A Novel identity based secure distributed data storage scheme
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 6
Abstract
Abstract: Secure distributed data storage can shift the burden of maintaining a large number of files from the owner to proxy servers. Proxy servers can convert encrypted files for the owner to encrypted files for the receiver without the necessity of knowing the content of the original files. In practice, the original files will be removed by the owner for the sake of space efficiency. Hence, the issues on confidentiality and integrity of the outsourced data must be addressed carefully. In this paper, we propose two identity-based secure distributed data storage (IBSDDS) schemes. Our schemes can capture the following properties: (1) The file owner can decide the access permission independently without the help of the private key generator (PKG); (2) For one query, a receiver can only access one file, instead of all files of the owner; (3) Our schemes are secure against the collusion attacks, namely even if the receiver can compromise the proxy servers, he cannot obtain the owner’s secret key. Although the first scheme is only secure against the chosen plaintext attacks (CPA), the second scheme is secure against the chosen cipher text attacks (CCA). To the best of our knowledge, it is the first IBSDDS schemes where access permission is made by the owner for an exact file and collusion attacks can be protected in the standard model.
Authors and Affiliations
M. Ramadevi , D. Bulla Rao
An application of flexible query interface to relational databases
Abstract: The use of databases has for long been for the computer elites in the society as well as multinationals that can pay for their services, and these has inhibited the scope and wide use of database applications....
Driving Supportive System for Warning Traffic Sign Classification
Abstract: Traffic signs should be accurately identified in order to prevent vital road accidents and secure lives. The objective of this paper is to detect the warning traffic signs and recognize the message it is design...
Web-Based System for Software Requirements Quality Analysis Using Case-Based Reasoning and Neural Network
The overall success of a software project depends on the quality of its software requirements specifications (SRS). Hence, it is very important to get the requirements correct from the onset of the project. This...
DELB: Differential Evolution BASED Load Balancing Technique for Load Balance in Cloud Computing
Cloud applications are often subject to unexpected events like flash crowds and hardware failures. Scholars addressed this matter on two various fronts: first, they presented replicas – application copies with same funct...
Image Enhancement Techniques: A Selected Review
Image enhancement is one of the key issues in high quality pictures such as digital cameras. Since image clarity is very easily affected by lighting, weather, or equipment that has been used to capture the image....