A Vulnerable Scoring through Code-based Cloud Storage System with Sheltered Data Forwarding

نویسندگان

  • S. Palani
  • A. Kumaresan
  • S. Murali
  • Matthew Green
  • Susan Hohenberger
  • Zhongwen Guo
  • Pengpeng Chen
  • Hao Zhang
  • Chunrong Li
  • D. Bindel
  • Y. Chen
  • P. Eaton
  • D. Geels
  • R. Gummadi
  • S. Rhea
  • A. Adya
  • W. J. Bolosky
  • M. Castro
  • G. Cermak
  • R. Chaiken
  • J. R. Douceur
  • J. Howell
  • J. R. Lorch
چکیده

Cloud Storage System has a collection of storage servers provides long-standing storage services over the internet. Data privacy becomes a major concern in cloud storage system because user stores their data in third party cloud system. An encryption scheme available for data privacy but it limits the number of functions done in storage system. Building a secure storage system that supports multiple functions is tough when the storage system is distributed and has no central authority. A new idea is proposed proxy re-encryption scheme for decentralizes erasure code for defending the distributed system. The distributed storage system not only supports secure and robust data storage and recovery, but client onward his information in the storage servers to another user without retrieving the data back. The important technical part is that the proxy re-encryption scheme supports encoding operations over encrypted data as well as forwarding operations over encoded and encrypted data. Our schemes fully integrate encoding, encrypting, and onward.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Threshold Proxy Re-Encryption Scheme and Decentralized Erasure Code in Cloud Storage With Secure Data Forwarding

A cloud storage system, used to store large number of data in storage server. Cloud system is used to provide large number storage servers, which provide long-term storage service over the Internet. Third party’s cloud system does not provide data confidentiality. Constructing centralized storage system for the cloud system makes hackers stole data easily. General encryption schemes protect dat...

متن کامل

Providing a Secure Data Forwarding in Cloud Storage System Using Threshold Proxy Re-encryption Scheme

Cloud computing treats the resources on the Internet as a unified entity, cloud. A cloud storage system is considered as a large scale distributed storage system that consists of many independent storage servers. Storing data in a third party’s cloud system causes serious concern on data confidentiality. In order to provide strong confidentiality for messages in storage servers, a user can encr...

متن کامل

Secure Data Forwarding In Distributed Environment Using Cloud Storage System

A cloud storage system, used to store large number of data in storage server. Cloud system is used to provide large number storage servers, which provide long-term storage service over the Internet. Third party’s cloud system does not provide data confidentiality. Constructing centralized storage system for the cloud system makes hackers stole data easily. General encryption schemes protect dat...

متن کامل

An Efficient Secret Sharing-based Storage System for Cloud-based Internet of Things

Internet of things (IoTs) is the newfound information architecture based on the internet that develops interactions between objects and services in a secure and reliable environment. As the availability of many smart devices rises, secure and scalable mass storage systems for aggregate data is required in IoTs applications. In this paper, we propose a new method for storing aggregate data in Io...

متن کامل

A Secure Cloud server System using Proxy Re-Encryption Model

A cloud storage system, consisting of a collection of storage servers, provides long-term storage services over the Internet. Storing data in a third party's cloud system causes serious concern over data confidentiality. General encryption schemes protect data confidentiality, but also limit the functionality of the storage system because a few operations are supported over encrypted data. Cons...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013