

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 3480 Secure Data Access Control with Cipher Text and It’s Outsourcing in Fog Computing Kirti Madhavi1, Neha Bhutkar2, Pratiksha Kadu3, Babita Bhagat4 1,2,3 Student, Computer of Engineering, PHCET College, Maharashtra ,India 4 Faculty, Computer of Engineering, PHCET College, Maharashtra, India -------------------------------------------------------------------------------***-------------------------------------------------------------------------------- Abstract - In spite of the abundant advantages of storing data on cloud, Security still remains a major hurdle which needs to be conquered. The subsisting methods of protecting data on cloud have failed in preventing data theft attacks. An altered approach is carried out in our proposed system for securing the data, which is fog computing, in addition to the previous standard encryption mechanisms.Theusersusingthe Cloud are monitored and their access patterns are recorded. Every person who is trying to access the data is made to answer the security questions. Also an OTP isprovidedtoavoid shoulder sniffing of password. Fog computing is nothing but cloud computing to the extreme of the network security. It provides computation and storage services via CSP (Cloud Service Provider) to end devices in Internet of Things (IoT). Attribute-BasedEncryption (ABE) is a public key encryption scheme that allows users to encrypt and decrypt messages based on user attributes,which guarantees data confidentiality and powerful data access control. However, its computational cost for encryption and decryption phase is directly proportional to the complexity of the policies used. Key Words: Access Control, Attribute BasedEncryption, Attribute Based Signature, Cipher text-Policy Attribute Based Encryption, Cloud ServiceProvider,DataSecurity, Internet of Things, Fog Computing. 1. INTRODUCTION Today, cloud computing is considered a promising prototype of computing, since it can provide users with elastic computing resources based on shared computing techniques, virtualization, etc. However, the universality of Internet of Things (IoT) applications is changing the main factor of computing. Centralized computer systems suffer from unacceptable transmission latency andreducedsystem performance due to the extremely large volume traffic between IoT nodes and the cloud. Cloud computing is an encouraging technology that exploitsthe prototypesofcloud computing and IoT. Although the "fog computing" prototype generates many benefits, security issues, including data privacy and access control, are the same as cloud computing and information technology. In addition, they are easier to compromise and unreliable, since fog nodes are distributed at the edge of the network and cost much less than servers in the cloud. Another way to solve these problems is to encrypt user data before uploading. Attribute-based encryption(ABE)isaone- to-many cryptographic technique that meets these requirements. It hastoolsand techniquesthatprovideaccess control to the encrypted data through variousaccesspolicies and attributes referring to private keys and cryptographic texts. In particular, the ABE encryption text policy (CP-ABE) allows the data owner to define the access policy on a universe of attributes that the user must possess to decrypt the encrypted text and apply it to the data. This ensures the confidentiality and control of high-precision data access. However, existing solutions based on ABE are mainly aimed at managing secure access to data for users, few studies believe that there is no other requirement that the owner of the data you want to authenticate some usersto update data encrypted. For example, Alice hasoutsourced cryptographic data and data to the cloud, and expects only her many friends who are authorized users can renew the cryptography of the initial text. Therefore, the key update is the secure encryption text that the user renews the cipher text must be able to convince the cloud service provider (CSP), which is a valid user. The traditional approach is to sign changed data, which means that CSP shouldmaintainat the same time a list of valid public key users to verify users' identities. However, it would be a big burden to keep the list of keys, if the current number of users and CSP can know the identity of users in this way, revealing the user's privacy. A recent cryptographic technique known as based on study attributes(ABS) can help the CSP to verify if the user isvalid. In an ABS system, the user can sign messageswith a political request and its attributes. Then, with the signature, the CSP can verify the signer attributes satisfy the affirmation policy without even knowing the signer's identity. Therefore, the adoption of ABE and ABS can guarantee data privacy, detailed access control and user verification, but at the same time also implies a high computational cost in cloud computing. The encryption, decryption and signature operations of ABE and ABS require a largenumber of module exponents, which normally grow linearly withthe number of attributes in the policies. This is a significant challenge for users who access and modify data on IoT devices with limited resources with limited computing and archiving capabilities. In this paper, we propose a secure control scheme for accessing data in cloud computing for IoT. The main contributions are as follows:
