Abstract—Here in this paper a new and efficient technique for the Sharing of Data over Cloud Computing is proposed. The proposed Methodology implemented here is based on the concept of implementing Hard Logarithmic based Problem such as Elliptic Curves Cryptography. The Proposed Methodology Works in Two Phases : First Key generation using Hyper Elliptic Curve and Second by Encryption the Shared Data using these keys and Encrypted using Cipher Text Policy based Encryption. The Proposed Methodology provides Security from various Attacks and also reduces Computational Time and Cost as compared to the existing methodology. Index Terms—Cloud Computing, CP-ABE, ECIES, Public Auditing. I. INTRODUCTION Nowadays, cloud computing has penetrated into every corner of Internet industry with its low-cost computing resources, easy scaling architectures, and everywhere on-demand services. Security issues is the most important issue faced by people in the use of cloud computing data storage services [1].The advantage of cloud is cost savings. The prime disadvantage is security. The security risks associated with each cloud delivery model vary and are dependent on a wide range of issues counting the understanding of data quality’s, cloud architectures and safety measures organizes engaged in a exacting cloud atmosphere. With public audit capability, a trusted entity with expertise and capabilities data owners do not hold can be entrusted as an outside
Organizations use the Cloud in a variety of different service models (SaaS, PaaS, IaaS) and deployment models (Private, Public, Hybrid). There are a number of security issues/concerns associated with cloud computing but these issues fall into two broad categories: Security issues faced by cloud providers (organizations providing software-, platform-, or infrastructure-as-a-service via the cloud) and security issues faced by their customers.In most cases, the provider must ensure that their infrastructure is secure and that their clients’ data and applications are protected while the customer must ensure that the provider has taken the proper security measures to protect their information.
We would like to provide the benefits of cloud computing without any troubles to propel in the direction it is designed for. This is to be achieved by preventing the owner's data from all risks associated and providing a cloud model that is more secure and efficient. The proposed model shall overcome the security risks defined by the security functions over cloud computing, as follows in (Passent M. et al., 2015):
Cloud Computing has many threats which are disturbing gigantic acceptance of cloud. Major threats that affect data integrity and privacy in cloud storage. In order to reduce this type of threats in cloud many researches are going on.
Usage of remote servers via internet to store, manage and process data instead of using a personal computer is known as Cloud computing. It’s a set of Information Technology services with the ability to scale up or down their service requirements. Most of the cloud services are provided by a third party service provider. In cloud computing, organizations can utilize IT services without in advance investment. Despite its benefits obtained from the cloud computing, the organizations are slow in accepting it due to security issues and challenges. Security is one of the major problems which hinder the growth of cloud. It’s not wise to handing over the important data to another company; such that clients need to be vigilant in understanding the risks of data infringement in this new environment. This paper discusses a detailed analysis of the cloud computing security issues and challenges. (Ayoleke)
In the past few years cloud computing has become the latest mainstream technology for individuals and businesses(McDermott, 2009). Cloud defines the use of assembly of services, infrastructure, information and applications which are comprised of pools of network, compute, information and storage assets. The cloud is a centralized shared data storage network that enables an individual or business to be able to store personal data such as: personal files, images and videos etc.(Camp, 2009). It offers the convenience to be able to store personal data in one centralized location and allows easy access to the data even from a remote location by use of user assigned passwords and user login details. This concept may sound straight forward, easy and user friendly but cloud computing poses potential security threats that can possibly put the user’s privacy and security at risk in case another party is able to log in their account, resulting in an unsafe storage of their personal information. Users are assured that their data is safe and won’t be exploited, however the user does not have control where the data is being stored and cannot track precisely how well their data is being protected(McDermott, 2009). In most cases, users just rely on trust and confidence to their storage provider that they can be able to securely store their data and prevent unauthorized persons from accessing the data. This means users are unsure of who and what may be accessing their data and
From the viewpoint of data security, which has always been an important form of quality of service, Cloud computing surely poses new challenging security threats for number of reasons. Firstly, traditional cryptographic primitives for the purpose of data security protection cannot be straight accepted due to users loss control of data under cloud computing. Therefore, verification of correct data storage in the cloud must be attended without accurate knowledge of the whole data. Considering different kind of data for every user stored in the cloud and the requirement of long term continuous security of their data safety, the problem of checking correctness of data storage in the cloud becomes even more challenging.[1]
Services such as, data storage and security, are provided by cloud computing over the internet. In cloud computing, users can pay for what they consume (Bisong & Rahman, An Overview of the Securtiy Concerns in Enterprise Cloud Computing, 2011). Cloud computing is an emerging information technology, which can make it easier for the users to manage their data. Cloud computing allows businesses to expand as new cloud-based models are being discussed and implemented as solutions (Bamiah & Brohi, 2011).
