An Analysis upon Various Security Methods for Identification of Data in Cloud Computing Environment: A Case Study of Predicate Based Encryption

Enhancing Data Security in Cloud Computing with Predicate Based Encryption

by Anita Soni*, Dr. Kalpana .,

- Published in Journal of Advances in Science and Technology, E-ISSN: 2230-9659

Volume 12, Issue No. 24, Nov 2016, Pages 159 - 166 (8)

Published by: Ignited Minds Journals


ABSTRACT

Cloud computing has turned into a standout amongst the most critical data security issue lately. That is because of the breathtakingly developing applications and obliged services of cloud computing. Notwithstanding, with a specific end goal to securely use and revel in the profit of cloud computing through wired/wireless networking, sufficient confirmation of data security, for example, classified ness, verification, non repudiation, and respectability is the most basic component for reception. Data that was once housed under the security realm of the service client has now been put under the insurance of the service provider. Clients have lost control over the security of their data. Never again is our data held under our own particular watchful eyes. This study demonstrates how Predicate Based Encryption (PBE) could be leveraged inside the Cloud to secure data. Five situations for utilizing Predicate Based Encryption inside the Cloud are introduced. These situations vary regarding mode of operation, predicate situation, and responsibility for Key Authority. In a perfect world, a privacy-saving database-in-the-cloud environment might permit a database possessor to outsource its encrypted database to a cloud server. The possessor might hold control over what records might be questioned and by whom, by giving each one commissioned client a hunt token and a decryption key. A client might then present this token to cloud server who might utilize it to find encrypted matching records, while taking in nothing else. A client could then utilization its possessor issued decryption key to take in the actual matching records.

KEYWORD

security methods, identification of data, cloud computing environment, predicate based encryption, data security, wired/wireless networking, authentication, non-repudiation, integrity, privacy-saving database

Cloud computing includes greatly accessible enormous figure and storage stages offering a wide go of services. A standout amongst the most famous and fundamental cloud computing services is storage-as-a-service (SAAS). It gives organizations reasonable storage, expert upkeep and movable space. On one hand, because of aforementioned profits, organizations are energized by the public introduction of SAAS. On the other hand, organizations are hesitant about embracing SAAS. One of the real concerns is the privacy as cloud service is for the most part furnished by the alternate gathering. In the accompanying, we call the organization, who uses SAAS, the database holder. We call any individual who questions the organization's database, the database client. Also we call the cloud servers, which store the database, the cloud server. Right away we begin to illuminate distinctive sorts of privacy challenges throughout the sending of cloud service. From the view of the database manager, three challenges emerge.

  • Challenge 1: how to secure outsourced data from robbery by programmers or malware

clients appears to be a clear result. In any case, cautious thought ought to be given to both encryption system and its granularity.

  • Challenge 2: how to secure outsourced data from ill-use by the cloud server? An inconsequential result is for the holder to encrypt the database preceding outsourcing. Accordingly, clients (furnished with the decryption key(s)) can download the whole encrypted database, decrypt it and perform questioning in situ. Obviously, this nullifies most profits of utilizing the cloud. A more sumptuous approach is to utilize searchable encryption. Lamentably, ebb and flow searchable encryption strategies just help basic hunt (attribute=value), instead of convoluted SQL, inquiries.
  • Challenge 3: how to acknowledge substance level fine-grained access control for clients? This challenge is even harder to settle as it obliges variable decryption proficiencies for distinctive clients. Indeed trifling answer for the second challenge does not settle this challenge as it gives every client equivalent decryption proficience (same decryption key). A perfect result might involve the database possessor issuing a given client a key that just permits the client to inquiry and decrypt certain records. From client's point of view, three more challenges emerge.
  • Challenge 4: how to inquiry the cloud server without uncovering question parts? Taking in client's inquiry items means taking in client's conceivably touchy hunt investment. Also, by taking in client inquiries, the cloud server continuously takes in the information in the encrypted database.

 Challenge 5: how to shroud inquiry substance (e.g., values utilized as a part of "attribute=value" inquiries) from the database possessor. For the database possessor to practice access control over its outsourced data, a client might as well first acquire a support from the database possessor over its inquiry substance. On the other hand, in a few cases, the client may need to get the approbation without uncovering its question substance even to the database possessor. This is the situation when the client happens to be an abnormal amount official who is immediately qualified to pursuit any esteem and is not eager to uncover question to anybody.

Anita Soni1* Dr. Kalpana2

substance while guaranteeing database possessor the hiden substance are commissioned by some authentication power (CA). Such challenge surfaces, for instance, when the client is FBI who does not have any desire to uncover the individual it is researching while database holder needs to get some certainty by verifying FBI is commissioned by the court to do this examination. In this study, we present another plan that addresses previously stated prerequisites. It depends on characteristic based encryption and unseeing Boneh-Boyen feeble mark plan. Indeed, we change the standard trait based encryption to make it privately searchable in the cloud computing situation. Moreover, we utilize the unseeing Boneh-Boyen mark plan to let client absently recover a pursuit token and decryption key. Also, visually impaired pursuit token and decryption key extraction technique might be coupled with CA approval on client's include.

