IJRIT International Journal of Research in Information Technology, Volume 2, Issue 3, March 2014, Pg: 491- 497

International Journal of Research in Information Technology (IJRIT) www.ijrit.com

ISSN 2001-5569

Secure Key Sharing towards Mobile Applications Ujjwala Mhatre1, Sayli Nisal2, Manjusha Khade3 and Prof. Kanchan Doke4 1

Sem VIII B.E, Mumbai University Computer Engineering, B.V.C.O.E Navi Mumbai, Maharashtra, India [email protected]

2

Sem VIII B.E,Mumbai University Computer Engineering, B.V.C.O.E Navi Mumbai, Maharashtra, India [email protected]

3

Sem VIII B.E,Mumbai University Computer Engineering, B.V.C.O.E Navi Mumbai, Maharashtra, India [email protected]

4

Sem Professor,Mumbai University Computer Engineering, B.V.C.O.E Navi Mumbai, Maharashtra, India [email protected]

Abstract Cloud is a platform where computing and software resources are provided “as a service” to external customers using Internet technologies. Cloud provides us the facility of storing as well as processing data online. Cloud computing has many economic advantages, but sensitive data of clients must be protected from untrusted cloud provider. Cloud provider may misuse sensitive data of client, thus securing data stored on cloud is of utmost importance. This paper proposes a key management scheme where encrypted key shares are given to the authorized users to prevent cloud provider from accessing the sensitive data of client. Android is the most widely used open source mobile operating system recently. This paper proposes a platform of connectivity between android application and cloud to provide easy access of data stored on cloud using android mobile device.

Keywords: Distributed systems, mobile computing, security, cryptography, scalability

1. Introduction Cloud computing is an evolutionary latest model for distributed computing consisting of centralized data centers that provide resources for highly scalable units of computing. Cloud computing systems offer unlimited storage and processing for clients. However, we cannot always trust a cloud provider considering that we always have certain data that do not want to be seen by anyone, not even by cloud provider. Many clients are reluctant to implicitly trust a third-party cloud provider. Given that cloud applications are accessed by thousands of mobile device users, an encrypted cloud storage solution requires scalable key management. Current key management practices typically focus on key generation and distribution among a large population of users. The primary concern is that as authorized users join and leave a system, current keys Ujjwala Mhatre,

IJRIT

491

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 3, March 2014, Pg: 491- 497

must be re-generated and re-distributed to valid users, which is an unrealistic cost for mobile device users. Some approaches suggest performing computationally-intensive key re-generation operations within the cloud to take advantage of its scalability, but these computations may prove too expensive in certain applications where processing overhead is undesirable [1]. This work suggests concentrating on the use of another asset of a cloud system. Its permanent replicated storage, which can scale according to client demand. The key design factors that a cloud-based secure key sharing system has includes : no additional server-side logic is required on the cloud provider end; easy data access; highly scalable key sharing among multiple authorized users; minimal computation efforts required by mobile users; minimal communication is required with the cloud provider; and users do not need to trust existing cloud providers, in terms of the administrator having unrestricted full access to stored user data.

2. Literature Review Various access control techniques have been available for encrypted file storage in the cloud. The cloud provider typically controls key management activities, or the data owner or a trusted proxy does so if the provider is untrusted, requiring additional network communication and components [4]. In some mechanisms where control rests within the domain of the client, such as cloud-based data re-encryption, the ability of the provider to scale for computation has been exploited by performing intensive cryptographic computation in the cloud [3]. This paper is based on guideline provide by NIST (National Institute of Standards and Technology) [5], it recommends secret sharing as a technique to be used to protect long-term credentials in its security definition for a CSP (Cloud Service Provider). Secret key sharing allows a secret such as key information to be divided into multiple shares [2]; these shares may be distributed among key generators using the concept of threshold decryption [6], or portions of a private key are distributed among users [7]. The challenge is that the client must assemble a key from multiple sources, potentially resulting in expensive communication overhead.

3. BASE IDEA Cloud Computing is evolutionary new technology which offers IT to do more with the infrastructure that already exists, as well as adding new ways to expand capacity quickly and economically by using external cloud computing resources. Though Cloud offers unbounded storage and easy access to data it is not practically possible to trust existing cloud providers. Cloud is known to be secure from other users and data on cloud passes through a encrypted medium, but hiding and securing data from other users is of no use if we cannot protect our data from existing cloud providers. The paper mainly deals with securing data from untrusted cloud providers. Paper also resolves the problem of limited key shares available for sharing data on cloud. A key management scheme is proposed where encrypted key shares are stored on cloud and automatically deleted based on passage of time or user activity. Android platform is a new generation of smart mobile phone operating system launched by Google. Android is a most widely used open source operating system used currently. An android application is developed for providing encrypted key shares to authorized users on cloud. Users can also access their data on cloud using this android application once they are authorized. This android application is connected to a private cloud.

