A Secure Erasure Cloud Storage system using Advanced Encryption Standard algorithm and Proxy Re-encryption

被引:0
|
作者
Nivedhaa, R. [1 ]
Justus, J. Jean [1 ]
机构
[1] St Josephs Coll Engn, CSE, Chennai, Tamil Nadu, India
关键词
Cloud computing security; Encryption; Secure storage;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Cloud computing is a model that treats the resources on the internet as an integrated entity, cloud. Organizations proposing computing services are termed cloud providers and normally charge for their services based on the consumption. Cloud storage is an improved way out to those who wish to pay consideration to the security issues of their data. Cloud storage provides enhanced security from the occurrence of viruses. It is difficult for the information to be retrieved by any unauthenticated user since the data is encrypted when it is stored in the server. The entire server is very much secured with innovative encryption system. The central focus of this paper is creating a protected storage system that provisions multiple tasks and this is thought-provoking when the storage system is dispersed and has no central power. Here, a proxy re-encryption scheme is suggested and combined with a distributed erasure code such that a secure and strong data storage and retrieval, but also lets a user to share his information on the cloud with a different user in the encrypted format itself. This paper facilitates the use of encoding the encrypted files and sharing files in the encrypted format itself. This paper uses the techniques of both encrypting and sharing the data. Erasure encoding supports sharing encrypted files and is valid in decentralized distributed system. A distributed erasure code is used to authorize the data safety in the dispersed cloud storage.
引用
收藏
页码:755 / 759
页数:5
相关论文
共 50 条
  • [41] Proxy Re-Encryption Scheme for Decentralized Storage Networks
    Kan, Jia
    Zhang, Jie
    Liu, Dawei
    Huang, Xin
    APPLIED SCIENCES-BASEL, 2022, 12 (09):
  • [42] Proactive threshold-proxy re-encryption scheme for secure data sharing on cloud
    Nitish Raghav
    Katyayani Andola
    S. Verma
    Shekhar Venkatesan
    The Journal of Supercomputing, 2023, 79 : 14117 - 14145
  • [43] PRE+: dual of proxy re-encryption for secure cloud data sharing service
    Wang, Xu An
    Xhafa, Fatos
    Ma, Jianfeng
    Barolli, Leonard
    Ge, Yunlong
    INTERNATIONAL JOURNAL OF WEB AND GRID SERVICES, 2018, 14 (01) : 44 - 69
  • [44] Pairing free and implicit certificate based signcryption scheme with proxy re-encryption for secure cloud data storage
    Braeken, An
    Shabisha, Placide
    Touhafi, Abdellah
    Steenhaut, Kris
    PROCEEDINGS OF 2017 3RD INTERNATIONAL CONFERENCE OF CLOUD COMPUTING TECHNOLOGIES AND APPLICATIONS (CLOUDTECH), 2017, : 32 - 38
  • [45] Strong Post-Compromise Secure Proxy Re-Encryption
    Davidson, Alex
    Deo, Amit
    Lee, Ela
    Martin, Keith
    INFORMATION SECURITY AND PRIVACY, ACISP 2019, 2019, 11547 : 58 - 77
  • [46] A Time-Based Group Key Management Algorithm Based on Proxy Re-encryption for Cloud Storage
    Cui, Yihui
    Peng, Zhiyong
    Song, Wei
    Li, Xiaojuan
    Cheng, Fangquan
    Ding, Luxiao
    WEB TECHNOLOGIES AND APPLICATIONS, APWEB 2014, 2014, 8709 : 117 - 128
  • [47] Generic Construction of Chosen Ciphertext Secure Proxy Re-Encryption
    Hanaoka, Goichiro
    Kawai, Yutaka
    Kunihiro, Noboru
    Matsuda, Takahiro
    Weng, Jian
    Zhang, Rui
    Zhao, Yunlei
    TOPICS IN CRYPTOLOGY - CT-RSA 2012, 2012, 7178 : 349 - +
  • [48] Distributed Proxy Re-Encryption Protocol for Secure Multiparty Computation with Fully Homomorphic Encryption
    Demir, Busranur Bulbul
    Altilar, Deniz Turgay
    2024 IEEE INTERNATIONAL BLACK SEA CONFERENCE ON COMMUNICATIONS AND NETWORKING, BLACKSEACOM 2024, 2024, : 199 - 204
  • [49] Unidirectional chosen-ciphertext secure proxy re-encryption
    Libert, Benoit
    Vergnaud, Damien
    PUBLIC KEY CRYPTOGRAPHY - PKC 2008, 2008, 4939 : 360 - +
  • [50] Chosen-Ciphertext Secure Certificateless Proxy Re-Encryption
    Sur, Chul
    Jung, Chae Duk
    Park, Youngho
    Rhee, Kyung Hyune
    COMMUNICATIONS AND MULTIMEDIA SECURITY, PROCEEDINGS, 2010, 6109 : 214 - +