IJRIT International Journal of Research in Information Technology, Volume 3, Issue 1, January 2015, Pg. 172-178

International Journal of Research in Information Technology (IJRIT)

www.ijrit.com

ISSN 2001-5569

Secure and Scalable Access to Cloud Data in Presence of Dynamic Groups J.Anil Swamy1, S.Saritha2, B.Srikanth3 1

Student, Department of CSE & JNTUK, Gandhiji Institute of Science & Technology, Bhimavaram (V), Near Jaggayyapet, Krishna Dist. - 521 178, Andhra Pradesh,India [email protected]

2

HOD, Department of CSE & JNTUK, Gandhiji Institute of Science & Technology, Bhimavaram (V), Near Jaggayyapet, Krishna Dist. - 521 178, Andhra Pradesh, India [email protected] 3

Department of CSE & JNTUK, Gandhiji Institute of Science & Technology, Bhimavaram (V), Near Jaggayyapet, Krishna Dist. - 521 178, Andhra Pradesh, India [email protected] ___________________________________________________________________________________

Abstract Cloud computing has emerged to facilitate huge amount of computing resources in pay as you use fashion. Though the cloud offers services like Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS) and Mining as a Service (MaaS), the more frequently used service is IaaS where storage service is a part. A company can have its data stored in cloud and access is given to its employees in terms of groups. Every member of a group has permissions to access the data meant for that group. Group manager has rights to revoke members when employee resign job. Thus the groups are dynamic in nature. Providing a secure solution to facilitate this requirement is a challenging job. Recently Liu et al. proposed a scheme for secure multi-owner data sharing. In this paper we build a prototype application to demonstrate that model. The application built in Java simulates the cloud environment with groups and group members having access rights and data dynamics. The prototype is useful to show the proof of concept and can be used for further experiments in future.

Index Terms – Cloud computing, multi-owner data sharing, security

1. Introduction Cloud computing has become a reality and there are many cloud service providers offering various services such as Infrastructure as a Service (IaaS), Platform as a Service (Paas), Software as a Service (SaaS) and Mining as a Service (MaaS). There has been increased use of cloud computing services as they are affordable, thanks to virtualization technology in which cloud is built. Virtualization technology made the cloud computing cheaper for commoditizing computing resources. Though cloud is providing great business opportunities and other facilities, security is the major concern as the cloud is treated to be untrusted. Many security schemes came into existence as explored in [1], [2] and [3]. Security in single-owner context is explored in [4]. Single owner does mean that a file is owned by only one person who is known as data owner. The data owner has rights to access data.

J.Anil Swamy, IJRIT -172

IJRIT International Journal of Research in Information Technology, Volume 3, Issue 1, January 2015, Pg. 172-178

Figure 1 – Multi-owner data sharing environment with dynamic groups

In this paper we explored the multi-owner environment in the presence of dynamic groups. We considered a company with employees working on various projects. The related employees are grouped together so as to manage easily. Each group has a group manager. All the group members of a group have rights to access a common file. In other words they have rights to shared data as far as they belong to that group. Members may be revoked by group manager from the corresponding group when employee leaves organization or moves to different project within the group. We built a prototype application based on the concepts conceived from [5] which demonstrates the proof of concept. The implementation is based on the overview given in Figure 1. The remainder of this paper is structured as follows. Section II provides review of literature. Section III provides details of proposed system. Section IV presents the implementation of a prototype. Section VI provides experimental results while section VI concludes the paper. 2. Related

Work

Many researchers focused on the cloud storage security. Cryptographic storage systems were explored in [3]. The files are divided into file groups and the cryptographic primitives are applied to secure data. NNL construction is used in [6] for efficient security. In [2] a security scheme is built which divides the files into two parts namely file data and file metadata. KP-ABE technique was proposed in [4] for cloud storage security. Proxy re-encryption concept was proposed in [1] for scoring distributed storage where data owners can have cryptographic features to secure their data before sending to cloud. Secure provenience scheme was proposed in [7] for group access to data. Each user is given two keys in order to for group signature key and attribute key. Thus attribute based encryption is made possible.

