Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Look up keyword
Like this
3Activity
0 of .
Results for:
No results containing your search query
P. 1
A Novel and Secure Data Sharing Model with Full Owner Control in the Cloud Environment

A Novel and Secure Data Sharing Model with Full Owner Control in the Cloud Environment

Ratings: (0)|Views: 180|Likes:
Published by ijcsis
Cloud computing is a rapidly growing segment of the IT industry that will bring new service opportunities with significant cost reduction in IT capital expenditures and operating costs, on-demand capacity, and pay-per-use pricing models for IT service providers. Among these services are Software-as-a-Service, Platform-as-a-Service, Infrastructure-as–a-Service, Communication-as-a-Service, Monitoring-as-a-Service, and Storage-as-a-Service. Storage-as-a-Service provides data owners a cost effective service to store massive data and handles efficient routine data backup by utilizing the vast storage capacity offered by a cloud computing infrastructure. However, shifting data storage to cloud computing infrastructure introduces several security threats to data as cloud providers may have complete control on the computing infrastructure that underpins the services. These security threats include unauthorized data access, compromise data integrity and confidentiality, and less direct control over data for data owner. The current literatures propose several approaches for storing and sharing data in the cloud environments. However, these approaches are either applicable to specific data formats or encryption techniques. In this paper, unlike previous studies, we introduce a secure and efficient model that allows the data owners to have full control over data sharing in the cloud environment. In addition, it prevents cloud providers from revealing data to unauthorized users. The proposed model can be used in different IT areas, with different data and encryption techniques, to provide secure data sharing for fixed and mobile computing devices.
Cloud computing is a rapidly growing segment of the IT industry that will bring new service opportunities with significant cost reduction in IT capital expenditures and operating costs, on-demand capacity, and pay-per-use pricing models for IT service providers. Among these services are Software-as-a-Service, Platform-as-a-Service, Infrastructure-as–a-Service, Communication-as-a-Service, Monitoring-as-a-Service, and Storage-as-a-Service. Storage-as-a-Service provides data owners a cost effective service to store massive data and handles efficient routine data backup by utilizing the vast storage capacity offered by a cloud computing infrastructure. However, shifting data storage to cloud computing infrastructure introduces several security threats to data as cloud providers may have complete control on the computing infrastructure that underpins the services. These security threats include unauthorized data access, compromise data integrity and confidentiality, and less direct control over data for data owner. The current literatures propose several approaches for storing and sharing data in the cloud environments. However, these approaches are either applicable to specific data formats or encryption techniques. In this paper, unlike previous studies, we introduce a secure and efficient model that allows the data owners to have full control over data sharing in the cloud environment. In addition, it prevents cloud providers from revealing data to unauthorized users. The proposed model can be used in different IT areas, with different data and encryption techniques, to provide secure data sharing for fixed and mobile computing devices.

More info:

Published by: ijcsis on Jul 07, 2011
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

07/07/2011

pdf

text

original

 
(IJCSIS) International Journal of Computer Science and Information Security,Vol. 9, No. 6, June 2011
A Novel and Secure Data Sharing Model with FullOwner Control in the Cloud Environment
Mohamed Meky and Amjad Ali
Center of Security StudiesUniversity of Maryland University CollegeAdelphi, Maryland, USAmmeky@faculty.umuc.eduand aali@umuc.edu
 Abstract
 — 
Cloud computing is a rapidly growing segment of theIT industry that will bring new service opportunities withsignificant cost reduction in IT capital expenditures andoperating costs, on-demand capacity, and pay-per-use pricingmodels for IT service providers. Among these services areSoftware-as-a-Service, Platform-as-a-Service, Infrastructure-as
 – 
a-Service, Communication-as-a-Service, Monitoring-as-a-Service,and Storage-as-a-Service. Storage-as-a-Service provides dataowners a cost effective service to store massive data and handlesefficient routine data backup by utilizing the vast storagecapacity offered by a cloud computing infrastructure. However,shifting data storage to cloud computing infrastructureintroduces several security threats to data as cloud providers mayhave complete control on the computing infrastructure thatunderpins the services. These security threats includeunauthorized data access, compromise data integrity andconfidentiality, and less direct control over data for data owner.The current literatures propose several approaches for storingand sharing data in the cloud environments. However, theseapproaches are either applicable to specific data formats orencryption techniques. In this paper, unlike previous studies, weintroduce a secure and efficient model that allows the dataowners to have full control over data sharing in the cloudenvironment. In addition, it prevents cloud providers fromrevealing data to unauthorized users. The proposed model can beused in different IT areas, with different data and encryptiontechniques, to provide secure data sharing for fixed and mobilecomputing devices.
 Keywords- cloud computing; cloud storage; data sharing model; data access control; data owner full control, cloud storage as a service; data encryption
I.
 
