Providing Data Confidentiality of Outsourced Data In Cloud
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2014, Vol 3, Issue 9
Abstract
Cloud means collection of storage servers maintained by the cloud service provider which minimizes investment cost for individual users and organizations. It provides on-demand self service, resource pooling, rapid elasticity and measured service. But users are worrying about their data confidentiality stored in untrusted cloud servers. Storing data in a third party’s cloud system causes serious concern over data confidentiality. In order to provide strong confidentiality for messages in storage servers, a user can encrypt messages by a cryptographic method before applying an erasure code method to encode and store messages. Constructing a secure storage system that supports multiple functions is challenging when the storage system is distributed and has no central authority. The proposed method is a proxy re-encryption scheme which was integrated with a decentralized erasure code such that a secure distributed storage system is formulated. The distributed storage system not only supports secure and robust data storage and retrieval, but also lets a user forward his data in the storage servers to another user without retrieving the data back. The main technical contribution is that the proxy re-encryption scheme supports encoding operations over encrypting messages as well as forwarding operations over encoded and encrypted messages.
Authors and Affiliations
N_V_S Sowjanya, S. N. S. V. S. C Ramesh, S. Rama sree
Scattered Access Control with Seclusion Support in Wireless Sensor Networks by SecureQ Protocol
A wireless sensor Network consists of spatially dispersed self-directed sensors to monitor the environment conditions. This work supports in-network top-k query process over uncertain data in a distributed wireless...
Design of Punctuality Enhanced Bus Transportation System Using GSM and Zigbee
Public traffic system depends mainly on driver’s manual operation, which will encounter many problems regarding the punctuality of the bus’s arrival and departure of the bus at bus stations. Paper proposes a supervi...
Novel Iris Recognition Techniques using Energy Compaction and Partial Energies of Transformed Iris Images with Cosine-Kekre and CosineHartley Hybrid Wavelet Transforms
The paper presents novel Iris Recognition technique using Energy Compaction and Partial Energies of transformed iris images with the Hybrid wavelet transform namely ‘Cosine-Kekre’ and ‘Cosine-Hartley’ Hybrid wavelet...
Intensity Difference Technique Implementation for Smile Detection
Smile detection has many potential applications. Our paper presents an efficient approach of smile detection. We have combined. Weak Classifiers depending upon intensity differences. This will generate a Strong classi...
An improved contourlet transform technique for image watermarking
In this paper, contourlet transform technique is explored to hide the information confidentially from the unauthorized users. The image is decomposed into subbands by using contourlet transform. These subbands are us...