You are on page 1of 2

Bonfring International Journal of Software Engineering and Soft Computing, Vol. 9, No.

1, March 2019 15

Provisioning of Data Security for File


Transformation on Multi Cloud Storage
M. Nandhini and Dr.S. Madhavi

Abstract--- In file transformation utilizing proxy re- costs. The client maintains a constant amount of data, which
signatures, once a user in the group is revoked; the data cloud minimizes network communication. Thus, the PDP model for
server is able to re-sign the blocks, which were signed by the remote data checking supports large data sets in widely
revoked user, with a resigning key. As a result, the distributed storage systems metadata to verify the proof.
effectiveness of user revocation can be significantly
B. Wang, L. Baochun, and L. Hui; narrates data services
developed; computation and communication resources of in the cloud, users can easily modify and share data as a
existing users can be easily saved. Meantime, the data cloud group. To ensure data integrity can be audit publicly, users
server, who is not in the same trusted domain with each user,
need to compute signatures on all the blocks in shared data.
is only able to convert a signature of the revoked user into an Different blocks are signed by different users because of data
existing user on the same block, but it cannot sign arbitrary modifications performed by different users. For security
blocks on side of either the revoked user or an existing user.
reasons, once a user is revoke from the group, the blocks are
Keywords--- Cloud Server, Based Key Generation, previously signed by the revoked user, must be re-signed by
Attribute Revocation. an existing user.
S. Benabbas; suggests the problem of computing on large
I. INTRODUCTION AND SCOPE datasets those are stored on an untrusted server. To follow the
approach of amortized verifiable computation. To present the
I N key generation is every user in the group generates user
public and private key. User generates a random number p,
and provides an output of public and private key without any
first practical verifiable computation scheme for high degree
polynomial functions. Functions that can be used for example,
loss of abstraction. The one who creates the shared data is the to make predictions based on polynomials fitted to a large
original user and it is assumed as user 1 in this paper. The user number of sample points in an experiment.
list will be designed by the original user and which holds the Dan Boneh, Ben Lynn, and Hovav Shacham; suggests
id’s of the entire user in the particular group. The user list is theshort digital signatures are needed in environments where a
signed by original user and it tends to be public. The file is human is asked to manually generate a key in the signature.
split into two or more blocks and each will be encrypted by For example, product registration systems often ask users to
the user using their public key when the user wants to upload a key in a signature provided on a label. Currently, the two most
file. In order to authenticate the user has to create the signature frequently used signatures schemes, RSA (Rivest Shamir
for each and every block. In each block along with cipher text Adleman) and DSA (Data Encryption Standard) provide
the signature, block id, signer id will be uploaded by the user relatively long signatures compared to the security they
and these metadata and key details further will get stored by provide.
public verifier for public auditing. By using secret key the file
H. Shacham; describes to present a new type of signature
will be downloaded by user or member of the group and secret
for a group of persons, called a group signature. Only
key will be obtained when the user enter their filename. If this
members of the group can sign messages. The receiver can
secret key is valid then the user able to decrypt this
verify that it is a valid group sign, but cannot discover which
downloaded file. Else the user entered wrong secret key then
grump ember made. The signature can be "opened", so that
who is blocked by public verifier.
the person who signed the message is revealed it; The group
signatures are a "generalization" of the credential/ membership
II. LITERATURE SURVEY
authentication schemes, in which one person paves that he
G. Ateniese, R. Burns; describes the Provable Data belongs to a &n group. To present four schemes that satisfies
Possession (PDP) that allows a client that has stored data at an the properties above. Not all these schemes arc based on the
untrusted cloud server to verify that the cloud server possesses same cryptographic assumption. In some of the schemes a
the original data without retrieving it. The model generates busted cent is only needed during the setup; and in other
probabilistic proofs of possession by sampling random sets of schemes, each parson can create the group he belongs to.
blocks from the cloud server, which drastically reduces I/O
III. IMPLEMENTATION

M. Nandhini, PG Scholar, Department of CSE, K.S.Rangasamy College a) Group Member Registration & Login
of Technology, Tiruchengode. E-mail: nandhini1078@gmail.com In order to create an account user has to register by giving
Dr.S. Madhavi, Professor, Department of CSE, K.S.Rangasamy College
of Technology, Tiruchengode.
the appropriate details that is needed. Once the registration is
DOI:10.9756/BIJSESC.9007 completed they have to use their user name and the password

