Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 7

A USER-CENTRIC DATA PROTECTION METHOD FOR

CLOUD STORAGE BASED ON INVERTIBLE DWT


Han Qiu, Hassan Noura, Meikang Qiu.

Vel Tech High Tech Dr.Rangarajan Dr.Sakunthala Engineering College.

dinaraina4031@gmail.com , dinaking86088@gmail.com , santhoshr1998@gmail.com .

ABSTRACT:
One reasonable solution is to protect data on a safe end user’s machine before
outsourcing to Clouds which naturally becomes traditional ciphers. However,
encryption algorithms are transferring protection on data to protection on keys
which in turn, introduces Selective encryption.It is a new trend in image and video
content protection. It consists of encrypting only a subset of the data. The aim of
selective encryption is to reduce the amount of data to encrypt while preserving a
sufficient level of security.Due to this drawback, AES (Advanced Encryption
Standard)is used.The proposed method is performed in order to establish its level
of security.

Keywords:SE(Selective Encryption), AES (Advanced Encryption


Standard),Data Privacy,Symmetric Key Block Cipher.

INTRODUCTION: issues in ensuring their data privacy.


One reasonable solution is to protect
Cloud storage has became a
data on a safe end user’s machine
advantage for many businesses and to
before outsourcing to Clouds which
minimize the problems in maintaining
naturally becomes traditional ciphers
large capacity over the years. Not all
such as AES. However, encryption
users are completely satisfactory with
algorithms are transferring protection
the cloud storage due to the trust
on data to protection on keys which in security.
turn, introduces key management
problems. Once the key is exposed,
PROBLEM DESCRYPTION:
data security will be threatened.
The issue definition for the existing
Worse, if the end users have no
frame work is
cryptography good practice and try to
 The clear understanding and
reuse the same key for different data
learing of this process is not
protection; one key exposure will lead characterized properly.
to a large range of data leakage. Thus,  The security standards given in
this technique was not upto the
in addition to ciphers, other data
mark.
protection schemes are necessary to  The aim of selective encryption
support such scenarios. is to reduce the amount of data
to encrypt while preserving a
sufficient level of security

PROPOSED STSTEM:
EXISTING SYSTEMS: The proposed method is
One reasonable solution is to protect performed in order to establish its
data on a safe end user’s machine level of security. The private fragment
before outsourcing to Clouds which
naturally becomes traditional ciphers of one data chunk is supposed to be
such as AES. However, encryption securely protected. We assume it is
algorithms are transferring protection encrypted with AES128 but can be
on data to protection on keys which in
replaced with other encryption
turn, introduces. Selective encryption
is a new trend in image and video algorithms as the flexibility. AES
content protection. It consists of (Advanced Encryption
encrypting only a subset of the data.
sStandard).Encryption standard
The aim of selective encryption is to
reduce the amount of data to encrypt supported by the National Institute of
while preserving a sufficient level of Standards & Technology (NIST).
AES is a cryptographic cipher that to login to get access to the required
uses a block length of 128 bits and file by means of password and
username. If he enters any invalid
key lengths of 128, 192 or 256 bits.
name or password he cant go to the
window page.

FILE UPLOAD

ARCHITECTURE DIAGRAM: User will login their account and


upload a file or image, and that
files/image are encrypt and store in
admin side. Even uploaded user also
doesn’t access ,before admin can
accept.

STORE DATA IN PUBLIC


AND PRIVATE CLOUDS
In this part the uploaded file stores
FLOW DIAGRAM under two clouds: PUBLIC CLOUDS
and PRIVATE CLOUDS. The files
splited here and stores under public
and private clouds. In public clouds,
we can show the file that we are
already uploaded, but in private
clouds, we can’t able to access the
file, because that uploaded file will be
encrypted in private clouds.

USER REQUESTING FILE


FROM CLOUDS
USER LOGIN PAGE
In this module User will request
In this page the data owner needs the file that is uploaded by another
user(owner), user cannot know that • The input to the encyption and
the file is under private or public decryption algorithms is a single 128-
clouds. bit block.
RESPONSE FOR THE • The block is represented as a row of
REQUESTED FILE matrix of 16 bytes.
In this part owner will give response • AES uses several rounds in which
for the file requested by user. owner each round is made of several stages.
knows the file that it is stored under
• Data block is transformed from one
private or public clouds.
stage to another.

•After the final stage, state is copied


VIEW/READ FILE to an output matrix.

