A Secure Erasure Code-Based Cloud Storage System with Secure Data Forwarding

被引:108
|
作者
Lin, Hsiao-Ying [1 ]
Tzeng, Wen-Guey [1 ]
机构
[1] Natl Chiao Tung Univ, Intelligent Informat & Commun Res Ctr, Dept Comp Sci, Hsinchu 30010, Taiwan
关键词
Decentralized erasure code; proxy re-encryption; threshold cryptography; secure storage system;
D O I
10.1109/TPDS.2011.252
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
A cloud storage system, consisting of a collection of storage servers, provides long-term storage services over the Internet. Storing data in a third party's cloud system causes serious concern over data confidentiality. General encryption schemes protect data confidentiality, but also limit the functionality of the storage system because a few operations are supported over encrypted data. Constructing a secure storage system that supports multiple functions is challenging when the storage system is distributed and has no central authority. We propose a threshold proxy re-encryption scheme and integrate it with a decentralized erasure code such that a secure distributed storage system is formulated. The distributed storage system not only supports secure and robust data storage and retrieval, but also lets a user forward his data in the storage servers to another user without retrieving the data back. The main technical contribution is that the proxy re-encryption scheme supports encoding operations over encrypted messages as well as forwarding operations over encoded and encrypted messages. Our method fully integrates encrypting, encoding, and forwarding. We analyze and suggest suitable parameters for the number of copies of a message dispatched to storage servers and the number of storage servers queried by a key server. These parameters allow more flexible adjustment between the number of storage servers and robustness.
引用
收藏
页码:995 / 1003
页数:9
相关论文
共 50 条
  • [31] Secure Data Deduplication System with Tag Consistency in Cloud Data Storage
    Patil, Pramod Gorakh
    Dixit, Aditya Rajesh
    Sharma, Aman
    Mahale, Prashant Rajendra
    Jadhav, Mayur Pundlik
    INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS AND COMMUNICATION TECHNOLOGIES (ICCNCT 2018), 2019, 15 : 119 - 124
  • [32] Secure fault-tolerant code for cloud storage
    Tan, Peng-Xu
    Chen, Yue
    Lan, Ju-Long
    Jia, Hong-Yong
    Tongxin Xuebao/Journal on Communications, 2014, 35 (03): : 109 - 115
  • [33] Secure Code Update for Embedded Devices via Proofs of Secure Erasure
    Perito, Daniele
    Tsudik, Gene
    COMPUTER SECURITY-ESORICS 2010, 2010, 6345 : 643 - 662
  • [34] A Cloud Secure Storage Mechanism Based on Data Dispersion and Encryption
    Song, Heqing
    Li, Jifei
    Li, Haoteng
    IEEE ACCESS, 2021, 9 : 63745 - 63751
  • [35] ID-Based Cryptography for Secure Cloud Data Storage
    Kaaniche, Nesrine
    Boudguiga, Aymen
    Laurent, Maryline
    2013 IEEE SIXTH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (CLOUD 2013), 2013, : 375 - 382
  • [36] SECURE STORAGE OF COMPUTER NETWORK DATA BASED ON CLOUD COMPUTING
    Jiang, Hongwei
    SCALABLE COMPUTING-PRACTICE AND EXPERIENCE, 2023, 24 (04): : 663 - 672
  • [37] An E-learning System Based on Secure Data Storage Services in Cloud Computing
    Gopinath, R.
    Geetha, B. G.
    INTERNATIONAL JOURNAL OF INFORMATION TECHNOLOGY AND WEB ENGINEERING, 2013, 8 (02) : 1 - 17
  • [38] A Secure Cloud Storage System Based on Discrete Logarithm Problem
    Zhang, Jian
    Yang, Yang
    Chen, Yanjiao
    Chen, Fei
    2017 IEEE/ACM 25TH INTERNATIONAL SYMPOSIUM ON QUALITY OF SERVICE (IWQOS), 2017,
  • [39] Secure Data Storage in Distributed Cloud Environments
    Jordao, Renata
    Martins, Valerio Aymore
    Buiati, Fabio
    de Sousa Junior, Rafael Timoteo
    de Deus, Flavio Elias
    2014 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2014,
  • [40] Secure data deletion in cloud storage: a survey
    Hua, Minyao
    Zhao, Yinyuan
    Jiang, Tao
    INTERNATIONAL JOURNAL OF EMBEDDED SYSTEMS, 2020, 12 (02) : 253 - 265