You are on page 1of 5

IAETSD JOURNAL FOR ADVANCED RESEARCH IN APPLIED SCIENCES ISSN NO: 2394-8442

Comparison Study of Related Data Sharing Security Issues In Cloud


Computing

K.Raja1, Dr.R.Sugumar2
1Reserch
Scholar, 2 Deputy Director& Research Supervisor
1&2Department of Computer Science, Christhu Raj College, Tiruchirappalli.

Abstract: Cloud computing is one of the emerging techniques over the computing. Nowadays many cloud service
providers are providing vast memory spaces and satisfying their needs. Although it brought up with more security issues
while transferring data. These make the user into worries about their data and loose confident. Sometimes it may leads to
become big organizational issues due to the leakage of data. So the developers should take step of those outflow and security.
In this proposed work, concern about security issues while transferring and comparison study of various framework of data
security and storage in cloud computing. In this paper includes the process to reduce data sharing security issues so we took
some major attributes of data sharing over cloud. They are authentication, authorization, encryption and dynamic key
changes. These are the major attributes to avoid unauthorised accessing of data. So it will be helpful to make secure data
sharing.

1. INTRODUCTION
Today cloud computing is the massive demand of every IT industry as well as big organizations. Storage and sharing
of hardware have been major factor to cloud computing. It’s mainly developed to reduce economic problems for both
individuals and enterprises to outsource their data into cloud [1]. This technique makes user friendly and tries to bring high
secured data. Even though it was lagging in security while transferring to end user, so they generated more parameters and
constraints to create high security. It should maintain specific server to update about user actions. Anyhow spies pirate
confidential data. So the client moved into trouble. Outsourcing of data is very challenging to meet all the requirements of
performance, system usability and scalability. So the developers created encrypted cloud data sharing.

Occurrence of data sharing security issues Occurrence of data sharing security issues

Send / receive data Send / receive data


Cloud
Client interface Cloud
server

* using effective
Encryption algorithm

Fig 1.1 Stages of Data Sharing over Cloud


Above diagram depicts the stages of data sharing over cloud and where the possibilities of security lacking and the need
of effective algorithm to make secured data sharing. However extremely difficult task to provide secured data and so on
many algorithms and programs are designed for highly secured cloud data sharing. In this paper, we described about related
data security issues comparison study between existing and proposed system based on some security attributes.

VOLUME 4, ISSUE 7, DEC/2017 365 http://iaetsdjaras.org/1


IAETSD JOURNAL FOR ADVANCED RESEARCH IN APPLIED SCIENCES ISSN NO: 2394-8442

2. IMPORTANT ATTRIBUTES OF CLOUD DATA SHARING SECURITY


Sending and receiving of data is the plenty process among client and server. So do more concentration on this process to
enhance security and concern about the issues [2]. Many cloud service providers are disquiet about security lag. Here
encapsulate few major attributes need and their issues to rectify security whereas transferring data.

In this paper mainly focus on data sharing security issues. So we took below attributes. These attributes takes major role
to avoid data sharing security issues. Without any single attribute we cannot create secure data sharing over cloud. Hence
the major attributes are:

a) Authentication
b) Authorization
c) Encryption
d) Dynamic key changes

a) Authentication
Authentication is the process of verifying the identity of user, that identity should be valid one. It is the premier process
to enter. And this process happens in the midst of user and server. In existing system for the authentication they used digital
signature as an attribute to secure [3]. But signature may increase the fake login. Today’s many providing the service so it
tends to more security problem. But in proposed system provide active unique id for the user.

Sends user id and


CLOU digital signature

Sends digital signature


and keyboard OWNE

USER Sends password


and request data

Fig 2.2 Authentication

The user ID is a projection of an actual individual into system or application or service. In general that system uses
a summary thing, called a user account that contains a set of attributes for each actual individual. Each account has a name
(user ID or logon ID) that is used to represent the summary thing to the system. Additional thing of the object may include
the full name of the actual user, and their some self, official details. Items may or may not have identification as their
attributes [4]. Apart from the user ID or logon ID, a security system will typically assign users an internal number (Security
Identifier) that is used by the system to refer to the summary thing. If the user does not have any id then it will close the
account automatically. They should contact service providers for further use.

VOLUME 4, ISSUE 7, DEC/2017 366 http://iaetsdjaras.org/2


IAETSD JOURNAL FOR ADVANCED RESEARCH IN APPLIED SCIENCES ISSN NO: 2394-8442

b) Authorization
Authorization is the process of giving rights to the user. They only able to give roles to access the data and cannot
pierce without their knowledge. Key factors may have user type, number, and permit requiring verification and related actions
and roles [5]. In proposed system generate specific authorization through some personal questions to the user. Those
questions are encrypting through various format. So securities of data are higher than existing system.

c) Encryption
Encryption is the process of converting normal text into cyber text. It is most important attributes which are used
in cloud computing and plays a vital role for securing data. It is mainly used to reduce the complexity from third party.
Several algorithms to generate encrypt data. Encryption made through both public and private key. These key generation
based on algorithm generation. In existing system, essentially used algorithm is RSA to encrypt data while transformation
between client and server. But in proposed system uses precise key generation for encrypting the data.

d) Dynamic Key Generation


Dynamic key generation is the unique features from existing system. Each time it generate key depends upon user
action. Dynamic key is used to encrypt data is generated by the client implementation and used by both client and server.

