Open Access   Article Go Back

Ttpse- Trusted Third Party With Symmetric Encryption Towards Secured Cloud Storage

Shreeraghav Kulkarni1 , Sujata Terdal2

  1. Dept. of CS, PDA College of Engineering (VTU University), Karnataka, India.
  2. Dept. of CS, PDA College of Engineering (VTU University), Karnataka, India.

Correspondence should be addressed to: kulkarni.shreeraghav@gmail.com.

Section:Research Paper, Product Type: Journal Paper
Volume-5 , Issue-5 , Page no. 47-51, May-2017

Online published on May 30, 2017

Copyright © Shreeraghav Kulkarni, Sujata Terdal . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Shreeraghav Kulkarni, Sujata Terdal, “Ttpse- Trusted Third Party With Symmetric Encryption Towards Secured Cloud Storage,” International Journal of Computer Sciences and Engineering, Vol.5, Issue.5, pp.47-51, 2017.

MLA Style Citation: Shreeraghav Kulkarni, Sujata Terdal "Ttpse- Trusted Third Party With Symmetric Encryption Towards Secured Cloud Storage." International Journal of Computer Sciences and Engineering 5.5 (2017): 47-51.

APA Style Citation: Shreeraghav Kulkarni, Sujata Terdal, (2017). Ttpse- Trusted Third Party With Symmetric Encryption Towards Secured Cloud Storage. International Journal of Computer Sciences and Engineering, 5(5), 47-51.

BibTex Style Citation:
@article{Kulkarni_2017,
author = {Shreeraghav Kulkarni, Sujata Terdal},
title = {Ttpse- Trusted Third Party With Symmetric Encryption Towards Secured Cloud Storage},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {5 2017},
volume = {5},
Issue = {5},
month = {5},
year = {2017},
issn = {2347-2693},
pages = {47-51},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=1262},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=1262
TI - Ttpse- Trusted Third Party With Symmetric Encryption Towards Secured Cloud Storage
T2 - International Journal of Computer Sciences and Engineering
AU - Shreeraghav Kulkarni, Sujata Terdal
PY - 2017
DA - 2017/05/30
PB - IJCSE, Indore, INDIA
SP - 47-51
IS - 5
VL - 5
SN - 2347-2693
ER -

VIEWS PDF XML
1384 667 downloads 557 downloads
  
  
           

Abstract

Mutual trust in computer security is known as accepting on the same security architecture by two participating parties. Today, most of the users prefer to keep their data in the cloud with Cloud Storage Providers (CSP), some of the popular cloud storage providers are Drop Box, SkyDrive, and Google Drive and so on. Most of the cloud storage providers operate on secured http layer, therefore they provide underneath security for any data transmission. However, users often do not know in what ways the cloud service providers uses his data. Security of the critical data (for ex. Critical health record) is extremely difficult for the user to trust the service provider completely, and keep the record as it is. Beside this, once the storage link of the cloud is shared user has very little control on the link sharing. In the past several techniques have been proposed to provide security to the data in the cloud, however, not significant work has been carried out, towards offering a solution to address the problem of lack of mutual trust. In this work we develop a unique third party solution for providing mutual trust between the user and the cloud service provider. Our application takes a user key, encrypts every contents that need to be stored in a cloud space and then stores the data. While accessing the same data user needs to provide his key, then the encrypted data is downloaded from the cloud and is decrypted locally. We use symmetric key encryption as middle layer security for the mutual trust. We also analyze the performance of three very popular symmetric key encryption techniques such as AES, 3DES, RC2 and evaluate the performance of the same. The performance of the different algorithms varies according to data loads.

Key-Words / Index Term

Cloud Storage Provider(CSP), Mutual Trust, Trusted Third Party, Access Control, AES, 3DES, RC2.

References

[1] Mithilesh Mittal, Pradeep Sharma and Pankaj Kumar Gehlot, “A Comparative Study of Security Issues& Challenges of Cloud Computing”, International Journal of Scientific Research in Computer Science and Engineering, Vol.1, Issue.5, pp.9-15, 2013.
[2] Ayad Barsoum, Anwar Hassan “Enabling Dynamic data and Indirect Mutual Trust for Cloud Computing Storage System”, IEEE Transactions on Parallel and Distributed Systems,Vol.24, Issue.(12, pp.2375-2385, 2013.
[3] Cong Wang, Kui Ren, “Towards Publicly Auditable Secure Cloud Data Storage Services”, IEEE Network, Vol.24, Issue.4, pp.19-84, 2010.
[4] S.D.C. Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, P. Samarati, “Over-encryption: Management of access control evolution on outsourced data”, in Proceedings of the 33rd International Conference on Very Large Data Bases, Austria, pp.123-134, 2007.
[5] Schneier Bruce,”Applied cryptography: Protocols Algorithms and Source code in C (2nd edition)”, John Wiley & Sons, United States, pp.1-784,1996.
[6] AJ. Menezes, VOorschot, PCV. Anstone, A. Scott , “Handbook of Applied Cryptography” , Jaypee publisher, India, pp.34-58, 1996.
[7] A. Sharma, RS Thakur, S. Jaloree, “Investigation of Efficient Cryptic Algorithm for image files Encryption in Cloud”, International Journal of Scientific Research in Computer Science and Engineering, Vol.4, Issue.5, pp.5-11, 2016.
[8] Dong, Russello,Dulay, “Shared and Searchable Encrypted data for Untrusted Servers”, International Journal of Computer Security, Vol.19, Issue.3, pp.367-397, 2011.
[9] SL. Mewada, P. Sharma, SS. Gautam, “Classification of Efficient Symmetric Key Cryptography Algorithms”, International Journal of Computer Science and Information Security (IJCSIS), Vol. 14, No. 2, pp.105-11, 2016
[10] Md.A. Mushtaque, “Comparative Analysis on Different parameters of Encryption Algorithms for Information Security”, International Journal of Computer Sciences and Engineering, Vol.2, Issue.4, pp.76-82, 2014.