Published in International Journal of Advanced Research in Computer Science Engineering and Information Technology
ISSN: 2321-3337 Impact Factor:1.521 Volume:4 Issue:3 Year: 01 April,2016 Pages:724-729
Off-site data storage is an application of cloud that relieves the customers from focusing on data storage system. However, outsourcing data to a third-party administrative control entails serious security concerns. Data leakage may occur due to attacks by other users and machines in the cloud. Wholesale of data by cloud service provider is yet another problem that is faced in the cloud environment. Consequently, high-level of security measures is required. In this paper, we propose Data Security for Cloud Environment with Semi-Trusted Third Party (DaSCE), a data security system that provides (a) key management (b) access control, and (c) file assured deletion. The DaSCE utilizes Shamir’s (k, n) threshold scheme to manage the keys, where k out of n shares are required to generate the key. We use multiple key managers, each hosting one share of key. Multiple key managers avoid single point of failure for the cryptographic keys. We (a) implement a working prototype of DaSCE and evaluate its performance based on the time consumed during various operations, (b) formally model and analyze the working of DaSCE using High Level Petri nets (HLPN), and (c) verify the working of DaSCE using Satisfiability Modulo Theories Library (SMT-Lib) and Z3 solver. The results reveal that DaSCE can be effectively used for security of outsourced data by employing key management, access control, and file assured deletion.
Key spliting analysis , Data Security In cloud, Off-site data storage. 1.
1.M. Armbrust, A. Fox, R. Griffith, A.D. Joseph, R. Ktaz, A. Konwin-ski, G. Lee, D. Patterson, A. Rabkin, I. Stoics, and M. Zaharia, “A View of Cloud Computing,” Communications of the ACM, Vol. 53, No. 4, 2010, pp. 50-58. 2. M. S. Blumenthal, “Is Security Lost in the Clouds?”Communica-tions and Strategies, No. 81, 2011, pp. 69-86. 3. C. Cremers, "The Scyther Tool: Verification, falsification, and analysis of security protocols." In Computer Aided Verification, Springer Berlin Heidelberg, 2008, pp. 414-418. 4. W. Diffie, P. C. V. Oorschot, and M. J. Wiener, “Authentication and authenticated key exchanges,”Designs, Codes and Cryptography,Vol. 2, No. 2, 1992, pp. 107-125. 5. N. En and N. Srensson, “An extensible SAT-solver,” Lecture Notes in Computer Science, vol. 2919, Springer, 2003, pp. 502-518. 6. C P. Gomes, H. Kautz, A. Sabharwal, and B. Selman, “Satisfia-bility solvers,” In Handbook of Knowledge Representation, Elsevier, 2007.