We proposes a scheme based on attribute based encryption (ABE) to deduplicate encrypted data stored in the cloud while at the same time supporting secure data access control. proposes to outsource only encrypted data to CSPs. However, the same or different users could save duplicated data under different encryption schemes at the cloud. Although cloud storage space is huge, this kind of duplication wastes networking resources, consumes excess power, and complicates data management. intra-user deduplication and inter deduplication. In their scheme, the ciphertext C of convergent encryption is further encrypted with a user key and transferred to the servers. However, it doesn’t deal with data sharing after deduplication among different users.
Security is additionally one of the significant worries of the cloud computing innovation and is evident through the prior investigations. There exist a few dangers included which will limit the organizations in partaking and actualizing these cool administrations. There exist significant odds of dangers like losing of information, information ruptures, in security to the secret information which can affect the organizations. In this manner, the vast majority of the organizations introduce in the market fears to render their private information helpless against the uncertainties of unapproved access and they were in that by embracing the cloud benefits, their information might be more presented to dangers and likely of getting assaulted or
In this work I am proposing to design framework based on trusted computing technology to improve data security and confidentiality in the cloud. In order to do that I will work on defining protocols to make sure that data storage and replication is only done on trusted storage servers and also data access from the cloud is secure for the client and users. Cloud computing allows clients to use computing resources with option of pay per use. It is convenient option used widely in Information Technology industry. Data security and confidentiality is problematic when data transfers to third party.
Fig -1: An example situation in cloud computing showing the importance of accountability and auditability in the cloud
A standout amongst the most essential issues identified with cloud security dangers is information trustworthiness. The information put away in the cloud may experience the ill effects of harm amid move operations from or to the distributed storage supplier. Cachinet al. give illustrations of the danger of assaults from both inside and outside the cloud supplier, for example, the as of late assaulted Red Hat Linux 's conveyance servers. Another case of ruptured information happened in 2009 in Google Docs, which set off the Electronic Privacy Information Center for the Federal Trade Commission to open an examination concerning Google 's Cloud Computing Services. Another case of a danger to information trustworthiness as of late happened in Amazon S3 where clients experienced information defilement.
Whenever an examination about cloud security is occurred there will be particularly to accomplish for it. The cloud service provider for cloud ensures that the client does not confront any issue, for example, loss of information or data theft. Likewise, there is a probability where a harmful user can infiltrate the cloud by claiming a authorized user, there by infecting the whole cloud. This prompts to influences numerous clients who are sharing the contaminated cloud. There are four sorts of issues raise while examining security of a cloud.
Cloud computing is a new way of delivering computing resources, not a new technology. Computing services ranging from data storage and processing to software, such as email handling, are now available instantly, commitment-free and on-demand. Since we are in a time of belt-tightening, this new economic model for computing has found fertile ground and is seeing massive global investment. According to IDC’s analysis, the worldwide forecast for cloud services in 2009 will be in the order of $17.4bn1. The estimation for 2013 amounts to $44.2bn, with the European market ranging from €971m in 2008 to €6,005m in 2013 2. The key conclusion of ENISA’s 2009 paper on Cloud
The primary purpose of cloud computing is resource sharing. The biggest risk when multiple organizations share resources is of data misuse. So to prevent this risks it is essential to secure the data stored in the repositories, data in the transit and processes. To enhance the security in cloud computing,it is vital to provide authorization, authentication and access control for data that is stored in cloud.