EFFICIENT RETRIEVAL OF DATA FROM CLOUD USING DATA PARTITIONING METHOD FOR BANKING APPLICATIONS [RBAC]

Similar documents
ABSTRACT I. INTRODUCTION

SECURE SHARING OF DATA IN PRIVATE CLOUD BY RSA OAEP ALGORITHM. SRM University, Chennai

AES and DES Using Secure and Dynamic Data Storage in Cloud

International Journal of Advance Engineering and Research Development. AN Optimal Matrix Approach for virtual load allocation and data sharing

ANALYSIS OF SaaS MULTI-TENANT DATABASE IN A CLOUD ENVIRONMENT

International Journal of Computer Engineering and Applications, Volume XIII, Issue II, Feb. 19, ISSN STUDY ON CLOUD COMPUTING

Three Levels of Access Control to Personal Health Records in a Healthcare Cloud

Research and Design of Crypto Card Virtualization Framework Lei SUN, Ze-wu WANG and Rui-chen SUN

PRIVACY PRESERVING RANKED MULTI KEYWORD SEARCH FOR MULTIPLE DATA OWNERS. SRM University, Kattankulathur, Chennai, IN.

Partition Based Perturbation for Privacy Preserving Distributed Data Mining

Survey Paper on Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud

Implementation of Decentralized Access Control with Anonymous Authentication in Cloud

Multi Packed Security Addressing Challenges in Cloud Computing

Available online at ScienceDirect. Procedia Computer Science 48 (2015 ) (ICCC-2014) (ICCC-2015)

International Journal of Computer Science Trends and Technology (IJCST) Volume 5 Issue 4, Jul Aug 2017

BioTechnology. An Indian Journal FULL PAPER. Trade Science Inc. Study on secure data storage based on cloud computing ABSTRACT KEYWORDS

System Approach for Single Keyword Search for Encrypted data files Guarantees in Public Infrastructure Clouds

A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data

ISSN Vol.04,Issue.05, May-2016, Pages:

DISCLOSURE PROTECTION OF SENSITIVE ATTRIBUTES IN COLLABORATIVE DATA MINING V. Uma Rani *1, Dr. M. Sreenivasa Rao *2, V. Theresa Vinayasheela *3

Privacy-Preserving Using Data mining Technique in Cloud Computing

Secure Data Storage and Data Retrieval in Cloud Storage using Cipher Policy Attribute based Encryption

Efficient Auditable Access Control Systems for Public Shared Cloud Storage

Volume 6, Issue 1, January 2018 International Journal of Advance Research in Computer Science and Management Studies

The Challenge of Cloud Security

Secure Token Based Storage System to Preserve the Sensitive Data Using Proxy Re-Encryption Technique

Best Practices in Securing Your Customer Data in Salesforce, Force.com & Chatter

DATA INTEGRITY TECHNIQUES IN CLOUD: AN ANALYSIS

Lecture 1 Applied Cryptography (Part 1)

Improving data integrity on cloud storage services

Privacy Challenges in Big Data and Industry 4.0

In this unit we are going to look at cloud computing. Cloud computing, also known as 'on-demand computing', is a kind of Internet-based computing,

ABSTRACT I. INTRODUCTION. Telangana, India 2 Professor, Department of Computer Science & Engineering, Shadan College of Engineering & Technology,

2018 THALES DATA THREAT REPORT

LOAD BALANCING AND DEDUPLICATION

Jim Reavis CEO and Founder Cloud Security Alliance December 2017

Accumulative Privacy Preserving Data Mining Using Gaussian Noise Data Perturbation at Multi Level Trust

International Journal of Advance Engineering and Research Development

Secure Multiparty Computation

ENCRYPTED DATA MANAGEMENT WITH DEDUPLICATION IN CLOUD COMPUTING

Attribute Based Encryption with Privacy Protection in Clouds

Cloud security is an evolving sub-domain of computer and. Cloud platform utilizes third-party data centers model. An

Distributed Bottom up Approach for Data Anonymization using MapReduce framework on Cloud

Secured Information Retrieval using CIDS and Map Reducing in Cloud

A SURVEY OF ISSUES IN CLOUD COMPUTING. D.vasuyadav 1, Dr.V.KrishnaReddy 2

EFFICIENT DATA SHARING WITH ATTRIBUTE REVOCATION FOR CLOUD STORAGE

IMPROVING DATA SECURITY USING ATTRIBUTE BASED BROADCAST ENCRYPTION IN CLOUD COMPUTING

EXAM - CL CompTIA Cloud Essentials Exam. Buy Full Product.

