A Secure Erasure Code-Based Cloud Storage System with Secure Data Forwarding

被引:108
|
作者
Lin, Hsiao-Ying [1 ]
Tzeng, Wen-Guey [1 ]
机构
[1] Natl Chiao Tung Univ, Intelligent Informat & Commun Res Ctr, Dept Comp Sci, Hsinchu 30010, Taiwan
关键词
Decentralized erasure code; proxy re-encryption; threshold cryptography; secure storage system;
D O I
10.1109/TPDS.2011.252
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
A cloud storage system, consisting of a collection of storage servers, provides long-term storage services over the Internet. Storing data in a third party's cloud system causes serious concern over data confidentiality. General encryption schemes protect data confidentiality, but also limit the functionality of the storage system because a few operations are supported over encrypted data. Constructing a secure storage system that supports multiple functions is challenging when the storage system is distributed and has no central authority. We propose a threshold proxy re-encryption scheme and integrate it with a decentralized erasure code such that a secure distributed storage system is formulated. The distributed storage system not only supports secure and robust data storage and retrieval, but also lets a user forward his data in the storage servers to another user without retrieving the data back. The main technical contribution is that the proxy re-encryption scheme supports encoding operations over encrypted messages as well as forwarding operations over encoded and encrypted messages. Our method fully integrates encrypting, encoding, and forwarding. We analyze and suggest suitable parameters for the number of copies of a message dispatched to storage servers and the number of storage servers queried by a key server. These parameters allow more flexible adjustment between the number of storage servers and robustness.
引用
收藏
页码:995 / 1003
页数:9
相关论文
共 50 条
  • [41] Data storage with secure boundary in cloud computing
    Zhu, Shuaishuai
    Han, Yiliang
    ICIC Express Letters, 2014, 8 (09): : 2389 - 2394
  • [42] Secure Data Storage Architecture on Cloud Environments
    Tran Thi Xuan Trang
    Maruyama, Katsuhisa
    ICSOFT-EA: PROCEEDINGS OF THE 11TH INTERNATIONAL JOINT CONFERENCE ON SOFTWARE TECHNOLOGIES - VOL. 1, 2016, : 39 - 47
  • [43] A Secure Data Deduplication Scheme for Cloud Storage
    Stanek, Jan
    Sorniotti, Alessandro
    Androulaki, Elli
    Kencl, Lukas
    FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2014, 2014, 8437 : 99 - 118
  • [44] A Secure and Searchable Data Storage in Cloud Computing
    Gupta, Sarika
    Satapathy, Sangita Rani
    Mehta, Piyush
    Tripathy, Anupam
    PROCEEDINGS OF THE 2013 3RD IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE (IACC), 2013, : 106 - 109
  • [45] Secure Data Storage Scheme in Hybrid Cloud
    Liu X.-J.
    Ye W.
    Jiang J.-W.
    Zhang L.
    Beijing Ligong Daxue Xuebao/Transaction of Beijing Institute of Technology, 2019, 39 (03): : 295 - 303
  • [46] Solution for Secure Private Data Storage in a Cloud
    Shatilov, Kirill
    Boiko, Vladislav
    Krendelev, Sergey
    Anisutina, Diana
    Sumaneev, Artem
    FEDERATED CONFERENCE ON COMPUTER SCIENCE AND INFORMATION SYSTEMS, 2014, 2014, 2 : 885 - 889
  • [47] A Secure Architecture for Data Storage in the Cloud Environments
    Fu, Chuan
    Yang, Jun
    Liu, Zheli
    Jia, Chunfu
    2015 9TH INTERNATIONAL CONFERENCE ON INNOVATIVE MOBILE AND INTERNET SERVICES IN UBIQUITOUS COMPUTING IMIS 2015, 2015, : 289 - 291
  • [48] Secure data storage in the cloud with homomorphic encryption
    Bensitel, Yasmina
    Romadi, Rahal
    2016 2ND INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGIES AND APPLICATIONS (CLOUDTECH), 2016, : 1 - 6
  • [49] Division of data in cloud environment for secure data storage
    Manjula, S.
    Devi, M. Indra
    Swathiya, R.
    2016 INTERNATIONAL CONFERENCE ON COMPUTING TECHNOLOGIES AND INTELLIGENT DATA ENGINEERING (ICCTIDE'16), 2016,
  • [50] CryptDICE: Distributed data protection system for secure cloud data storage and computation
    Rafique, Ansar
    Van Landuyt, Dimitri
    Beni, Emad Heydari
    Lagaisse, Bert
    Joosen, Wouter
    INFORMATION SYSTEMS, 2021, 96