I
NTRODUCTION
Cloud computing is a rapidly growing segment of the ITindustry that will bring new service opportunities withsignificant cost reduction and increased operating efficiency forIT vendors. Cloud computing includes three major models:Software-as-a-Service, Platform-as-a-Service, andInfrastructure-as-a-Service [1]. Additional models are evolvingas the concept of cloud computing develops new services suchas Storage-as-a-Service, Communication-as-a-Service, andMonitoring-as-a-Service. An important characteristic of cloudcomputing is pay-per-use [2]. Customers pay for cloud servicesonly when they use them. Several cloud services are availableto the public such as the Google App Engine [3] and MicrosoftLive Mesh [4]. Storage-as-a-Service, such as Amazon simplestorage service [5], gives data owners a cost effective service tostore massive data and handles efficient routine data backup byutilizing the vast storage capacity offered by a cloud computinginfrastructure. In addition, it gives customers the ability toexpand and reduce IT resources as needed. However, with thedevelopment of cloud computing, deployment of IT systemsand data storage is shifted to off-premises third-party ITinfrastructures, i.e., cloud computing platforms. Shifting datastorage to cloud computing infrastructure introduces severalsecurity threats to data, as cloud providers may have completecontrol on the computing infrastructure that underpins theservices. These security threats include unauthorized dataaccess, compromised data integrity and confidentiality, and lessdirect control over data for data owners. To overcome thesethreats, we present a secure and efficient model that allows thedata owners to have full control to grant or deny data sharing inthe cloud environment. In addition, the proposed model ensuresdata integrity and confidentiality, and prevents cloud providersfrom revealing data to unauthorized users. The proposed modelcan be used in several applications such as remote file storage,data publication, on-demand data access, and onlineeducational programs. Each application can use its data formatand encryption technique to provide secure data sharing in thecloud. In addition, the proposed model uses a low computingpower (e.g. symmetric encryption) and a one- authenticationstep to accept or deny a data access request. Therefore, it canbe used with low computing power devices such as mobiledevices. The remainder of this paper is organized as follows. Insection II, we survey and analyze the related work. Section IIIdescribes the details of our proposed model, followed by thesecurity analysis in section IV, and finally, section V concludesthe paper.II.
 
RELATED
 
WORKDeployment of storage as a cloud computing service,where data storage is shifted to off-premises third-partyinfrastructure, introduces special security threats. Therefore,data owners have to establish the following special securityrequirements to safeguard the data in the midst of un-trustedcloud environments:
12http://sites.google.com/site/ijcsis/ISSN 1947-5500
 
(IJCSIS) International Journal of Computer Science and Information Security,Vol. 9, No. 6, June 2011
 A.
 
 Ensuring Date Integrity and Confidentiality
The cloud storage providers should not have the capabilityof compromising the integrity and confidentiality of the datastored in the cloud. Confid
entiality means keeping users’ data
secret in the cloud systems while data integrity meanspreserving information integrity, i.e., no data loss ormodification by unauthorized users [6].
 B.
 
Controling Data Access and Sharing
The data owner should be the only authority that grants andaccess to authorized users.
C.
 