Read
data
CLOUD Authentication
SERVER

User
Give rights
Fetch user
action

Based on user action it will


generate dynamic key using
algorithm

To make strong data sharing


security

Fig 1.3 Process to Generate Dynamic key


Above diagram describes relation between server and client and how they are sharing data? In this process it includes
dynamic key generation based on the user action. It create key and uses dynamic key generation algorithm with specific
authentication to user. This process will reduce the data sharing security issues and make it strong.

3. COMPARISON STUDY
Below comparison study table is based on the existing system to validate the efficiency of secured data share.
Dynamic key generation is the specific purpose of each time generating key to the user. It specifies supported and
unsupported various attributes [7] and existing system which is developed for data sharing security.

VOLUME 4, ISSUE 7, DEC/2017 367 http://iaetsdjaras.org/3


IAETSD JOURNAL FOR ADVANCED RESEARCH IN APPLIED SCIENCES ISSN NO: 2394-8442

S.NO ATTRIBUTES Paper- Paper- Paper- Paper-4 PROPOSED


1 2 3 (jin (bhandari)
(jules) (cong) li)
1 Authentication True True True True True
2 Authorization True True True True True
3 Confidentiality False True True True True
4 non repudiation False True True True True
5 Integrity True True True True True
6 Encryption True True True True True
7 Storage provider False False True True True
verification
8 Secure even after loss False False True True True
of user identity and
password
9 Indexing of data False False False True True
10 Keyword search False False False True True

11 Dynamic key False False False False True


Changes
Table 1
Above comparison study table compares specific attributes with each and proposed paper. True indicates which
paper support those attribute and false represents which does not support those attributes. Authentication has taken to
compare the security issues with proposed and it is moreover supported by all the paper. Authorization is used to check the
availability and service provided papers and probably supported. Confidentiality is the relationship between client and server
and how it works without any issue and results paper-1 does not support it. Non repudiation is the process of giving assertion
to communicate without contradicts of service and states that does not supported by paper 1. Integrity is the whole bundles
of data to make more genuine and it supported by all paper. Encryption is the process of conversion from normal text to
cipher text and it takes major role as well as supported by all the papers. Storage provider verification and Secure even after
loss of user identity and password does supported by both paper 1 and 2. Indexing of data is mainly used to naming the data
for easy accessing of data and does not supported by paper 1, 2 and 3. Keyword search is the process of searching vast data
with the help of keyword and it set by user furthermore does not supported by paper 1, 2 and 3. A dynamic key change is
used to generate key highly secured data plus it does not be present in the existing system.

4. CONCLUSION
In proposed study provide dynamic key changes so the key changes provides user into highly secured data because
it dynamically change key so the third party cannot able to guess the key to pirate the data while sharing [Refer 2.d]. It is the
major advantages to this system. In existing system they provided one key to encrypt and decrypt the data so it sometimes
moves to misuse or alter data through the third party. Although future enhancement of this study to implement this key
generation to various document without any limitations.

VOLUME 4, ISSUE 7, DEC/2017 368 http://iaetsdjaras.org/4


IAETSD JOURNAL FOR ADVANCED RESEARCH IN APPLIED SCIENCES ISSN NO: 2394-8442

REFERENCES
1. Chen, Deyan, and Hong Zhao. "Data security and privacy protection issues in cloud computing." In Computer Science and Electronics Engineering
(ICCSEE), 2012 International Conference on, vol. 1, pp. 647-651. IEEE, 2012.
2. Kaufman, Lori M. "Data security in the world of cloud computing." IEEE Security & Privacy 7, False. 4 (2009).
3. Takabi, Hassan, James BD Joshi, and Gail-Joon Ahn. "Security and privacy challenges in cloud computing environments." IEEE Security &
Privacy 8, False. 6 (2010): 24-31.
4. Rong, Chunming, Son T. Nguyen, and Martin Gilje Jaatun. "Beyond lightning: A survey on security challenges in cloud computing." Computers
& Electrical Engineering 39, False. 1 (2013): 47-54.
5. Li, Jin, et al. ’A Hybrid Cloud Approach for Secure AuthorizedDeduplication’, 2015.
6. Juels, Ari, and Burton S. Kaliski Jr. ’PORs: Proofs of retrievability for large files’, Proceedings of the 14th ACM conference on Computer and
communications security, ACM, 2007.
7. G. L. Prakash, M. Prateek and I. Singh, ’Data Encryption and Decryption Algorithms using Key Rotations for Data Security in Cloud
System’, International Journal Of Engineering And Computer Science vol. 3, issue 4, pp. 5215-5223, April 2014.
8. Somani, Uma, Kanika Lakhani, and Manish Mundra. "Implementing digital signature with RSA encryption algorithm to enhance the Data
Security of cloud in Cloud Computing." In Parallel Distributed and Grid Computing (PDGC), 2010 1st International Conference on, pp. 211-
216. IEEE, 2010.

VOLUME 4, ISSUE 7, DEC/2017 369 http://iaetsdjaras.org/5

You might also like