Towards Achieving Efficient and Secure Way to Share the Data

Page 1

International Research Journal of Engineering and Technology (IRJET)

e-ISSN: 2395-0056

Volume: 04 Issue: 07 | July -2017

p-ISSN: 2395-0072

www.irjet.net

Towards Achieving Efficient and Secure way to Share the Data Sreevathsa C.V1, Rajeshwari R2, Meghana B3 1,2,3

Bachelor of Engineering, Department of ISE, SKIT, Bengaluru, Karnataka, India

---------------------------------------------------------------------***---------------------------------------------------------------------

Abstract - The impact of the cloud computing technique

made users to store and share their data easily and accessible anywhere and at any point of time. The cloud can handle huge amount of data where the data is stored in datacenter which is placed in a remote place. The users can use the service of cloud for personal or the professional use depending on the purpose. The continuous use of the cloud is prone to number of security attacks because users now store and share the data using cloud rather than any other means. There are number of cloud service providers and the third-party platforms where the users store their data and those stored data will be shared to other users or to the group. The data may be accessed for the public or the private use. When the data is kept for sharing certain security measures should be taken such that the data of the users is secure in the cloud. There may be major security attacks in the cloud so when the data is shared certain cryptographic and authentication techniques should be given in order to protect the data of the users. The security measures must be strong enough and have to be updated frequently as the cloud service updates its settings. Also the efficiency of the cloud service which handles the data must be good and it must use the resources well. The resources must be idle when the data is not in use which saves the energy. The mechanism must be very efficient even when the data is shared among multiple users. Key Words: Cloud Computing, security, efficiency

1. INTRODUCTION Cloud services have been used by the users for its flexibility and ability to store huge amount of data. Using the services of the cloud the stored data can be shared among individuals or the group of users. It is one of the major aspect in which the users stick on this service. The small scale users or the major organizations have been into data sharing because it increases their productivity. Also the data sharing facility reduces the amount of time to spend on sharing on the huge amount of data irrespective of the physical devices which may take more time to share. Multiple users can access the same data at the same time on the same platform. The Fig.-1 shows the structure of the multiple users’ access the same cloud service in which data is shared. This leads to the less usage of time and the cost to build and maintain the storage structure. The storage can be set up once and the data can be stored and shared among multiple users at a time using the same storage. The datacenter should be maintained such that it is efficient to handle the multiple requests from the users and the resources allocated to them. However, the © 2017, IRJET

|

Impact Factor value: 5.181

|

cloud services have to meet the confidentiality, integrity and privacy of the user’s data which is stored. There may be anonymous users over the internet where the send fake request for the resources in which authentication must be set up [5] for the cloud service to its storage and the shared data. To provide security some identity based signatures have to be used have been proposed. Authentication is very much important for the organizations in order to share data on a large scale even if there is single or multiple users to maintain its confidentiality. Security in the public cloud is most important [10] because in order to protect the shared data and resources of the users from the possible attacks. The best solution provided is to add a two step authentication technique by using a private key to share and encrypt using the session keys. Even though it may prevent attacks such as key escrow and reduces computational cost it is limited to the image based authentication and the private key which is used for once for sharing purpose it uses Hash functions to generate the keys which can be unlocked easily. The users can store and share the data in cloud but unable to control the data which is stored in the remote datacenters [11]. Thus, controlling the data in the remote site and maintaining its integrity is the major task. In order to overcome these problems the technique using function proxy re-encryption is used. Here the change is in the decryption process where the entire process depends on the user’s secret key in which a string has been linked. In turn the string is linked with the cipher text which holds a string if its matches decryption will be made. This method will provide some means of security but it consumes lot of time in re-encryption process where a delay can be introduced. There may be other aspects in cloud such as there may be multi-owner for the same shared data and the groups may be dynamically formed in the cloud [12] which uses One-Time Password [OTP] which is the easiest way and the most popular mechanism which is being used. The OTP is the authentication technique for securing the account which may be used in different machines. It provides three levels of security using mixture of image and password generation technique. The level 1 and 2 are based on the captcha and after successful solving the captcha the user gets the OTP. This technique is very basic and the image related grid can be easily solved. Thus, it moves a little step down in terms of providing a strong security to the cloud to handle the shared data. There must be some strong mechanisms to handle data especially when it is shared among multiple users and an efficient approach needed to be used.

ISO 9001:2008 Certified Journal

|

Page 3251


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.
Towards Achieving Efficient and Secure Way to Share the Data by IRJET Journal - Issuu