 Authentication
The Authentication is used to verify the claimed identity of the data owner, user, or other entity [7] such as cloud provider.To meet these security requirements, data owners have toenforce authorization access policies that prevent revealingdata information to cloud service providers or unauthorizedusers. Previous studies proposed several approaches for storingand sharing data in the cloud environments. However, theseapproaches are either applicable to specific data formats orencryption techniques. For example, the model introduced in[8] applies the publisher policy model presented in [9] to securestorage of Extensible Markup Language (XML) data in thecloud by adding special secure co-process to the storedmachine, as part of the cloud infrastructure, to enable efficientencryption to the stored XML documents. Althoughmechanism published in [8] may
enforce owner’s policies on
XML documents, the cloud providers have access to plainXML data. Reference [10] introduced a model for securingdata sharing on the cloud. In that model, data sharing isachieved by re-encrypting the data to the authorized users bythe cloud provider. Although model illustrated in [10] canenforce sharing policies, specified by data owners, and
 preventing unauthorized access to data, the model’s idea works
only with one encryption technique (progress elliptic curveencryption) and requires the cloud provider to re-encrypt theencrypted data before forwarding it to authorized users.Reference [11] introduced a model to outsource very largeblocks of data by encrypting each block of data with a differentencryption key. However, the model published in [11] fails todemonstrate how a user will ensure data confidentiality afterreceiving data from the cloud. In addition, whenever a user'saccess right is revoked, the data block group needs to befragmented and several data blocks need to be re-encrypted.Our model is more secure and more efficient than the modelpresented in [11] and immune to eavesdropping attacks since,in our model, a user is not allowed to communicate with thecloud provider. In summary, our model gives the data ownerfull control to grant or deny data sharing in the cloud usingefficient and secure procedures. In addition, it prevents cloudproviders from revealing data contents to unauthorized users.The proposed model can be used in several applications (e.g.remote file storage, data publication, online educationalprograms), with different data and encryption techniques, toprovide secure data sharing for both fixed and mobilecomputing devices.III.
 
THE
 
P
 
PROPOSED
 
MODELIn this section, we will explain our proposed access modelbased on a scenario illustrated in Figure 1 and notations listedin Table 1. As shown in Figure 1, a data owner, who stores hisencrypted data in the cloud, receives a data access requestfrom a user. After successfully authenticating the user andchecking the policies, relevant to the user, the data ownersends a control message to the user and a data access permit tothe cloud storage provider. The data access permit has relevantinformation that allows the cloud storage provider to apply
data owner’s policy and provides specific data to the user.
Meanwhile the control message, sent by the data owner, willallow the user to decrypt and authenticate the data that will begranted from the cloud storage provider. As shown in step 4 inFigure 1, the user compares the information received from thedata owner with information received from the cloud provider.If there is a match, the user ensures that the receivedinformation is valid and authentic.In the proposed model, a cloud storage provider has noknowledge about the data encryption algorithm and decryptionkey. This way, data owners keep control over data integrityand confidentiality in the cloud. Meanwhile, data ownerscontrol user policy access and reveal relevant information thatgrants users access and protects data against any modification.
Figure 1. Secure Data Sharing Model with Full Control in the CloudTABLE I.
MODEL’
S
N
OTATIONS
 
Notation
 
Description
 
Comments
O-ID
Data Owner ID
C-ID
Cloud storage provider ID
U-ID
User ID
 D-ID
Shared data ID
SU 
User secret anonymity Published bydata owner
SC 
Cloud provider secret anonymity Published bydata owner
du
Secret encryption key for exchangingmessages between data owner and the userPublished bydata owner
dc
Secret encryption key for exchangingmessages between data owner and thecloud providerPublished bydata owner
 XOR
Logical exclusive or operation
ks
A one-time session key to be used withXOR operation when transferring messagefrom the cloud provider to the userGenerated bydata owner
13http://sites.google.com/site/ijcsis/ISSN 1947-5500
 
(IJCSIS) International Journal of Computer Science and Information Security,Vol. 9, No. 6, June 2011
h (.)
A one-way secure hash function such asSHA-1
||
A concatenation operator
{.}
 
Encryption operator using encryption key,
 
 EN 
Encryption algorithm used for encryptingthe shared dataChosen by thedata ownerbased on datatype
 ENC{dat a}
Encrypted data Sent by cloudprovider
kd 
Encryption key used for encrypting theshared dataChosen by thedata owner
h(data)
 
Hash value of the shared data Calculated atthe data owner
For execution of this proposed model, the data owner firstneeds to complete the following tasks:
a)
 
 Issue two secret anonymities, SC and SU, for the cloud service provider and the user.b)
 
 Issue two secret symmetric encryption keys, dc and du, for the cloud service provider and the user.c)
 
Use a secure channel, such as Diffie-Hellman keyagreement [12], to exchange SC and dc with the cloud  provider, and submit SU and du to the user 
In addition, we assume that the data owner encrypts thedata with a suitable encryption algorithm, relevant to the datatype, and submitted the encrypted data to the cloud serviceprovider though a secure channel. The proposed model has thefollowing five steps:
1.
 
