IJRIT International Journal of Research in Information Technology, Volume 2, Issue 4, April 2014, Pg: 196- 200

International Journal of Research in Information Technology (IJRIT)

www.ijrit.com

ISSN 2001-5569

Barcode based private key distribution for secure data sharing on cloud Praveen Tabbannavar1, Lingaraj Hadimani2 1

M.Tech Student, Department of computer science and engineering KLE Dr. M. S. Sheshgiri College of Engineering and Technology. Belgaum, Karnataka, India [email protected]

2

Asst. Professor, Department of computer science and engineering KLE Dr. M. S. Sheshgiri College of Engineering and Technology. Belgaum, Karnataka, India

[email protected]

. Abstract



One of the most challenging problems of cloud service solicitation is to persuade users to trust the security of cloud service and upload their sensitive data. Although cloud service providers can claim that their services are well protected by elaborate encryption mechanisms, traditional cloud systems still cannot persuade the users that even if the cloud servers are compromised, the data are still securely protected. This study proposes a user-centric key management scheme for cloud data protection, to solve this problem. It utilises RSA and indirectly encrypts users’ data by users’ public keys, but stores the users’ private keys on neither servers nor users’ PCs; instead, the private keys are stored on users’ mobile devices and presented via two-dimensional (2D) barcode images when they are utilised to decrypt users’ sensitive data. In this manner, users’ data are safely protected even if the cloud servers are compromised. Also, this provides users with the experience of managing visible private keys by storing the keys into mobile phones and displaying them via 2D barcodes. In addition, a hierarchical structure is designed for basic key backup and data sharing in the proposed scheme. Keywords -- Cloud computing, BARCODE, RSA

1 . INTRODUCTION Cloud computing is a technology which uses internet and remote servers to store data and application. It presents a new way to supplement the current consumption and delivery model for IT services based on the Internet, by providing for dynamically scalable and often virtualized resources as a service over the Internet. Nowadays providing security to user’s data is a challenging task. So when security comes in to picture we use encryption mechanisms to make the users data authentic, where a user encrypts his data using public keys and the server uploads this data to cloud, later user decrypts this data using his private keys. Problem with the existing cloud service is to make the user to have trust in the security of cloud service and upload their sensitive data. Traditional cloud systems cannot assure the users that there data is still secure even if the cloud servers are

Praveen Tabbannavar,

IJRIT

196

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 4, April 2014, Pg: 196- 200

compromised. In existing systems users data is encrypted using the public keys and stored on to cloud, private keys are designed to be stored on PC’s and servers from where they can be hacked by unauthorized users. Also traditional cloud systems rely only on passwords to provide security, and at present it’s not a big deal to hack the passwords.

2. LITERATURE SURVEY In this section we review related works addressing security in the cloud. Security issue is very important in the cloud, there are many techniques so here review of all these.This survey involves studying of the capability of the existing system available in both open source and proprietary. This survey it was evident as to what should be incorporated in the system and possible impact of the enhancement of the system.

2.1 PREVIOUS RESEARCH WORK In traditional cloud services such as Google Gmail, Facebook and home surveillance services users’ data are managed and protected by service providers. If the cloud servers are compromised, users’ data may suffer from the leakage problem. Several researches include the idea of client application to encrypt data before it is transferred to cloud and decrypt data after it is downloaded. However, since the client application is coupled with user’s computer, the decryption keys of data are difficult to be shared with other users or another user’s client application. Kamara and Lauter proposed a data sharing and searching architecture between the data owners and other users. However, the attribute-based encryption is adopted to generate the decryption key according to the policy used to encrypt the data. In other words, the access policy is fixed and not flexible unless the data are re-encrypted by a new policy. Dai and Zhou proposed another approach similar with the Kamara’s. In this approach, the access control matrix (ACM) is sent to cloud storage provider so that the provider can check this matrix for each request. However, in this manner, each user has to define his (her) ACM; in the enterprise scenario, it is very difficult to maintain such a huge matrix for each user. Sanka proposed a more advanced architecture to maintain an access control list in the owner server. However, in this approach, the owner has to maintain a server and manage the access control list (ACL); it is not applicable in the personal storage scenario. In systems such as zero-interaction authentication (ZIA) the computer is usually required to be paired, or bound to a mobile device for establishing a communication channel. Wireless technologies such as IEEE 802.11 or Bluetooth are usually adopted so that the communication channel can be constructed automatically without user’s intervention. ZIA emphasised that this channel must be a short-range or constrained channel to prevent the transmitted information from being eavesdropped. constrained channel can be constructed by various technologies with distinct properties. Infrared light-emitting diode (IR LED) is not supported by most mobile devices, thus it is not applicable for mobile scenario. Bluetooth and other wireless technologies provide the capability of zero user intervention, but in this manner, the constrained channel can be established without owners awareness. Near field communication (NFC) is a new technology which enables mobile devices to establish a Short-range wireless and contactless communication Channel. If NFC is deployed on mobile phones, users can also use it for conducting authentication based on the SIM cards. The wireless channel established based on NFC is a very secure constrained channel, because that it provides a very short range (< 0.2 m) of communication. However, most PCs have not supported NFC yet until now.