2.1 Proposed System For Multi-owner Data Sharing The proposed system facilitates multiple data owners who are part of a group to share common data. They are able to access data and also modify as long as the members are in that group. The group manager has right to revoke any member of group for some valid reasons like the member discontinued from company. The group members can upload new files and perform data dynamics on the uploaded file as per the company’s requirements. They do enjoy the universal access to their data without time and geographical restrictions. The group manager can grant privileges to members and revoke them besides adding new group members and viewing data. This multiowner environment suggests that every group member is treated as owner of the data and expected to work with the part of the data to which he is entitled access rights. This way every group member can perform duties within the confines of the guidelines of the company with respect to cloud access. In this section the proposed system flow is

J.Anil Swamy, IJRIT -173

IJRIT International Journal of Research in Information Technology, Volume 3, Issue 1, January 2015, Pg. 172-178

described. The system is built based on the concepts provided by Liu et al. [5]. More details on the system security mechanisms can be found in [5]. Figure 2 shows the flow of the system with respect to group manager and group members. C L O U D

G r o u p

M

e m

b e r

G r o u p

M

a n a g e r

e r r o r

e r r o r

L o g in

L o g in

s u c c e s s

G r o u p S ig n a t u r e V e r if ic a t i o n

s u c c e s s

L o g in

F a il e d

F il e

F il e

F a ile d

G r o u p M e m b e r A c c o u n t A c t iv a t e

e r r o r

S ig n a t u r e

fa ile d

G F i le

L o g in

s u c c e s s

r o u p

d e t a i ls

U p lo a d

F i le

D e t a il s

F i le

D e le te

D o w n lo a d

E d it

a n d

A c c o u n t

S a v e

R e v o k e

E n d

Figure 2 – The flow of activities of group manager and group member

As shown in Figure 2, it is evident that both group manager and group member have certain activities that can be performed. Both users are having access to data. However, group members can gain access to the data of that group only. The multi-owner data access concept considers each member in a group as the owner (one of the owners) of data and the part of data can be manipulated by that member. The members are dynamic in nature as employees may join and leave company.

3. Implementation The application is a customer cloud simulator which has been built in Java/J2EE platform. The environment used to build the application is a PC with 4 GB RAM, core 2 dual processor running Windows 7 operating system. The basis for the functionality of the system is the USE CASE diagram modeled as part of requirement analysis. The diagram is shown in Figure 3 which reflects two kinds of users such as group manager and group member having varied access to various functionalities of the system.

J.Anil Swamy, IJRIT -174

IJRIT International Journal of Research in Information Technology, Volume 3, Issue 1, January 2015, Pg. 172-178

Regis tration

Log in an d Grou p Sign ature v erific atio n

View Group

Grou p Account Activa tion

File Uploa d

File Edit Group Manag er Group M embe rs File Do wnload

File Delete

Ac cou nt Revo ke

Figure 3 – USE CASE diagram showing important functionalities of the system

Every user account needs to be activated by group manager. Though the group member is registered with the system, it needs to be activated by group manager. Revocation of group members can be done by group manager as per the situations arise with respect to group members leaving the company. Figure 4 shows some of the operations of group member.

Figure 4 – Some of the group member operations

Group members can have data dynamics besides security aspects. Only authorized people can gain access to the data and perform operations on specific files for which they are authorized. The group managers also have certain activities to be performed. Their operations are presented in Figure 5.

J.Anil Swamy, IJRIT -175

IJRIT International Journal of Research in Information Technology, Volume 3, Issue 1, January 2015, Pg. 172-178

Figure 5 – Some of the group manager operations

As seen in Figure 5, group managers can perform all operations of group members but also additional activities like activating new users and revoking existing users based on the dynamics of employees in company. Every user is part of a group and group can have access to certain data which can be manipulated by group members.

4. Experimental Results Experiments are made with accessing time of file and generation time of a file of different size. Thus the computational cost is recorded with the help of the prototype application. As the size of file grows, the computational cost is increased. It is also same with respect to the generation tile of a file with different size.

