SDSM IN MOBILE CLOUD COMPUTING By- ID NO-1069 K.C. SHARMILAADEVI Sethu Institute Of Tech IV year-ECE Department CEC Batch: AUG 2012.

Slides:



Advertisements
Similar presentations
Trusted Data Sharing over Untrusted Cloud Storage Provider Gansen Zhao, Chunming Rong, Jin Li, Feng Zhang, and Yong Tang Cloud Computing Technology and.
Advertisements

Secure Mobile IP Communication
AUTHENTICATION AND KEY DISTRIBUTION
Akshat Sharma Samarth Shah
Attribute-based Encryption
Data Integrity Proofs in Cloud Storage Sravan Kumar R, Ashutosh Saxena Communication Systems and Networks (COMSNETS), 2011 Third International Conference.
Encryption Public-Key, Identity-Based, Attribute-Based.
Network Security Topologies Chapter 11. Learning Objectives Explain network perimeter’s importance to an organization’s security policies Identify place.
WAP Public Key Infrastructure CSCI – Independent Study Fall 2002 Jaleel Syed Presentation No 5.
16.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft® Windows® Server 2003 Active Directory Infrastructure.
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
Security Chapters 14,15. The Security Environment Threats Security goals and threats.
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
Chapter 9 - Control in Computerized Environment ATG 383 – Spring 2002.
Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Encryption Methods By: Michael A. Scott
Key Management Guidelines. 1. Introduction 2. Glossary of Terms and Acronyms 3. Cryptographic Algorithms, Keys and Other Keying Material 4. Key Management.
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
Cong Wang1, Qian Wang1, Kui Ren1 and Wenjing Lou2
SYSTEM ADMINISTRATION Chapter 13 Security Protocols.
Fine-Grained Access Control (FGAC) in the Cloud Robert Barton.
A Survey on Secure Cloud Data Storage ZENG, Xi CAI, Peng
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
HPCC 2015, August , New York, USA Wei Chang c Joint work with Qin Liu a, Guojun Wang b, and Jie Wu c a. Hunan University, P. R. China b. Central.
02/22/2005 Joint Seminer Satoshi Koga Information Technology & Security Lab. Kyushu Univ. A Distributed Online Certificate Status Protocol with Low Communication.
Department of Information Engineering The Chinese University of Hong Kong A Framework for Monitoring and Measuring a Large-Scale Distributed System in.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
Cryptography, Authentication and Digital Signatures
Security Protocols and E-commerce University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
James Higdon, Sameer Sherwani
1 A Secure System Based on Fingerprint Authentication Scheme Author : Zhe Wu,Jie Tian,Liang Li, Cai-ping Jiang,Xin Yang Prestented by Chia Jui Hsu.
Identity-Based Secure Distributed Data Storage Schemes.
CSCD 218 : DATA COMMUNICATIONS AND NETWORKING 1
Certificate-Based Operations. Module Objectives By the end of this module participants will be able to: Define how cryptography is used to secure information.
Professional Encryption Software FINECRYPT 8.1. Contents Introduction Introduction Features Features Installation Installation Tests Tests Results Results.
Fall, Privacy&Security - Virginia Tech – Computer Science Click to edit Master title style Collusion-Resistant Group Key Management Using Attribute-
3.06 Data Encryption Unit 3 Internet Basics. Introduction In May of 2006, an analyst with the U.S. Department of Veterans Affairs was robbed of his notebook.
Improving MBMS Security in 3G Wenyuan Xu Rutgers University.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
Information Security By:-H.M.Patel. Information security There are three aspects of information security Security service Security mechanism Security.
Strong Security for Distributed File Systems Group A3 Ka Hou Wong Jahanzeb Faizan Jonathan Sippel.
Public Key Encryption with keyword Search Author: Dan Boneh Rafail Ostroversity Giovanni Di Crescenzo Giuseppe Persiano Presenter: 陳昱圻.
Encryption. What is Encryption? Encryption is the process of converting plain text into cipher text, with the goal of making the text unreadable.
Authentication of Signaling in VoIP Applications Authors: Srinivasan et al. (MIT Campus of Anna University, India) Source: IJNS review paper Reporter:
Transparent Mobility of Distributed Objects using.NET Cristóbal Costa, Nour Ali, Carlos Millan, Jose A. Carsí 4th International Conference in Central Europe.
PUBLIC KEY CRYPTOGRAPHY ALGORITHM Concept and Example 1IT352 | Network Security |Najwa AlGhamdi.
Kerberos By Robert Smithers. History of Kerberos Kerberos was created at MIT, and was named after the 3 headed guard dog of Hades in Greek mythology Cerberus.
Software Security Seminar - 1 Chapter 10. Using Algorithms 조미성 Applied Cryptography.
WSV Problem Background 3. Accelerated Protocols and Workloads 4. Deployment and Management 2. BranchCache Solution Modes 5. BranchCache Protocols.
Data Integrity Proofs in Cloud Storage Author: Sravan Kumar R and Ashutosh Saxena. Source: The Third International Conference on Communication Systems.
Deck 10 Accounting Information Systems Romney and Steinbart Linda Batch March 2012.
Presented By Amarjit Datta
CSI-09 COMMUNICATION TECHNOLOGY SECURITY MECHANISMS IN A NETWORK AUTHOR - V. V. SUBRAHMANYAM.
2011 IEEE TrustCom-11 Sushmita Ruj Amiya Nayak and Ivan Stojmenovic Regular Seminar Tae Hoon Kim.
From Coulouris, Dollimore, Kindberg and Blair Distributed Systems: Concepts and Design Edition 5, © Addison-Wesley 2012 Slides for Chapter 11: Security.
1 Cryptography Troy Latchman Byungchil Kim. 2 Fundamentals We know that the medium we use to transmit data is insecure, e.g. can be sniffed. We know that.
Wired Equivalent Privacy (WEP) Chris Overcash. Contents What is WEP? What is WEP? How is it implemented? How is it implemented? Why is it insecure? Why.
KERBEROS SYSTEM Kumar Madugula.
多媒體網路安全實驗室 An ID-based client authentication with key agreement protocol for mobile client–server environment on ECC with provable security Date:2012/02/16.
RANDY MODOWSKI COSC Cloud Computing. Road Map What is Cloud Computing? History of “The Cloud” Cloud Milestones How Cloud Computing is being used.
Privacy Preserving Cloud Data Access With Multi-Authorities Taeho Jung 1, Xiang-Yang Li 1, Zhiguo Wan 2, Meng Wan 3 Illinois Institute of Technology, Chicago.
INFSO-RI Enabling Grids for E-sciencE Sofia, 17 March 2009 Security, Authentication and Authorisation Mike Mineter Training, Outreach.
BY S.S.SUDHEER VARMA (13NT1D5816)
Shucheng Yu, Cong Wang, Kui Ren,
Hybrid Cloud Architecture for Software-as-a-Service Provider to Achieve Higher Privacy and Decrease Securiity Concerns about Cloud Computing P. Reinhold.
Fundamental Concepts in Security and its Application Cloud Computing
Advanced Security Architecture System Engineer Cisco: practice-questions.html.
Module 2 OBJECTIVE 14: Compare various security mechanisms.
Verifiable Attribute Based Keyword Search with Fine-Grained Owner-Enforced Search Authorization in the Cloud They really need a shorter title.
Presentation transcript:

