You are on page 1of 3

International Journal on Recent and Innovation Trends in Computing and Communication

Volume: 3 Issue: 2

ISSN: 2321-8169
866 - 868

_______________________________________________________________________________________________

Secure Digital Content Management On Cloud


Aditi A. Mehta1, Rakhi N. Bhagat2, Harshit N. Chheda3, Smit N. Sanghani4
Computer Department,
K. J. Somaiya College of Engineering,
Mumbai, India.
1
aditi.mehta@somaiya.edu, 2rakhikumari.b@somaiya.edu, 3harshit.c@somaiya.edu, 4smit.s@somaiya.edu
AbstractCloud Computing is one of the new emerging technologies in todays world. With increase in use of services available with different
cloud infrastructures, it is very important to have secure access to confidential data shared over cloud. This can be achieved using Digital Rights
Management (DRM) along with the established cryptographic mechanisms to curb illegal access to the content without its owners knowledge.
In this paper, it is our approach to propose some method to have a secure digital content management on cloud.
Keywords- Digital Rights Management, Geo-Encryption, Cloud, Cryptography.

__________________________________________________*****_________________________________________________
I.

INTRODUCTION

Cloud Computing is the recent evolving computer


technology based on the utilization of available computing
resources. Cloud computing involves deployment of group of
remote servers and software network that allows centralized
data storage. It can be easily accessed online to computer
services and resources anywhere around the globe.
Digital rights management is an attempt to provide remote
control over digital content. A simple DRM architecture
consists of various set of usage permissions which can be seen
in figure below. It consists of rights, constraints and
obligations. In this paper, we attempt on allowing data access
to users by giving them rights and setting constraints like time
and location. We have adopted cryptography to control and
restrict the use of digital media. The cryptographic method
that we have proposed is Geo-Encryption [7].

is cloud infrastructure whose services are only used for


organizations. A hybrid cloud is combination of two or more
clouds [6].
B. Concept of Geo-Encryption
The concept of Geo Encryption was first conceptualized by
Logan Scott and Dorothy .E. Denning. In this process, the
sender acquires the location of the receiver using out of band
means. It is used along with the random key and time as a
parameter (on what time the receiver should be able to access
the file meant for him) to form Geo key, also known as Geo
tag to encrypt the plain text. This Geo key is used by the
receiver to decrypt the cipher text sent by the sender [2].
C. Major Cloud Computing Challenges
Since cloud computing offers various options for great
communication, it also faces some security challenges.
Following are some challenges faced:
1) Employee Access:
Employees of the organization may pose a threat if by any
chance they gain access to the confidential information related
to the organization's networks and systems.
2) Managing Identity:

Figure 1: Simple DRM Architecture

II.

LITERATURE SURVEY

Organizations are more concerned about sensitive data,


confidential and unauthorized access to the resources on cloud.
Also, the authentication framework of the users in cloud
computing still does not have any established methods.

A. Cloud
Clouds can be classified as public clouds, private clouds or
hybrid cloud. A public cloud is cloud infrastructure whose
services are open to public use over a network. A private cloud
866
IJRITCC | February 2015, Available @ http://www.ijritcc.org

_______________________________________________________________________________________

International Journal on Recent and Innovation Trends in Computing and Communication


Volume: 3 Issue: 2

ISSN: 2321-8169
866 - 868

_______________________________________________________________________________________________
3) Controlling the access of users:
Access control means keeping the data inaccessible to
unauthorized users. Access control is generally based on the
identity and leads to user's identity validation [1].
III.

PROPOSED SYSTEM

Consider Alice and Bob want to share some confidential


information within them using secure mechanism such as
cryptographic methods over Cloud. Alice is sender of
encrypted text while Bob is receiver of it.

