Impregnable Cloud Storage using Surrogate Twofold Encryption Technique (STET) in Cloud

Jump To References Section

Authors

  • Research & Development Centre, Bharathiar University, Coimbatore, Tamil Nadu ,IN
  • Department of Computer Applications, Chikkanna Government Arts College, Tirupur, Tamil Nadu ,IN

DOI:

https://doi.org/10.15613/sijrs/2015/v2i2/114285

Keywords:

Arbituary Access Control, Encrypting Algorithm, Flag Set, Identity Based, Service Provider, Surrogate Twofold Encryption Technique (STET), Triple Layer Protection.

Abstract

Privacy and security in cloud computing has becoming a challenging task where several techniques used by existing security based only on perimeter level. When an obtrude tries to hack the formatted encryption scheme protected by service provider they could not be hacked. However the data insecurity has no solution to the large extent though the entire process provided by the service provider may not always as right as cloud is a public entity. In our proposed, we enhance several algorithmic techniques chosen randomly applied for the cloud efficient storage and security. There are different service model and distribution model the organization use in cloud and they report the efficiency and correctness of data. The techniques emphasizing authorization models are Surrogate Twofold Encryption Technique (STET). The data from main database (owner’s data) stored in cloud by transferring data contents into a substitute system and encrypting the original data in surrogate system, and then data is re-encrypted inside the cloud thus forming a triple layer protection for the database stored in cloud. Moreover, in arbitrary access control the security enhanced can randomly choose any two encryption technique from four cryptographic algorithms. Those two algorithms selected will be known only to their corresponding system encrypting it. Thus it passes twofold encryption methods and for decrypting it also it needs to pass this twofold decryption method. A flag set synchronized for accessing arbitrary choice of algorithms which promotes a secured algorithmic encryption. To make it more complex, the ciphered information stored in cloud is visible and known only to their corresponding system or well-known authorized user can view or use the data.

Downloads

Published

2015-12-01

Issue

Section

Computer Science

 

References

Sahai A., Waters B., “Fuzzy identity-based encryptionâ€, Eurocrypt, 2005.

Goyal V., Pandey O., Sahai A., Waters B., “Attribute-based encryption for fine-grained access control of encrypted dataâ€, ACM Conference on Computer and Communications Security, 2006.

Bethencourt J., Sahai A., Waters B., “Ciphertext-policy attribute-based encryptionâ€, IEEE Symposium on Security and Privacy, 2007.

Waters B., “Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realizationâ€, Public Key Cryptography, 2011.

Sahai A., Seyalioglu H., Waters B.,“Dynamic credentials and ciphertext delegation for attribute-based encryptionâ€, Crypto, 2012.

Hohenberger S., Waters B., “Attribute-based encryption with fast decryptionâ€, Public Key Cryptography, 2013.

Tysowski P.K., Hasan M.A., “Hybrid attribute- and reencryption- based key management for secure and scalable mobile applications in cloudsâ€, IEEE T. Cloud Computing, p. 172–186, 2013.

Wired., Spam suspect uses google docs; fbi happy. 2014. Available: http://www.wired.com/2010/04/cloud-warrant/.

Wikiped‑ia. Global surveillance disclosures. 2014. Available: http://en.wikipedia.org/wiki/Global surveillance disclosures (2013-present)

Snowden E., Available: http://en. wikipedia.org/wiki/ Edward Snowden

Lavabit. Available: http://en.wikipedia. org/wiki/Lavabit

Canetti R., Dwork C., Naor M., Ostrovsky R., “Deniable encryptionâ€, Crypto, 1997.

Lewko A.B., Okamoto T., Sahai A., Takashima K., Waters B., “Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryptionâ€, Eurocrypt, 2010.

Attrapadung N., Herranz J., Laguillaumie F., Libert B., Panafieu E De, Afols C.R., “Attribute-based encryption schemes with constant-size ciphertextsâ€, Theor Comput. Sci., vol. 422, 2012.

Murmuth M.D.,Freeman D.M., “Deniable encryption with negligible detection probability: An interactive constructionâ€, Eurocrypt, 2011.