International Research Journal of Engineering and Technology (IRJET)
e-ISSN: 2395 -0056
Volume: 02 Issue: 04 | July-2015
p-ISSN: 2395-0072
www.irjet.net
SECURE DATA SHARING USING AGGREGATE KEY FOR SENSITIVE DATA
M.R.Sumalatha1, M.B.Rizvana Begam2, E.Divya Priya3, J.Bejin Joe4
1
Associate Professor,Information Technology Department, Anna University,Tamil Nadu,India
2,3,4 Students, Information Technology Department, Anna University,Tamil Nadu,India
---------------------------------------------------------------------***--------------------------------------------------------------------data in the cloud. Using the aggregate key, makes the
system share the sensitive data without transferring
keys for each and every file. This system uses
asymmetric encryption standard for encrypting all the
data followed by public key encryption. The end user
can access their data using their private key and the
master secret key which is transferred during or after
authentication process. Even though the Master secret
key is hacked during transmission, the malicious
attacker cannot get the data since it can be decrypted
only by using a private key. There is no need to transfer
key for each and every file. All data will be encrypted by
the Master Secret Key. So data will be safe at a remote
place. Users who need sensitive data will access the
data using their private key so there is no need to
transfer key for each and every file.
secret keys which are aggregated.The user who possesses
the secret key is allowed to release a constant-size
aggregate key so that cipher text set can be flexibly chosen
while ensuring that the other encrypted files out of the set
stay confidential. The constant-size aggregate key which is
released by the user can be easily directed to other users or
it can be saved in a smart card. It can perform security
analysis of the schemes which are in the standard model.
The data to be shared is mostly sensitive, which is
accessible only to a certain level. For example, the data used
in business intelligence, health system, bank transactions are
highly sensitive. These sensitive data must be shared in a
highly secured manner. To maintain confidentiality of user's
sensitive data, existing techniques employ cryptographic
methods by exposing decryption keys only to the authorized
data owners and users [10].
In this paper, a method to share data in a highly secured
manner is proposed, using an aggregate key instead of using
the separate keys of each file. This reduces the time for
transferring the keys and improves performance of sharing
data.
Key Words: Aggregate Key, Cassandra, Data Sharing,
2. RELATED WORK
Abstract - Security is essential for sharing sensitive
The survey has been carried out on data sharing issues in
a confidential manner, Privacy-Preserving Public Auditing
is being analyzed [1]. In their system a secure cloud
storage method is proposed which supports privacypreserving public auditing. Existing systems make use of a
TPA (third party auditor) to satisfy auditing requirements
for any number of users in a parallel and efficient manner.
Users can access the cloud infrastructure as if it is in their
own local domain without bothering to check its integrity.
Service providers cannot attend auditing requests of all its
users. Hence, SP relies on TPA, which performs batchauditing to deal with the auditing requirements of the
users. However, the third party auditors are susceptible to
compromise in the security of the outsourced data. The
system uses homomorphic linear authenticator along with
random masking. This can guarantee that the TPA (third
party auditor) is restricted from learning any knowledge
about the outsourced data. Data security of systems with
multiuser setting is threatened as the privacy-preserving
public auditing protocol cannot be extended to future
extensive cloud storage as it lacks efficiency.
Trusted computing aims to address the problem
of trustworthy online computing through the use of
Page 40
International Research Journal of Engineering and Technology (IRJET)
this paper is that computing a certain number of updates
and challenges are limited and fixed beforehand. This
cannot perform block insertion anywhere. Hence this
scheme causes heavy computation cost to the server.
Cloud storage is a storage of data online in the cloud which
is accessible from multiple and connected resources. Cloud
storage can provide better accessibility and reliability,
strong protection, disaster recovery, and lowest cost.
Cloud storage having important functionality, i.e. securely,
efficiently, flexibly sharing data with others. A novel
public–key encryption, which is called as Key-aggregate
cryptosystem (KAC) is introduced in this work. Keyaggregate cryptosystem produce constant size cipher texts
such that the efficient delegation of decryption rights for
any set of cipher text are possible. Any set of secret keys
can be aggregated and make them as single key, which
encompasses power of all the keys being aggregated. This
aggregate key can be sent to the others for decryption of
cipher text set and remaining encrypted files outside the
set are remains confidential.
NoSQL databases try to offer certain functionality
that more traditional relational database management
systems do not. Whether it is for holding simple key-value
pairs for shorter lengths of time for caching purposes, or
keeping unstructured collections (e.g. collections) of data
that could not be easily dealt with using relational
databases and the structured query language (SQL) –
NoSql databases will help. By design, NoSQL databases and
management systems are relation-less (or schema-less).
They are not based on a single model (e.g. Relational
model of RDBMSs) and each database, depending on their
target-functionality, adopts a different one.
