Authentication Based Cloud Storage and Secure Data Forwarding
Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2013, Vol 4, Issue 1
Abstract
cloud storage system, consisting of a collection of storage servers, provides long-term storage services over the Internet. Storing data in a third party’s cloud system causes serious concern over data confidentiality. General encryption schemes protect data confidentiality, but also limit the functionality of the storage system because a few operations are supported over encrypted data. Constructing a secure storage system that supports multiple functions is challenging when the storage system is distributed and has no central authority. We propose a threshold proxy re-encryption scheme and integrate it with a decentralized erasure code such that a secure distributed storage system is formulated. The distributed storage system not only supports secure and robust data storage and retrieval, but also lets a user forward his data in the storage servers to another user without retrieving the data back. The main technical contribution is that the proxy re-encryption scheme supports encoding operations over encrypted messages as well as forwarding operations over encoded and encrypted messages. Our method fully integrates encrypting, encoding, and forwarding. We analyze and suggest suitable parameters for the number of copies of a message dispatched to storage servers and the number of storage servers queried by a key server. These parameters allow more flexible adjustment between the number of storage servers and robustness.
Authors and Affiliations
Rajasekaran S, Kalifulla. Y, Murugesan. S, Ezhilvendan. M, Gunasekaran. J
In Search of a Better Heuristic Algorithm for Simplification of Switching Function - A Challenge to ESPRESSO
Finding minimum cost switching function is a n intractable problem. The number of prime implicant of a typical switching function is of the order of 3n [5][13]. When fitness function with respect to cost is the only goal...
A Feature Selection process Optimization in multi-class Miner for Stream Data Classification
Multi-class miner resolves the problem of feature evaluation, data drift and concept evaluation of stream data classification. The process of stream data classification in multi-class miner based on ensemble technique of...
A REVIEW OF ELEMENTS FOR ASSESSMENT OFE-LEARNING READINESS IN LIBYA UNIVERSITIES
The e-learning is developing rapidly in the world nowadays, where technology has replaced the traditional educational approach in many universities around the world. This is because e-learning can save time and cost in e...
Determination of Optimal Number of Relays Using a New Energy Model for WSN
Wireless Sensor Networks are proving themselves as a boon to the surroundings and its deployment is a prominent area to be considered for minimum energy consumption. In this paper, we have considered deployment of a sens...
WATERMARKING TECHNIQUES
Embedding a hidden stream of bits in a file is called Digital watermarking. The file could be an image, audio, video or text. Nowadays, a digital watermarking has many applications such as broadcast monitoring, owner ide...