3) The Geo key is combination of EXOR operation


of random key and the values of position and time of
the receiver.
4) Alice then assumes that Bob might not be able to
access the encrypted file at the mentioned exact time,
hence gives some time range interval to a Web
Service so that Bob can access it in that time interval
otherwise not.
(For example If the time mentioned to access the
file is 12 pm exactly, the Alice can give time range of
12 pm to 12:30 pm in which Bob can access the file.
If this time elapses, then he wouldnt have the access
to the mentioned file.)
5) The encrypted file is then uploaded on the Cloud by
Alice.
6) The Random key is shared by Alice to Bob using
Secure Socket Layer (SSL) methods.
7) When Bob tries to decrypt the encrypted text, the
Web Service Program captures the location and time
parameters of his current location.
8) If the position and time interval matches with the
information fed by Alice, the location and time
parameter along with the random key (fed by Bob
while decrypting the file) forms the Geo - key and
can decrypt the file using the same decryption
algorithm that Alice had used for encryption. If the
parameters do not match with the fed data by sender,
the file is inaccessible to the receiver.
9) The mechanism of Web Service is used by sender to
ensure that the receiver does not fool him on any
instance of the said process.

Figure 2: Diagram of Proposed system


Following is the sequence order of events to take place
according to our proposed model:
1) Using out of band means, Alice gets the Position
(Latitude and Longitude Co ordinates) of Bob and
Time (HH) at which Bob is supposed to get the
access to the encrypted file (i.e. cipher text) which
can be mutually agreed by them.
2) Now, Alice encrypts the confidential information (i.e.
Plain Text) using some standard established
symmetric cryptographic algorithm with Geo key.

Figure 3: Use Case Diagram of Proposed Model

867
IJRITCC | February 2015, Available @ http://www.ijritcc.org

_______________________________________________________________________________________

International Journal on Recent and Innovation Trends in Computing and Communication


Volume: 3 Issue: 2

ISSN: 2321-8169
866 - 868

_______________________________________________________________________________________________
Since, one of the most challenging issues in cloud computing
is of digital data security, we use the concept of Geo
Encryption to protect our important data. It also adds new
level of security to the existing system of security.
VI.

ACKNOWLEDGEMENT

Through this acknowledgment, we express our sincere


gratitude to all those people who have been associated with
this research paper and have helped us with it and made it a
worthwhile experience. We extend our thanks and
acknowledge the contributions of Prof. Deepak Sharma for his
endless support, motivation and guidance throughout this
research. We also thank our college K. J. Somaiya College Of
Engineering, Vidyavihar for providing the necessary tools,
infrastructure and platform for doing this research.
VII. REFERENCES
[1]

Meer Soheil Abolghasemi, Mahdi Mokarrami Sefidab,


Reza Ebrahimi Atani,
Using Location Based
Encryption to Improve the Security of Data Access in
Cloud Computing, International Conference on
Advances in Computing, Communications and
Informatics (ICACCI), 2013, pp 261 - 265

[2]

Logan Scott, Dorothy E. Denning, A Location Based


Encryption Technique and Some of Its Applications,
ION NTM, 2003, pp 734 - 740.

[3]

D. Qiu, "Security Analysis of Geoencryption: A Case


Study using Loran", Proceeding of ION GNSS, 2007, pp
824 - 831.

[4]

D. Qiu & Sherman Lo & Per Enge & Dan Boneh,


Geoencryption Using Loran, Proceeding of ION NTM
2007.

[5]

Rohollah Karimi, Mohammad Kalantari, Enhancing


security and confidentiality in location-based data
encryption algorithms, unpublished.

[6]

www.wikipedia.com

[7]

Deven N. Shah Mark Stamps Information Security


Principles and Practice.

Figure 4: Sequence Diagram of the Proposed Model


IV.

APPLICATIONS

The above mentioned proposed model can be used in


following scenarios:
In banking industry, confidential financial matters
can be discussed using above proposed model.
In Government Organizations, top security matters
and highly confidential files can be saved from
leaking into public.
In Military Organization as well as in Defense it is
very fruitful for them to save secret data and missions
from terrorists.
In Education System, the central authority of
examinations can use this system to distribute
question papers without leaking them to the students
using unfair means.
V.

FUTURE WORK AND CONCLUSION

The proposed model can be used for many digital contents


such as text, images, videos and audio.
For future the proposed system can be redesigned to support
all file formats of the mentioned digital content.

868
IJRITCC | February 2015, Available @ http://www.ijritcc.org

_______________________________________________________________________________________

You might also like