Secure Storage and Retrieval of Data without Original Files in Cloud Architectures Subtitle as needed

نویسندگان

  • Jianhong Zhang
  • Xue Liu
چکیده

When a client uses the service which is offered by cloud storage providers, he might worry about how to retrieve their original files securely. Relieving client’s storage burden and successfully retrieving data on demand are the ultimate purposes of cloud storage service. To achieve the above two aims, in this paper we propose a specific way to store and retrieve the out stored data in cloud storage. We utilize an efficient publicly verifiable secret sharing (PVSS) scheme to divide the file into multiple parts and store them among a group of servers, then using the recovery algorithm in PVSS, the users can retrieve their stored files successfully from any k qualified servers without the need of holding original file. Thus, the storage burden of the user is relieved much. And we show that the security of the protocol is closely related to the computational Diffie-Hellman problem.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Efficient Secret Sharing-based Storage System for Cloud-based Internet of Things

Internet of things (IoTs) is the newfound information architecture based on the internet that develops interactions between objects and services in a secure and reliable environment. As the availability of many smart devices rises, secure and scalable mass storage systems for aggregate data is required in IoTs applications. In this paper, we propose a new method for storing aggregate data in Io...

متن کامل

Fuzzy retrieval of encrypted data by multi-purpose data-structures

The growing amount of information that has arisen from emerging technologies has caused organizations to face challenges in maintaining and managing their information. Expanding hardware, human resources, outsourcing data management, and maintenance an external organization in the form of cloud storage services, are two common approaches to overcome these challenges; The first approach costs of...

متن کامل

Attribute-based Access Control for Cloud-based Electronic Health Record (EHR) Systems

Electronic health record (EHR) system facilitates integrating patients' medical information and improves service productivity. However, user access to patient data in a privacy-preserving manner is still challenging problem. Many studies concerned with security and privacy in EHR systems. Rezaeibagha and Mu [1] have proposed a hybrid architecture for privacy-preserving accessing patient records...

متن کامل

A Mobile and Fog-based Computing Method to Execute Smart Device Applications in a Secure Environment

With the rapid growth of smart device and Internet of things applications, the volume of communication and data in networks have increased. Due to the network lag and massive demands, centralized and traditional cloud computing architecture are not accountable to the high users' demands and not proper for execution of delay-sensitive and real time applications. To resolve these challenges, we p...

متن کامل

A Comprehensive Data Forwarding Technique under Cloud with Dynamic Notification

The aim of the study is to propose an integrated encrypting, encoding, forwarding and online alert scheme with a decentralized scattered code such that a secure distributed and forward storage system is formulated. The distributed data forwarded storage system supports secure and robust data storage and retrieval and also lets a user forward his data among storage servers to another user withou...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012