FILE CREATION TIME t 4 i m 3 e 2 (

C r e a t i o n

1 s e 0 c

10

20

30

40

50

) File Size (MB)

Figure 6 – Computational cost for file generation

J.Anil Swamy, IJRIT -176

IJRIT International Journal of Research in Information Technology, Volume 3, Issue 1, January 2015, Pg. 172-178

File Access Performance

(

T 2.5 2 A i m 1.5 c 1 c e 0.5 e 0 s s s e c

10

20

30

40

50

File Size (MB)

) Figure 7 – Computational cost for file generation

As can be seen in Figure 6 and Figure 7, it is evident that the file generation and file access performance is presented. As the size of file grows, the computation cost is increased. However, the access time is always lesser than the file generation time.

5. Conclusions and Future Work In this paper we study the security challenges in cloud computing environment where dynamic groups are maintained and group members are not static. The group members can have access to certain data and group manager provides access rights to them. As all employees are working for a company, the group manager has rights to activate user accounts and also revoke them. The data dynamics are possible for both group members and group managers. The security aspects are modeled based on the concepts provided in [5]. We built a custom application to demonstrate the cloud, data and member dynamics. The prototype application is able to simulate the functionalities of both group members and group managers in multi-owner data sharing context of cloud computing. The application is useful to test the efficiency of security aspects of the multi-owner data sharing in presence of dynamic groups. In future, we continue working on storage security and data dynamics with real cloud environment.

REFERENCES [1] G. Ateniese, K. Fu, M. Green, and S. Hohenberger, “Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage,” Proc. Network and Distributed Systems Security Symp. (NDSS), pp. 29-43, 2005. [2]E. Goh, H. Shacham, N. Modadugu, and D. Boneh, “Sirius: Securing Remote Untrusted Storage,” Proc. Network and Distributed Systems Security Symp. (NDSS), pp. 131-145, 2003. [3] M. allahalla, E. Riedel, R. Swaminathan, Q. Wang, and K. Fu,“Plutus: Scalable Secure File Sharing on Untrusted torage,” Proc. USENIX Conf. File and Storage Technologies, pp. 29-42, 2003. [4] S. Yu, C. Wang, K. Ren, and W. Lou, “Achieving Secure, Scalable, and Fine-Grained Data Access Control in Cloud Computing,” Proc. IEEE INFOCOM, pp. 534-542, 2010. [5] Xuefeng Liu, Yuqing Zhang, Member, IEEE, Boyang Wang, and Jingbo Yan, Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud, IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 24, NO. 6, JUNE 2013.

J.Anil Swamy, IJRIT -177

IJRIT International Journal of Research in Information Technology, Volume 3, Issue 1, January 2015, Pg. 172-178

[6] D. Naor, M. Naor, and J.B. Lotspiech, “Revocation and Tracing Schemes for Stateless Receivers,” Proc. Ann. Int’l Cryptology Conf. Advances in Cryptology (CRYPTO), pp. 41-62, 2001. [7] R. Lu, X. Lin, X. Liang, and X. Shen, “Secure Provenance: The Essential of Bread and Butter of Data Forensics in Cloud Computing,” Proc. ACM Symp. Information, Computer and Comm. Security, pp. 282-292, 2010.

AUTHORS

J.Anil Swamy is student of GANDHIJI INSTITUTE OF SCIENCE AND TECHNOLOGY, Jaggayyapet, AP, INDIA. He has received B.Tech Degree Computer Science and Eengineering and M.Tech Degree in Computer Science and Engineering. His main research interest includes Cloud Computing, Databases and DWH.

S.Saritha is working as a Associate Professor in GANDHIJI INSTITUTE OF SCIENCE AND TECHNOLOGY, Jaggayyapet, AP, INDIA. She has received B.Tech Degree Computer Science and Engineering, M.Tech Degree in Computer Science and Engineering. Her main research interest includes Cloud Computing and DWH.

B.Srikanth is working as a Associate Professor in GANDHIJI INSTITUTE OF SCIENCE AND TECHNOLOGY, Jaggayyapet, AP, INDIA. He has received B.Tech Degree Computer Science and Engineering, M.Tech Degree in Computer Science and Engineering. His main research interests includes Cloud Computing and Networking.

J.Anil Swamy, IJRIT -178

Secure and Scalable Access to Cloud Data in ...

IJRIT International Journal of Research in Information Technology, Volume 3, Issue .... In future, we continue working on storage security and data dynamics with ...

