INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY VOLUME 4 ISSUE 2 – APRIL 2015 - ISSN: 2349 - 9303
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption Scheme Dr. S. Sankar Ganesh2
P. Vidhya Lakshmi1
Associate Professor Department of Information Technology 2 National Engineering College, ssganesa@yahoo.com
Student II Year M.E Department of Information Technology 1 National Engineering College, vidhyapl1992@gmail.com
Abstract— Cloud computing provides the facility to access shared resources and common support which contributes services on demand over the network to perform operations that meet changing business needs. A cloud storage system, consisting of a collection of storage servers, affords long-term storage services over the internet. Storing the data in a third party cloud system cause serious concern over data confidentiality, without considering the local infrastructure limitations, the cloud services allow the user to enjoy the cloud applications. As the different users may be working in the collaborative relationship, the data sharing becomes significant to achieve productive benefit during the data accessing. The existing security system only focuses on the authentication; it shows that user’s private data cannot be accessed by the fake users. To address the above cloud storage privacy issue shared authority based privacy-preserving authentication protocol is used. In the SAPA, the shared access authority is achieved by anonymous access request and privacy consideration, attribute based access control allows the user to access their own data fields. To provide the data sharing among the multiple users proxy re-encryption scheme is applied by the cloud server. The privacy-preserving data access authority sharing is attractive for multi-user collaborative cloud applications. Index Terms— Authentication Protocol, Cloud computing, Privacy Preserving, Shared Authority —————————— ——————————
1 INTRODUCTION Cloud computing is one of the emerging technologies [10]. The cloud environment is a large open distributed system. Hence it is important to preserve the data, as well as, privacy of users, without considering the local infrastructure limitations; the cloud services allow the user to enjoy the cloud applications. [3], [4]. The ―Cloud‖ is the default symbol of the internet in diagrams. The broader term of ―Computing‖ encompasses: computation, co-ordination logic, storage. Fig. 1 describes that the cloud computing is a term used to refer a model of computing the network, in which a program or application runs on a connected servers rather than on a local computing device such as a system, tablet or Smartphone. Research in cloud computing is receiving a great deal of attention from each educational and industrial worlds. In cloud computing, users will source their compute and storage to servers (also called clouds) exploitation web. This frees users from the hassles of maintaining resources on-site. Clouds will give many varieties of services, infrastructures and platforms assist developers write applications (e.g., Amazon’s S3, Windows Azure) [5]. Since services are outsourced to a foreign server, security and privacy are of huge concern in cloud computing. In one hand, the user ought to evidence itself before initiating any dealings, and on the opposite hand, it should be ensured that the cloud will not tamper with the information that's outsourced. User privacy is additionally required so the cloud or different users don't apprehend the identity of the user. The cloud will hold the user in control of the information it outsources, and likewise, the cloud is itself in control of the services it provides. It also verifies validity of the user who stores the information. Except for the technical solutions to confirm security and privacy, there's conjointly a necessity for enforcement. Efficient search is additionally a very important concern in clouds.
Fig. 1 Cloud Computing overview Cloud Computing is a model for enabling convenient, on-demand network access for a shared pool of computing resources to be configured [1] (e.g., networks, servers, memory capacity, applications and services) that can be provisioned and released with minimal effort of management or service provider interaction. This Cloud model can be composed of essential characteristics-5, service models-3 and deployment models-4.
1.1 Infrastructure as a service (IaaS) According to basic cloud-service model & the IETF (Internet Engineering Task Force), providers of IaaS offer computers – physical or (more often) virtual machines – and other sources. (Pools of cloud operational support-system can support large numbers of virtual tools and the ability to scale the services up and down according to various consumers’ choice.) Extra sources provided by IaaS clouds are virtualmachine disk image library and object storage, load balancers, IP addresses, virtual local area networks (VLANs), software etc. IaaScloud providers supply those resources on on-demand from their large pools installed in the data point centers. For far distance network
135