Abstract

A Cloud storage system consists of a collection of storage servers provide long-term Services over the internet. Storing data in other's Cloud system causes serious concern over data confidentiality. Existing systems protect data confidentiality, but also limit the functionality of the system. Constructing a secure storage system that supports multiple functions is challenging when the storage system is distributed. Proposed system consists of proxy re-encryption scheme integrated with a decentralized erasure code such that a secure storage system is constructed. Planned system not only supports secure and robust data, but also let user forward data in the storage system to another user without retrieving it back. Projected system fully integrates encrypting, encoding and forwarding. Proposed system analyzes and suggests suitable parameters for number of copies of messages delivered to storage servers and number of storage servers queried by key server.

Highlights

  • Cloud Computing is a concept that treats the resources on the Internet as a unified Entity Cloud

  • A cloud storage system is considered as a large scale distributed storage system that consists of many independent storage servers

  • To This project investigates the problem of data security in cloud data storage, which is essentially a distributed storage system

Read more

Summary

Introduction

The pioneer of Cloud Computing vendors, Amazon Simple Storage Service (S3) and Amazon Elastic Compute Cloud (EC2) are both well known examples While these internet-based online services do provide huge amounts of storage space and customizable computing resources, this computing platform shift, is eliminating the responsibility of local machines for data maintenance at the same time. Distributed protocols for storage correctness assurance will be of most importance in achieving a robust and secure cloud data storage system in the real world. Such important area remains to be fully explored in the literature. Extensive security and performance analysis shows that the proposed scheme is highly efficient and resilient against Byzantine failure, malicious data modification attack, and even server colluding attacks

Related Work
Unlike most prior works for ensuring remote data
Outcome
Purpose
Audience
Disadvatages of Existing System
Proposed System
Advantages of Proposed System
Cloud Data Storage Architecture
Implementation
Modules Description
Construction of Cloud Data Storage Module
Data Encryption Module
Data Forwarding Module
Data Retrieval Module
Conclusions and Future Work
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.