 A user Resquest Data Access from the Data Owner 
A user who would like to access data, defined by
 D-ID
,generates a nonce,
 N 
u
, and prepares a message
m
1
= {U-ID //  D-ID // N 
u
 }
 
to be sent to the data owner. The user then sends arequest data access message =
{U-ID, {m
1
// h (m
1
// SU)}
du
} tothe data owner.
2.
 
 Data Owner 
 
 Authenticates and Sends Control Message to the User 
Upon receiving the data access request from the user, thedata owner executes the following steps:
a)
 
 Decrypt the received message, using the symmetric secret key, du, (that is relevant to U-ID) and obtain m
1
= (U-ID, D-ID // N 
u
), and h (m
1
// SU).b)
 
Verify the format of U-ID, D-ID from the decrypted messagem
1
. If there is no match, the data owner terminates theconnection. Otherwise, the data owner continues.c)
 
Compute h (m
1
 // SU) and check whether it equals thereceived h (m
1
 // SU)). If there is a match, the data owner determines the authenticity of the user.
After authenticating the user, the data owner generates anonce,
 N 
, a one-time session key,
ks
, and prepares two specialmessages
m
2
, and
m
3
to be sent to the user and the cloudprovider respectively. The message,
m
2
= {C-ID // D-ID // N 
u
//  N 
 // EN // kd // h (data) // ks // OP}
 ,
contains the followingparameters: cloud provider identification,
C-ID
, shared dataidentification,
 D-ID
, message nonce,
 N 
u
and N 
, theencryption algorithm,
 EN 
, encryption key,
kd 
, and data hashvalue,
h (data),
that are relevant to
 
the data (
 D-ID
), a one-time session key,
ks
, and optional field,
OP.
The optionalfield,
OP
, could be used to extend the capability of theproposed model. For example, the optional field could havethe time when the data should be accessed (e.g. fordownloading a test on an online educational program) orspecial access policy that could be related to MandatoryAccess Control
(
MAC) or Role Based Access Controls(RBAC)
 
[13]. After preparing the message,
m
2
, the data ownersends the control message =
{O-ID, {m
2
 , h (m
2
// SU)}
du
}
 
to theuser.
 
Upon receiving the control message,
{O-ID, {m
2
 , h (m
2
// SU)}
du
}
 ,
the user will authenticate and check the integrity of the received message as follows:
a)
 
 Decrypt the received message, using the symmetric secret key, du, and obtain m
2
= {C-ID // D-ID // N 
u
// N 
 // EN // kd  // ks // h(data) // OP}, and h (m
2
// SU)b)
 
Compare the values of D-ID and N 
u
 , obtained from m
2
 , tothose values sent in message m
1
. If there is a match, theuser continues.c)
 
Compute h (m
2
 , SU) and check whether it equals thereceived h (m
2
 // SU)). If there is a match, the user authenticates the data owner.d)
 
Keep C-ID, ks, and N 
for processing cloud provider message, m
4
 , in step 5.3.
 
 Data Owner Sends a Data Access Permit to the Cloud Provider 
In addition to sending the control message to the user, thedata owner prepares a message
m
3
= {D-ID // U-ID // N 
u
// N 
  // ks // OP}
and sends a permit data access message =
{O-ID,{m
3
 // h (m3 // SC)
dc
}}
 
to the cloud provider
4.
 
Cloude Provider Sends the Encrypted Data to theUser 
Upon receiving the grant data access message,
{O-ID, {m
3
 // h (m3 // SC)}
dc
}, the cloud provider executes the followingsteps:
a)
 
 Decrypt the received message, using the symmetric secret key, dc, (that is relevant to O-ID) and obtain m
3
= {D-ID,U-ID // N 
u
// N 
 // ks // OP}, and h (m3 // SC).b)
 
Verify the format of D-ID from the decrypted message m
3
. If there is no match, the cloud provider terminates theconnection.
 
Otherwise, the cloud provider continues.c)
 
Compute h (m
3
 // SC)) and checks whether it equals thereceived h (m
3
 // SC)). If there is a match, the cloud  provider ensures the authenticity of the data owner.d)
 
 Extract ks from m
3
and prepare a message m
4
= {D-ID, U- ID // N 
u
// N 
 // OP // ENC {data}} XOR ks.e)
 
Send a message = {C-ID, m
4
 // h (m
4
 // ks)} to the user defined by U-ID, obtained from message m
3
 , as shown inFigure 1.
14http://sites.google.com/site/ijcsis/ISSN 1947-5500

You're Reading a Free Preview

Download
scribd
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->