Authentication Based Cloud Storage and Secure Data Forwarding

Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2013, Vol 4, Issue 1

Abstract

cloud storage system, consisting of a collection of storage servers, provides long-term storage services over the Internet.  Storing data in a third party’s cloud system causes serious concern over data confidentiality. General encryption schemes protect data confidentiality, but also limit the functionality of the storage system because a few operations are supported over encrypted data. Constructing a secure storage system that supports multiple functions is challenging when the storage system is distributed and has no central authority. We propose a threshold proxy re-encryption scheme and integrate it with a decentralized erasure code such that a secure distributed storage system is formulated. The distributed storage system not only supports secure and robust data storage and retrieval, but also lets a user forward his data in the storage servers to another user without retrieving the data back. The main technical contribution is that the proxy re-encryption scheme supports encoding operations over encrypted messages as well as forwarding operations over encoded and encrypted messages. Our method fully integrates encrypting, encoding, and forwarding. We analyze and suggest suitable parameters for the number of copies of a message dispatched to storage servers and the number of storage servers queried by a key server. These parameters allow more flexible adjustment between the number of storage servers and robustness.

Authors and Affiliations

Rajasekaran S, Kalifulla. Y, Murugesan. S, Ezhilvendan. M, Gunasekaran. J

Keywords

Related Articles

Economic Dispatch Optimization Using Imperialist Competitive Algorithm (ICA) and compare with PSO algorithm result

Measurement Imperialist Competitive Algorithm (ICA) is a  population based stochastic optimization technique, originallydeveloped by Eberhart and Kennedy, inspired by simulation of a social psychological metaphor instea...

REVIEW OF DATABASE AND PROMINENT PROGRAMMES

Databases and database systems have become an essential component of everyday life in modern society. In the course of a day, most of us encounter several activities that involve some interaction with a database. For exa...

AN EFFECTIVE USAGE PARAMETER CONTROL MODEL FOR CELL POLICING IN ATM NETWORKS

The primary role of traffic control procedures is to protect the network so that it can achieve the required network performance objectives and yield a high quality of service (QoS). To guarantee the QoS, the network imp...

Localization of Sensor Nodes using Flooding in Wireless Sensor Networks

The accuracy of localization is a significant criterion to evaluate the practical utility of localization algorithm in wireless sensor networks (WSN). In mostly localization algorithms, one of the main methods to improve...

OPPORTUNISTIC APPROACH TO EXPLOIT WIRELESS SPECTRUM BY USE OF COGNITIVE RADIO

Cognitive radio (CR) technology is envisaged to solve the problems in wireless networks resulting from the limited available spectrum and the inefficiency in the spectrum usage by exploiting the existing wireless spectru...

Download PDF file
  • EP ID EP649933
  • DOI 10.24297/ijct.v4i1b.3068
  • Views 99
  • Downloads 0

How To Cite

Rajasekaran S, Kalifulla. Y, Murugesan. S, Ezhilvendan. M, Gunasekaran. J (2013). Authentication Based Cloud Storage and Secure Data Forwarding. INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY, 4(1), 106-110. https://europub.co.uk/articles/-A-649933