You are on page 1of 37

SECURITY ANALYSIS AND AUDITING FOR

BILINEAR AGGREGATE SIGNATURE IN


CLOUD COMPUTING

Guided by, submitted by,


ABSTRACT
 Data sharing is an important functionality in cloud storage. the invention of cloud computing and

mobile phone based applications, secure data transmission is the pressing need for a real time

perspective of the technologies. For Example, users can download the encrypted data from the

storage, decrypt them, then send them to others for sharing, but it loses the value of cloud

storage.

 Examples of the need for secure key management and distribution environments include secure

transmission of health related SMS, telecare medicine provisioning for critical applications.

 The process of generating, distributing and maintaining the cryptographic keys is taken care by

key management schemes.

 We describe new public-key cryptosystems and Key-aggregate that produce Secure transmission
INTRODUCTION

 Cloud storage has emerged as a promising solution for providing ubiquitous,


convenient, and on-demand accesses to large amounts of data shared over the Internet.
Security is one of the major issues which reduces the growth of cloud computing and
complications with data privacy.

 To address user’s concerns over potential data leaks in cloud storage, a common
approach is for the data owner to encrypt all the data before uploading them to the
cloud, such that later the encrypted data may be retrieved and decrypted by those who
have the decryption keys. Such cloud storage is often called the cryptographic cloud
storage.
EXISTING SYSTEM

 EXISTING ALGORITHM: Searchable symmetric encryption schemes


 To improve feasibility and save on the expense in the security paradigm, it is preferred to
get the information retrieval result with the most relevant keys that match users interest
instead of all the keys, which indicates that the keys should be ranked in the order of
relevance by users interest and only the keys with the highest relevance are selected by the
users.
DISADVANTAGES

 Long computational time which makes the computation slow.


 The costs and complexities involved generally increase with the number of the
decryption keys to be shared.
 The encryption key and decryption key are different in public key encryption.
An Energy-Efficient Clustering Routing Attribute-Based
Encryption

Attribute-Based Encryption (ABE) is a new paradigm where such policies are specified and
cryptographically enforced in the encryption algorithm itself.

ADVANTAGE
 More secure

DISADVANTAGE
 High transmission overhead
Extensive Survey on Usage of Attribute Based
Encryption in Cloud

ABE is key strength, enabling users to have a stronger encryption, than other encryption.
Cryptanalysis has revealed that the complexity of the algorithm is of good order and cannot be
made vulnerable.

ADVANTAGE
 Decryption and user revocation efficiency.

DISADVANTAGE
 Low computational capability
Improved Proxy Re-encryption Schemes with
Applications to Secure Distributed Storage

Re-encryption schemes that realize a stronger notion of security and demonstrate the
usefulness of proxy re-encryption as a method of adding access control to a secure file
system.

ADVANTAGE
 re-encryption schemes that offer security improvements over earlier approaches.

DISADVANTAGE
 Storage capacity is low.
Attribute-Based Encryption for Fine-Grained Access
Control of Encrypted Data

Sensitive data is shared and stored by third-party sites on the Internet, there will be a
need to encrypt data stored at these sites. One drawback of encrypting data, is that it can be
selectively shared only at a coarse-grained level. Here develop a new cryptosystem for fine-
grained sharing of encrypted data that we call Key-Policy Attribute-Based Encryption.
ADVANTAGE:
 Avoid packet loss.

DISADVANTAGE:


High energy consumption.
Hierarchical Attribute-Based Encryption for Fine-
Grained Access Control in Cloud Storage Services

Hierarchical identity-based encryption (HIBE) system scheme to help enterprises to efficiently share
confidential data on cloud servers. We achieve this goal by first combining the cipher text-policy
attribute-based encryption (CP-ABE) system and proxy re-encryption.

ADVANTAGE:
 High collusion resistant

DISADVANTAGE:
 Low computational capabitity.
Cipher text-Policy Attribute-Based Encryption:
An Expressive, Efficient, and Provably Secure Realization
Cipher text-policy attribute-based encryption (CP-ABE), as one of the most promising encryption systems in this field,

allows the encryption of data by specifying an access control policy over attributes, so that only users with a set of attributes

satisfying this policy can decrypt the corresponding data. .

ADVANTAGE:

Node
 share private data using secret key.

