A Novel identity based secure distributed data storage scheme
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 6
Abstract
Abstract: Secure distributed data storage can shift the burden of maintaining a large number of files from the owner to proxy servers. Proxy servers can convert encrypted files for the owner to encrypted files for the receiver without the necessity of knowing the content of the original files. In practice, the original files will be removed by the owner for the sake of space efficiency. Hence, the issues on confidentiality and integrity of the outsourced data must be addressed carefully. In this paper, we propose two identity-based secure distributed data storage (IBSDDS) schemes. Our schemes can capture the following properties: (1) The file owner can decide the access permission independently without the help of the private key generator (PKG); (2) For one query, a receiver can only access one file, instead of all files of the owner; (3) Our schemes are secure against the collusion attacks, namely even if the receiver can compromise the proxy servers, he cannot obtain the owner’s secret key. Although the first scheme is only secure against the chosen plaintext attacks (CPA), the second scheme is secure against the chosen cipher text attacks (CCA). To the best of our knowledge, it is the first IBSDDS schemes where access permission is made by the owner for an exact file and collusion attacks can be protected in the standard model.
Authors and Affiliations
M. Ramadevi , D. Bulla Rao
An Accident Prevention Technique For Speed Bumper Detection Through IR Sensor And Motor Speed Control Using Timer
Abstract : A method of preventing an accident using a technology is called ultrasonic. This project is about making cars more intelligent and interactive which may notify or resist user under unacceptable conditions. Thi...
Classification Algorithms for Predicting Computer Science Students Study Duration
The Department of Computer Science Universitas Klabat offers a bachelor program in Computer Science which should be completed within eight semesters or four years. Some students can accomplish the course in less than fou...
Charge Pump Phase Locked Loop Synchronization Technique in Grid Connected Solar Photovoltaic Systems
In this paper, an attempt to design and simulate charge pump phase locked loop method of synchronization in grid connected solar photovoltaic system has been made. Delivery of power with high quality to t...
Techniques for Cache Improvement
Personal data caches have been rendered ineffective in the process of reducing the median memory lag in multiprocessors, as is the case in single-processors, due to the distribution of data amongst processors, and furthe...
Role of Operational System Design in Data Warehouse Implementation: Identifying the Operational System Design Gaps and techniques to handle them
Abstract: Data warehouse designing process takes input from operational system of the organization. Quality of data warehousing solution depends on design of operational system. Often, operational system implementations...