Downloads: 127 | Views: 282
Research Paper | Computer Science & Engineering | India | Volume 4 Issue 1, January 2015 | Popularity: 6.7 / 10
A Secure Decentralized Erasure for Code-Based Cloud Storage System
Shaik Fathima Zahera
Abstract: A cloud storage system, consisting of a collection of storage servers, provides long-term storage services over the Internet. Storing data in a third partys cloud system causes serious concern over data confidentiality. General encryption schemes protect data confidentiality, but also limit the functionality of the storage system because a few operations are supported over encrypted data. Constructing a secure storage system that supports multiple functions is challenging when the storage system is distributed and has no central authority. We propose a threshold proxy re-encryption scheme and integrate it with a decentralized erasure code such that a secure distributed storage system is formulated. The distributed storage system not only supports secure and robust data storage and retrieval, but also lets a user forward his data in the storage servers to another user without retrieving the data back. The main technical contribution is that the proxy re-encryption scheme supports encoding operations over encrypted messages as well as forwarding operations over encoded and encrypted messages. Our method fully integrates encrypting, encoding, and forwarding. We analyze and suggest suitable parameters for the number of copies of a message dispatched to storage servers and the number of storage servers queried by a key server. These parameters allow more flexible adjustment between the number of storage servers and robustness
Keywords: Encryption, Threshold Proxy Re-encryption, Severs, Cloud storage, Storage sever, Decentralized
Edition: Volume 4 Issue 1, January 2015
Pages: 700 - 702
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 3 | Weekly Hits: ⮙2 | Monthly Hits: ⮙3
Review Papers, Computer Science & Engineering, India, Volume 12 Issue 10, October 2023
Pages: 1816 - 1822Introduction: Cloud Storage Security and Homomorphic Encryption in Cloud Computing
Pushpjeet Cholkar, Dr. Margi Patel
Downloads: 99
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015
Pages: 1939 - 1946An Approach for Video Compression Technique for Efficient Data Backup and Recovery in Public Cloud
Nagaraj S Kolhar, Dr. Suvarna Nandyal
Downloads: 99
Research Paper, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016
Pages: 2242 - 2246Efficient and Secure Auditing of Cloud Data with Key -Updating
Niranjana S, Manjusha M S
Downloads: 100
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 1058 - 1060Data Integrity Proof in Cloud Computing using TPA with Privacy Preserving
Rushikesh P. Dhanokar
Downloads: 100
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1709 - 1712A Business Framework for Securing Data Storage over Cloud Environment using ECC Crypto System
Nara Venkata Surendra Reddy, DLS Reddy