Secure Data Management in Cloud using IB-MRSA Algorithm

International Journal of Computer Trends and Technology (IJCTT)          
© 2016 by IJCTT Journal
Volume-36 Number-3
Year of Publication : 2016
Authors : B.Tamilselvi, Arulprakash.P, P.Vidhya


B.Tamilselvi, Arulprakash.P, P.Vidhya "Secure Data Management in Cloud using IB-MRSA Algorithm". International Journal of Computer Trends and Technology (IJCTT) V36(3):133-139, June 2016. ISSN:2231-2803. Published by Seventh Sense Research Group.

Abstract -
Cloud computing, a technology that provides computational resources on demands, is a good candidate to address these challenges since it has several good properties such as energy saving, cost saving, agility, scalability, and flexibility. As the number of data increased in number on the smart grid, the data handling becomes the biggest issue. The existing system introduced a security solution for the framework based on identity-based encryption which is used to protect the data from the cloud server and as well as limit the data access in the secured manner for the corresponding users and proxy re-encryption schemes, which provides secure communication services for the Smart-Frame. However this system may lack from security in case of hacker who knows the identity information of the users and might corrupt the data’s is that are stored in the cloud. To solve this problem the proposed system introduced an identity based hybrid encryption. This proposed system would encapsulate data contents before encryption using identity information which will leads to a secured environment. Additionally Mediated RSA (mRSA) is used for security purpose. It is a simple method of splitting a RSA private key between the user and a Security Mediator (SEM). Neither the user nor the SEM can cheat one another since each cryptographic operation (signature or decryption) involves both parties. The experimental results show that the proposed system achieves better performance compared with existing system.

[1].Joonsang Baek, Quang Hieu Vu, Joseph K. Liu, Xinyi Huang, and Yang Xiang, Senior Member, “A Secure Cloud Computing Based Framework for Big Data Information Management of Smart Grid”IEEE Transactions On Cloud Computing, Vol. 3, No. 2, April/June 2015.
[2]. Chang F, Dean J, Ghemawat S, Hsieh WC, Wallach DA, Burrws M, Chandra T, Fikes A, Gruber RE (2006) Big table: a distributed storage system for structured data. In: 7th UENIX symposium on operating systems design and implementation, pp 205–218.
[3]. Cong Wang, Qian Wang, KuiRen, Ning Cao, and Wenjing Lou, “Toward Secure and Dependable Storage Services in Cloud Computing”, IEEE Transactions On Services Computing, Vol. 5, No. 2, April-June 2012.
[4]. D. Richard Kuhn, Edward J. Coyne, Timothy R. Weil, “Adding Attributes to Role-Based Access Control”, IEEE Computer, vol. 43, no. 6 (June, 2010) , pp. 79-81.
[5]. Dean J, Ghemawat Dean S (2008) MapReduce: simplified data processing on large clusters. Commun ACM 51:107–113.
[6]. Hongwei Li, Yuanshun Dai, Bo Yang, “Identity-Based Cryptography for Cloud Security”, IACR Cryptology ePrint Archive, 2011.
[7]. Liu H, Orban D (2011) Cloud MapReduce: a MapReduce implementation on top of a cloud operating system. In: IEEE/ACM international symposium on cluster, cloud and grid computing, pp 464–474.
[8]. MateiZaharia, Andy Konwinski, Anthony D. Joseph, Randy Katz, Ion Stoica, “Improving MapReduce Performance in Heterogeneous Environments”, 8th USENIX Symposium on Operating Systems Design and Implementation.
[9]. SenyKamara, Kristin Lauter, “Cryptographic Cloud Storage”, Proceedings of Financial Cryptography: Workshop on Real-Life Cryptographic Protocols and Standardization 2010.
[10]. SushmitaRuj, Milos Stojmenovic, AmiyaNayak, “Privacy Preserving Access Control with Authentication for Securing Data in Clouds”, 2012 12th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing.

Hadoop Distributed File System,Big data, cloud computing, secure, information management, smart grid.