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 3481 1]. we propose a detailed data access control scheme with updated cryptography text based on CP-ABE and ABS in fog computing. First, the confidential data of IoT devices are encrypted with multiple policiesand then outsourced to the servers in the cloud through the nearby fog nodes. The authorized user whose attributesmeet the accesspolicy can decrypt the encryption text stored on servers in the cloud. Secondly, the authorized user can modify the decrypteddata and re-subcontract them with his signature. If the user's attributes in the signature match the update policy, cloud servers can renew the encryption text. 2]. We provide a secure outsourcing framework that outsources most encryption, decryption and signature processes from the final IoT devices to fog nodes. 2. RELATED WORKS Cloud computing is considered asa level in the middle of the cloud and end users are formed by fog nodes, such as routers, switches, etc. hardened. It is immediate for end users that servers in the cloud and some of the workloads and services that the cloud transfersto fog nodes. Fog nodes are semi-independent, aswell asnodesin the cloud anddata security would cause great concern to userswhen theystore sensitive data on cloud serversthroughfognodes.Therefore, a new access control system with cloud, fogandusersshould be considered, since the network structures and system prototypes are different, in which the fog nodesshouldserve the user to provide less computing complexity and greater flexibility for users. ABE is an encouraging cryptographic technique to provide end users with scalable, flexible and fine-grained access control. The concept of ABE was initially proposed by Sahai and Waters as a new method for fuzzy identity based encryption. ABE has two variants, the key to the ABE (KPABE) and CP-ABE policy. In fact, it becomes a powerful mechanism that can be applied to perform access control in many IoT applications. Yu et al. introduced for the first time the problem of controlling access to fine-grained data in wireless sensor networks and adopted KP-ABE to protect data. Unlike KP-ABE, CP-ABE is very suitable for access control in IoT because of its expressivenessin describingthe cryptographic text accesspolicy. Hu et al. I designedasecure data communication scheme between portable sensors and data consumers through the use of CP-ABE in wireless networks for body areas. Jiang et al. introduced a CP-ABE scheme against the abuse of key delegation in cloud computing. Yeh et al. proposed a detailed framework for controlling access to health information in the cloud for lightweight IoT devices. However, the most important drawback of theuseofABEin fog computing is the computational cost in the encryption and decryptions phase that is directly proportional to the complexity of the policy. Fog nodes, the edgeofthecloudand closer to end users, are one of the best options for outsourcing proxy, which can be used to make massive calculations to reduce the computational overhead required in IoT devices with limited resources. The main solution of the current schemes is to distribute the calculations of the CP-ABE encryption and decryption phase, so thatthelimited IoT devicescan delegate most of theconsumptionoperations to the nodes of the network. Louniset al. has designed a cloud based architecture for medical WSNs, where sensor nodes outsource cryptographic operations to a reliable gateway that encrypts CP-ABE-based data before sending it to the cloud. However, this solution adopts a completely reliable entityto perform data encryption that does not achieve the outsourcing of the practical calculation. Zuo et al. They designed a concrete ABE schemewithoutsourceddecryption for fog computing. Yang et al. proposed a concrete construction with a light computational overheadfortheIoT health system, where a semi-reliable computing center is introduced to apply most of the heavy calculations in the data encryption phase. Yang and others have proposed two multiple cloud-based ABE schemes for IoT, which allow receiversto outsource computational decoding to the cloud. However, these schemes can only support outsourced encryption or in-work decryption. Zhang et al. hasproposed an access control system for fog computing, which outsources the heavy calculation of cryptography and decoding in fog nodes, so the calculations to encrypt and decrypt are irrelevant to the