scholarly journals A Secure Code Based Cloud Storage System Using Proxy Re-Encryption Scheme in Cloud Computing

2013 ◽  
Vol 9 (2) ◽  
pp. 22-27
Author(s):  
Priyadharshini. B.

The rapid development in information technology has rendered an increase in the data volume at a speed which is surprising. In recent times, cloud computing and the Internet of Things (IoT) have become the hottest among the topics in the industry of information technology. There are many advantages to Cloud computing such as scalability, low price, and large scale and the primary technique of the IoTs like the Radio-Frequency Identification (RFID) have been applied to a large scale. In the recent times, the users of cloud storage have been increasing to a great extent and the reason behind this was the cloud storage system bringing down the issues in maintenance and also has a low amount of storage when compared to other methods. This system provides a high degree of reliability and availability where redundancy is introduced to the systems. In the replicated systems, objects get to be copied many times and every copy resides in a different location found in distributed computing. So, replication of data has been posing some threat to the cloud storage for users and also for the providers since it has been a major challenge providing efficient storage of data. So, the work has been analysing different strategies of replication of data and have pointed out several issues that are affected by this. For the purpose of this work, replication of data has been presented by employing the Cuckoo Search (CS) and the Greedy Search. The research is proceeding in a direction to reduce the replications without any adverse effect on the reliability and the availability of data.


2013 ◽  
Vol 756-759 ◽  
pp. 1275-1279
Author(s):  
Lin Na Huang ◽  
Feng Hua Liu

Cloud storage of high performance is the basic condition for cloud computing. This article introduces the concept and advantage of cloud storage, discusses the infrastructure of cloud storage system as well as the architecture of cloud data storage, researches the details about the design of Distributed File System within cloud data storage, at the same time, puts forward different developing strategies for the enterprises according to the different roles that the enterprises are acting as during the developing process of cloud computing.


2013 ◽  
Vol 4 (1) ◽  
pp. 106-110
Author(s):  
Rajasekaran S ◽  
Kalifulla. Y ◽  
Murugesan. S ◽  
Ezhilvendan. M ◽  
Gunasekaran. J

cloud storage system, consisting of a collection of storage servers, provides long-term storage services over the Internet.  Storing data in a third party’s cloud system causes serious concern over data confidentiality. General encryption schemes protect data confidentiality, but also limit the functionality of the storage system because a few operations are supported over encrypted data. Constructing a secure storage system that supports multiple functions is challenging when the storage system is distributed and has no central authority. We propose a threshold proxy re-encryption scheme and integrate it with a decentralized erasure code such that a secure distributed storage system is formulated. The distributed storage system not only supports secure and robust data storage and retrieval, but also lets a user forward his data in the storage servers to another user without retrieving the data back. The main technical contribution is that the proxy re-encryption scheme supports encoding operations over encrypted messages as well as forwarding operations over encoded and encrypted messages. Our method fully integrates encrypting, encoding, and forwarding. We analyze and suggest suitable parameters for the number of copies of a message dispatched to storage servers and the number of storage servers queried by a key server. These parameters allow more flexible adjustment between the number of storage servers and robustness.


2018 ◽  
Vol 7 (2.32) ◽  
pp. 315
Author(s):  
V Naresh ◽  
M Anudeep ◽  
M Saipraneeth ◽  
A Saikumar Reddy ◽  
V Navya

The cloud stockpiling framework, comprising of capacity servers, gives long haul stockpiling administrations on the Internet. Maintaining the data in the cloud computing of third parties generates: serious concern about the confidentiality of data and the reduction of data management costs. Nonetheless, we should give security certifications to outside information. We plan and actualize a protected cloud stockpiling framework that gives secure, secure and available record security for document administration and secure information exchange. It includes foreign files with a file access policy, possibly deleting files, to avoid being denied to anyone with a file access policy. To achieve these security objectives, a set of password keys is implemented that maintain a host (s) or head (s) separately. We offer a twofold edge intermediary coding plan and incorporate it with a decentralized disposal code, which is detailed with a safely Cloud storage framework. The Cloud storage system not only provides a secure and stable search and storage of data, but also allows the user to transfer their data to the user of the backup to another user without the data being returned.  


2013 ◽  
Vol 443 ◽  
pp. 477-481
Author(s):  
Kai Song

Cloud storage, data storage means occurring in recent years is based on cloud computing technology. It is the inevitable trend of data storage in the future. The article describes the definition and characteristics of cloud computing and design a generic cloud computing architecture, given its storage technology for cloud computing, cloud storage system architecture model. At last, the paper prospects the tendency of cloud computing and its storage technology.


