A Cloud Storage System with Information Confidentiality and Forwarding

نویسنده

  • Dr. M. V. Siva Prasad
چکیده

Cloud storage suggests that the storage of information on-line within the cloud,wherein a company's knowledge is keep in and accessible from multiple distributed and connected resources that comprise a cloud.Cloud storage will offer the advantages of larger accessibility and reliability; speedy deployment; robust protection for knowledge backup,archival and disaster recovery purposes; and lower overall storage prices as a results of not having to buy, manage and maintain overpriced hardware. However, cloud storage will have the potential for security and compliance issues.Third party’s cloud system doesn't offer knowledge confidentiality. Constructing centralized storage system for the cloud system makes hackers scarf knowledge simply. General cryptography schemes shield knowledge confidentiality. within the projected system a secure distributed storage system is developed by desegregation a threshold proxy re-encryption theme with a suburbanised erasure code. The distributed storage system not solely supports secure and strong knowledge storage and retrieval, however conjointly lets a user forward knowledge from one user to a different while not retrieving the info back. the most technical involvement is that the proxy re-encryption theme supports coding operations over encrypted messages still as forwarding operations over encoded and encrypted messages. the strategy totally integrates encrypting, encoding, and forwarding.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Providing a Secure Data Forwarding in Cloud Storage System Using Threshold Proxy Re-encryption Scheme

Cloud computing treats the resources on the Internet as a unified entity, cloud. A cloud storage system is considered as a large scale distributed storage system that consists of many independent storage servers. Storing data in a third party’s cloud system causes serious concern on data confidentiality. In order to provide strong confidentiality for messages in storage servers, a user can encr...

متن کامل

Threshold Proxy Re-Encryption Scheme and Decentralized Erasure Code in Cloud Storage With Secure Data Forwarding

A cloud storage system, used to store large number of data in storage server. Cloud system is used to provide large number storage servers, which provide long-term storage service over the Internet. Third party’s cloud system does not provide data confidentiality. Constructing centralized storage system for the cloud system makes hackers stole data easily. General encryption schemes protect dat...

متن کامل

Secure Data Forwarding In Distributed Environment Using Cloud Storage System

A cloud storage system, used to store large number of data in storage server. Cloud system is used to provide large number storage servers, which provide long-term storage service over the Internet. Third party’s cloud system does not provide data confidentiality. Constructing centralized storage system for the cloud system makes hackers stole data easily. General encryption schemes protect dat...

متن کامل

Secured Efficient Data Access in Cloud Architecture with B+ Tree Algorithm

Cloud computing facilitates data protection, privacy and medical record access. Computing is the new trend to reduce the investment in business to satisfy the client needs using internet. The various cloud services provides infrastructure, software and platform. In cloud computing, data is moved to a remote location. Users store their data conscientiously in the cloud and return back when it is...

متن کامل

A Secure Cloud server System using Proxy Re-Encryption Model

A cloud storage system, consisting of a collection of storage servers, provides long-term storage services over the Internet. Storing data in a third party's cloud system causes serious concern over data confidentiality. General encryption schemes protect data confidentiality, but also limit the functionality of the storage system because a few operations are supported over encrypted data. Cons...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014