930KB Sizes 1 Downloads 250 Views

Recommend Documents

Secure and Scalable Access to Cloud Data in Presence of Dynamic ...
cloud offers services like Infrastructure as a Service (IaaS), Platform as a Service ... The files are divided into file groups and the cryptographic primitives are ...

Secure overlay cloud storage with access control and ...
We design and implement FADE, a secure overlay cloud storage system that achieves ... a more fine-grained approach called policy based file assured deletion, ...

Mona: Secure Multi-Owner Data Sharing Cryptosystem in Cloud ...
Abstract: With the person in a work of low support cloud computing provides a ... system questions new given agreement users to learn the What is in of facts.

SDAFT: A Novel Scalable Data Access Framework for ...
becomes too heavy to move in the network in today's big data era. In this paper, we develop a Scalable Data Access Frame- work (SDAFT) to solve the problem.

Secure kNN Query Processing in Untrusted Cloud Environments.pdf ...
There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. Secure kNN ...

Secure and Efficient Data Transmission.pdf
Page 1 of 5. Secure and Efficient Data Transmission for Cluster-Based. Wireless Sensor Networks. ABSTRACT: Secure data transmission is a critical issue for wireless sensor networks. (WSNs). Clustering is an effective and practical way to enhance the

Making a secure transition to the public cloud Services
Public-cloud adoption and implications for cybersecurity. 01. Redesigning a full set of cybersecurity controls for the public cloud. 04. 05. 06. 07. Developing a cloud-centric cybersecurity model. 03. 12. 52. 6. 5. 38. 22. Conclusion. How companies c

Making a secure transition to the public cloud - Services
Valley office, James. Kaplan is a partner in the New York office, and. Mike Newborn is CISO for McKinsey Digital. Labs in the Washington,. DC, office. .... One executive, for example, said, “I need to unify my IAM approach across on-premises and cl

Scalable and interpretable data representation ... - People.csail.mit.edu
Scalable and interpretable data representation for high-dimensional, complex data. Been Kim∗ ... Figure 1: A portion of the analysis report using the data rep-.

Access to and Retention of Research Data Rights and ...
Access to and Retention of Research Data Rights and Responsibilities.pdf. Access to and Retention of Research Data Rights and Responsibilities.pdf. Open.

Design and Implement Secure Cloud ComputingSystem Based on ...
There was a problem previewing this document. Retrying. ... Design and Implement Secure Cloud ComputingSystem Based on Hadoop .pdf. Design and ...

Secure Comparison of Encrypted Data in Wireless ...
proposed by Agrawal, et al. for database encryption. This scheme is ... static and is represented by a graph G = (N, L) with |N | .... in F are uniformly distributed. 3.

cloud-computing-in-ghana.-data-privacy-regulatory-framework-and ...
There was a problem loading more pages. cloud-computing-in-ghana.-data-privacy-regulatory-framework-and-opportunities.pdf. cloud-computing-in-ghana.

Secure Data Aggregation for Multiple Applications in ...
In order to overcome this, various data aggregation techniques have been proposed ... Keywords: Wireless Sensor Networks, Structure-free Data Aggregation.

Secure and Distributed Knowledge Management in Pervasive ...
2 Department of Information and Communication Systems Engineering University of the. Aegean ... solutions observed in the past few years and the high rates of ..... of the Education and Initial Vocational Training. Program – Archimedes. 7.

Scalable Regression Tree Learning in Data Streams
In the era of Big data, many classic ... novel regression tree learning algorithms using advanced data ... different profiles that best describe the data distribution.

Recursion in Scalable Protocols via Distributed Data Flows
per explains how with our new Distributed Data Flow (DDF) ... FROM RECURSION TO DATA FLOWS ... Thus, the crash of B3 and joining of B4, B5, should.

Yobicash: a cryptocurrency for secure sharing and storage of data
The World Wide Web is built on top of technologies for sharing, storing and retrieving data. A few decades after its inception, the web has become the backbone of the information economy, and thanks to innovations as the Internet of Things, Virtual R

Secure k-NN computation on encrypted cloud data without sharing key ...
May 8, 2013 - Without Sharing Key with Query Users. Youwen ... scheme for k-NN query on encrypted cloud data in which the key of data ... Therefore, a big.