For reading each file which have


been uploaded and split into 4 parts
we should be owner of the file CONCLUSION
otherwise we should know the four In our project, we proposed a solution
different key which have been
for end users to exploit the usage of
combined by random algorithm after
reading the file you can also cheap Cloud storage services while
download the file otherwise with keeping their data safe. Our method
wrong key you can’t open content.
can be applied on many different data
formats which significantly improved
ALGORITHM the concept of selective encryption by
introducing fragmentation and
AES Algorithm:
dispersion methods. The experimental
• Step1: Byte Substitution and theoretical results have verified
•Step 2: Row Shift that our method can provide a high
• Step 3: Column mixing level of protection with resistance
against propagation errors. We also
• Step 4: Round key addition
provided a fast runtime on different preventing data over-collection in
PC platforms with practical designs smart city,” IEEE Transactions on
and implementations based on Computers, vol. 65, no. 5, pp. 1339–
GPGPU acceleration. In summary, we 1350, 2016.
proposed a secure and efficient data
protection method for end users to [4] L. Kuang, L. Yang, J. Feng, and
securely store the data on Clouds. M. Dong, “Secure tensor
decomposition using fully
homomorphic encryption scheme,”
REFERENCES
IEEE Transactions on Cloud
[1] F. Hu, M. Qiu, J. Li, T. Grant, D.
Computing, 2015.
Taylor, S. McCaleb, L. Butler, and R.
Hamner, “A review on cloud
[5] J. Wu, M. Dong, K. Ota, J. Li, and
computing: Design challenges in
Z. Guan, “Big data analysisbased
architecture and security,” Journal of
secure cluster management for
computing and information
optimized control plane in software-
technology, vol. 19, no. 1, pp. 25–55,
defined networks,” IEEE Transactions
2011.
on Network and Service Management,
vol. 15, no. 1, pp. 27–38, 2018.
[2] H. Li, K. Ota, and M. Dong,
“Virtual network recognition and
[6] K. Gai, K.-K. R. Choo, M. Qiu,
optimization in SDN-enabled cloud
and L. Zhu, “Privacy-preserving
environment,” IEEE Transactions on
content-oriented wireless
Cloud Computing, 2018.
communication in Internet-of-
Things,” IEEE Internet of Things
[3] Y. Li, W. Dai, Z. Ming, and M.
Journal, vol. 5, no. 4, pp. 3059–3067,
Qiu, “Privacy protection for
2018.
[7] S. Hambleton et al., “A glimpse of [12] T. Xiang, J. Hu, and J. Sun,
21st century care,” Australian Journal “Outsourcing chaotic selective image
of General Practice, vol. 47, no. 10, encryption to the cloud with
pp. 670–673, 2018. steganography,” Digital Signal
Processing, vol. 43, pp. 28–37, 2015.
[8] K. Gai and M. Qiu, “Blend
arithmetic operations on tensor-based [13] H. Qiu, G. Memmi, X. Chen, and
fully homomorphic encryption over J. Xiong, “DC coefficient recovery for
real numbers,” IEEE Transactions on JPEG images in ubiquitous
Industrial Informatics, 2017. communication systems,” Future
Generation Computer Systems, 2019.
[9] O. Solon and O. Laughland,
“Cambridge analytica closing after [14] G. O. Karame, C. Soriente, K.
facebook data harvesting scandal,” Lichota, and S. Capkun, “Securing
The Guardian, 2018. cloud data under key exposure,” IEEE
Transactions on Cloud Computing,
[10] W. Dai, “Crypto++ library,” 2017.
2007.
[15] H. Qiu and G. Memmi, “Fast
[11] A. Massoudi, F. Lefebvre, C. De selective encryption methods for
Vleeschouwer, B. Macq, and J.- J. bitmap images,” International Journal
Quisquater, “Overview on selective of Multimedia Data Engineering and
encryption of image and video: Management (IJMDEM), vol. 6, no.
challenges and perspectives,” 3, pp. 51–69, 2015.
EURASIP Journal on Information
Security, vol. 2008, no. 1, p. 1, 2008. [16] H. Qiu, “Phd thesis: An efficient
data protection architecture based on and Communications, vol. 65, no. 4,
fragmentation and encryption,” arXiv pp. 338–344, 2011
preprint arXiv:1803.04880, 2018.

[17] H. Li, K. Ota, M. Dong, A.


Vasilakos, and K. Nagano,
“Multimedia processing pricing
strategy in GPU-accelerated cloud
computing,” IEEE Transactions on
Cloud Computing, 2017.

[18] L. Krikor, S. Baba, T. Arif, and


Z. Shaaban, “Image encryption using
DCT and stream cipher,” European
Journal of Scientific Research, vol.
32, no. 1, pp. 47–57, 2009.

[19] A. Pommer and A. Uhl,


“Selective encryption of wavelet-
packet encoded image data: efficiency
and security,” Multimedia Systems,
vol. 9, no. 3, pp. 279–287, 2003.

[20] N. Taneja, B. Raman, and I.


Gupta, “Selective image encryption in
fractional wavelet domain,” AEU-
International Journal of Electronics

You might also like