2014 ◽  
Vol 556-562 ◽  
pp. 6179-6183
Author(s):  
Zhi Gang Chai ◽  
Ming Zhao ◽  
Xiao Yu

With the rapid development of information technology, the extensive use of cloud computing promotes technological change in the IT industry. The use of cloud storage industry is also one solution to the problem of an amount of data storing, which is traditionally large, and unimaginably redundant. The use of cloud computing in the storage system connects the user's data with network clients via the Internet. That is to say, it not only solves a lot of data storage space requirements in request, but also greatly reduces the cost of the storage system. But in the application of cloud storage, there are also many problems to be solved, even to some extent which has hindered the development of cloud storage. Among these issues, the most concerning one is cloud storage security. The following passages discuss the problem and propose a solution to it.


2017 ◽  
Vol 2017 ◽  
pp. 1-10 ◽  
Author(s):  
Hongying Zheng ◽  
Jieming Wu ◽  
Bo Wang ◽  
Jianyong Chen

Attribute-based encryption (ABE) is considered a promising technique for cloud storage where multiple accessors may read the same file. For storage system with specific personal health record (PHR), we propose a modified ciphertext-policy attribute-based encryption scheme with expressive and flexible access policy for public domains. Our scheme supports multiauthority scenario, in which the authorities work independently without an authentication center. For attribute revocation, it can generate different update parameters for different accessors to effectively resist both accessor collusion and authority collusion. Moreover, a blacklist mechanism is designed to resist role-based collusion. Simulations show that the proposed scheme can achieve better performance with less storage occupation, computation assumption, and revocation cost compared with other schemes.


2015 ◽  
pp. 2274-2287
Author(s):  
Yaser Jararweh ◽  
Ola Al-Sharqawi ◽  
Nawaf Abdulla ◽  
Lo'ai Tawalbeh ◽  
Mohammad Alhammouri

In recent years Cloud computing has become the infrastructure which small and medium-sized businesses are increasingly adopting for their IT and computational needs. It provides a platform for high performance and throughput oriented computing, and massive data storage. Subsequently, novel tools and technologies are needed to handle this new infrastructure. One of the biggest challenges in this evolving field is Cloud storage security, and accordingly we propose new optimized techniques based on encryption process to achieve better storage system security. This paper proposes a symmetric block algorithm (CHiS-256) to encrypt Cloud data in efficient manner. Also, this paper presents a novel partially encrypted metadata-based data storage. The (CHiS-256) cipher is implemented as part of the Cloud data storage service to offer a secure, high-performance and throughput Cloud storage system. The results of our proposed algorithm are promising and show the methods to be advantageous in Cloud massive data storage and access applications.


Author(s):  
P. NagaRaju ◽  
N. Nagamalleswara Rao

Cloud computing (CC) is one amongst the developing technologies, which get more attention from academia as well as industries. It offers diverse benefits like sharing computing resources, service flexibility, reducing costs, etc. The Cloud Services Provider (CSP) is accountable for the data that are delivered to the cloud. The threat of seeing the stored data and using sensitive raw data by strangers is the main barrier in the utilization of cloud services. So, Data Security (DS) along with privacy is the chief issue, which is an obstacle while adopting the CC. Countless techniques are existent for ensuring data confidentiality, but they do not completely give protection to the data. To trounce these drawbacks, this paper introduces the Obfuscation (OB) based Modified Elliptical Curve Cryptography (MECC) algorithm for protecting data as of malicious attacks, which is termed as OB-MECC. Primarily, the proposed method obfuscates the data before they are uploaded to the cloud. For the OB of the data, the proposed work employs methods like substitution cipher (SC), position update, Ceaser cipher, binary conversion, 8-bit binary conversion, decimal(),  two complex(), and ASCII(). Then, encryption of the obfuscated data is done with the utilization of the MECC algorithm. After encryption, the data on the cloud is retrieved. The retrieved data is then decrypted by reversing the OB and encryption process to get the actual data. The outcomes corroborate that the confidentiality and security level are maximum for the proposed OB-MECC when contrasted to the existing approaches.


2018 ◽  
Vol 228 ◽  
pp. 01012
Author(s):  
Biao Wan

In the era of big data, the storage of massive data has become an important issue that enterprises need to solve. However, the existing storage model hinders the pace of the times, and new storage technologies and storage models that adapt to the development of the times must be studied. This paper first summarizes and summarizes the problems faced by Big Data, then proposes and analyzes popular cloud storage and cloud computing for storage problems, discusses its structure and models, introduces such technologies, and will lead the development of the times.


Sign in / Sign up

Export Citation Format

Share Document