CFP last date
20 January 2025
Reseach Article

A Vulnerable Scoring through Code-based Cloud Storage System with Sheltered Data Forwarding

by S. Palani, A. Kumaresan, S. Murali
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 72 - Number 15
Year of Publication: 2013
Authors: S. Palani, A. Kumaresan, S. Murali
10.5120/12567-8897

S. Palani, A. Kumaresan, S. Murali . A Vulnerable Scoring through Code-based Cloud Storage System with Sheltered Data Forwarding. International Journal of Computer Applications. 72, 15 ( June 2013), 1-3. DOI=10.5120/12567-8897

@article{ 10.5120/12567-8897,
author = { S. Palani, A. Kumaresan, S. Murali },
title = { A Vulnerable Scoring through Code-based Cloud Storage System with Sheltered Data Forwarding },
journal = { International Journal of Computer Applications },
issue_date = { June 2013 },
volume = { 72 },
number = { 15 },
month = { June },
year = { 2013 },
issn = { 0975-8887 },
pages = { 1-3 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume72/number15/12567-8897/ },
doi = { 10.5120/12567-8897 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:37:58.125731+05:30
%A S. Palani
%A A. Kumaresan
%A S. Murali
%T A Vulnerable Scoring through Code-based Cloud Storage System with Sheltered Data Forwarding
%J International Journal of Computer Applications
%@ 0975-8887
%V 72
%N 15
%P 1-3
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cloud Storage System has a collection of storage servers provides long-standing storage services over the internet. Data privacy becomes a major concern in cloud storage system because user stores their data in third party cloud system. An encryption scheme available for data privacy but it limits the number of functions done in storage system. Building a secure storage system that supports multiple functions is tough when the storage system is distributed and has no central authority. A new idea is proposed proxy re-encryption scheme for decentralizes erasure code for defending the distributed system. The distributed storage system not only supports secure and robust data storage and recovery, but client onward his information in the storage servers to another user without retrieving the data back. The important technical part is that the proxy re-encryption scheme supports encoding operations over encrypted data as well as forwarding operations over encoded and encrypted data. Our schemes fully integrate encoding, encrypting, and onward.

References
  1. Giuseppe Ateniese, Kevin fu, Amherst Matthew Green, Susan Hohenberger, February 2006. Improved Proxy Re-encryption Schemes with Applications to Secure Distributed Storage. The Johns Hopkins University, University of Massachusetts, The Johns Hopkins University and Massachusetts Institute of Technology.
  2. Zhongwen Guo, Member, IEEE, Pengpeng Chen, Hao Zhang, , Chunrong Li and Mingxing Jiang. May 2012. IMA: An Integrated Monitoring Architecture With Sensor Networks. A Secure Erasure Code-Based Cloud Storage System with Secure Data Forwarding,
  3. J. Kubiatowicz, D. Bindel, Y. Chen, P. Eaton, D. Geels, R. Gummadi, S. Rhea, H. eatherspoon, W. Weimer, C. Wells, and B. Zhao, 2000. "Oceanstore: An Architecture for Global-Scale Persistent Storage," Proc. Ninth Int'l Conf. Architectural Support for Programming Languages and Operating Systems (ASPLOS), pp. 190- 201.
  4. P. Druschel and A. Rowstron, 2001. "PAST: A Large-Scale, Persistent Peer-to-Peer Storage Utility," Proc. Eighth Workshop Hot Topics in Operating System (HotOS VIII), pp. 75-80.
  5. A. Adya, W. J. Bolosky, M. Castro, G. Cermak, R. Chaiken, J. R. Douceur, J. Howell, J. R. Lorch, M. Theimer, and R. Wattenhofer, "Farsite: Federated, 2002. Available, and Reliable Storage for an Incompletely Trusted Environment," Proc. Fifth Symp. Operating System Design and Implementation (OSDI), pp. 1-14.
  6. A. Haeberlen, A. Mislove, and P. Druschel, 2005. "Glacier: Highly Durable, Decentralized Storage Despite Massive Correlated Failures," Proc. Second Symp. Networked Systems Design and Implementation (NSDI), pp. 143-158.
Index Terms

Computer Science
Information Sciences

Keywords

Ciphertext Plaintext Key translation Proxy re-encryption