Praveen Tabbannavar,

IJRIT

197

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 4, April 2014, Pg: 196- 200

2.2 EXISTING SYSTEM In the existing systems users encrypt there sensitive data on to cloud and use private keys to decrypt data. Users store there private keys on to their pc’s or servers or floppy disks from where they can be hacked by any unauthorised users.so if the users private keys are hacked then his data will no longer be secure. Nowadays providing security to user’s data is a challenging task. So when security comes in to picture we use encryption mechanisms to make the users data authentic, where a user encrypts his data using public keys and the server uploads this data to cloud, later user decrypts this data using his private keys. Problem with the existing cloud service is to make the user to have trust in the security of cloud service and upload their sensitive data. Traditional cloud systems cannot assure the users that there data is still secure even if the cloud servers are compromised. In existing systems users data is encrypted using the public keys and stored on to cloud, private keys are designed to be stored on PC’s and servers from where they can be hacked by unauthorized users. Although the data can be safely protected, it is difficult to be shared with other users who are authorised to access it. Also, the keys are not portable and not convenient to be used on other PCs. Also traditional cloud systems rely only on passwords to provide security, and nowadays it’s not a big deal to hack the passwords by using dictionary attacks.

3. PROPOSED SYSTEM This project proposes a mechanism for cloud data protection, to solve the problem of data leakage and

also aims to provide

security to user’s data and his private keys. This paper utilises RSA and indirectly encrypts users’ data by users’ public keys, but neither stores the users’ private keys on servers nor on PCs; instead, are the private keys stored on users’ mobile devices and presented via two-dimensional (2D) barcode images when they are utilised to decrypt users’ data. Also at the time of login user has to give his biometric (fingerprint) authentication for high security. If the device is lost then the user can take a new device and edit his mobile IMEI number in the server and can generate new set of private keys and access his data. In this manner users can see the unique 2D barcode images of private keys and believe that their data cannot be accessed without the presentation of these images on their mobile phones even if the public cloud servers are compromised. Moreover, this also includes a hierarchical structure for basic key backup and data sharing. Also, it provides users with the experience of managing visible private keys by storing the keys into mobile phones and displaying them via 2D barcodes. 2D barcode is able to store more information within an image for information exchange. So whenever we want to decrypt our data we must present the barcode image in front of scanner. The channel between 2D barcode displayer and scanner is a constrained channel, since that if images are taken with a longer distance, they become smaller, more ambiguous and more difficult to be decoded correctly. This kind of constrained channel requires users to perform a simple action: locate the scanner and displayer together. In this manner, the establishment of this channel can be confirmed by users with little user intervention. Another benefit of using 2D barcode is that the unique image with private key included provides users with the experience of owning a physical key.

Praveen Tabbannavar,

IJRIT

198

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 4, April 2014, Pg: 196- 200

Fig 1: System Architecture

Fig. 1 shows the system overview. In this figure, the red key and red lock represent a pair of private and public key, respectively. First of all, the cloud application developers can upload and register their applications onto an un-trusted public cloud. Second, the users can generate their own public and private key pairs by mobile applications, and register their accounts of the public cloud applications. For the personal usage scenario, users can encrypt and upload their files by PC Applications and decrypt these files by showing 2D barcode images, which include the users’ private keys, on mobile devices to PC applications

4. CONCLUSION AND FUTURE WORK In This paper, we proposed the model to provide user-centric-key management of cloud data protection, which includes a hierarchical structure for basic key backup and data sharing, In this the private keys are stored on users’ mobile devices and presented via 2D barcode images when they are utilised to decrypt users’ data. In this manner, even if the cloud services are compromised, the data are still safely protected.

