International Journal of Recent Technology and Engineering (IJRTE)
ISSN: 2277-3878, Volume-9 Issue-2, July 2020
862
Published By:
Blue Eyes Intelligence Engineering
and Sciences Publication
Retrieval Number: B3931079220/2020©BEIESP
DOI:10.35940/ijrte.B3931.079220
Public Key Encryption for Cloud Storage Attack
using Blockchain
Akshay Babrekar, Rohini G. Pise
Abstract: Cloud storage enables user to store data and make it
available when it is requested by user. Data generated
electronically is very important and it must be encrypted to make
sure that the data is tramper-proof. There are two important
points to be considered, keyword guessing attack and making
cloud storage secure from hackers. In Keyword guessing attack
the Keywords search by user are encrypted using secure
mechanism and securing the cloud storage means use such
techniques which assured to give Confidentiality, Integrity and
Accessibility using Blockchain Technology. It is decentralized
cloud storage which assist different security mechanisms to
protect data. Decentralized cloud storage is itself secure than
centralized cloud storage. Because the concept of decentralized is
not to store data on single storage device but to store on multiple
servers. While storing the data on different location it divided
into small parts, and at the time of retrieving data it is available
as a complete single block of original data. Whereas in
centralized cloud storage data is stored on single storage device.
As technology progress the risk from fraudulent users also
increases. For this reason, we need some encryption, decryption
and authentication mechanism to verify user and if it is
authenticated allow access to use its data. There are some
techniques also available where user made request on cloud
server to receive data which makes cloud server to learn
keywords except resulting data. In this paper we make an attempt
to review encryption and decryption for cloud storage using
blockchain technology to improve security of data.
Keywords — Cloud storage, Keyword guessing attack, securing
the cloud, Blockchain, Encryption
I. INTRODUCTION
Using cloud storage user can access his data via
internet. These services include send and receive data from
systems, where user send their data to multiple users and it
is received by target receiver by searching the keywords.
This also reduce the load of system which holds data and
allows user to store data on the cloud server. While, using
these service’s security of data remains a question.
Confidentiality of data is one of the most important issue.
Hence, data must be encrypted before sending. In public
key encryption keywords and data kept encrypted under
receiver’s public key. Resulting cyphertext data store on
server, then receiver creates trapdoor to test weather
cyphertext of keyword is same as trapdoor for retrieving
data.
Revised Manuscript Received on June 22, 2020.
Akshay Babrekar, Department of Information Technology, Pimpri
Chinchwad College of Engineering, Savitribai Phule Pune University,
Pune, India. Email: a.babrekar.ab@gmail.com
Rohini G. Pise, Department of Information Technology, Pimpri
Chinchwad College of Engineering, Savitribai Phule Pune University,
Pune, India. Email: rohinipise@gmail.com
The main advantage of cloud server is that it is reliable. If
one node fails, still user is able to retrieve the data. To gain
access control on data, method use to the encryption remains
a trust. In case for decentralized cloud storage slowing
factor is an issue, due to independent and dynamic nature of
network reduces control of owner on network on their
resources. For centralized systems, Cloud Service Provider
(CSP) is considered to be most trusted platform for the
operation performed by authenticated users. User side
encryption is first strategy to protect data but this kind of
security mechanism remains unsafe in case where encrypted
key is reveal or data nodes are not performing the operation
which is given by owner. These operations like deleting
data, reconstructing the resource entity. So, the
security of encryption key is not adequate in decentralized
cloud storage, additional layers security is to be needed. On
the other side, reliability of DCS is increases due to
independent participation of data storage resources. If
attentive precaution method is used then makes it possible
for data owner to completely relay on the DCS to store their
data. For this purpose, there are various methods are
available which can be used with blockchain technology to
enhance the security level. Apart from encrypting the data,
Confidentiality, Integrity and Accessibility of data is also
important which can be achieved by blockchain. When user
request to access data and after permission is given to user,
all the transactions is captured with the help of blockchain
and the data security is maintained because it makes the
transactions unalterable. It is mostly promising technology
which minimize the chances of attacks and threads to data.
In blockchain data is divided into block and each block have
its different hash as well as nonce value which is reference
to the next and previous block in chain. Hash is having 256-
bits and Nonce is having 32-bits so it’s approximately four
billion probable combination of hash and nonce. Alteration
to any one earlier block requires re-mining not only that
block but also all blocks which are in chain. Hence, it is
tough to exploit blockchain technology. After complete
mining chain of block is accepted by rest of the nodes.
II. LITREATURE SURVYE
Yuan Zhang, Chunxiang Xu, Jianbing Ni, Hongwei
Li, and Xuemin (Sherman) Shen; in their paper title
“Blockchain-assisted Public-key Encryption with Keyword
Search against Keyword Guessing Attacks for Cloud
Storage” state that encryption technique use for search
keyword is plays vital role in such applications where user
request for some results to storage server and server respond
without learning about data than
search result.