• No results found

Secure Key Sharing towards Mobile Applications Secure Key Sharing towards Mobile Applications Secure Key Sharing towards Mobile Applications Secure Key Sharing towards Mobile Applications

N/A
N/A
Protected

Academic year: 2022

Share "Secure Key Sharing towards Mobile Applications Secure Key Sharing towards Mobile Applications Secure Key Sharing towards Mobile Applications Secure Key Sharing towards Mobile Applications"

Copied!
7
0
0

Loading.... (view fulltext now)

Full text

(1)

International Journal of Research in Information Technology International Journal of Research in Information Technology International Journal of Research in Information Technology International Journal of Research in Information Technology

(IJRIT) (IJRIT) (IJRIT) (IJRIT) www.ijrit.com

www.ijrit.com www.ijrit.com

www.ijrit.com ISSN 2001-5569

Secure Key Sharing towards Mobile Applications Secure Key Sharing towards Mobile Applications Secure Key Sharing towards Mobile Applications Secure Key Sharing towards Mobile Applications

Ujjwala Mhatre1, Sayli Nisal2,Manjusha Khade3 and Prof. Kanchan Doke4

1Sem VIII B.E, Mumbai University Computer Engineering, B.V.C.O.E Navi Mumbai, Maharashtra, India

mujjwala@yahoo.in

2Sem VIII B.E,Mumbai University Computer Engineering, B.V.C.O.E Navi Mumbai, Maharashtra, India

saylinisal31@gmail.com

3Sem VIII B.E,Mumbai University Computer Engineering, B.V.C.O.E Navi Mumbai, Maharashtra, India

manjusha612@ymail.com

4Sem Professor,Mumbai University Computer Engineering, B.V.C.O.E Navi Mumbai, Maharashtra, India

kanchankdoke@gmail.com

Abstract

Cloud is a platform where computing and software resources are provided “as a service” to external customers using Internet technologies. Cloud provides us the facility of storing as well as processing data online. Cloud computing has many economic advantages, but sensitive data of clients must be protected from untrusted cloud provider. Cloud provider may misuse sensitive data of client, thus securing data stored on cloud is of utmost importance. This paper proposes a key management scheme where encrypted key shares are given to the authorized users to prevent cloud provider from accessing the sensitive data of client. Android is the most widely used open source mobile operating system recently. This paper proposes a platform of connectivity between android application and cloud to provide easy access of data stored on cloud using android mobile device.

Keywords:Distributed systems, mobile computing, security, cryptography, scalability

1. Introduction

Cloud computing is an evolutionary latest model for distributed computing consisting of centralized data centers that provide resources for highly scalable units of computing. Cloud computing systems offer unlimited storage and processing for clients. However, we cannot always trust a cloud provider considering that we always have certain data that do not want to be seen by anyone, not even by cloud provider. Many clients are reluctant to implicitly trust a third-party cloud provider. Given that cloud applications are accessed by thousands of mobile device users, an encrypted cloud storage solution requires scalable key management.

Current key management practices typically focus on key generation and distribution among a large population of users. The primary concern is that as authorized users join and leave a system, current keys

(2)

must be re-generated and re-distributed to valid users, which is an unrealistic cost for mobile device users.

Some approaches suggest performing computationally-intensive key re-generation operations within the cloud to take advantage of its scalability, but these computations may prove too expensive in certain applications where processing overhead is undesirable [1]. This work suggests concentrating on the use of another asset of a cloud system. Its permanent replicated storage, which can scale according to client demand.

The key design factors that a cloud-based secure key sharing system has includes : no additional server-side logic is required on the cloud provider end; easy data access; highly scalable key sharing among multiple authorized users; minimal computation efforts required by mobile users; minimal communication is required with the cloud provider; and users do not need to trust existing cloud providers, in terms of the administrator having unrestricted full access to stored user data.

2. Literature Review

Various access control techniques have been available for encrypted file storage in the cloud. The cloud provider typically controls key management activities, or the data owner or a trusted proxy does so if the provider is untrusted, requiring additional network communication and components [4]. In some mechanisms where control rests within the domain of the client, such as cloud-based data re-encryption, the ability of the provider to scale for computation has been exploited by performing intensive cryptographic computation in the cloud [3]. This paper is based on guideline provide by NIST (National Institute of Standards and Technology) [5], it recommends secret sharing as a technique to be used to protect long-term credentials in its security definition for a CSP (Cloud Service Provider). Secret key sharing allows a secret such as key information to be divided into multiple shares [2]; these shares may be distributed among key generators using the concept of threshold decryption [6], or portions of a private key are distributed among users [7]. The challenge is that the client must assemble a key from multiple sources, potentially resulting in expensive communication overhead.

3. BASE IDEA

Cloud Computing is evolutionary new technology which offers IT to do more with the infrastructure that already exists, as well as adding new ways to expand capacity quickly and economically by using external cloud computing resources. Though Cloud offers unbounded storage and easy access to data it is not practically possible to trust existing cloud providers. Cloud is known to be secure from other users and data on cloud passes through a encrypted medium, but hiding and securing data from other users is of no use if we cannot protect our data from existing cloud providers.