Currently, since users usually do not know the security level of cloud services, we assume that all cloud services are comprisable. However, more secure designs cause less security problems. In the future, we will use the Trusted Platform Module (TPM), hardware to enhance the security level of module.

Praveen Tabbannavar,

IJRIT

199

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 4, April 2014, Pg: 196- 200

REFERENCES [1] Vouk, M.A.: ‘Cloud computing – issues, research and implementations’, J. Comput. Inf. Technol., 2008. [2] Wang, L., Laszewski, G., Kunze, M., Tao, J.: ‘Cloud computing: a perspective study’, New Gener. Comput., 2010 [3] Heiser, J., Nicolett, M.: ‘Assessing the security risks of cloud computing’. Gartner, Incorporated, 3 June 2008 [4] Kandukuri, B.R., Paturi, R., Rakshit, A.: ‘Cloud security issues’. Proc. Working IEEE SCC 2009: Int. Conf. Services Computing 2009 [5] Kato, H., Tan, K.T.: ‘2D barcodes for mobile phones’. Proc. Second Int. Conf. Mobile Technology, Applications and Systems, 2005 [6] Kamara, S., Lauter, K.: ‘Cryptographic cloud storage’. ACM Workshop on Cloud Security, 2009 [7] Sanka, S., Hota, C., Rajarajan, M.: ‘Secure data access in cloud computing’. IEEE Fourth Int. Conf. Internet Multimedia Systems Architectures and Applications (IMSAA 2010), Bangalore, December 2010 [8] Corner, M.D., Noble, B.D.: ‘Zero-interaction authentication’. Proc.Eighth Annual Int. Conf. Mobile Computing and Networking (MobiCom ’02), 2002 [9] Ohbuchi, E., Hanaizumi, H., Hock, L.A.: ‘Barcode readers using the camera device in mobile phones’. IEEE Int. Conf. Cyberworlds (CW04), 2004 [10] Bajikar, S.: ‘Trusted Platform Module (TPM) based security on notebook PCs-white paper’ (Mobile Platforms Group Intel Corporation, 2002)

Praveen Tabbannavar,

IJRIT

200

196 www.ijrit.com ISSN 2001-5569 Barcode based ...

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 4, April 2014, Pg: 196- 200. Praveen Tabbannavar ... Cloud computing is a technology which uses internet and remote servers to store data and application. It presents a new way to ... Infrared light-emitting diode (IR LED) is not supported by ...

95KB Sizes 0 Downloads 174 Views

Recommend Documents

196 www.ijrit.com ISSN 2001-5569 Barcode based ...
One of the most challenging problems of cloud service solicitation is to persuade users to trust the security of cloud service and upload their sensitive data. Although cloud service providers can claim that their services are well protected by elabo

(IJCC) ISSN
Jan 1, 2008 - A list of “Top 12 Malware Threats” to date was compiled by the group5. ... Really big botnets (supercomputer at the disposal of criminals). 12.

A 2D Barcode-Based Mobile Payment System
captured and decoded by mobile client software on mobile devices. Moreover, 2D barcodes .... necessary security data, such as PIN and session records. Figure 3 The 2D ... management, and user payment account management. The second .... Netbeans (Vers

2D Barcode Scanner.pdf
Cheap ScanHome ZD5800 Barcode 2D 32Bit Scanner P ... de Scanner USB Wired 1D - 2D Barcode Scanner.pdf. Cheap ScanHome ZD5800 Barcode 2D 32Bit ...

ISSN 0491-4481 -
Ibrahim A Adam, Mohammed OH Musa, Anwar A Kordofani, Lina GA Elnourani………… 165. Historical Perspective. ✍ Early European medical encounters in the ...