DISADVANTAGE:

High
 storage capacity.
Polynomial-based key management for secure intra-group
and inter-group communication

Secure group communication has become an important issue in many applications. Both intra-group and inter-group

multicast traffic must be protected by shared secret keys. 

METHODOLOGY

Polynomial-based
 key management scheme

ADVANTAGE

Group
 members and the group controller can share the intra-group key without any encryption/decryption.

DISADVANTAGE

Central
 mechanism is implicated in generating, dispensing, re-keying, and providing access control for every group, it

is regularly accessed.
Efficient group Diffie–Hellman key agreement protocols
Secure group communication has become an important issue in many applications. Both intra-group and inter-group multicast traffic

must be protected by shared secret keys. 

METHODOLOGY

Authenticated
 group Diffie–Hellman (GDH) key agreement protocols are used.

ADVANTAGE

GDH
 key agreement protocols are based on the secret sharing.

Solution
 is efficient, robust and secure.

DISADVANTAGE

Communication
 complexity.

Computation
 overhead.
An efficient secure communication for healthcare system
using wearable devices
The messages are sent in a computationally efficient way and the experimental results confirm

that the proposed work ensures end-to-end security with lower computational and communication overheads.

METHODOLOGY

Short
 Message Service scheme

ADVANTAGE

An
 efficient multicast SMS alert system has been proposed to help the heart patients.

An
 attack resistant end-to-end secure SMS alert system is ensured from patient to the doctor, relative, ambulance and hospital.

DISADVANTAGE

Cellular
 networks do not provide confidentiality, authentication and end-to-end security
Computationally efficient privacy preserving anonymous
mutual and batch authentication schemes for vehicular ad
hoc networks
The concept of intelligent transportation system is developed to manage the traffic of the city, where Vehicular Ad-

hoc Network (VANET) is used to provide road safety.

METHODOLOGY

A password-based
 CPPA and group-key agreement (PW-CPPA-GKA) protocol is used for VANETs.

ADVANTAGE

It
 takes Computation cost for authentication message generation and verification phases.

Better
 efficiency and performance.

DISADVANTAGE

It
 is very difficult to control and manage the city traffic.
A robust and efficient password-based conditional privacy
preserving authentication and group-key agreement protocol
for VANETs

This Internet connection can provide facility to other vehicles to send traffic related messages,
collisions, infotainment messages other useful safety alerts. 

METHODOLOGY
A NETs will also make use of short-distance communication methods, such as Dedicated Short-
Range Communications (DSRC) and Wireless Fidelity (Wi-Fi).

ADVANTAGE
Data integrity to messages which is suitably required for VANETs.

DISADVANTAGE
High computational cost.
An Efficient Certificateless Encryption for Secure
Data Sharing in Public Clouds

The proposed mCL-PKE scheme without pairing operations and provided its formal security. Our mCL-PKE

solves the key escrow problem and revocation problem.

METHODOLOGY

Mediated
 certificateless public key encryption (mCL-PKE)

ADVANTGAE

Assure
 the confidentiality of data stored in public clouds while enforcing access control requirements

DISADVANTAGE

Here
 could not solve the key revocation problem. In public key cryptography, we should consider scenarios

compromised.
CL-PRE: a Certificateless Proxy Re-Encryption
Scheme for Secure Data Sharing with Public Cloud
 The proposed new construction for certificateless proxy re-encryption scheme and give the

corresponding security model. The scheme has chosen plaintext security in the random oracle

model assuming the Decisional Bilinear Diffie-Hellman problem is difficult.

METHODOLOGY

 CL-PRE, a certificateless proxy re-encryption scheme for secure data sharing with public

cloud.

ADVANTGAE

 CL-PRE schemes and evaluate their security and performance

DISADVANTAGE
Incremental proxy re-encryption scheme for mobile
cloud computing environment
 The proposed incremental proxy re-encryption scheme and compared with the existing proxy re

encryption scheme on the basis of turnaround time, energy consumption, CPU utilization, and

memory allocation on the mobile device.

METHODOLOGY

 Incremental version of proxy re-encryption scheme

ADVANTGAE

 Energy consumption, CPU utilization, and memory consumption Security operations on mobile

device.

DISADVANTAGE

 Encryption and decryption, are executed using the limited computational power of mobile device.
Efficient and Provably-Secure Group Key Management
Scheme Using Key Derivation
 The proposed efficient and provably secure GKM scheme using key derivation The scheme is
suitable in practical scenarios with frequent group key updates. They have an efficient rekey
mechanism for a reconnected member who may miss group key updates in his off-line period.

