An Approach for Efficient Utilization of Public Cloud Storage and Securing Data

Page 1

International Research Journal of Engineering and Technology (IRJET)

e-ISSN: 2395 -0056

Volume: 04 Issue: 05 | May -2017

p-ISSN: 2395-0072

www.irjet.net

An Approach for Efficient Utilization of Public Cloud Storage and Securing Data Megha Prabhu1, K Paramesha2 1M.

Tech Student, Department of Computer Science and Engineering, VVCE, Mysuru, India. Professor, Department of Computer Science and Engineering, VVCE, Mysuru, India. ---------------------------------------------------------------------***--------------------------------------------------------------------2Associate

Abstract - Technology is evolving at a rapid speed. The

come across many approaches where in different encryption mechanisms are used to encrypt the data and store it. Data encryption can be done using symmetric encryption technique or asymmetric encryption technique [1]. The decision on which technique must be used depends on the application in which it is implemented and the level of security expected. Initially, data encryption was done using DES techniques. It was used for a long duration by many organizations and agencies as an efficient and secure method for data encryption. Currently technologists are turning towards AES encryption methods [2] as it has been observed as efficient and secure method for data encryption. In our approach, we upload the encrypted data to the cloud and the key management is done at the secure server. We make sure that the server is secure by imposing certain policies on it. In this way, we can utilize the benefit of cloud storage at the same time be sure that our da-ta is secure as the keys required for decrypting the data files on the cloud resides with the system owner or the enterprise as it is stored in the secure server and is not uploaded in the cloud. This approach makes sure that the data in the cloud is secure even if it becomes accessible by other unauthorized authority because it cannot be decrypted unless they obtain the decryption key which is not available in the cloud.

infrastructure requirement of the enterprises is also changing with the evolution. One way to cope up with this is to make use of the cloud services rather than investing on the infractures and its maintenance. But we cannot outsource all our storage as we cannot trust the service provider completely. In this paper, we propose an approach for utilizing the public cloud storage space for storing our data in encrypted form. We also make use of secure servers maintained by the organizations or enterprises which can be trusted completely for the key management. By the combination of public cloud storage for storing data and use of secure servers for key management and authentication we propose an approach to achieve data security. Key Words: public cloud storage, data security, secure server, cryptography, AES 1.INTRODUCTION We are in a world where each person generates a large set of data in his day to day life and would like to preserve the same and share it. With the growing amount of data, it is becoming difficult to store the data in the personal systems or hard drives. Each person comes across a point where he/she feels that the data they possess are important and should be preserved as it may need to be retrieved or shared with some other person at some point in time. As we all know the most precious thing in this digital world is the data and hence its storage and security are the main things to be considered.

2. RELATED WORK Lot of work has been done and are going on in the field of cloud computing to make it robust against security attacks and at the same time improve performance. Mai Dahshan and Sherif Elkassass [3] suggested a framework for data protection on cloud. In this paper, they design a framework for confidentiality and fine grain access control. They make use of trusted third party service in their approach. In their approach, they made use of multi-authority cipher text policy attribute-based encryption method and attribute based signature method. They suggest double encryption of data before sending to cloud. Readers and writers have different access permissions. Writer can create, update and download the file whereas the reader can only download the file.

Cloud computing is one such domain which provides solution for data storage and security concerns. Cloud provides services like IaaS, PaaS and SaaS. For data storage, we make use of infrastructure as a service. Cloud comes with three basic types namely private cloud, public cloud and the hybrid cloud. As we know, a lot of security measures will be at place in the private cloud. But when it comes to public cloud, security becomes a major concern for the data owner. Even though the public cloud storage provider offers a lot of safety and security measures, we cannot completely trust the public cloud. So, we need to make sure that the data that is stored in the public cloud is secure. We suggest an approach wherein we make use of the cryptographic techniques to secure our data, public cloud infractures for data storage and secure servers for key management and authentication. We

Š 2017, IRJET

|

Impact Factor value: 5.181

Ms. S. Vijaya Lekshmi and Mrs. M.P. Revathi [4] in their work suggest a method for implementing a secure data storage method for multiauthority access. They make use of proxy re-encryption and CP-ABE method. They also prove that their method is secure against chosen cipher text attacks. They suggest using database as a service and use certificate authorities in their approach.

|

ISO 9001:2008 Certified Journal

|

Page 841


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.
An Approach for Efficient Utilization of Public Cloud Storage and Securing Data by IRJET Journal - Issuu