Secure Sharing: Group Key Management for Cloud Storage Files

venkatvemu2 16 views 35 slides Aug 31, 2024
Slide 1
Slide 1 of 35
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17
Slide 18
18
Slide 19
19
Slide 20
20
Slide 21
21
Slide 22
22
Slide 23
23
Slide 24
24
Slide 25
25
Slide 26
26
Slide 27
27
Slide 28
28
Slide 29
29
Slide 30
30
Slide 31
31
Slide 32
32
Slide 33
33
Slide 34
34
Slide 35
35

About This Presentation

Final ppt


Slide Content

Secure Sharing: Group Key Management for Cloud Storage Files Department of Computer Science & Engineering VEMU INSTITUTE OF TECHNOLOGY                Present By KASTURI YSASWINI (204M1A0552) BAINI DEEPA REDDY       (204M1A0513) GONU RUPA                         (204M1A0537) GUTTAPALEM JAHNAVI     (204M1A0541) JANGAMA SWATHI (204M1A0542) Under the Guidance of Dr. R. YAMUNA, Associate Professor, Dept of CSE   2020-2024

CONTENTS OBJECTIVES INTRODUCTION LITERATURE SURVEY EXISTING  SYSTEM  AND DISADVANTAGES PROPOSED SYSTEM  AND ADVANTAGES HARDWARE AND SOFTWARE REQUIREMENTS ARCHITECTURE UML DIAGRAMS MODULES SCREEN SHOTS FUTURE ENHANCEMENT CONCLUSION REFERENCES

OBJECTIVES The main aim of this project is to achieve the authentication scheme is used to prevent shared files from being attacked by a combination of cloud providers and group members. For this, we are proposing the Group Key Management Protocol for file sharing on cloud storage (GKMP).

Faced with today’s innovative blow-up of cloud technologies, rebuilding services in terms of cloud have become more popular. In a shared-tenancy cloud computing environment, data from different clients which can be hosted on separate virtual machines may reside on a single physical machine. Under this paradigm, the data storage and management is under full control of the cloud provider, so data owners are left vulnerable and have to solely rely on the cloud provider to protect their data. A common way to guarantee privacy is encrypting and authenticating the shared files.There is a series of cryptographic schemes under such circumstance that a third party auditor is able to check the availability of files while nothing about the file leaks. The cloud users are motivated to encrypt their files with their own keys before uploading them to the cloud server. The remaining challenge is how to share and manage the cryptographic keys among valid users without the participant of the cloud provider. INTRODUCTION

LITERATURE SURVEY S.NO YEAR AUTHORS TITLE OUT COMES 1 International journal, 2019 J.Wu,Y.Li , T.Wang A Confidentiality-Preserving Deduplication Cloud Storage With Public Cloud Auditing The study introduces CPDA, a Confidentiality-Preserving Deduplication Cloud Storage system with Public Cloud Auditing, as presented in IEEE Access (2019). CPDA addresses data security concerns through confidentiality preservation and deduplication in cloud storage. The inclusion of public cloud auditing enhances transparency and accountability. 2 Confererence 2018 Po- Wen.C,Chin L Audit-Free Cloud Storage via Deniable AttributeBased Encryption Utilizing Deniable Attribute-Based Encryption, the scheme ensures audit-free storage while providing robust security measures. The outcome highlights the potential of this method to enhance privacy and security in cloud storage systems

LITERATURE SURVEY S.NO YEAR AUTHORS TITLE OUT COMES 3 Research paper , 2017 J. Zhou Securing outsourced data in the multi-authority cloud with fine-grained The proposed method incorporates fine-grained access control and efficient attribute revocation mechanisms. The outcome of their work contributes to strengthening the security infrastructure of outsourced data, providing a foundation for robust and controlled access in cloud computing scenarios. 4 International Conference  2017 Hu.X , Jianfei.S Comments on Verifiable and Exculpable Outsourced Attribute-Based Encryption for Access Control in Cloud Computing the outcome suggests a critical assessment or commentary on the discussed outsourced attribute-based encryption for access control in cloud computing. The nature of the comments and their implications on the proposed methodology or findings are not explicitly detailed within the provided information.

EXISTING SYSTEM Compared to CFS and NASD, CFS is tailored towards single-user workstations and relied on user-supplied passwords for data encryption. NASD proposes a distributed system comprising intelligent disks and users supplied keys as proofs of authorization. While these schemes use identity privacy by using attribute-based techniques which fail to protect user attribute privacy. Doesn’t prevent out-side attacks. Not secure. Cannot prevent the shared files. DISADVANTAGES

PROPOSED SYSTEM In proposed scheme, the verification scheme is used to prevent shared files from being attacked by the collusion attack of cloud providers and group members. Security and performance analyses indicate that the proposed protocol is both secure and efficient for data sharing in cloud computing. Faced with network attacks from public channel, a group key generation scheme based on mixed encryption technology is proposed. Verification scheme . Trustable ADVANTAGES

