Proxy Re-encryption Scheme for Decentralizes Erasure Code for Defending the Distributed System

Proxy Re-encryption Scheme for Decentralizes Erasure Code for Defending the Distributed System

Authors

  • K. Anita Davamani, S. Amudha

Keywords:

Cloud, Data Privacy, Proxy Re-encryption

Abstract

Cloud Storage System has a collection of storage servers provides long-standing
storage services over the internet. Data privacy becomes a major concern in cloud storage
system because user stores his data in third party cloud system. Encryption schemes
available for data privacy but it limit the number of functions done in storage system.
Building a secure storage system that supports multiple functions is tough when the
storage system is distributed and has no central authority. A new idea is proposed proxy
re-encryption scheme for decentralizes erasure code for defending the distributed system.
The distributed storage system not only supports secure and robust data storage and
retrieval, but also lets a user forward his data in the storage servers to another user
without retrieving the data back. The main technical contribution is that the proxy reencryption scheme supports encoding operations over encrypted messages as well as
forwarding operations over encoded and encrypted messages. Our method fully integrates
encrypting, encoding, and forwarding

Downloads

Published

25-02-2017

Issue

Section

Articles
Loading...