3. IMPROVED KEY AGREGATE CRYPTOSYSTEM
A. Proposed Work
Secure data sharing in the cloud using the aggregate key
for drug addict victim proposed work aims in sharing the
data without transferring keys for each and every file. The
asymmetric encryption standard is used for encrypting all
the data followed by public key encryption. The end user
can access their data using their private key and the
master secret key which is transferred during the
authentication
process. Even though the Master secret key is hacked
during transmission, malicious attacker cannot get the
data since it can be decrypted only by using a private key.
Keys need not be transferred for each and every file, data
will be encrypted using a master secret key. So the data
will be safe at remote place. The users who need the data
will access the data using their private key.
B. Architecture
Data security is aimed at secure sharing of data using a
asymmetric encryption standard followed by public key
Page 41
International Research Journal of Engineering and Technology (IRJET)
e-ISSN: 2395 -0056
Volume: 02 Issue: 04 | July-2015
p-ISSN: 2395-0072
www.irjet.net
cryptosystem.. So withn this method two keys are used for
encrypting the data and the keys are master secret key
followed by the public key of the user. The intended user
will get authenticated and use master secret key followed
by private key of the user to decrypt the data.
The backend database used here is Datastax enterprise
Cassandra. Apache Cassandra is an open source
distributed database management system which can
operate enormous amount of data stored across
commodity servers .The redundant storage provides for
an increased availability has no chance for a single point of
failure. Innumerable commodity servers can be included
in a Cassandra cluster. Cassandra caters to clusters
present across numerous data centers using asynchronous
masterless replication, which decreases the latency of
operations of all clients. The data model of cassandra
involves a partitioned row store with tunable consistency.
In cassandra each row has a unique row key. Each key has
a value which corresponds to a column. Then the columns
are grouped to form column families which can be
considered as a table.
The complete architecture diagram is shown. The
system uses the Amazon cloud for storing their data.
Amazon Elastic Compute Cloud (Amazon EC2) maintains
resizable computing capacity in the cloud. It is designed to
limit the difficulties of the developers in using web-scale
cloud computing. Amazon EC2 has an uncomplicated web
service interface which allows us to obtain and configure
capacity with minimum overhead. It provides us with
complete control of our computing resources and lets us
run on Amazon's cloud computing environment. Obtaining
and booting new server instances can be done in a lesser
time using Amazon EC2. Amazon EC2 protects the
developers from various failure scenarios. It helps them
build applications which are resilient to failure. With
changing computing requirements, Amazon EC2 helps to
scale capacity rapidly. There are cost benefits as well as it
is a pay as per usage model. A virtual private cloud can be
set up with the desired IP range ensuring data security.
Amazon EC2 can also provide dedicated instances for
users who need dedicated hardware to run their instances
thereby data security is preserved.
4. IMPLEMENTATION DETAILS
CloudSim, a simulation toolkit model and simulates the
cloud infrastructure such as data center,virtual machines
and application provisioning environments. CloudSim
provides custom interfaces, which can be used for the
implementation of different provisioning techniques for
allocating virtual machines which is used in drug addict
victims database.
International Research Journal of Engineering and Technology (IRJET)
e-ISSN: 2395 -0056
Volume: 02 Issue: 04 | July-2015
p-ISSN: 2395-0072
www.irjet.net
Where,
enc0x -Encrypted file using master secret key.
Ekmsk - Encryption using master secret key.
enc1x - Encrypted file using public key of the intended
user.
Eku
- Encryption using public key of the user.
Dkr
- Decryption using private key of the user.
Dkmsk - Decryption using master secret key.
dec1x - Decrypted file using master secret key.
The Fig.2 shows the implementation scenario of a drug
addict victim data and the communications between the
Team and the user. The sensitive data of the drug addict
victims are stored by the Team after encryption using
Improved KAC algorithm in the cloud storage. The user
gets authenticated, acquires the Master Secret Key from
the Team and decrypt the data using both the private and
Master secret key.
saving spaces if all key-holders share a similar set of
privileges. This work uses hybrid crypto scheme which
involves both RSA and AES algorithm. This system focuses
on encrypting the data two times, initially by using Master
secret key and then by using public key of the user. Hence
the inter communication involving more transfer of keys
for data sharing is reduced. Encryption with public key of
any user which is known to all and making only the
intended person to read it by using their private key which
is known to them alone makes the system more secure.
Encryption is made such a way that decryption cannot be
done using public key [1].
Cryptanalysis for secure data sharing is made using
Cloudsim and Cassandra. This approach will provide
scalable data sharing system by generating keys in linear
order of time. Execution time for transferring file becomes
comparatively effective. There is no need to transfer key
used for encryption, which in turn reduces the execution
time. Even though it takes more time compared to RSA
algorithm to transfer files, the level of security is higher
since it does encryption two times.
The Fig.3 shows that execution time vs file size for the
aggregate key algorithm.This algorithm maintains their
execution time for different sizes of file within a range.