The paper mainly deals with securing data from untrusted cloud providers. Paper also resolves the problem of limited key shares available for sharing data on cloud. A key management scheme is proposed where encrypted key shares are stored on cloud and automatically deleted based on passage of time or user activity. Android platform is a new generation of smart mobile phone operating system launched by Google. Android is a most widely used open source operating system used currently. An android application is developed for providing encrypted key shares to authorized users on cloud. Users can also access their data on cloud using this android application once they are authorized. This android application is connected to a private cloud.

4. Proposed Scheme

The below diagram gives the overview of the system. A private cloud is created which has an application server and database. This database offers nearly unbounded storage. This is the centralized database which stores all the data. This database of cloud acts as the backend of the whole system. An android application is developed which provides graphical user interface to the user. An android application is developed which provides graphical user interface to the user. It acts as the front end of the system. This android application is connected with cloud server database. Thus any user accessing data through android

(3)

application is verified by checking record in centralized database.The entire scenario can be conveniently express in form of diagram given below:

Fig 2. Three cases at receiver side of the proposed separable scheme.

Fig 2. Flow of execution

User- A user is any authorized person who wants to access and/ or upload the data. He has to be registered on database and be authorized by the cloud admin.

(4)

Admin: Admin is a person who possess all the rights to perform all the transactions on cloud. He has the right to authorize the users.

Database: Database acts as a backend of the system. It has all data stored that is stored on the cloud. It also has information regarding authorized users on cloud.

Cloud Hosting System: This system deals with key generation and sharing techniques. It generates encrypted key shares which will provide a solution to the problem of limited key shares to the data on cloud.

4.1 Main technique

Consider a technique based on Shamir’s secret sharing where U is set of users accessing the cloud, ΓU is list of subsets of U such that each subset is trusted, Utr is any trusted subset of parties, where Utr ∈ ΓU, t is threshold value where (t+1) or more parties in U can recover the secret, while any t or less cannot do so, therefore this secret sharing scheme is threshold-based scheme.

All symbolic notations are summarized in table I

Table no. 1: Symbolic notations

Symbol Description

Utr Authorized user set.

A,B,C Users Alice, Bob, and Charlie in Utr.

GenKey() Function to generate a random key of some predetermined length. K Symmetric data key.

KS[i] Share i of key K.

v[i] Version associated with a key share KS[i].

EKS[i] Encrypted key share i.

KS[i]hdr Metadata header for key share KS[i].

KS[i]dig Digest of key share KS[i].

EKS[i]hdr Signed metadata header.

Partition(K, i, n) Function to generate share i of key K, where n is the total number of shares.

Encrypty(x) Function to encrypt data x using key y.

Decrypty(x) Function to decrypt data x using key y.

Hash(x) Compute the digest of message x.

Reconstruct([z]) Function to reconstruct secret key from shares in array z[].

Compare(x, y) Function to perform a bitwise comparison of values x and y.

AK[i] Access key to unlock share KS[i].

M Plaintext of user data.

Mid Unique plaintext record identifier.

C Ciphertext of user data.

T The threshold number of key shares KS, above which (at t + 1 or greater), there is a sufficient number to compute K.

N The total number of key shares KS generated for a particular data record.

L A description key identifying the set of key shares eligible to decrypt c.

PKX Public key of user X.

SKX Private (secret) key of user X.

(5)

4.2 Encryption

Refer following algorithm:

1. Comment: Generate the data and access keys.

2. K ← GenKey() 3. for i ← 1 to n 4. do

i.KS[i] ← Partition(K, i, n) ii.AK[i] ← GenKey()

iii.EKS[i] = EncryptAK[i](KS[i]) iv.KS[i]dig = Hash(KS[i])

v.EKS[i]hdr ← EncryptSKA(mid i v[i]KS[i]dig) 5. comment: Encrypt the plaintext message

6. c ← EncryptK(m)

In the ENCRYPT operation user A, proceeds to generate key shares and encrypt a message m which is stored in the cloud and identified with a unique identifier mid. User A generates a symmetric key K and divides it into multiple shares KS[1] to KS[n], in which n is the current total number of shares, and a minimum t + 1 shares are required for decryption, where t + 1 ≤ n. Parameter t may be decreased or increased in value for a corresponding adjustment in the level of security and parameter n determines the number of users supported and the storage requirements for the shares.

After encryption each share KS[i] is become encrypted as EKS[i], using a symmetric encryption key AK[i]

of user A, known as an access key; it is also possible for the same access key AK[i] to protect multiple shares. The encrypted shares are stored in a key database in the cloud and cannot be read in plaintext form by the cloud provider, although they remain accessible for download by users for accessing data.

Unique record identifier of mid is assigned to the plaintext m, and that message encrypted by A as ciphertext c using K, is uploaded to the provider, and is stored in the cloud. Since the cloud provider cannot unlock any share stored in the key database, it is unable to decrypt c. To the ciphertext is appended a description key L identifying the set of key shares eligible to decrypt the data, of which only the threshold amount is required by any user.