number of attributes in the access policy. To perform cryptographic text update services in fog computing, the CSP must be able to verify the user's test before accepting the modified cryptographic text. ABS is an emerging signature algorithm to ensure anonymous user authentication. It wasintroduced for the first time by Majiet al. Provide authentication without revealing user identities. Based on ABS, Ruj et al. has proposed a new decentralized access control system for the secure reading and writing of data in the cloud, which supports the authentication of anonymous users. In this scheme, the cloud verifies authenticity without knowing the user's identity before storing data. His et al. proposed an expressiveschemeofABS in IoT, which usesan attribute tree to ensure that onlyauser with the appropriate attributes that meet the access policy can approve the message. However, in existing ABS works, a large computational cost is needed during the signature phase, which also grows linearly with the size of the predicate formula. Chen et al. they are the first to present two ABS outsourced schemes in which the computational load on the user's side is greatly reduced by outsourcing intensive calculations for CSP that are not reliable. Inspired by this, our schema performs anonymous authentication of the user during the update of the encryption text and delegates most of the signature operations to the fog nodes.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 3482 3. SYSTEM MODEL System Model 1]. Attribute authority. The attribute authority is a fully trusted party which is in charge of generating system parameters as well as secret key for each user. 2]. CSP. The CSP is a semi-trusted party which provideshigh- capacity and online data storage service. It is also responsible for verifying the signature before accepting the updated cipher text. 3]. Fog node. The fog nodes are also semi-trusted parties which are deployed at the network edge and offer a variety of services. They are in charge of generating part of the cipher text and uploading the whole cipher text to the CSP, and also helping users to decrypt the cipher text from the CSP. Moreover, they assist end users to sign the cipher text update request. 4]. Data owner. The data owner has a great amount of data from the IoT devices to be uploaded to cloud. Itisdesignedto define access and update policies to generate the whole cipher text with the fog nodes. 5]. User. The user is attached to fog nodesandequippedwith IoT devices such as smart cameras, medical sensors and smart meters. FIGURE 1: SYSTEM MODEL SYSTEM DEFINITION We define our proposed scheme by describing the following five phases and nine algorithms. Phase 1: System setup 1) Setup 1: The attribute authority takes as input security Parameter k, and outputs the system public key (PK) and master secret key (MK). Phase 2: Key generation 2) Key Gen (PK, MK, S). The attribute authoritytakesasinput PK, MK, a set of attributes S, outputs the secret key SK forthe user. And the outsourcing key SK' is sent to fog nodes. Phase 3: Data symmetric encryption 3) Fog. Encrypt (PK, T). The fog node takes as input PK, an access policy T, outputs a partial cipher text CT’. 4) Owner. Encrypt (PK, M, Tu, CT). The data owner takes as input PK, a data M, an update policy Tu, a partial cipher text CT’, and outputs the cipher text CT. Phase 4: Data decryption 5) Fog. Decrypt (PK, CT, SK'). The fog node takes asinput PK, a cipher text CT and a user’s SK’, and outputs a partial decrypted cipher text T if the attributes satisfy access policy T. In the cipher text CT. 6) User. Decrypt (T, SK). The user takes as input a partial decrypted cipher text T and SK, then recovers the MK and outputs the plaintext M. Phase 5: Cipher text update 7) Fog. Sign (PK, U, Tu, SK’). The fog node takes asinputPK,a user’s cipher text update request U and SK’, update policy Tu. It outputs a partial signature ST' and the global key GK. 8) User. Sign (PK, ST’, SK). The user takes as input PK, a partial signature ST' and SK, outputs the signature ST. 9) Verify (Public key, ST, GK). The CSP takes as input PK, a signature ST and a global key GK. It outputs true if ST is a valid signature by the signer whose attributes satisfying Tu. The workflow of our scheme is shown in the figure. In the initialization phase, the attribute authority uses the configuration algorithm to generate the system parameter. Generating keys with the algorithm, the authority attribute generates secret keys for owners and users of the data. To