METHODOLOGY
 RSA-based GKM scheme.
 Efficient and provably-secure GKM scheme using the key derivation method

ADVANTGAE
 Secure based on the pseudorandom function family assumption and one-way property of a hash
function

DISADVANTAGE
 A member does not update the keys assigned to him after he joined the system.
Security and privacy for storage and computation in cloud
computing
 The proposed SecCloud, a privacy-cheating discouragement and secure-computation auditing

protocol 560 for data security in the cloud. To the best of our knowledge, it is the first work that

jointly considers both of data storage 561 security and computation auditing security in the cloud.

METHODOLOGY

 privacy cheating discouragement and secure computation auditing protocol

ADVANTGAE

 Better effectiveness

 and efficiency

DISADVANTAGE

 it did not support public auditability.


PROPOSED SYSTEM
 In Cloud Storage there is an important functionality called Data Sharing, but the
query always present in every one’s mind is how to securely, efficiently, and flexibly
share data with others in cloud storage.
 In the Proposed Approach, by utilizing public key based homomorphic authenticator
with random masking privacy preserving public auditing can be achieved. The
technique of bilinear aggregate signature is used to achieve key auditing. Key
auditing reduces the computation overhead.
 key-aggregate encryption scheme and proves its security in the standard model. The
main thought of the scheme lies in constructing the ciphertext and the private key. 
 The performance and security analysis shows that the proposed protocol is secure and
performs better in terms of computation cost.
ADVANTAGES

 Reduce the computation overheads.


 Secure and performs better in terms of computation cost.
 The extracted key have can be an aggregate key which is as compact as a
secret key for a single class.
 The delegation of decryption can be efficiently implemented with the
aggregate key.
SYSTEM ARCHITECTURE DIAGRAM
Select the data to Encrypt the data into
user apply security unreadable format

Structuring the Hint text,


plain text into Encryption
server securable format key

Sent the dynamic


Select the password to the user
Process
encrypted data mail
Hint Text
to decrypt

Decrypt Processing inputting


the data password

Data Decrypted
Stop the user to
proceed for further
BLOCK DIAGRAM

Cloud

Upload to cloud

Download encrypt content


Key generate and encrypt
content

Generate secure key and send


User 1 User 2

Decrypt content
Using secure key
DATAFLOW DIAGRAM
User
Upload to cloud

Upload Download

Key generates and Download encrypt


encrypts content content

secret Key

Decrypt content
Using secret key
USE CASE Diagram
SQUENCE DIAGRAM
ACTIVITY DIAGRAM
MODULES
MODULES

System Model
Key Generation
Encryption
Aggregate Key Transfer
System Model:

 Data Owner: In this module we executed by the data owner to setup an account on
an untrusted server. On input a security level parameter 1 λ and the number of
ciphertext classes n (i.e., class index should be an integer bounded by 1 and n), it
outputs the public system parameter param, which is omitted from the input of the
other algorithms for brevity.
Key Generation

 Public-key cryptography, also known as asymmetric cryptography, is a class


of cryptographic algorithms which requires two separate keys, one of which
is secret (or private) and one of which is public. Although different, the two
parts of this key pair are mathematically linked.
Encryption

 Encryption keys also come with two flavours symmetric key or asymmetric
(public) key. Using symmetric encryption, when Alice wants the data to be
originated from a third party, she has to give the encrypted her secret key;

obviously, this is not always desirable.


Aggregate Key Transfer:
A key-aggregate encryption scheme consists of five polynomial-time
algorithms as follows. The data owner establishes the public system
parameter via Setup and generates a public/master-secret key pair via

KeyGen.
REFERENCES
C. Zhang, B. DeCleene, J. Kurose, and D. Towsley"Comparison of inter-area
rekeying algorithms for securewireless group communications," Performance
Evaluationvol. 49, pp. 1-20, 9//.
M. Kellil, Olivereau, J. C. A., and P. Janneteau, "Rekeyingin secure mobile
multicast communications," United StatesPatent Application Publications.
L. M. Kiah and K. M. Martin, "Host Mobility Protocol forSecure Group
Communication in Wireless MobileEnvironments," in Future Generation
Communication andNetworking.
THANK YOU

You might also like