Fig-3. Execution time vs file size for the aggregate key
algorithm
Fig-2. Drug addict victim Data Transfer Scenario
The Fig.4 shows that execution time vs file size for RSA
algorithm.The RSA algorithm consistently maintains the
execution time for different sizes of file within a specified
range of values. There is no major deviation in the
execution time with respect to file size.
Page 43
International Research Journal of Engineering and Technology (IRJET)
e-ISSN: 2395 -0056
Volume: 02 Issue: 04 | July-2015
p-ISSN: 2395-0072
www.irjet.net
Fig-4. Execution time vs file size for RSA algorithm
The Fig.5 shows that execution time vs file size for AES
algorithm. The AES algorithm has increased execution
time for increasing file sizes. The graph is plotted for
Execution Time against File Size(KB).
Fig-5. Execution time vs file size for AES algorithm
6.RESULT ANALYSIS
The preliminary results obtained for the proposed
security model is analyzed considering different scenarios.
Different encryption techniques are compared with their
execution time for various file sizes. The graph Fig.6 shows
the overall comparison of the encryption techniques. It
clearly shows that the proposed algorithm works more
efficiently than the other encryption standards being
compared.
Fig-6. Comparison of AES,RSA,
Improved KAC encryption standards
7.CONCLUSION AND FUTURE WORK
In this work secured data sharing using an
aggregate key is proposed for handling sensitive data
considering drug addict victims data. The Data can be
securely shared in Cloud storage using this Aggregate key
techniques. Asymmetric Encryption standards are more
secure than the symmetric encryption standards which
uses a single key on both sides for transmission of data.
Using a single Master Secret key is an important feature of
the proposed algorithm. This reduces the usage of multiple
keys sharing between the users and hence ensures
security of the data being shared. Despite being encrypted,
the data to be shared will be safe in the remote place,
especially in the case of drug addict victim’s data.
Cassandra, a distributed data storage system is used for
storing drug addict victims data with security
enhancements for handling Data sharing.
The algorithm can be extended for n number of
data on any application specific information. Further work
can be done on the current statistics of any real-time data
which is highly sensitive and is prone to attack. Highly
sensitive data can be encrypted using a highly secured
Master secret key. For example, Applications like Health
Records, Forensic Data, Criminal Database, etc., requires
secured sharing of sensitive data. The Improved KAC
algorithm can be extended to these applications to share
the sensitive data in a highly secured manner.
Page 44
International Research Journal of Engineering and Technology (IRJET)
e-ISSN: 2395 -0056
Volume: 02 Issue: 04 | July-2015
p-ISSN: 2395-0072
www.irjet.net
REFERENCES
[1]
Cong Wang, Sherman S.M. Chow, Qian Wang, Kui
Ren and Wenjing Lou,”Privacy-Preserving Public
Auditing for Secure Cloud Storage”, 2013 IEEE
Transactions on Computers.
[6]
Kan Yang and Xiaohua Jia,”An Efficient Dynamic
Auditing Protocol for Data Storage in Cloud
Computing”, 2012 IEEE Transactions on Parallel
and Distributed Systems.
[2]
Tamleek Ali, Mohammad Nauman, Muhammad
Amin and Masood Alam,”Scalable, Privacypreserving Remote Attestation in and through
Federated
Identity
Management
Frameworks”,2010 IEEE.
[7]
Huiki Xu, Shumin Guo and Keke Chen,”Building
Confidential and Efficient Query Services in The
Cloud using Data Perturbation”, 2014 IEEE
Transactions on Knowledge and Data Engineering,
VOL.26,NO.2.
[3]
Xuyun Zhang, Laurence T. Yang, Chang Liu and
Jinjun Chen,”A Scalable Two-Phase Top-Down
Specialisation Approach for Data Anonymization
Using
MapReduce
on
Cloud”,2014
IEEE
Transactions on Parallel and Distributed Systems.
[8]
Mahdi Tayarani Najaran and Norman C.
Hutchinson,”Innesto: A Searchable Key/Value Store
for Highly Dimensional Data”, 2013 IEEE
International Conference on Cloud Computing
Technology and Science.
[4]
Maria Chalkiadaki and Kostas Magoutis,”Managing
Service Performance in Cassandra Distributed
Storage
System”,2013
IEEE
International
Conference on Cloud Computing Technology and
Science.
[9]
Satoshi Fukuda, Ryota Kwashima, Shoichi Saito and
Hiroshi Matsuo,”Improving Respose Time for
Cassandra with Query Scheduling”,2013 First
International Symposium on Computing and
Networking.
[5]
Martin Henze, Marcel Grobfengels, Maik Kaprowski
and Klaus Wehrle,”Towards Data Handling
Requirements-Aware Cloud Computing”, 2013 IEEE
International Conference on Cloud Computing
Technology and Science.
[10]
Cheng-Kang Chu, Sherman S.M. Chow, Wen-Guey
Tzeng, Jianying Zhou and Robert H.Deng,”KeyAggregate Cryptosystems for Data Sharing in Cloud
Sharing”, IEEE Transactions.