Nowadays, most of the organizations managing data
to the cloud such that an active member of the group can able to
share data with other members of the group. Because of its
insecure nature, we propose Initiator which acts as the
middleware between the group manager and the data owners for
providing versatile authentication mechanism. The initiator
sends a key generation request to Group manager [1] with a list
of group members. Key confidentiality is provided by
INITIATOR due to the security feature of a data sharing
scheme. The vulnerabilities that may be exploited by attackers
are reduced and the security analyses prove that the middleware
is secure.
Nowadays, most of the organizations managing data
to the cloud such that an active member of the group can able to
share data with other members of the group. Because of its
insecure nature, we propose Initiator which acts as the
middleware between the group manager and the data owners for
providing versatile authentication mechanism. The initiator
sends a key generation request to Group manager [1] with a list
of group members. Key confidentiality is provided by
INITIATOR due to the security feature of a data sharing
scheme. The vulnerabilities that may be exploited by attackers
are reduced and the security analyses prove that the middleware
is secure.
Original Title
Improved Authentication Scheme for Dynamic
Groups in the Cloud
Nowadays, most of the organizations managing data
to the cloud such that an active member of the group can able to
share data with other members of the group. Because of its
insecure nature, we propose Initiator which acts as the
middleware between the group manager and the data owners for
providing versatile authentication mechanism. The initiator
sends a key generation request to Group manager [1] with a list
of group members. Key confidentiality is provided by
INITIATOR due to the security feature of a data sharing
scheme. The vulnerabilities that may be exploited by attackers
are reduced and the security analyses prove that the middleware
is secure.
Nowadays, most of the organizations managing data
to the cloud such that an active member of the group can able to
share data with other members of the group. Because of its
insecure nature, we propose Initiator which acts as the
middleware between the group manager and the data owners for
providing versatile authentication mechanism. The initiator
sends a key generation request to Group manager [1] with a list
of group members. Key confidentiality is provided by
INITIATOR due to the security feature of a data sharing
scheme. The vulnerabilities that may be exploited by attackers
are reduced and the security analyses prove that the middleware
is secure.
Improved Authentication Scheme for Dynamic Groups in the Cloud
M. TamilSelvan #1 , M. Newlin Rajkumar *2
M. TamilSelvan #1 PG Scholar Department of Computer Science and Engineering Regional Center of Anna University Coimbatore Coimbatore, Tamil Nadu, India 9943285999 M. Newlin Rajkumar *2 Assistant Professor Department of Computer Science and Engineering Regional Center of Anna University Coimbatore Coimbatore, Tamil Nadu, India 9952153334
Abstract Nowadays, most of the organizations managing data to the cloud such that an active member of the group can able to share data with other members of the group. Because of its insecure nature, we propose Initiator which acts as the middleware between the group manager and the data owners for providing versatile authentication mechanism. The initiator sends a key generation request to Group manager [1] with a list of group members. Key confidentiality is provided by INITIATOR due to the security feature of a data sharing scheme. The vulnerabilities that may be exploited by attackers are reduced and the security analyses prove that the middleware is secure.
Keywords IAS, Key Generation Centre, Group Manager, Intruders, Security. I. INTRODUCTION Cloud computing technology is a network based technology which performs the delivery of computing as a service, whereby computers and other devices can share resources, software, and information. Irrespective of the physical location and configuration of the systemthat delivers the services the cloud can provide data access, software, computation and storage services.. The era of Cloud Computing has been started and its impacts are growing by several trends, Which is an adaptive technology based on internet and use of computer based technology. Transforming data is a main activity, performed in huge scale with a help of cheaper and powerful processors, along with service architectures. Dependable, yet flexible network connections make it even possible that users can now subscribe high quality services fromdata and software that reside solely on remote trusted centres. The convenient factor about Cloud Computing Technology is the users can move data into it directly at any time without having much worries about the complexities of direct hardware management. The well known examples of Cloud Computing vendors are, Amazon Simple Storage Service (S3) and Amazon Elastic Compute Cloud (EC2). Both of these internet-based online services do provide huge amounts of storage space and customizable computing resources; this eliminates the responsibility of local machines for data maintenance. As a result, integrity of data will be achieved. Although the infrastructures are much more powerful and reliable than personal computers, attacks from both internal threats and external threats for the integrity of data still exist. Failures and losses are obvious. The cloud service providers (CSP) to behave unfaithfully towards the cloud users regarding the status of their outsourced data. Sometimes CSP may discard rarely accessed data without being detected in a timely fashion. In order to maintain Clouds reputation CSP may try to hide data loss. So lack of data integrity and availability exist. To achieve the clouds confidentiality, data integrity and availability and enforce the quality of cloud storage service varies design strategies has to be followed to enable on-demand data correctness verification on behalf of cloud users. For the purpose of data integrity users no longer have physical possession of data in the cloud. Hence, verification of data correctness has to be done explicitly. Coming to the systemdesigning as a third party data warehouse the data can be frequently updated, which supports for cloud storage correctness assurance. Thus the power of cloud computing rely on powerful data centres which are available in distributed, simultaneous and highly cooperated manner. As an individual, cloud allows storing their data redundantly across multiple physical servers in order to achieve integrity. Hence, robust and secure cloud storage systems for correctness of data will be achieved. However, the remote data integrity is not fully achieved. Recent different systemand security models are implemented to provide remote data integrity. Without possessing local data to ensure the storage correctness these techniques are much needed. On the other side these techniques may be useful for International Journal of Computer Trends and Technology (IJCTT) volume 11 number 3 May 2014 ISSN: 2231-5381 http://www.ijcttjournal.org Page 103
QoS testing, but does not guarantee the data availability in case of server failures. It is a straightforward approach to multiple server environments; the verification process would be linear to the number of servers. As a complementary approach, researchers have also proposed distributed protocols for ensuring storage correctness distributed storage. However, these schemes are all focusing on static or repository data. As a result, their capabilities of handling dynamic data remains unclear, which inevitably limits their full applicability in cloud storage scenario. In this paper, we propose an effective and flexible distributed storage verification scheme with explicit dynamic data support to ensure the correctness and availability of users data in the cloud. More data integrity and confidentiality is achieved.