THALES DATA THREAT REPORT

A compact Aggregate key Cryptosystem for Data Sharing in Cloud Storage systems.

Danish Cloud Maturity Survey 2018

To Enhance Homomorphic Encryption scheme for Key Management and Key Sharing in Cloud Computing

Secure Multiparty Computation Multi-round protocols

Blanket Encryption. 385 Moffett Park Dr. Sunnyvale, CA Technical Report

Cloud-Security: Show-Stopper or Enabling Technology?

PRIVACY PRESERVING CONTENT BASED SEARCH OVER OUTSOURCED IMAGE DATA

COMPTIA CLO-001 EXAM QUESTIONS & ANSWERS

ADVANCES in NATURAL and APPLIED SCIENCES

JAVA IEEE TRANSACTION ON CLOUD COMPUTING. 1. ITJCC01 Nebula: Distributed Edge Cloud for Data Intensive Computing

SEGMENT STATURE HASH TABLE BASED COST EFFICIENT DATA SHARING IN CLOUD ENVIRONMENT

SECURE MULTI-KEYWORD TOP KEY RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD DATA

An Approach towards Securing Data in Cloud Computing

S. Indirakumari, A. Thilagavathy

Overview. SSL Cryptography Overview CHAPTER 1

Secure Multiparty Computation Introduction to Privacy Preserving Distributed Data Mining

Secure Data Storage in Clouds by Using Decentralized Access Control Scheme

Framework Research on Privacy Protection of PHR Owners in Medical Cloud System Based on Aggregation Key Encryption Algorithm

Single-Tenant vs. Multi-Tenant Enterprise Software

ANONYMIZATION OF DATA USING MAPREDUCE ON CLOUD

Thakare B. Monika, Dhande M. N.; International Journal of Advance Research, Ideas and Innovations in Technology.

MULTI - KEYWORD RANKED SEARCH OVER ENCRYPTED DATA SUPPORTING SYNONYM QUERY

Business Technology Briefing: Fear of Flying, And How You Can Overcome It

Cloud Computing and Its Security Issues - A Review

White Paper BC/DR in the Cloud Era

Secure Data Sharing using Attribute Based Encryption with Revocation in Cloud Computing

A Modified Approach for Kerberos Authentication Protocol with Secret Image by using Visual Cryptography

Analysis of ISO 27001:2013 Controls Effectiveness for Cloud Computing

Distributed System Framework for Mobile Cloud Computing

Research Trends in Privacy Preserving in Association Rule Mining (PPARM) On Horizontally Partitioned Database

Improved Delegation Of Computation Using Somewhat Homomorphic Encryption To Reduce Storage Space

International Journal of Advance Engineering and Research Development

Cloud Computing: Security Issues & Solution

THIRD PARTY AUDITING FOR SECURE DATA STORAGE IN CLOUD THROUGH DIGITAL SIGNATURE USING RSA

Secure Data De-Duplication With Dynamic Ownership Management In Cloud Storage

Cryptography (Overview)

Flex Tenancy :48:27 UTC Citrix Systems, Inc. All rights reserved. Terms of Use Trademarks Privacy Statement

Security Control Methods for Statistical Database

Study on data encryption technology in network information security. Jianliang Meng, Tao Wu a

Data Integrity Verification in Cloud Storage without using Trusted Third Party Auditor

The Business of Security in the Cloud

Enhancing Fine Grained Technique for Maintaining Data Privacy

International Journal of Advanced Engineering Research and Science (IJAERS) [Vol-1, Issue-2, July 2014] ISSN:

SECURED TRANSMISSION OF BIOMETRIC CONTENT USING VISUAL CRYPTOGRAPHY

Third Party Cloud Services Its Adoption in the New Age

Integrity Check Mechanism in Cloud Using SHA-512 Algorithm

Building a Secure and Compliant Cloud Infrastructure. Ben Goodman Principal Strategist, Identity, Compliance and Security Novell, Inc.