PROTECTION TECHNIQUE FOR DATA MIGRATION IN CLOUD COMPUTING

An observation on the Data Migration : Data migration to a cloud computing environment is from numerous points of view a practice in hazard administration. Both qualitative and quantitative elements apply in a dissection. The dangers must be painstakingly adjusted against the accessible protects and wanted profits, with the comprehension that responsibility for security stays with the organization. An excess of controls might be wasteful and ineffectual, if the profits exceed the expenses and partnered dangers. A suitable equalize between the quality of controls and the relative hazard connected with specific systems and operations must be guaranteed. Data security is an alternate vital research theme in cloud computing. Since service providers regularly don't have entry to the physical security system of data focuses, they must depend on the foundation provider to attain full data security. Actually for a virtual private cloud, the service provider can just define the security setting remotely, without knowing if it is completely executed. The framework provider, in this connection, must attain the accompanying targets: (1) classifiedness, for secure data access and exchange, and (2) auditability, for bearing witness to if security setting of applications has been altered or not. Classifiedness is normally accomplished utilizing cryptographic conventions, inasmuch as auditability might be attained utilizing remote verification methods. Remote authentication regularly obliges a trusted stage module (TPM) to encrypted utilizing TPM's private key) as the verification of system security. In any case, in a virtualized environment like the clouds, Vms can alertly relocate starting with one area then onto the next; thus straightforwardly utilizing remote confirmation is not sufficient. Hence, it is discriminating to fabricate trust components at each building layer of the cloud. Firstly, the hardware layer must be trusted utilizing hardware TPM. Besides, the virtualization stage must be trusted utilizing secure virtual machine monitors. VM migration might as well just be permitted if both source and objective servers are trusted. Later work has been committed to planning proficient conventions for trust stronghold and administration. Need for securing data migration process : Cloud Migration is one of greatly talked focus where cloud directors face great issues around then of data migration from an organization's server to a server that structures cloud somewhere else. Why they face inconveniences how about we discover. As I know, cloud carries on as an interface through which organizations can access data in a virtual environment. Accordingly, smooth working of it depends essential on how decently tidied and learned cloud providers are around there. Also, if data migration is not completed systematically and legitimately, it can offer ascent to issues concerning data and cloud security of organization's possessions that principally contain data. Accordingly, enlisting cloud providers having sound encounter about the field with plentiful learning and aptitude sets gets fundamental for overseeing cloud all the more viably and proficiently.

CONCLUSION

Cloud Computing embodies the as-a-Service paradigm and allows for services to be provided en masse to consumers. When combined with the cloud setting, two different sets of scenarios emerged based upon whether the service user‘s or CSP‘s data was to be protected. PBE schemes can be used to protect service user‘s data in three different scenarios: Scenario I saw the inclusion of PBE within a service; Scenario II saw the provision of PBE asa-Service; and Scenario V saw PBE being deployed by the user themselves. In each of these three scenarios PBE can be used by service users to specify precisely with whom they wish to share their data, for what purpose, and for how long. Although Scenario V may be a privacy zealot‘s ideal choice , they are in full control its practical feasibility has yet to be determined.

inclusion of PBE within a service; Scenario II saw the provision of PBE as-a-Service; and Scenario V saw PBE being deployed by the user themselves. In each of these three scenarios PBE can be used by service users to specify precisely with whom they wish to share their data, for what purpose, and for how long. Although Scenario V may be a privacy zealot's ideal choice| they are in full control its practical feasibility has yet to be determined; the ability for service users' to act competently as a Key Authority is still unclear. The remaining two scenarios, on the other hand, do appear to be more promising. However, these scenarios in themselves do present a dilemma between usability and the guarantees made over end-to-end security.

REFERENCES

Gopalakrishnan (2009). .―Cloud Computing Identity Management,.‖ SETLabs Briefings, vol. 7. E. Shi and B. Waters (2008). ―Delegating capabilities in predicate encryption systems,‖ in ICALP‘08. E. Shi and B. Waters (2008). Delegating capabilities in predicate encryption systems. In ICALP ‘08, pages 560–578. Foster I, Zhao Y, Raicu I, Lu S (2008). Cloud Computing and Grid Computing 360-Degree Compared. In: Grid Computing Environments Workshop (GCE‘08). oi:10.1109/GCE.2008.4738445 J. Baek, R. Safavi-Naini, and W. Susilo (2008). Public key encryption with keyword search revisited. In Proceedings of ICCSA, Part I, ICCSA ‘08, pages 1249–1259. J. Benaloh, M. Chase, E. Horvitz, and K. Lauter (2009). Patient controlled encryption: ensuring privacy of electronic medical records. In CCSW‘09, pages 103–114. J. de Muijnck-Hughes (2011). ―Data protection in the cloud,‖ Master‘s thesis, Radboud Universiteit Nijmegen, March 2011 M. Li, S. Yu, N. Cao, and W. Lou. (2011). Authorized private keyword search over encrypted data in cloud computing. Technical report, http://ece.wpi.edu/ mingli/, Mar. 2011. S. Overby (2010). How to Negotiate a Better Cloud Computing Contract, CIO, April 21, 2010, S. Yu, C. Wang, K. Ren, and W. Lou (2010). Achieving secure, scalable, and fine-grained data access Tim Mather, Subra Kumaraswamy, Shahed Latif (2009). "Cloud Security and Privacy: An Enterprise Perspective on Risk and Compliance", Editor Mike Loukides. O‘Reilly. Y. C. Chang and M. Mitzenmacher (2005). ―Privacy preserving keyword searches on remote encrypted data,‖ in ACNS‘05, 2005. Brian Hayes (2008). "Cloud Computing", Commun. ACM 51.7, pp. 9-11.

Corresponding Author Candidate Name*

Research Scholar, Pacific University, Udaipur, Rajasthan E-Mail –