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 3483 achieve high encryption efficiency, the ownerentersthedata collected first with a random DK applying a symmetric encryption algorithm and defines an access policy and a policy update, the node usesthe fog algorithm Encryptionto encrypt partially data accesspolicy, and then the dataowner uses a proprietary .Encrypt algorithm to terminate the encryption with access to the policy and policy update and stored in the CSP. When accessing data, the fog node first uses the fog algorithm. Decryption to decipher partially encrypted text, the user can use the user. Decryption algorithm to recover data. After modifying the data, the user also uses phase encryption algorithms to encrypt the updated data. Before making the final modification, the user uses the user. Join algorithm to generate the signature with the return of partial signature of fog node. Algorithm of the sign. Then, the CSP uses the Verify algorithm to verify the signature and finally accepts the updated encrypted text if the signature is true. In the end, other users can get the updated data with the decryption algorithms. Therefore, users with Think Internet devices can access and efficiently update sensitive data in fog computing. 4. SYSTEM WORKFLOW Security Model In our scheme, cloud serversand fog nodesare curious, they execute the tasks and may collude to get the unauthorized data. Specifically, the security model covers the following aspects. 1) Data confidentiality: The unauthorized users which are not the intended receivers defined by data owner should be prevented from accessing the data. 2) Fine-grained access control: The data owner can custom expressive and flexible policies so that the data only can be accessed and updated by the users whose attributes satisfy these policies. 3) Authentication: If userscould not satisfytheupdatepolicy in cipher texts, it should also be preventedfromupdatingthe cipher texts. 4) Collusion resistance: Two or more users cannot combine their secret and outsourcing keys and get access to the data they cannot access individually. Figure 2: Work flow our scheme 5. CONCLUSION In this paper, we put forward a secure data access control scheme in fog computing for IoT based on CP-ABE and ABS. The sensitive data of users are first encrypted with both access policy and update policy, and then outsourced to cloud serversvia fog nodes. Thus, the userswhoseattributes meet the access policy can decrypt the cipher text. In order to address the problem of data changes, the CSP will check the signature, to ensure that only the users whose attributes meet the update policy can renew the cipher text. Hence,our scheme attains both fine-grained data access control and secures cipher text update. Also we use decoy information and user behavior profiling to secure data on Cloud. We launch a disinformation attack against malicious intruder using these two technologiesthusgiving them fake data and keeping the original data safe and intact. Also, our scheme provides an outsourced encryption, decryption and signing construction by assigningmostofthe operations to fog nodes. The comprehensive performance analysis and experiments are performed, and the results show that our scheme can easily handle the increasing number of attributes, which is suitable for the resource- constrained IoT devices in fog computing.
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 3484 6. REFERENCES [1] Data collaboration in cloud computing,” in Proc. IEEE/ACM 21st International Symposium on Quality of Service, Montreal, QC, 2013, pp.195-200. [2]. F. Zhao, T. Nishide, and K. Sakurai, “Realizing fine- grained and flexible access control to outsourced data with attribute-based cryptosystems,” in Proc. Information Security Practice and Experience - 7th International Conference, Guangzhou, China, 2011, pp. 83-97. [3]J. Li, M.H. Au, W. Susilo, D. Xie, and K. Ren, “Attribute- based signature and its applications,” in Proc. 5th International Symposium of Information, Computer and Communications Security, Guangzhou, China,2010, pp. 60- 69. [4]Y. Jiang, W. Susilo, Y. Mu, and F. Guo. (2017, Jan.).Cipher text-policy attribute-based encryption against key- delegation abuse in fog computing. Future Generation Computer Systems. [Online].Available: https://doi.org/10.1016/j.future.2017.01.026 [5]L. Yeh, P. Chiang, Y. Tsai, and J. Huang. (2015, Oct.).Cloud- based fine-grained health information access control framework for lightweight IoT devices with dynamic auditing and attribute revocation. IEEET transactions on Cloud Computing. [Online]. Available: https://doi.org/10.1109/TCC.2015. 2485199 [6]C. Zuo, J. Shao, G. Wei, M. Xie, and M. Ji. (2016, Nov.). CCA- secure ABE with outsourced decryption for fog computing. Future Generation Computer Systems. [Online]. Available: https://doi.org/10.1016/j.future.2016.10.028 [7]Y. Yang, X. Zheng, and C. Tang. (2016, Nov.). Lightweight distributed secure data management system for health internet of things. Journal of Network and Computer Applications. [Online]. Available: https://doi.org/ 10.1016/ j.jnca.2016.11.017 [8]A. Sahai and B. Waters, “Fuzzy identity-basedencryption,” in Proc. 24th Annual International ConferenceontheTheory and Applications of Cryptographic Techniques Aarhus, Denmark, 2005, pp. 457-473.