Security. ITM Platform

Concealing Information in Images using Progressive Recovery

Solution Overview Gigamon Visibility Platform for AWS

An efficient and practical solution to secure password-authenticated scheme using smart card

Transcription:

EFFICIENT RETRIEVAL OF DATA FROM CLOUD USING DATA PARTITIONING METHOD FOR BANKING APPLICATIONS [RBAC] Rajalakshmi V., Jothi Nisha V. and Dhanalakshmi S. Faculty of Computing, Sathyabama University, Chennai, India E-Mail: rajalakshmi.it@sathyabamauniversity.ac.in ABSTRACT Cloud computing is a pioneering area, where abundant services are provided for storing and handling data. Though the cloud usage reduces the cost of its customers, there is a severe drawback towards its privacy. As access to the data is provided open, there is a tendency for the lack of privacy of data. The existing methods use different encryption algorithms to handle this issue. Encryption algorithms being costlier and depends on the chosen key value the method becomes less secured. Hence, in this paper a simple yet secured perturbation procedure using integer partitioning which uses the keyword itself for generating the key value. The procedure is explained with the algorithm and the results are compared with the existing method. Keywords: data partitioning, privacy preservation, data storage in cloud, encryption. 1. INTRODUCTION Cloud computing is a technique in which large groups of remote servers are connected to allow centralized data storage and online access to computer services or resources. The present availability of highcapacity networks, low-cost computers and storage devices as well as the efficient adoption of hardware virtualization, service-oriented architecture, and autonomic and utility computing have led to the development in cloud computing. The goal of cloud computing is to allow users to utilize all of these technologies, without the need for deep knowledge about or expertise with each one of them. The cloud aims to reduce costs, and help the users focus on their core business instead of being impeded by IT obstacles. With cloud computing, multiple users can access a single server to retrieve and update their data without purchasing licenses for different applications. Cloud resources are usually not only shared by multiple users but are also dynamically reallocated on demand [4]. Cloud computing exhibits Application programming interface (API), Cost reductions, Device and location independence, Multi tenancy etc., usually in a cloud, loosely coupled architectures are constructed using web services as the system interface. With these advantages, Security over data becomes a huge concern. The complexity of security is greatly increased when data is distributed over a wider area or over a greater number of devices, as well as in multi-tenant systems shared by unrelated users [12]. Cloud computing providers offer their services according to several fundamental models [9]: Infrastructure as a service (IaaS) Platform as a service (PaaS) Software as a service (SaaS) Across all forms of deployment, architecture and service models the basic concept of cloud computing remains to be the abstraction of computation over the used hardware/resources [6]. If considering various groups of stakeholders, a three-tier setup can be considered: i) users of virtual services ii) tenants who provide services iii) providers who provide the infrastructure. The key to gaining trust in cloud computing is assuring the user or tenant of security being applied and maintained in all components contributing to his virtual service. Several deterrents to the widespread adoption of cloud computing remain. Among them are reliability, availability of services and data, security, complexity, costs, regulations and legal issues, performance, migration, reversion, the lack of standards, limited customization and issues of privacy[8][10]. The provider of such services lies in a position such that with the greater use of cloud computing services has given access to a plethora of data. This access has the immense risk of data being disclosed either accidentally or deliberately. In a multi user shared cloud environment users are only physically isolated, but their data are stored in a same physical equipment [5]. For example, the details of bank transactions are stored in a cloud. The request of every customer to their corresponding account should be provided in a less time and none should be given others data. For every data stored in the cloud, security is a definite concern required for it. It is usually acquired by various conventional encryption algorithms. These algorithms rely on a key value - private or public. If the key is revealed or identified by a brute force method the entire system collapses [1]. 2. RELATED WORK In [2], multi keyword based data retrieval is implemented to rank the received records. Ranking the records based on keywords is done for the encrypted records after decrypting them. As multi keywords are not possible for all forms of access like bank account number, 1834