4. Proposed Scheme The below diagram gives the overview of the system. A private cloud is created which has an application server and database. This database offers nearly unbounded storage. This is the centralized database which stores all the data. This database of cloud acts as the backend of the whole system. An android application is developed which provides graphical user interface to the user. An android application is developed which provides graphical user interface to the user. It acts as the front end of the system. This android application is connected with cloud server database. Thus any user accessing data through android Ujjwala Mhatre,

IJRIT

492

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 3, March 2014, Pg: 491- 497

application is verified by checking record in centralized database. The entire scenario can be conveniently express in form of diagram given below:

Fig 2. Three cases at receiver side of the proposed separable scheme.

Fig 2. Flow of execution User- A user is any authorized person who wants to access and/ or upload the data. He has to be registered on database and be authorized by the cloud admin. Ujjwala Mhatre,

IJRIT

493

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 3, March 2014, Pg: 491- 497

Admin: Admin is a person who possess all the rights to perform all the transactions on cloud. He has the right to authorize the users. Database: Database acts as a backend of the system. It has all data stored that is stored on the cloud. It also has information regarding authorized users on cloud. Cloud Hosting System: This system deals with key generation and sharing techniques. It generates encrypted key shares which will provide a solution to the problem of limited key shares to the data on cloud.

4.1 Main technique Consider a technique based on Shamir’s secret sharing where U is set of users accessing the cloud, ΓU is list of subsets of U such that each subset is trusted, Utr is any trusted subset of parties, where Utr ∈ ΓU, t is threshold value where (t+1) or more parties in U can recover the secret, while any t or less cannot do so, therefore this secret sharing scheme is threshold-based scheme. All symbolic notations are summarized in table I Table no. 1: Symbolic notations Symbol

Description

Utr A,B,C GenKey()

Authorized user set. Users Alice, Bob, and Charlie in Utr. Function to generate a random key of some predetermined length. K Symmetric data key. Share i of key K. Version associated with a key share KS[i]. Encrypted key share i. Metadata header for key share KS[i]. Digest of key share KS[i]. Signed metadata header. Function to generate share i of key K, where n is the total number of shares. Function to encrypt data x using key y. Function to decrypt data x using key y. Compute the digest of message x. Function to reconstruct secret key from shares in array z[]. Function to perform a bitwise comparison of values x and y. Access key to unlock share KS[i]. Plaintext of user data. Unique plaintext record identifier. Ciphertext of user data. The threshold number of key shares KS, above which (at t + 1 or greater), there is a sufficient number to compute K. The total number of key shares KS generated for a particular data record. A description key identifying the set of key shares eligible to decrypt c. Public key of user X. Private (secret) key of user X.

KS[i] v[i] EKS[i] KS[i]hdr KS[i]dig EKS[i]hdr Partition(K, i, n) Encrypty(x) Decrypty(x) Hash(x) Reconstruct([z]) Compare(x, y) AK[i] M Mid C T N L PKX SKX

Ujjwala Mhatre,

IJRIT

494

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 3, March 2014, Pg: 491- 497

4.2 Encryption Refer following algorithm: 1. 2. 3. 4.

Comment: Generate the data and access keys. K ← GenKey() for i ← 1 to n do i.KS[i] ← Partition(K, i, n) ii.AK[i] ← GenKey() iii.EKS[i] = EncryptAK[i](KS[i]) iv.KS[i]dig = Hash(KS[i]) v.EKS[i]hdr ← EncryptSKA(mid i v[i]KS[i]dig) 5. comment: Encrypt the plaintext message 6. c ← EncryptK(m) In the ENCRYPT operation user A, proceeds to generate key shares and encrypt a message m which is stored in the cloud and identified with a unique identifier mid. User A generates a symmetric key K and divides it into multiple shares KS[1] to KS[n], in which n is the current total number of shares, and a minimum t + 1 shares are required for decryption, where t + 1 ≤ n. Parameter t may be decreased or increased in value for a corresponding adjustment in the level of security and parameter n determines the number of users supported and the storage requirements for the shares. After encryption each share KS[i] is become encrypted as EKS[i], using a symmetric encryption key AK[i] of user A, known as an access key; it is also possible for the same access key AK[i] to protect multiple shares. The encrypted shares are stored in a key database in the cloud and cannot be read in plaintext form by the cloud provider, although they remain accessible for download by users for accessing data. Unique record identifier of mid is assigned to the plaintext m, and that message encrypted by A as ciphertext c using K, is uploaded to the provider, and is stored in the cloud. Since the cloud provider cannot unlock any share stored in the key database, it is unable to decrypt c. To the ciphertext is appended a description key L identifying the set of key shares eligible to decrypt the data, of which only the threshold amount is required by any user.

