Sie sind auf Seite 1von 3

International Journal of Computer Trends and Technology (IJCTT) volume 11 number 3 May 2014

ISSN: 2231-5381 http://www.ijcttjournal.org Page 102



Improved Authentication Scheme for Dynamic
Groups in the Cloud

M. TamilSelvan
#1
, M. Newlin Rajkumar
*2

M. TamilSelvan
#1
PG Scholar
Department of Computer Science and Engineering
Regional Center of Anna University Coimbatore
Coimbatore, Tamil Nadu, India
9943285999
M. Newlin Rajkumar
*2
Assistant Professor
Department of Computer Science and Engineering
Regional Center of Anna University Coimbatore
Coimbatore, Tamil Nadu, India
9952153334

Abstract Nowadays, most of the organizations managing data
to the cloud such that an active member of the group can able to
share data with other members of the group. Because of its
insecure nature, we propose Initiator which acts as the
middleware between the group manager and the data owners for
providing versatile authentication mechanism. The initiator
sends a key generation request to Group manager [1] with a list
of group members. Key confidentiality is provided by
INITIATOR due to the security feature of a data sharing
scheme. The vulnerabilities that may be exploited by attackers
are reduced and the security analyses prove that the middleware
is secure.

Keywords IAS, Key Generation Centre, Group Manager,
Intruders, Security.
I. INTRODUCTION
Cloud computing technology is a network based
technology which performs the delivery of computing as a
service, whereby computers and other devices can share
resources, software, and information. Irrespective of the
physical location and configuration of the systemthat delivers
the services the cloud can provide data access, software,
computation and storage services.. The era of Cloud
Computing has been started and its impacts are growing by
several trends, Which is an adaptive technology based on
internet and use of computer based technology. Transforming
data is a main activity, performed in huge scale with a help of
cheaper and powerful processors, along with service
architectures. Dependable, yet flexible network connections
make it even possible that users can now subscribe high
quality services fromdata and software that reside solely on
remote trusted centres. The convenient factor about Cloud
Computing Technology is the users can move data into it
directly at any time without having much worries about the
complexities of direct hardware management. The well known
examples of Cloud Computing vendors are, Amazon Simple
Storage Service (S3) and Amazon Elastic Compute Cloud
(EC2). Both of these internet-based online services do provide
huge amounts of storage space and customizable computing
resources; this eliminates the responsibility of local machines
for data maintenance. As a result, integrity of data will be
achieved. Although the infrastructures are much more
powerful and reliable than personal computers, attacks from
both internal threats and external threats for the integrity of
data still exist. Failures and losses are obvious. The cloud
service providers (CSP) to behave unfaithfully towards the
cloud users regarding the status of their outsourced data.
Sometimes CSP may discard rarely accessed data without
being detected in a timely fashion. In order to maintain
Clouds reputation CSP may try to hide data loss. So lack of
data integrity and availability exist. To achieve the clouds
confidentiality, data integrity and availability and enforce the
quality of cloud storage service varies design strategies has to
be followed to enable on-demand data correctness verification
on behalf of cloud users. For the purpose of data integrity
users no longer have physical possession of data in the cloud.
Hence, verification of data correctness has to be done
explicitly. Coming to the systemdesigning as a third party
data warehouse the data can be frequently updated, which
supports for cloud storage correctness assurance. Thus the
power of cloud computing rely on powerful data centres
which are available in distributed, simultaneous and highly
cooperated manner. As an individual, cloud allows storing
their data redundantly across multiple physical servers in
order to achieve integrity. Hence, robust and secure cloud
storage systems for correctness of data will be achieved.
However, the remote data integrity is not fully achieved.
Recent different systemand security models are implemented
to provide remote data integrity. Without possessing local data
to ensure the storage correctness these techniques are much
needed. On the other side these techniques may be useful for
International Journal of Computer Trends and Technology (IJCTT) volume 11 number 3 May 2014
ISSN: 2231-5381 http://www.ijcttjournal.org Page 103

QoS testing, but does not guarantee the data availability in
case of server failures. It is a straightforward approach to
multiple server environments; the verification process would
be linear to the number of servers. As a complementary
approach, researchers have also proposed distributed protocols
for ensuring storage correctness distributed storage. However,
these schemes are all focusing on static or repository data. As
a result, their capabilities of handling dynamic data remains
unclear, which inevitably limits their full applicability in
cloud storage scenario. In this paper, we propose an effective
and flexible distributed storage verification scheme with
explicit dynamic data support to ensure the correctness and
availability of users data in the cloud. More data integrity and
confidentiality is achieved.

