A Secure Erasure Cloud Storage system using Advanced Encryption Standard algorithm and Proxy Re-encryption

被引:0
|
作者
Nivedhaa, R. [1 ]
Justus, J. Jean [1 ]
机构
[1] St Josephs Coll Engn, CSE, Chennai, Tamil Nadu, India
关键词
Cloud computing security; Encryption; Secure storage;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Cloud computing is a model that treats the resources on the internet as an integrated entity, cloud. Organizations proposing computing services are termed cloud providers and normally charge for their services based on the consumption. Cloud storage is an improved way out to those who wish to pay consideration to the security issues of their data. Cloud storage provides enhanced security from the occurrence of viruses. It is difficult for the information to be retrieved by any unauthenticated user since the data is encrypted when it is stored in the server. The entire server is very much secured with innovative encryption system. The central focus of this paper is creating a protected storage system that provisions multiple tasks and this is thought-provoking when the storage system is dispersed and has no central power. Here, a proxy re-encryption scheme is suggested and combined with a distributed erasure code such that a secure and strong data storage and retrieval, but also lets a user to share his information on the cloud with a different user in the encrypted format itself. This paper facilitates the use of encoding the encrypted files and sharing files in the encrypted format itself. This paper uses the techniques of both encrypting and sharing the data. Erasure encoding supports sharing encrypted files and is valid in decentralized distributed system. A distributed erasure code is used to authorize the data safety in the dispersed cloud storage.
引用
收藏
页码:755 / 759
页数:5
相关论文
共 50 条
  • [1] Secure bidirectional proxy re-encryption for cryptographic cloud storage
    Shao, Jun
    Lu, Rongxing
    Lin, Xiaodong
    Liang, Kaitai
    PERVASIVE AND MOBILE COMPUTING, 2016, 28 : 113 - 121
  • [2] A New Kind of Conditional Proxy Re-Encryption for Secure Cloud Storage
    Zeng, Peng
    Choo, Kim-Kwang Raymond
    IEEE ACCESS, 2018, 6 : 70017 - 70024
  • [3] Fine-grained and heterogeneous proxy re-encryption for secure cloud storage
    Xu, Peng
    Chen, Hongwu
    Zou, Deqing
    Jin, Hai
    CHINESE SCIENCE BULLETIN, 2014, 59 (32): : 4201 - 4209
  • [4] Semantic keyword searchable proxy re-encryption for postquantum secure cloud storage
    Yang, Yang
    Zheng, Xianghan
    Chang, Victor
    Tang, Chunming
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2017, 29 (19):
  • [5] Fine-grained and heterogeneous proxy re-encryption for secure cloud storage
    Peng Xu
    Hongwu Chen
    Deqing Zou
    Hai Jin
    Chinese Science Bulletin, 2014, 59 (32) : 4201 - 4209
  • [6] CCA Secure Proxy Re-Encryption Scheme for Secure Sharing of Files through Cloud Storage
    Mishra, Bharati
    Jena, Debsish
    PROCEEDINGS OF 2018 FIFTH INTERNATIONAL CONFERENCE ON EMERGING APPLICATIONS OF INFORMATION TECHNOLOGY (EAIT), 2018,
  • [7] A Secure Revocable Identity-Based Proxy Re-encryption Scheme for Cloud Storage
    Luo, Wei
    Ma, Wenping
    CLOUD COMPUTING AND SECURITY, PT II, 2018, 11064 : 519 - 530
  • [8] Efficient and Secure Certificateless Proxy Re-Encryption
    Liu, Ya
    Wang, Hongbing
    Wang, Chunlu
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2017, 11 (04): : 2254 - 2275
  • [9] Secure cloud storage service and limited proxy re-encryption for enforcing access control in public cloud
    Purushothama, B.R.
    Shrinath, B.
    Amberker, B.B.
    International Journal of Information and Communication Technology, 2013, 5 (02) : 167 - 186
  • [10] Proxy Re-encryption with Unforgeable Re-encryption Keys
    Guo, Hui
    Zhang, Zhenfeng
    Zhang, Jiang
    CRYPTOLOGY AND NETWORK SECURITY, CANS 2014, 2014, 8813 : 20 - 33