A Secure Decentralized Erasure for Code-Based Cloud Storage System
Journal Title: UNKNOWN - Year 2015, Vol 4, Issue 1
Abstract
A cloud storage system, consisting of a collection of storage servers, provides long-term storage services over the Internet. Storing data in a third party’s cloud system causes serious concern over data confidentiality. General encryption schemes protect data confidentiality, but also limit the functionality of the storage system because a few operations are supported over encrypted data. Constructing a secure storage system that supports multiple functions is challenging when the storage system is distributed and has no central authority. We propose a threshold proxy re-encryption scheme and integrate it with a decentralized erasure code such that a secure distributed storage system is formulated. The distributed storage system not only supports secure and robust data storage and retrieval, but also lets a user forward his data in the storage servers to another user without retrieving the data back. The main technical contribution is that the proxy re-encryption scheme supports encoding operations over encrypted messages as well as forwarding operations over encoded and encrypted messages. Our method fully integrates encrypting, encoding, and forwarding. We analyze and suggest suitable parameters for the number of copies of a message dispatched to storage servers and the number of storage servers queried by a key server. These parameters allow more flexible adjustment between the number of storage servers and robustness
Comparatively Study of ECC and Jacobian Elliptic Curve Cryptography
Abstract: - Elliptic curves were first proposed as a basis for public key cryptography in the mid-1980s independently by Koblitz and Miller. Elliptic curve cryptography (ECC) algorithm is practical than existing security...
Comparison of Transversus Abdominis Plane Block and Caudal Block for Postoperative Analgesia in Children Undergoing Lower Abdominal Surgery
"Abstract Introduction Providing postoperative analgesia have become imperative in pediatric anaesthesia practice. Caudal block is being used with greatest frequency for postoperative analgesia in pediatric patients....
Location Based Query Processing For Providing Privacy to Exploit Service Similarity: A Survey
Location Based Application(LBA) provide location based services(LBS) by using queries called location based queries(LBQ). The result of these queries is based on location of mobile user. Privacy and Usability are two imp...
Properties and Potentials of Soils of Liman Katagum Bauchi State, Nigeria
The properties and potentials of soils of Liman Katagum (LK) in Bauchi State were assessed for both rainfed and irrigated crop production. Six soil mapping units were identified. The soils were moderately deep to very de...
Dietary Energy Intakes of Sudanese Pregnant Women
Purpose: To determine dietary energy intake of pregnant Sudanese women in their third trimester, with focus on macronutrients fat,, carbohydrates, and protein and their contribution to dietary energy. Methods and Materi...