Secure Cloud Using RGB Value and Homomorphic Encryption For Shared Data in Cloud
Secure Cloud Using RGB Value and Homomorphic Encryption For Shared Data in Cloud
Volume: 3 Issue: 6
ISSN: 2321-8169
4158 4161
_______________________________________________________________________________________________
Secure Cloud using RGB value and Homomorphic Encryption for Shared Data in
Cloud
Yogita S. Pawar1
Abstract Cloud computing is a promise computing technology where all the services are provided via Internet. Recent Years have seen
increasing attractiveness of storing and managing personal data on the cloud. Preserving confidentiality of personal data while offering efficient
functionalities thus becomes an important and pressing research issue. We all know the demand for privacy of information of enterprise has
increased tremendously. For this, technologies such as data encryption methods are used. However a critical problem arises when there is a need
of computation on encrypted data where privacy is established. At this situation homomorphic encryption can be applied. In this paper we
propose the application that perform the operation on encrypted data and provides the same result on raw data as well as encrypted data when
calculation to be performed. We also use RGB value for accountability purpose and proxy re-encryption technique for preventing chosen cipher
text attacks.
Keywords: Cloud Computing, Cloud Data Security, Homomorphic Encryption Techniques, RSA Encryption Techniques
__________________________________________________*****_________________________________________________
I.
INTRODUCTION
_______________________________________________________________________________________
ISSN: 2321-8169
4158 4161
_______________________________________________________________________________________________
Googles AppEngine and Microsofts Azure). The ownerorganization makes its infrastructure available to the general public
via a multi-tenant model on a self-service basis delivered over the
Internet. This is the most cost-effective model leading to substantial
savings for the user, albeit with attendant privacy and security issues
since the physical location of the providers infrastructure usually
traverses numerous national boundaries [10].
Results
Decryption
Encryption
Cloud Services
_______________________________________________________________________________________
ISSN: 2321-8169
4158 4161
_______________________________________________________________________________________________
TABLE I PAILLIER CRYPTOSYSTEM [8]
Key Generation:
KeyGen (p,q)
Input: p, q P
Compute: n=p*q,
and =lcm(p-q)(q-1)
Choose g Zn such
that Gcd(L(g^ mod
n2),n)=1 with
L(u)=(u-1)/n
Encryption:
Enc(m, pkey)
Input: m Zn
Choose r Zn
Compute:
ci=gm * rn mod
n2
Decryption:
Dec(ci, skey)
Input: Ci Zn
Compute: m=
mod n [L((c^
mod n2)/L((g^
mod n2)]
Output: m Zn
Encryption:
Enc(m, pkey)
Input: m Zn
Compute: ci=me
mod n
Decryption:
Dec(ci, skey)
Input: Ci Zn
Compute: m=
cd mod n
Output: Ci Zn
Output: m Zn
V. PROPOSED SYSTEM
For preventing of cipher data from CCA (chosen ciphertext attack)
and accountability I propose Proxy Re- Encryption algorithm with
paillier and RSA Cryptosystem. Initially users are identified by
assigning of unique RGB value. Each RGB value is represented with
a set of three values for example violet red color is represented in
RGB format as (138, 158, 40) simultaneously user signup will done,
after then user can able to login in system, at the time of login OTP
will generated which is accessible from registered email_id. In next
step actual data are encrypted using RGB and Homomorphic
encryption technique, after then these data are sent on the cloud. After
then user can able to decrypt the data by using login into system
again OTP will generated, user can login into system by providing
OTP which is accessible from registered email_id then user can
decrypt the data by providing RGB value and key of Homomorphic
encryption. Detail description of proposed system model is shown in
fig. 3.
_______________________________________________________________________________________
ISSN: 2321-8169
4158 4161
_______________________________________________________________________________________________
2. Compute n=p.q, (n)=(p-1)(q-1) and choose e such that gcd(e,
(n)))=1.
3. Determine d such that e.d=1 mod (n).
4. The Proxy public key (Rpk) is (e,n) is generated.
5. The proxy Secret key (Rsk) is (d) is generated.
Encryption: Enc (c,Rpk)
1. Let m be a message to be encrypted where m Zn.
2. Compute ciphertext as: rc=me mod n.
Decryption: Dec (rc,Rsk)
1. Ciphertext c Zn.
2. Compute message m=cd mod n.
VI. CONCLUSION
The above combination of secret key and public key cryptography
can be applied mainly at initial level we provide the mechanism for to
identifying the receiver. At the final level we provide Homomorphic
encryption technique which is a new concept of security on the cloud
that enables proving results of calculations on encrypted data without
knowing the row data. In this paper we have proposed RSA and
Paillier algorithm for Homomorphic encryption with RGB color
model that prevents cipher data from Choosen Cipher text Attack
(CCA). So this system is more secure than existing system.
REFERENCES
[1] Anjana Chaudhary, Ravinder Thakur and Manish Mann
Security in Cloud Computing by Using Homomorphic
Encryption Scheme with Diffie-Hellman Algorithm
Proceedings of 7th SARC-IRF International Conference, 03rd
August-2014, New Delhi, India, ISBN: 978-93-84209-41-4.
[2] Hu Shuijing Data Security: the Challenges of Cloud
Computing 2014 Sixth International Conference on Measuring
Technology and Mechatronics Automation.
[9]
[10]
_______________________________________________________________________________________