this method is disadvantageous. In [3], multiple layers of security is built and it increases the cost of the system and also increases the time taken for storing and retrieving the data. In [13],a certificate less aggregate signature scheme is proposed, which provides different signatures on different messages being compressed into one, however, those corresponding messages cannot be compressed. Compression leads to loss of information and provides inefficiency during data retrieval. [11] Uses a separate layer of encryption to increase the security of data. In addition, they have used the basic public/private key encryption systems. This increases the overall processing time for storing and retrieving data. In [7], a multi authority hierarchical attribute based encryption is proposed and it is compared with key policy and cipher text policy attribute based encryption techniques. The dis-advantages of attribute based encryption are the specific identification of attributes are required, which further hinders the security. Hence all these existing procedures have a drawback to implement an efficient secure method for a cloud computing environment. If a third party who monitors the storage and maintenance of the cloud is not trustworthy, the person should not be given the right to handle the data. In this paper, we have proposed RBAC procedure which first stores the data in cloud using integer partitioning based encryption. The keyword is also encrypted and only the encrypted data are compared. The third party administrator also gets the encrypted data. 3. PROBLEM DEFINITION An efficient encryption algorithm The proposed algorithm handles the problem using an efficient encryption using Integer partitioning method which calculates a Unique Key for every Keyword. Hence there is no chance for a secured record given to a vulnerable user. The following issues in the field of data security in a cloud are handled. 1. The third party who verifies and maintains the cloud should be trustworthy. 2. The execution time for encrypting huge amount of data should be reduced. 3. There should be an efficient encryption algorithm which ensures security. 4. The encryption algorithm should not lead to symmetric reconstruction problem. 5. The method should allow authenticated data acquirement in an easier and efficient manner. 4. RBAC PROCEDURE Security of a data that is present in a common location can be handled by using an encryption method which does not have a single key that encrypts all the data in a similar way. Such procedures are vulnerable to symmetric disclosure of key value. If a key generated for every possible keyword, the security of the data is highly increased. Hence procedure of Integer Partitioning is used that generates a key for every keyword provided. The Figure-1, explains the architecture of the system. The Figure-1 shows the system model of RBAC procedure. All the data stored in the cloud are encrypted through RBAC procedure, i.e., for every numeric attribute like customers account number integer partitioning is applied and then stored in cloud. The actual parameters of partitioning are known only to the RBAC procedure, which can be altered only by a responsible person. When a consumer requires his account s details by providing the account number, first the validity of the customer is verified by an admin, along with sending the encrypted password to RBAC procedure. The RBAC procedure compares every record with the encrypted KEYWORD and returns only the valid, authorized record belonging to the corresponding customer. Figure-1. System Model of RBAC. For implementing this procedure a banking database with the attributes specified in Table-1 is chosen. In the 1835

given database Account number is the primary key which is unique for every individual customer. The remaining attributes can remain unaltered as they cannot be used to identify a particular record. Table-1. Details of database used. S. No. Attribute name Attribute Type 1 Account number Numeric, Continuous 2 Name String, Continuous 3 Transaction Date Date 4 Transaction amount Numeric,Continuous 5 Credit/Debit Boolean 6 Balance Numeric, Continuous 7 Mode of transaction Categorical A. Integer Partitioning A partition of a positive integer n is defined to be a sequence of positive integers whose sum is n. the order of the partitions are usually written in a non- increasing order. The partitions can be any positive integer, but in our work we have restricted to prime numbers. The procedure is reversible and hence can decrypt the data when required. The method also do not relate by any means with other records like clustering the records. The algorithm for the procedure is given in Figure-2. Example: The partitions of 5 are 5+0 4+1 3+2 3+1+1 2+2+1 2+1+1+1 1+1+1+1+1 Thus p 5 =7. A partition is uniquely described by the number of 1s, number of 2s, and so on, that is, by the repetition numbers of the multi set. We devote one factor to each integer: (1+x+x 2 +x 3 + )(1+x 2 +x 4 +x 6 + ) (1+x k +x 2k +x 3k + ) given by, For every integer, it has been proved that there is a unique partition with prime numbers. Hence this method can be adopted for anonymizing a data. stored anywhere and also it is not susceptible to any kind of insecurity. Example: 100 = 97 + 2 + 1 101 = 97 + 3 + 1 102 = 97 + 3 + 2 103 = 97 + 5 + 1 104 = 97 + 5 + 2 (1) There are many combinations for the same number. But if a single constraint like maximum prime number added with lesser prime numbers is specified, it produces a unique result every time. Such encrypted data present in cloud can be made available to public users and they can receive their required details by providing their unique details. Figure-3 specifies the number of possible combinations for number 40. Figure-2. Algorithm of RBAC Procedure. The algorithm has two sections, one for data storage and the other is for data retrieval. Only if the data is stored in the specified method, it can be retrieved in the same method. For the account number, its integer partitioning value is calculated and it remains a unique value as we have chosen them to be minimum prime numbers. Another level of variation is given with respect to the value of the attribute gender. The value is either added are subtracted from the calculated key value. Since the key value is generated by the input keyword, it need not be Figure-3. Possible combinations for number 40. The RBAC algorithm can be tuned by controlling the 1836