II. PROPOSED SYSTEM To achieve secure data sharing for dynamic groups in the cloud, we address the issues by an inside attacker in the cloud who may store and share a mendacious information to derive substantial benefits. Therefore to fight against inside attack the members should be able to reveal the identity of data owners. For this we have used an advanced authentication scheme in our proposed model such that to provide a randomly generated sessionID as a group signature key [6][7] for each member of the group in order to perform data operations such as update and delete the data other then the data owner. This task is handled by an initiator that sends a key generation request to group manager with a list of group members. The initiator provides secure key sharing among different members in the group and also high confidentiality is achieved. The initiator provides advanced authentication scheme for the group members rather than traditional authentication scheme such as username and password. The Improved Authentication Scheme (IAS) is illustrated in the Fig. 1.
In the cloud, user revocation can be achieved without involving the participation of remaining users. Data or keys are revocated in the cloud frequently depending upon the kind of data owners identity and the data to be stored in the cloud. The remaining users need to update their private keys after each revocation. The new granted users have to know the content of the data file stored in the cloud before their participation without the knowledge of the data owner.
Thus, through this advanced authentication scheme we can achieve improved security goals including access control and data confidentiality.
Fig. 1. Proposed SystemModel.
III. PERFORMANCE EVALUATION The proposed model increases the security of dynamic groups in the cloud in the means of Digital Signature. The experimental result of Digital Signature generation is shown in Fig. 2.
Fig. 2. Execution Time Evaluation. IV. CONCLUSIONS In this paper, we design an improved authentication scheme, IAS for dynamic groups in a cloud. It provides an Advanced Authentication technique for group members by initiator rather than traditional authentication such as username and password. Secure key sharing and more data confidentiality is achieved.
International Journal of Computer Trends and Technology (IJCTT) volume 11 number 3 May 2014 ISSN: 2231-5381 http://www.ijcttjournal.org Page 104
REFERENCES [1]. Xuefeng Liu, Yuqing Zhang, Member, IEEE, Boyang Wang, and J ingbo Yan, Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud, IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 24, NO. 6, pp. 1182-1191 J UNE 2013. [2]. S. Yu, C. Wang, K. Ren, and W. Lou, Achieving Secure, Scalable, and Fine-Grained Data Access Control in Cloud Computing, Proc. IEEE INFOCOM, pp. 534-542, 2010. [3]. R. Lu, X. Lin, X. Liang, and X. Shen, Secure Provenance: The Essential of Bread and Butter of Data Forensics in Cloud Computing, Proc. ACM Symp. Information, Computer and Comm. Security, pp. 282-292, 2010. [4]. B. Wang, B. Li, and H. Li, Knox: Privacy-Preserving Auditing for Shared Data with Large Groups in the Cloud, Proc. 10th Intl Conf. Applied Cryptography and Network Security, pp. 507-525, 2012. [5]. C. Wang, Q. Wang, K. Ren, and W. Lou, Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing, Proc. IEEE INFOCOM, pp. 525-533, 2010. [6]. D. Chaumand E. van Heyst, Group Signatures, Proc. Intl Conf. Theory and Applications of Cryptographic Techniques (EUROCRYPT), pp. 257-265, 1991. [7]. D. Boneh, X. Boyen, and H. Shacham, Short Group Signature, Proc. Intl Cryptology Conf. Advances in Cryptology (CRYPTO), pp. 41-55, 2004.