4.3 Decryption

User B, wishes to access ciphertext, and so he executes the following DECRYPT operation. For decryption refer following algorithm:

Comment: Reconstruct the data key.

1.for i ← 1 to t + 1 2.do

i.KS[i] ← DecryptAK[i]EKS[i]

ii.KS[i]hdr←DecryptPKAEKS[i]hdr

iii.Compare(Hash(KS[i]),KS[i]hdr.KS[i]dig)) 3.K ← Reconstruct(KS[1, .., (t + 1)])

4.comment: Decrypt the plaintext message.

5.m ← DecryptK(c)

(6)

Suppose that B is an authorized member of Utr obtains symmetric access keys AK[x] to AK[y] from A, where the range of keys is of at least size t + 1, the required threshold.

A description key L is required to convert ciphertext to plaintext. Authorized user will get description key for accessing plaintext.

4. GUI Model

Fig.3 GUI model

4. Conclusions

In this paper, we have discussed some issues related to security of data stored on cloud. We have also proposed some techniques to secure data on cloud from cloud providers. We have proposed a key management scheme to overcome the drawback of limited key shares to data stored on cloud. Connectivity between android application and cloud is demonstrated for easy access of data stored on cloud through mobile application

5. Acknowledgments

Sincere appreciation and warmest thanks are extended to the many individuals who in their own ways have inspired us in the completion of this project. Firstly we are thankful to our principle Dr. M. Z. Shaikh for his help. We are extremely grateful for his friendly support and professionalism. We express our heartfelt gratitude to our head of department Prof. D. R. Ingle and our project coordinator Prof. B. W. Balkhande for their help and support. This task would not have been possible without the help and guidance of our project guide Prof. Kanchan Doke. We are also convening special thanks to all staff of Computer Engineering department for their support and help. Last but not least, we are very much thankful to our friends who directly or indirectly helped us in completion of the project report.

(7)

6. References

[1] Piotr K. Tysowski and M. Anwarul Hasan, “Cloud-Hosted Key Sharing Towards Secure and Scalable Mobile Applications in Clouds”, 2013

[2] Shamir, “How to share a secret,” Commun. ACM, vol. 22, no. 11,pp. 612–613, Nov. 1979.

[3] P. Tysowski and M. A. Hasan, “Towards Secure Communication for Highly Scalable Mobile Applications in Cloud Computing Systems,” Centre for Applied Cryptographic Research, University of Waterloo, Tech. Rep. CACR 2011-33, 2011

[4] S. Jahid, P. Mittal, and N. Borisov, “EASiER: encryption-based access control in social networks with efficient revocation,” in Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, ser. ASIACCS ’11. New York, NY, USA: ACM, 2011, pp. 411–

415.

[5] W. E. Burr, D. F. Dodson, E. M. Newton, R. A. Perlner, W. T. Polk, S. Gupta, and E. A. Nabbus,

“Electronic Authentication Guideline,” National Institute of Standards and Technology (NIST), Tech. Rep. Special Publication 800-63-1, December 2011.

[6] D. Boneh and M. Franklin, “Identity-based encryption from the weil pairing,” in Advances in Cryptology — CRYPTO 2001, ser. Lecture Notes in Computer Science, J. Kilian, Ed. Springer Berlin / Heidelberg, 2001, vol. 2139, pp. 213–229.

[7] J. Baek and Y. Zheng, “Identity-Based Threshold Decryption,” in Public Key Cryptography – PKC 2004, ser. Lecture Notes in Computer Science, F. Bao, R. Deng, and J. Zhou, Eds. Springer Berlin / Heidelberg, 2004, vol. 2947, pp. 262–276.

References

Related documents

The Road is a seminal novel within the genre, and Cormac McCarthy is a major.. novelist exploring and refining

Our title derives from a nick- name given to Grant by his former students: the ‘‘King- pin.’’ Grant’s research career (and research students) can be roughly divided into

Culture 24 weeks Decrease in area of nail visually affected measured with the Onychomycosis Severity Index (OSI) and negative cultures... Hees et al. short pulse) on each hallux

ft583 pdf Regulation and activity of JNK signaling in the wing disc peripodial membrane during adult morphogenesis in Drosophila CHATURVEDULA TRIPURA*,1, NULU PRAFULLA CHANDRIKA1,

Layout 1 CUAJ ? October 2009 ? Volume 3(5Suppl3) S161 P85 Temporal Stage and Grade Migration in Surgically Treated Patients with Upper Urinary Tract Transitional Cell Carcinoma

effect.” Specifically, the incentives that players face diverge in the middle of the season because the player who has early success (was lucky) in the first tournament of the

obtained results of the average particle size, it can be stated that the ZnO, ZnO+0.1%Ag, ZnO+1%Ag and ZnO+10%Ag samples underwent agglomeration and sedimentation pro- cesses during