variable m, which specifies the highest prime number used for partitioning. As m is increased the amount of privacy is increased, but the computation time slightly increases. The following graph shows the performance of RBAC over a standard encryption algorithm. The graph in Figure-4 shows that the execution time of RBAC is less than that of a conventional encryption based algorithm. As the number of shifts and time consuming rotations present in an encryption algorithm is not there, the execution time reduces. As cloud is used mainly for storing huge amount of data, the performance over execution time is highly important. Hence RBAC is considered to be better than any conventional encryption algorithm. value in a lesser time and also useful even when the administrator is a third party. The main drawback of this method is it cannot be used to encrypt non-numerical data. In future, this method can be used to encrypt nonnumerical attributes. REFERENCES [1] Bhanumathi S. and S. Sakthivel. A new model for privacy preserving multiparty collaborative data mining. Circuits, Power and Computing Technologies (ICCPCT), 2013 International Conference on. IEEE, 2013. [2] Cao Nin. et al. Privacy-preserving multi-keyword ranked search over encrypted cloud data. Parallel and Distributed Systems. IEEE Transactions on25.1 (2014): 222-233. [3] Chandramohan D. et al. A novel framework to prevent privacy breach in cloud data storage area service. Green High Performance Computing (ICGHPC), 2013 IEEE International Conference on. IEEE, 2013. Figure-4. Performance of RBAC over AES encryption. [4] Chen Deyan. and Hong Zhao. Data security and privacy protection issues in cloud computing. Computer Science and Electronics Engineering (ICCSEE), 2012 International Conference on. Vol. 1. IEEE, 2012. [5] Juels Ari. and Alina Oprea. New approaches to security and availability for cloud data. Communications of the ACM 56.2 (2013): 64-73. [6] Li Ming et al. Authorized private keyword search over encrypted data in cloud computing. Distributed Computing Systems (ICDCS), 2011 31st International Conference on. IEEE, 2011. Figure-5. Tuning of RBAC using key size. Figure-5 shows the tuning of system by selecting a maximum prime number for partitioning. By choosing the maximum number, there is only one unique partitioning for a numeric value and also the amount of privacy required can be fixed. Though the requirement is always the maximum privacy, increase in the maximum partition value increases the execution time. Hence an optimal value is chosen for the maximum partition value. 5. CONCLUSIONS AND FUTURE WORK Thus the procedure for RBAC is explained with the steps. The performance of the procedure is also compared with a conventional encryption algorithm. A tuning parameter is also set for the tuning between privacy and execution time. The method computes the encrypted [7] Manjusha R. and R. Ramachandran. Comparative study of attribute based encryption techniques in cloud computing. Embedded Systems (ICES). 2014 International Conference on. IEEE, 2014. [8] Ren Kui., Cong Wang. and Qian Wang. Security challenges for the public cloud. IEEE Internet Computing. 16.1 (2012): 69-73. [9] Sri Venkatesh S. Bui: Browser User Interface And Extensions With Cloud Storage. Information Sciences & Computing. Vol. 7, Issue 1,pp. 47-52,2013. [10] Takabi Hassan. James BD Joshi. and Gail-Joon Ahn. Security and Privacy Challenges in Cloud Computing Environments. IEEE Security & Privacy 8.6 (2010): 24-31. 1837

[11] Vanitha Muthusamy, Kavitha C. Secured Data Deletion In Cloud Based Multi-Tenant Database Architecture. Information Sciences & Computing, Vol. 6, Issue 2,pp. 73-76,2012. [12] Xiao Zhifeng. and Yang Xiao. Security and privacy in cloud computing. Communications Surveys & Tutorials. IEEE 15.2 (2013): 843-859. [13] Zhang L. and Zhang F. A New Certificateless Aggregate Signature Scheme. Computer Communications, vol. 32, no. 6, pp. 1079 1085, 2009. 1838