ISSN 2277-5099 | © 2019 Bonfring


Bonfring International Journal of Software Engineering and Soft Computing, Vol. 9, No. 1, March 2019 16

that the user entered in their registration panel in order to mode and this process of verification is called Integrity
login. checking between files.
b) Batch Level Sign Based Key Generation
V. CONCLUSION
In key generation, every user in the group generates user’s
public and private keys. User generates a random number p, The primitive of verifiable database with effective updates
and provides output public and private keys without loss of is an important way to solve the problem of verifiable
generality. Assume user1(u1) is the original user, who is the outsourcing of storage. To propose a scheme to realize
creator of shared data. The original user also creates a User efficient and secure data integrity auditing for share dynamic
List (UL), which contains ids of all the users in the group. The data with multi-user modification. The group signatures with
user list is public and the list is signed by the original user. user revocation are affect to achieve the data integrity auditing
of remote data. Beside the public data auditing, the integration
c) Upload Files to Cloud Server of the three primitive enable our scheme to outsource cipher
The user wants to upload a file. So the user split the files text database to remote cloud and support secure group users
into many blocks. Next the user encrypt each blocks with his revocation to shared dynamic data.
public key. Then the user generate signature of each blocks for To provide security analysis of our scheme, and it shows
authentication purpose. The user upload each block cipher text that our scheme provide data confidentiality for group users,
with signature, block id and signer id. The metadata and key and it is also secure against the collusion attack from the cloud
details are stored in public verifier for public auditing. storage server and revoked group users. In addition, the
d) Download File from Cloud Server performance analysis shows that, compared with its relevant
schemes, our scheme is also efficient in different phases.
In cloud server the next user or group member wants to
download a file. So user gives the filename and gets the secret
ACKNOWLEDGEMENT
key. Then he entered this secret key. If this secret key is valid
then the user able to decrypt this downloaded file. Else user We acknowledge DST-File No.368. DST-
entered wrong secret key then he blocked by public verifier. If FIST(SR/FIST/College-235/2014 dated 21-11-2014) for
the secret key is valid then decrypt each block and verify the financial support and DBT-STAR-College-Scheme ref. no:
signature. If both signatures are matched then combine all BT/HRD/11/09/2018 for providing infrastructure support.
blocks then get the original file.
REFERENCES
e) Public Auditing with User Revocation In Public Verifier
[1] A. Giuseppe, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson
In user revocation, the user who entered the wrong secret and D. Song, “Provable data possession at untrusted stores”,
key who is blocked by the public verifier. Next the user added Proceedings of the 14th ACM conference on Computer and
public verifier revoked user list. The user wants to tries to communications security, Pp. 598-609, 2015.
[2] W. Boyang, B. Li and H. Li, “Panda: Public auditing for shared data
download any file; the data cloud server replies his blocked with efficient user revocation in the cloud”, IEEE Transactions on
information. Then the user wants to unrevocation, so the services computing, Vol. 8, No. 1, Pp. 92-106, 2015.
user asks the public verifier. Finally the public verifier [3] B. Siavosh, R. Gennaro and Y. Vahlis, “Verifiable delegation of
unrevoked this user. Next the user able to download any file computation over large datasets”, In Annual Cryptology Conference, Pp.
111-131, 2011.
with its corresponding secret key. [4] B. Dan, B. Lynn and H. Shacham, “Short signatures from the Weil
pairing”, Journal of cryptology, Vol. 17, No. 4, Pp. 297-319, 2004.
f) Attribute Revocation [5] B. Emmanuel and J. Stern, “Efficient revocation in group signatures”,
The idea of proxy re-signatures, once a user in the group In International Workshop on Public Key Cryptography, Pp. 190-206,
is revoked, the data cloud server is able to re-sign the blocks, 2001.
[6] D. Chaum and E. Van Heyst, “Group signatures”, In Workshop on the
which were signed by the revoked user, with a resigning key. Theory and Application of of Cryptographic Techniques, Pp. 257-265,
The efficiency of user revocation can be significantly 1991.
improved, computation and communication resources of [7] W. Qianhong, Y. Mu, W. Susilo, B. Qin and J. Domingo-Ferrer,
existing users can be easily stored. Meanwhile, the data cloud “Asymmetric group key agreement”, In Annual International
Conference on the Theory and Applications of Cryptographic
server, who is not in the same trusted domain with each user, Techniques, Pp. 153-170, 2009.
is only able to convert revoked user into an existing user [8] E.C. Chris, A. Küpçü, C. Papamanthou and R. Tamassia, “Dynamic
signature on the same block, but it cannot sign arbitrary blocks provable data possession”, ACM Transactions on Information and
on behalf of either revoked or an existing user. System Security (TISSEC), Vol. 17, No. 4, 2015,
[9] G. Rosario, C. Gentry and B. Parno, “Non-interactive verifiable
computing: Outsourcing computation to untrusted workers”, Annual
IV. RESULT AND DISCUSSION Cryptology Conference, Pp. 465-482, 2010.
[10] Gentry, C, “Fully homomorphic encryption using ideal lattices”, Stoc,
When the file is transferred between two users and during Vol. 9, No. 2009, Pp. 169-178.
the file transformation third party authority is trying to decrypt [11] G. Craig and S. Halevi, “Implementing gentry’s fully-homomorphic
the file using false key. Then the public verifier will get know encryption scheme”, In Annual international conference on the theory
about the false key entered and they will revoke the user i.e. and applications of cryptographic techniques, Pp. 129-148, 2011.
[12] G. Rosario, C. Gentry and B. Parno, “Non-interactive verifiable
the third party user who entered the wrong key. If the file is computing: Outsourcing computation to untrusted workers”, In Annual
said to be in safe mode then the signature of the original and Cryptology Conference, Pp. 465-482, 2010.
decrypted file should be matched else the file is in the unsafe

ISSN 2277-5099 | © 2019 Bonfring

You might also like