SDSM IN MOBILE CLOUD COMPUTING By- ID NO-1069 K.C. SHARMILAADEVI Sethu Institute Of Tech IV year-ECE Department CEC Batch: AUG 2012

Cloud computing is a general term for anything that involves delivering hosted services over the Internet. Among numerous benefits, cloud computing offers customers a more flexible way to obtain computation and storage resources on demand. Different from the general cloud computing concept, mobile cloud computing refers to an emerging infrastructure where both of the data storage and the data processing happen outside of the mobile device from which an application is launched.

SDSM, is a user-efficient and secure data service mechanism in mobile cloud computing, which enables the mobile users to enjoy a secure outsourced data services at a minimized security management overhead. The core idea of SDSM is that the mobile user can securely shift the data computing and distribution overhead to the cloud while the cloud has no idea about data content in the whole process. Additionally only authorized users can decrypt the cipher text while unauthorized users would learn nothing about the data.

Outsource encrypted file Access data on the cloud Data sharing Cloud server Cloud server Cloud server Cloud server Cloud server Cloud service provider SYSTEM MODEL

 To realize secrecy of data  Allows semi-trusted proxy to transform the data encrypted with user1’s public key into the one encrypted with user 2’s public key  Benefits : Strong access control Flexibility Low overhead

 PHASE 1 : Setup and KeyGen Algorithm System parameters and users secret key are built up We set the system master secret key msk = s Each mobile user registered in the system can obtain a private key corresponding to his identity, sk = H1(ID) s is used in the process of user registration

 PHASE 2 : Data Encryption The data F is divided in to n fractions F =(m1,m2, ……, m n ) Each part m i is undergone encryption process Encrypted data is M i = (g, m.e(g, H 1 ( ID) )) After encryption, the user uploads F’ = (M1, M2,.., Mn)  PHASE 3 : Data Sharing RkGen Algorithm Generates proxy key rk = (H1(ID A ), IBE ID B (X)) The cloud can deploy the re-encrypt key rk to permit the authorized user to get the cipher text decrypted with his own secret key.

PHASE 4 : Access Data Sharer sends request to cloud server Cloud checks for the validity of sharer If re-encryption key exists for the sharer, Cipher text is achieved by RkGen algorithm Sharer fetches the data and runs the decrypt algorithm on M i to obtain m i Thus entire file is obtained F=(m1,m2,..,m n ) PHASE 5 : Policy Updating For updating the list of sharers the user has to update re-encryption keys instead of decrypting the cipher text from cloud

Running time is denoted by operate(m i ) If n is the number of blocks, then time for whole operation is n.operate(m i ) n is determined by size of the file F Delay could be reduced in practice since each file needs to be pre-processed only once To achieve the access control of file F, data owner only requires forwarding a re-encryption key of a small size 2q (q << F) instead of the ciphertext of F Cost is reduced