Corpus ID: 15597791

Secure Data Forwarding In Distributed Environment Using Cloud Storage System

  title={Secure Data Forwarding In Distributed Environment Using Cloud Storage System},
  author={S. Amritha and S. Saravana Kumar},
A cloud storage system, used to store large number of data in storage server. Cloud system is used to provide large number storage servers, which provide long-term storage service over the Internet. Third party’s cloud system does not provide data confidentiality. Constructing centralized storage system for the cloud system makes hackers stole data easily. General encryption schemes protect data confidentiality. In the proposed system a secure distributed storage system is formulated by… Expand
1 Citations
Reed solomon codes and its application for cloud storage system
A review of the most successful of the proposed approaches of cloud storage and presents systems which are scalable, complex, distributed data storage system, providing necessary safety characteristics with provable data availability. Expand


A Secure Erasure Code-Based Cloud Storage System with Secure Data Forwarding
A cloud storage system, consisting of a collection of storage servers, provides long-term storage services over the Internet. Storing data in a third party’s cloud system causes serious concern overExpand
Improved proxy re-encryption schemes with applications to secure distributed storage
Performance measurements of the experimental file system demonstrate the usefulness of proxy re-encryption as a method of adding access control to a secure file system and present new re-Encryption schemes that realize a stronger notion of security. Expand
CCA-Secure Proxy Re-Encryption without Pairings
  • Jun Shao, Z. Cao
  • Computer Science, Mathematics
  • IACR Cryptol. ePrint Arch.
  • 2009
This paper proposes a proxy re-encryption scheme without pairings, in which the proxy can only transform the ciphertext in one direction, and is the first unidirectional PRE scheme with CCA security and collusion-resistance. Expand
Farsite: federated, available, and reliable storage for an incompletely trusted environment
The design of Farsite is reported on and the lessons learned by implementing much of that design are reported, including how to locally caching file data, lazily propagating file updates, and varying the duration and granularity of content leases. Expand
PAST: a large-scale, persistent peer-to-peer storage utility
The design of PAST is sketched, a large-scale, Internet-based, global storage utility that provides scalability, high availability, persistence and security, and the use of randomization to ensure diversity in the set of nodes that store a file's replicas. Expand
Ubiquitous access to distributed data in large-scale sensor networks through decentralized erasure codes
This work introduces a class of erasure codes and shows how to efficiently diffuse the data by "pre-routing" only O(ln n) packets per data node to randomly selected storage nodes. Expand
Decentralized erasure codes for distributed networked storage
Decentralized erasure codes are introduced, which are linear codes with a specific randomized structure inspired by network coding on random bipartite graphs that lead to reduced communication, storage and computation cost over random linear coding. Expand
Divertible Protocols and Atomic Proxy Cryptography
A definition of protocol divertibility is given that applies to arbitrary 2-party protocols and is compatible with Okamoto and Ohta's definition in the case of interactive zero-knowledge proofs and generalizes to cover several protocols not normally associated with divertibility. Expand
Glacier: highly durable, decentralized storage despite massive correlated failures
Glasgow is described, a distributed storage system that relies on massive redundancy to mask the effect of large-scale correlated failures and is used as the storage layer for an experimental serverless email system. Expand
OceanStore: an architecture for global-scale persistent storage
OceanStore monitoring of usage patterns allows adaptation to regional outages and denial of service attacks; monitoring also enhances performance through pro-active movement of data. Expand