ADVANTAGES ADVANTAGES

HARDWARE AND SOFTWARE REQUIREMENTS Processor - I3/Intel Processor RAM - 8GB (min) Hard Disk - 128 GB Key Board - Standard Windows Keyboard Mouse - Two or Three Button Mouse Operating System : Windows 7/8/10/11 Server side Script : HTML, CSS, Bootstrap & JS Programming Language : Python Libraries : Flask, Pandas, Mysql.connector , Smtplib , Numpy IDE/Workbench : PyCharm Server Deployment : Xampp Server Database : MySQL Hardware Requirements Software Requirements

Round in AES: Sub Bytes Shift Rows Mix Columns Add Round Key Key and no.of.rounds: 128 bit key – 10 rounds 192 bit key – 12 rounds 256 bit key – 14 rounds AES is widely used today as it is a much stronger than DES and triple DES despite being harder to implement. AES is a block cipher. The key size can be 128/192/256 bits. That means it takes 128 bits as input and outputs 128 bits of encrypted cipher text as output Algorithm:Advance Encryption Standard(AES)

AES Algorithm:

AES STRUCTURE:

SYSTEM ARCHITECTURE

UML DIAGRAM USE CASE DIAGRAM

UML DIAGRAM CLASS DIAGRAM

ACTIVITY DIAGRAM UML DIAGRAM

UML DIAGRAM S EQUENCE DIAGRAM

MODULES CSP: CSP Login: Login with the valid credentials only. GROUPS: Csp can create groups and view all groups then join in particular group if he is interested view his own groups USERS: C sp can view al1 the users and the new user requests. Save the file : The attacker will save the file which is attacked by the attacker. LOGOUT: Admin can logout from the system

USER: REGISTRATION: If user don’t have any account he has to register and login. LOGIN: user having an account he can directly login into the system. GROUPS: user can view groups and join in specific groups, view all his groups and view the time line. FILES: user can upload files view those files and share files to specific groups and finally time line of groups. LOGOUT: User can logout from the system.

Attacker: Login: The attacker will login with the default email and password. Attack file: The attacker will attack the file with the file name LOGOUT: attacker can logout from the system.

OUTPUT SCREENSHOTS Home page: This is the home page for group key management protocol for file sharing on cloud storage.

OUTPUT SCREENSHOTS CSP login page : This is the login page for csp , can login with using valid credentials.

OUTPUT SCREENSHOTS User Requests: CSP can accept the user requests here.

OUTPUT SCREENSHOTS View groups page: CSP can view the list of groups over here.

OUTPUT SCREENSHOTS User registration page : This is the users registration page, the user can register by providing valid information over here.

OUTPUT SCREENSHOTS User login page: User’s login page, the user can login with using valid credentials.Here we provide two step verification to login.

OUTPUT SCREENSHOTS User home page : User can view the home page, after login success .

OUTPUT SCREENSHOTS View users group page : The user can view the list groups and can join particular group over here .

OUTPUT SCREENSHOTS Upload files page : The user can upload the files to cloud over here . Send messages : The user can send the messages to particular groups

OUTPUT SCREENSHOTS View files page : The user can view the uploaded files over here .

In the real of cloud security, future trends emphasize advancements in encryption, access control, and security automation tailored for cloud file sharing. Stronger encryption methods ensure that only authorized individuals can access sensitive files, while enhanced access controls, including biometric authentication, offer granular control over file access. Moreover, security automation, driven by machine learning and AI, enables swift detection and response to emerging threats, bolstering overall resilience. By embracing these innovations, organizations can fortify their cloud file sharing environments against evolving risks, safeguarding data assets and maintaining trust in their security practices. FUTURE ENHANCEMENT

CONCLUSION In this project, we implemented a novel group key management protocol for file sharing on cloud storage. Publickey is used by GKMP to guarantee the group key distribute fairly and resist attack from compromised vehicles or the cloud provider. We give a detailed analysis of possible security attacks and corresponding defense , which demonstrates that GKMP is secure under weaker assumptions. Moreover, we demonstrate the protocol exhibits less storage and computing complexity.

REFERENCES J.Wu , Y.Li , T.Wang , et al. CPDA: A Confidentiality-Preserving Deduplication Cloud Storage With Public Cloud Auditing, IEEE Access, vol.7, pp.160482-160497, 2019 Po-Wen. C, Chin L, ”Audit-Free Cloud Storage via Deniable AttributeBased Encryption”, IEEE Transactions on Cloud Computing,vol.6, no.2, pp. 414-427, 2018. J. Zhou et al., "Securing outsourced data in the multi-authority cloud with fine-grained access control and efficient attribute revocation", Comput . J., vol. 60, no. 8, pp. 1210-1222, Aug. 2017. Hu.X , Jianfei.S , "Comments on Verifiable and Exculpable Outsourced Attribute-Based Encryption for Access Control in Cloud Computing", IEEE Transactions on Dependable and Secure Computing., vol. 14, no.4, pp. 461-462, Aug.2017.