A Secure Erasure Cloud Storage system using Advanced Encryption Standard algorithm and Proxy Re-encryption

被引:0
|
作者
Nivedhaa, R. [1 ]
Justus, J. Jean [1 ]
机构
[1] St Josephs Coll Engn, CSE, Chennai, Tamil Nadu, India
关键词
Cloud computing security; Encryption; Secure storage;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Cloud computing is a model that treats the resources on the internet as an integrated entity, cloud. Organizations proposing computing services are termed cloud providers and normally charge for their services based on the consumption. Cloud storage is an improved way out to those who wish to pay consideration to the security issues of their data. Cloud storage provides enhanced security from the occurrence of viruses. It is difficult for the information to be retrieved by any unauthenticated user since the data is encrypted when it is stored in the server. The entire server is very much secured with innovative encryption system. The central focus of this paper is creating a protected storage system that provisions multiple tasks and this is thought-provoking when the storage system is dispersed and has no central power. Here, a proxy re-encryption scheme is suggested and combined with a distributed erasure code such that a secure and strong data storage and retrieval, but also lets a user to share his information on the cloud with a different user in the encrypted format itself. This paper facilitates the use of encoding the encrypted files and sharing files in the encrypted format itself. This paper uses the techniques of both encrypting and sharing the data. Erasure encoding supports sharing encrypted files and is valid in decentralized distributed system. A distributed erasure code is used to authorize the data safety in the dispersed cloud storage.
引用
收藏
页码:755 / 759
页数:5
相关论文
共 50 条
  • [21] Fully Secure Identity Based Proxy Re-Encryption Schemes in the Standard Model
    Hu, Xiaoming
    Chen, Xu
    Huang, Shangteng
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, 2008, : 53 - +
  • [22] KAPRE: Key-aggregate proxy re-encryption for secure and flexible data sharing in cloud storage
    Pareek, Gaurav
    Purushothama, B. R.
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2021, 63
  • [23] Secure Proxy Re-Encryption from CBE to IBE
    CHEN Yan
    Wuhan University Journal of Natural Sciences, 2008, (06) : 657 - 661
  • [24] Secure sharing of mobile personal healthcare records using certificateless proxy re-encryption in cloud
    Bhatia, Tarunpreet
    Verma, A. K.
    Sharma, Gaurav
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2018, 29 (06):
  • [25] Secure Certificateless Proxy Re-encryption Without Pairing
    Kuchta, Veronika
    Sharma, Gaurav
    Sahu, Rajeev Anand
    Bhatia, Tarunpreet
    Markowitch, Olivier
    ADVANCES IN INFORMATION AND COMPUTER SECURITY, IWSEC 2017, 2017, 10418 : 85 - 101
  • [26] Towards a Secure Certificateless Proxy Re-Encryption Scheme
    Guo, Hui
    Zhang, Zhenfeng
    Zhang, Jiang
    Chen, Cheng
    PROVABLE SECURITY, 7TH INTERNATIONAL CONFERENCE, PROVSEC 2013, 2013, 8209 : 330 - 346
  • [27] Chosen-Ciphertext Secure Proxy Re-Encryption
    Canetti, Ran
    Hohenberger, Susan
    CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2007, : 185 - 194
  • [28] Proxy Re-Encryption Based on Homomorphic Encryption
    Bellafqira, Reda
    Coatrieux, Gouenou
    Bouslimi, Dalel
    Quellec, Gwenole
    Cozic, Michel
    33RD ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2017), 2017, : 154 - 161
  • [29] Homomorphic Proxy Re-Encryption and Multiparty Cloud Computing
    Liu, Shu-Guang
    Zhang, Wei
    INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS AND INFORMATION SECURITY (CNIS 2015), 2015, : 222 - 225
  • [30] A proxy broadcast re-encryption for cloud data sharing
    Sun, Maosheng
    Ge, Chunpeng
    Fang, Liming
    Wang, Jiandong
    MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (09) : 10455 - 10469