Authentication Based Cloud Storage and Secure Data Forwarding
Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2013, Vol 4, Issue 1
Abstract
cloud storage system, consisting of a collection of storage servers, provides long-term storage services over the Internet. Storing data in a third party’s cloud system causes serious concern over data confidentiality. General encryption schemes protect data confidentiality, but also limit the functionality of the storage system because a few operations are supported over encrypted data. Constructing a secure storage system that supports multiple functions is challenging when the storage system is distributed and has no central authority. We propose a threshold proxy re-encryption scheme and integrate it with a decentralized erasure code such that a secure distributed storage system is formulated. The distributed storage system not only supports secure and robust data storage and retrieval, but also lets a user forward his data in the storage servers to another user without retrieving the data back. The main technical contribution is that the proxy re-encryption scheme supports encoding operations over encrypted messages as well as forwarding operations over encoded and encrypted messages. Our method fully integrates encrypting, encoding, and forwarding. We analyze and suggest suitable parameters for the number of copies of a message dispatched to storage servers and the number of storage servers queried by a key server. These parameters allow more flexible adjustment between the number of storage servers and robustness.
Authors and Affiliations
Rajasekaran S, Kalifulla. Y, Murugesan. S, Ezhilvendan. M, Gunasekaran. J
Cloud based Cost Effective Resource Allocation Model for Software-as-a-service Deployments
The Cloud Computing (CC) provides access to the resources with usage based payments model. The application service providers can seamlessly scale the services. In CC infrastructure, a different number of virtual machine...
Enhancing the Security of the GPT Cryptosystem Against Attacks
The concept of Public key cryptosystems based on error correcting codes was invented by McEliece in 1978. In 1991 Gabidulin, Paramonov and Tretjakov proposed a new mversion of the McEliece cryptosystem (GPT) based on max...
Application of Artificial Intelligence methods in Finding Program Comprehension Differences in Novice Object Oriented Programmers
Program comprehension is the first step required for software maintenance, which accounts for a considerable number of job opportunities. For this to happen, it seems obvious that improving this ability in the teaching e...
A Comparative analysis of OFDM based Communication using different Mapping Schemes for Signal Modulation
OFDM is a multiplexing technique that is used to divide a frequency spectrum into sub-carriers that are orthogonal to each other. They are capable to carry high rate data transmission. The orthogonality is maintained by...
Online Signature Verification: State of the art
online or Dynamic signature verification (DSV) is one of the most acceptable, intuitive, fast and cost effective tool for user authentication. DSV uses some dynamics like speed, pressure, directions, stroke length and pe...