Privacy preserving repositoy
-
Upload
manishajadhav13j -
Category
Engineering
-
view
149 -
download
0
Transcript of Privacy preserving repositoy
“PRIVACY PRESERVING REPOSITORY FOR SOCIAL NETWORKING APPLICATION
ACROSS CLOUD”
P. R. PATIL COLLEGE OF ENGINEERING AND TECHNOLOGY
DEPARTMENT OF COMPUTER SCIENCESESSION-2014-15
Presented by Guided byMs. Pritam V. Kilor Prof. V. B. Bhagat
CONTENTS Introduction
Literature Review
Proposed Method
Conclusion and Future Work
INTRODUCTIONPrivacy is an important issue in cloud
computing,
With the development of internet technology, privacy preserving data publication has become one of the most important research topics
Security has been a serious issue of concern in the cloud.
SERVICES ON CLOUD
Infrastructure as a Service(IAAS)
Software as a Service(SAAS)
Platform as a Service(PAAS)
MOTIVATION The following are some of the major issues
related to security
• Server Access Security • Database Access Security
• Internet Access Security • Program Access Security • Data Privacy Security
Of the above mentioned security issues we are focusing on the data privacy security issue.
AIM AND SCOPE
Repository is beneficial in the following ways:
The data sharing services in the cloud possess the ability to update and control the access and usages of their shared data.
The sharing of data in the cloud is done based on the need-to-share principle.
The repository is limited to gathering data from data sharing services and combining the data to satisfy user’s requirements.
LITERATURE REVIEW
Bertino and Ferrari describe mechanisms for fine-grained encryption of parts of XML documents.
Hippocratic databases include mechanisms for preserving the privacy of the data they manage.
Their proposed architecture is based on the concept of associating privacy metadata
IBM Tivoli Privacy Manage provided mechanisms for defining fine grained privacy policies and associating them with data.
This approach addressed the privacy management problem purely from an access control perspective within a single enterprise.
Stephen S. Yau, gives a concept about warehouse for integrating data from various data sharing services
warehouse Central authorities
collects data from data sharing services based on users‘ integration requirements
Collects all the data from the data sharing services
capability of warehouse is controlled to computing the integration results required by users
central establishment have full control of the collected data
only reveal the results of the specified data integration demand
Central establishment will reveal all data
RC6 ALGORITHM
RC6 is an evolutionary improvement of RC5, designed to meet the requirements of the Advanced Encryption Standard (AES)
A version of RC6 is more accurately specified as RC6-w/r/b
The plaintext, is stored in four w-bit input registers called (A,B,C,D). Keys are being stored into an array S[0,...,2r + 3].
Features of RC6 include the use of four working registers instead of two.
Decryption works in a similar way as encryption, the difference is that cipher text is the input and plaintext is the output.
PROPOSED METHOD
The social networking applications have become very popular and commonly used by the users in the modern times.
The objectives of propose project work to preserve the privacy of the data while it is being shared by the user to the friends.
The sharing of the data can be done need-based.
OBJECTIVE OF PROPOSED SYSTEM: To preserve the privacy of user’s file using
RC6 algorithm.
To provide sharing of encrypted files among various groups.
To provide need based sharing by using TTL.
To provide security to the files from accessing by unauthorized user
Flow diagram for uploading files on repository
FLOW DIAGRAM FOR FILES SHARING BETWEEN USER AND GROUPS
The current dissertation work is divided into following phases: Database creation
Login / Signup Module
File Upload/Download Module
Creation of Groups/Joining Groups
File sharing between user and groups
Result evaluation and optimization of system
SNAPSHOTS:
Login form
SNAPSHOTS
Creation of group
SNAPSHOTS
joining of group
SNAPSHOTS
Uploading of files
SNAPSHOTS
File sharing
SNAPSHOTS
Download file
SNAPSHOTS
Group request
RESULT ANALYSIS Here we have calculated encryption time for
different file size using RC6. Comparison of RC6 with AES and Twofish
w.r.t. encryption time for 16-bytes key.File Name (file type )
File Size(KB)
Encryption time withRC6algo.(in ms)
Encryption time with AES algo.(in ms)[25]
Encryption time withTwofishalgo.(in ms)[25]
A.doc 712 85.912 232.5 229.65
B.pdf 649 77.746 205 214.625
C.jpg 656 75.763 224.5 232.75
CONCLUSION AND FUTURE WORK
Here we are trying to give an assurance to the clients that their data is secured in cloud server with the help of RC6 algorithm, and privacy of data is also maintained
Future research along this topic includes how to extend the expressiveness of specification language, enable repository to support more types of data integration operations.
References
1) Cong Wang, Sherman S.M. Chow, Qian Wang, KuiRen, and Wenjing Lou “Privacy-Preserving Public Auditing for Secure Cloud Storage”, IEEE Transactions On Computers, Vol. 62, No. 2, pp. 362 – 375, February 2013.
2) Yuan, Jiawei, and Shucheng Yu. "Privacy Preserving Back-Propagation Neural Network Learning Made Practical with Cloud Computing", IEEE Transactions on Parallel and Distributed Systems, Vol. 25, Issue 1, pp. 212 – 221, 2014.
3) Ranjita Mishra and Sanjit Kumar Dash,A Privacy Preserving Repository for Securing Data across the Cloud ―IEEE 978-1-4244-8679, 2011
4) Gurudayal Singh Bhandari, Abhishek Chauhan, “A Survey on Privacy Preservation in Cloud Computing ,” International Journal of Emerging Technology and Advanced Engineering” Volume 4, Issue 7, July 2014 ,pp.710-723
.5) Shrinivas, D. "Privacy-Preserving Public Auditing In Cloud Storage Security." International Journal of computer science and Information Technologies,ISSN: 0975-9646, vol. 2, no. 6, pp. 2691-2693
Thank You