II. PROPOSED SYSTEM
To achieve secure data sharing for dynamic groups in the
cloud, we address the issues by an inside attacker in the cloud
who may store and share a mendacious information to derive
substantial benefits. Therefore to fight against inside attack
the members should be able to reveal the identity of data
owners. For this we have used an advanced authentication
scheme in our proposed model such that to provide a
randomly generated sessionID as a group signature key [6][7]
for each member of the group in order to perform data
operations such as update and delete the data other then the
data owner. This task is handled by an initiator that sends a
key generation request to group manager with a list of group
members. The initiator provides secure key sharing among
different members in the group and also high confidentiality is
achieved. The initiator provides advanced authentication
scheme for the group members rather than traditional
authentication scheme such as username and password. The
Improved Authentication Scheme (IAS) is illustrated in the
Fig. 1.


In the cloud, user revocation can be achieved without
involving the participation of remaining users. Data or keys
are revocated in the cloud frequently depending upon the kind
of data owners identity and the data to be stored in the cloud.
The remaining users need to update their private keys after
each revocation. The new granted users have to know the
content of the data file stored in the cloud before their
participation without the knowledge of the data owner.


Thus, through this advanced authentication scheme we can
achieve improved security goals including access control and
data confidentiality.


Fig. 1. Proposed SystemModel.

III. PERFORMANCE EVALUATION
The proposed model increases the security of dynamic
groups in the cloud in the means of Digital Signature. The
experimental result of Digital Signature generation is shown
in Fig. 2.


Fig. 2. Execution Time Evaluation.
IV. CONCLUSIONS
In this paper, we design an improved authentication
scheme, IAS for dynamic groups in a cloud. It provides an
Advanced Authentication technique for group members by
initiator rather than traditional authentication such as
username and password. Secure key sharing and more data
confidentiality is achieved.


International Journal of Computer Trends and Technology (IJCTT) volume 11 number 3 May 2014
ISSN: 2231-5381 http://www.ijcttjournal.org Page 104

REFERENCES
[1]. Xuefeng Liu, Yuqing Zhang, Member, IEEE, Boyang Wang, and
J ingbo Yan, Mona: Secure Multi-Owner Data Sharing for
Dynamic Groups in the Cloud, IEEE TRANSACTIONS ON
PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 24, NO. 6,
pp. 1182-1191 J UNE 2013.
[2]. S. Yu, C. Wang, K. Ren, and W. Lou, Achieving Secure, Scalable,
and Fine-Grained Data Access Control in Cloud Computing, Proc.
IEEE INFOCOM, pp. 534-542, 2010.
[3]. R. Lu, X. Lin, X. Liang, and X. Shen, Secure Provenance: The
Essential of Bread and Butter of Data Forensics in Cloud
Computing, Proc. ACM Symp. Information, Computer and
Comm. Security, pp. 282-292, 2010.
[4]. B. Wang, B. Li, and H. Li, Knox: Privacy-Preserving Auditing for
Shared Data with Large Groups in the Cloud, Proc. 10th Intl
Conf. Applied Cryptography and Network Security, pp. 507-525,
2012.
[5]. C. Wang, Q. Wang, K. Ren, and W. Lou, Privacy-Preserving
Public Auditing for Data Storage Security in Cloud Computing,
Proc. IEEE INFOCOM, pp. 525-533, 2010.
[6]. D. Chaumand E. van Heyst, Group Signatures, Proc. Intl Conf.
Theory and Applications of Cryptographic Techniques
(EUROCRYPT), pp. 257-265, 1991.
[7]. D. Boneh, X. Boyen, and H. Shacham, Short Group Signature,
Proc. Intl Cryptology Conf. Advances in Cryptology (CRYPTO),
pp. 41-55, 2004.

Das könnte Ihnen auch gefallen