196.pdf
Community Steps Up. Pg 24 New Shannon Lifeboat Arrives. Pg 30 ... Shaftesbury and delivered by Logiforce GPS-tracked distribution. .... Displaying 196.pdf.

pdf barcode generator
Loading… Page 1. pdf barcode generator. pdf barcode generator. Open. Extract. Open with. Sign In. Main menu. Displaying pdf barcode generator. Page 1 of 1.

Zebra Barcode scanner.pdf
... for Rough Manufacturing). 4,699.00. 3 years, exclude. cable and. accessories. Page 3 of 3. Main menu. Displaying Zebra Barcode scanner.pdf. Page 1 of 3.

196 Globalisation_Ageing.pdf
vibrant cities will become ghost towns. But is there possibly a different Stage 5 scenario? Are there any. mechanisms that might kick in to save a national population from. extinction? The most obvious salvation would be through immigration,. presuma

196 Globalisation_Ageing.pdf
Does the ageing of a population raise the same issues, particularly so. far as the elderly are concerned, no matter where you are in the world? Number 196. 1.

AR-196.pdf
Page 3 of 3. The overall struct re of the iRMX 86 Operating System ... an O.S. design d to exploit the advantages of. Intel's VLSI techn logy. Over the past s veral years, microcomputers have become. faster and less ~xpensive. Accompanying this incre

196 41.PDF
t lla:tzitst Koirlpa'r ot' 29. Mapra 2017 rola n fpair4aHcrcoi.i Kolleruia Brrcrreii C-v.rte6uoii iliura-rrt Pecn\,6irnru MorAoea. ilyreM rro.qaqa Kaccauuollrtoft xa-ro6l,t. 3. Ilacloqiqee I-loc'r'zurcln.lenuc ucry'rraer u cH.rr) co .'Itirr lpllIrr'r

pdf barcode generator
There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. pdf barcode ...

pdf center barcode
There was a problem loading more pages. pdf center barcode. pdf center barcode. Open. Extract. Open with. Sign In. Main menu. Displaying pdf center barcode.

ISSN ISSN—1098—6553
This paper appears in the Internet ... for an in-service training plan for ESL/EFL teachers to demon- strate the importance .... the data sample, the more accurate conclu- sions can ... example, business English, academic. English ...... tote bags ~.

196-1145-2-EDf.pdf
Loading… Whoops! There was a problem loading more pages. Retrying... Whoops! There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. 196-1145-2-EDf.pdf. 196-1145-

RDC Res. 035-196.pdf
Sign in. Page. 1. /. 1. Loading… Page 1. RDC Res. 035-196.pdf. RDC Res. 035-196.pdf. Open. Extract. Open with. Sign In. Main menu. Displaying RDC Res.

196-1145-2-EDf.pdf
Loading… Whoops! There was a problem loading more pages. Retrying... Whoops! There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. 196-1145-2-EDf.pdf. 196-1145-

man-196\motion-sensor-recorder.pdf
Download. Connect more apps... Try one of the apps below to open or edit this item. man-196\motion-sensor-recorder.pdf. man-196\motion-sensor-recorder.pdf.

man-196\magalai-ootha-appa.pdf
Download. Connect more apps... Try one of the apps below to open or edit this item. man-196\magalai-ootha-appa.pdf. man-196\magalai-ootha-appa.pdf. Open.

man-196\melayu-lucah-blog.pdf
Page 2 of 5. MELAYU LUCAH BLOG PDF. Melayu Lucah Blog. Modification your routine to hang or throw away the moment to only talk with. your good friends. It is done by your everyday, don't you really feel burnt out? Now, we will. certainly reveal you t

'Industrial Manufacturing and Warehousing Barcode ...
Good day, and thanks for visiting this useful rrnternet site. On this ... Warehouse barcode software create industrial barcodes generator design bar . ... and Warehousing Barcode Generator - 5 PC License All Software Free Download Website.

ConnectCode Barcode Font Pack - Unlimited ...
Distribution License cheap, or maybe you were searching for ConnectCode Barcode ... Using Peake Tool you can read teh error code, reset engine light, reset service ... Unlimited Distribution License Best Site Download Software Full Version.

BC2 Barcode Sensor Instructions.pdf
Page 1 of 1. BC2 Barcode Sensor Instructions.pdf. BC2 Barcode Sensor Instructions.pdf. Open. Extract. Open with. Sign In. Main menu. Displaying BC2 Barcode ...