International Journal of Computer Applications |
Foundation of Computer Science (FCS), NY, USA |
Volume 72 - Number 15 |
Year of Publication: 2013 |
Authors: S. Palani, A. Kumaresan, S. Murali |
10.5120/12567-8897 |
S. Palani, A. Kumaresan, S. Murali . A Vulnerable Scoring through Code-based Cloud Storage System with Sheltered Data Forwarding. International Journal of Computer Applications. 72, 15 ( June 2013), 1-3. DOI=10.5120/12567-8897
Cloud Storage System has a collection of storage servers provides long-standing storage services over the internet. Data privacy becomes a major concern in cloud storage system because user stores their data in third party cloud system. An encryption scheme available for data privacy but it limits the number of functions done in storage system. Building a secure storage system that supports multiple functions is tough when the storage system is distributed and has no central authority. A new idea is proposed proxy re-encryption scheme for decentralizes erasure code for defending the distributed system. The distributed storage system not only supports secure and robust data storage and recovery, but client onward his information in the storage servers to another user without retrieving the data back. The important technical part is that the proxy re-encryption scheme supports encoding operations over encrypted data as well as forwarding operations over encoded and encrypted data. Our schemes fully integrate encoding, encrypting, and onward.