4.3 Decryption User B, wishes to access ciphertext, and so he executes the following DECRYPT operation. For decryption refer following algorithm: Comment: Reconstruct the data key. 1.for i ← 1 to t + 1 2.do i.KS[i] ← DecryptAK[i]EKS[i] ii.KS[i]hdr←DecryptPKAEKS[i]hdr iii.Compare(Hash(KS[i]),KS[i]hdr.KS[i]dig)) 3.K ← Reconstruct(KS[1, .., (t + 1)]) 4.comment: Decrypt the plaintext message. 5.m ← DecryptK(c) Ujjwala Mhatre,

IJRIT

495

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 3, March 2014, Pg: 491- 497

Suppose that B is an authorized member of Utr obtains symmetric access keys AK[x] to AK[y] from A, where the range of keys is of at least size t + 1, the required threshold. A description key L is required to convert ciphertext to plaintext. Authorized user will get description key for accessing plaintext.

4. GUI Model

Fig.3 GUI model

4. Conclusions In this paper, we have discussed some issues related to security of data stored on cloud. We have also proposed some techniques to secure data on cloud from cloud providers. We have proposed a key management scheme to overcome the drawback of limited key shares to data stored on cloud. Connectivity between android application and cloud is demonstrated for easy access of data stored on cloud through mobile application

5. Acknowledgments Sincere appreciation and warmest thanks are extended to the many individuals who in their own ways have inspired us in the completion of this project. Firstly we are thankful to our principle Dr. M. Z. Shaikh for his help. We are extremely grateful for his friendly support and professionalism. We express our heartfelt gratitude to our head of department Prof. D. R. Ingle and our project coordinator Prof. B. W. Balkhande for their help and support. This task would not have been possible without the help and guidance of our project guide Prof. Kanchan Doke. We are also convening special thanks to all staff of Computer Engineering department for their support and help. Last but not least, we are very much thankful to our friends who directly or indirectly helped us in completion of the project report.

Ujjwala Mhatre,

IJRIT

496

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 3, March 2014, Pg: 491- 497

6. References [1] Piotr K. Tysowski and M. Anwarul Hasan, “Cloud-Hosted Key Sharing Towards Secure and Scalable Mobile Applications in Clouds”, 2013 [2] Shamir, “How to share a secret,” Commun. ACM, vol. 22, no. 11,pp. 612–613, Nov. 1979. [3] P. Tysowski and M. A. Hasan, “Towards Secure Communication for Highly Scalable Mobile Applications in Cloud Computing Systems,” Centre for Applied Cryptographic Research, University of Waterloo, Tech. Rep. CACR 2011-33, 2011 [4] S. Jahid, P. Mittal, and N. Borisov, “EASiER: encryption-based access control in social networks with efficient revocation,” in Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, ser. ASIACCS ’11. New York, NY, USA: ACM, 2011, pp. 411– 415. [5] W. E. Burr, D. F. Dodson, E. M. Newton, R. A. Perlner, W. T. Polk, S. Gupta, and E. A. Nabbus, “Electronic Authentication Guideline,” National Institute of Standards and Technology (NIST), Tech. Rep. Special Publication 800-63-1, December 2011. [6] D. Boneh and M. Franklin, “Identity-based encryption from the weil pairing,” in Advances in Cryptology — CRYPTO 2001, ser. Lecture Notes in Computer Science, J. Kilian, Ed. Springer Berlin / Heidelberg, 2001, vol. 2139, pp. 213–229.

[7] J. Baek and Y. Zheng, “Identity-Based Threshold Decryption,” in Public Key Cryptography – PKC 2004, ser. Lecture Notes in Computer Science, F. Bao, R. Deng, and J. Zhou, Eds. Springer Berlin / Heidelberg, 2004, vol. 2947, pp. 262–276.

Ujjwala Mhatre,

IJRIT

497

Secure Key Sharing towards Mobile Applications ...

logic is required on the cloud provider end; easy data access; highly scalable key sharing among multiple authorized users; minimal ... credentials in its security definition for a CSP (Cloud Service Provider). Secret key sharing ... is developed which provides graphical user interface to the user. An android application is ...

