Hash Dynamic Data Allocate in Cloud Using Cloud Intrusion Detection Service

Gongati Mahesh, Borra Subba Reddy

Abstract


Cloud computing would be one of technologies which is going to play a vital role in the next generation of computer engineering field. Stored information and encryption keys are usually managed by the cloud provider. It is important to put cryptographically access control on the data we share through cloud. Identity based encryption builds a practical data sharing system. We propose a proxy re encryption technique which performs a two level encryption before storing the actual data into the cloud. We have used AES technique to encrypt data as well as decrypt data this paper also introduce the Cloud Intrusion Detection Service (CIDS) which detect the different attack and fire the alert to other cloud user. Identity Based Encryption (IBE) simplifies public key management and certificate management at Public Key Infrastructure (PKI) with help of Private Key Generator. To ensure the security of data we proposed a method by implementing RSA algorithm. The trusted authority module receives encrypted file using AES Algorithm from the data owner and computes hash value using MD-5 algorithm. It stores key in its database which will be used during the dynamic operations and to determine the cheating party in the system (CSP or Owner). Finally we extend the proposed IBE scheme to present a CRA-aided authentication scheme with no period-limited privileges for managing a large number of various cloud services.


Full Text:

PDF




Copyright (c) 2019 Edupedia Publications Pvt Ltd

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.

 

All published Articles are Open Access at  https://journals.pen2print.org/index.php/ijr/ 


Paper submission: ijr@pen2print.org