99KB Sizes 2 Downloads 203 Views

Recommend Documents

Secure Key Sharing towards Mobile Applications ...
provider may misuse sensitive data of client, thus securing data stored on cloud is of utmost importance. This paper ... The key design factors that a cloud-based secure key sharing system has includes : no additional server-side ... Various access c

Towards a Secure Key Generation and Storage Framework ... - EWSN
International Conference on Embedded Wireless ..... ported on this technology. Most of .... tional Conference on Advanced Video and Signal-Based Surveillance.

Towards a Mobile Applications Security Approach
back the guidelines for secure mobile applications .... storage, performance are quite limited comparing to .... 'telecom/cal.vcs' for the devices calendar file.

Secure k-NN computation on encrypted cloud data without sharing key ...
May 8, 2013 - Without Sharing Key with Query Users. Youwen ... scheme for k-NN query on encrypted cloud data in which the key of data ... Therefore, a big.

On Session Key Construction in Provably-Secure Key ... - Springer Link
Both protocols carry proofs of security in a weaker variant of the Bellare & Rogaway (1993) ...... Volume 773/1993 of Lecture Notes in Computer Science. 5.

SECURE NEGOTIATIONS FOR MOBILE AGENT ... - Sapao.net
rity challenges [Chess, 1998]. Among these are ... Agent Places: an agent place is a server appli- cation where ..... Internet Computing, pages 40-48. [Yee and ...

Yobicash: a cryptocurrency for secure sharing and storage of data
The World Wide Web is built on top of technologies for sharing, storing and retrieving data. A few decades after its inception, the web has become the backbone of the information economy, and thanks to innovations as the Internet of Things, Virtual R

SECURE NEGOTIATIONS FOR MOBILE AGENT ... - Sapao.net
autonomous agents to roam around virtual stores and find desired products ... (owner) wants to send an agent to a virtual store ..... S. M., and Buttyan, L. (2000).

Secure Mobile Ad hoc Routing - IEEE Xplore
In mobile ad hoc networks (MANETs), multi-hop mes- sage relay is the common way for nodes to communicate and participate in network operations, making ...

Customizing Mobile Applications - CiteSeerX
The advantage of Xrdb is that clients accessing a central server do not need a ..... The PARCTAB is a hand held wireless device that communicates with ...

Mona: Secure Multi-Owner Data Sharing Cryptosystem in Cloud ...
Abstract: With the person in a work of low support cloud computing provides a ... system questions new given agreement users to learn the What is in of facts.

Expert and Non-Expert Attitudes towards (Secure) Instant ... - Usenix
Jun 24, 2016 - As these applications see more use, the privacy and secu- ..... Even in the German sample with a higher proportion of secure .... split of secure and non-secure mobile IM users. We also targeted for gender diversity and different profe

Towards secure the multi –cloud using homomorphic ... - IJRIT
Towards secure the multi –cloud using homomorphic encryption scheme. Rameshbabu .... in the design of current SNA techniques. Multiple key issues can be ...

Federated Homes: Secure Sharing of Home Services
service which can be installed on a home-gateway device. The ... another. These devices require automatic network integration and support for discovery and ...

Expert and Non-Expert Attitudes towards (Secure) Instant ... - Usenix
24 Jun 2016 - tions are centered around data protection. They are wor- ried what ..... ticipants and 2.2 times more likely than US participants to judge themselves as using secure instant messaging. not heard but tried but not act. heard not using no

Towards a General Framework for Secure MapReduce ...
on the public cloud without protection to prevent data leakages. Cryptographic techniques such as fully homo-. Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that co

Towards secure the multi –cloud using homomorphic ... - IJRIT
atomism of traditional social science in which individual behavior—such as ... Title : Public-Key Cryptosystems Based on Composite Degree Residuosity Classes ... The social network field is an interdisciplinary research programmer which ...

Towards a Secure, Resilient, and Distributed Infrastructure for ... - EWSN
Runs on. Inspired by IEC 61131. Offers Values as Datapoints. Hardware. View. Software. View. Cyclic. Task. Component. Component. Composition. Component.

Customizing Mobile Applications
by convention, re-read configuration files when they receive the HUP signal; ... The X windowing system provides a server-based resource manager, Xrdb [3], ...

A Key Management Scheme for Providing Secure ...
technology, Bluetooth has key distribution supports for secure multicasting over its unit one-hop network, piconet. Bluetooth core specification [1] defines basic ...