| Basically cloud storage architecture will have a collection of storage servers with higher end configuration which       will provides long-term storage services over the Internet and also for the cloud storage system. Proxy re-encryption       scheme [5] provides security improvements over other approaches used earlier. The main advantage of this scheme is       that they are unidirectional and do not require delegators to reveal their entire secret key to anyone or even interact with       the delegate, in order to allow a proxy to re-encrypt their cipher texts. In schemes, only a limited amount of trust is       placed in the proxy. For example, it is not able to decrypt the cipher texts it re-encrypts, and we prove our schemes       secure even when the proxy publishes all the re-encryption information it knows. This enables a number of applications       that would not be practical if the proxy needed to be fully trusted. At the early years, the Network-Attached Storage       (NAS) and the Network File System (NFS) provide extra storage devices over the network such that a user can access       the storage devices via network connection. Afterward, many improvements on scalability, robustness, efficiency, and       security were proposed. Here storing and retrieving the data in a third party’s cloud system causes serious problems       and conflict over data confidentiality during the data transactions. Whenever third party storage will involved with the       multi cloud server this conflict will occur naturally. Even though there are various methods are available to overcome       this problem like cryptography, key encryption and etc. But general encryption processor and verifier schemes protect       data confidentiality during the transaction of dual execution, but along with this process the main drawback will, it       limits the functionality of the storage system. This is because a few operations only supported over encrypted data.       These methods will cause failure. In order to constructing a secure storage system that supports multiple functions is       challenging when the storage system is distributed and has no central authority. The application logic proposes a       secured threshold proxy re-encryption server and integrates it with a decentralized erasure code such that a secure       distributed storage system is formulated. In this method multiple users can interact with the storage system. Users can       upload their data in to the distributed storage system. The distributed storage system not only supports secure and       robust data storage and retrieval, but also lets a user forward his data in the storage servers to another user without       retrieving the data back. This makes the ownership data unused and secured during the time of retrieval. The main technical contribution is that the proxy re-encryption scheme supports encoding operations along with a key over       encrypted messages, as well as forwarding operations over encoded and encrypted messages. The content in the       database will be in the decrypted format. So that even intruder cant able to access the data even they access the       database. The encrypted data will become unused even the data obtained by the intruder. This makes the system so       stronger. This project deals with fully integrates encrypting, encoding, and forwarding. The application can be shown in       both cloud servers as well as in local host as per the environment. The storage and robustness are more flexible with the       users. So that user will authorize the sender request to generate the key. Using the authorized one time key sender can       access the encrypted file in decrypted format at once. The key will become invalid after one use. This is method is       implemented for secured data forwarding. During data forwarding a proxy server will be created virtually to access the       encrypted data from the sender side. The original data from the cloud server will be transmitted to the proxy virtually.       This makes less traffic and the original data content will not get affected during the time of data transaction. After the       transaction the proxy server will be deleted. An erasure code provides redundancy without the overhead of strict       replication. Erasure code divide an object into k fragments and recode them into l fragments, where l>k. we call r=k/l       <1 rate of encoding. A rate r code increases storage cost by a factor of 1/r. The key property of erasure code is that the       original object can be reconstructed from any m fragments. For example using an r=1/4 encoding on a block divides the       block into k=16 fragments and encode the original m fragments into l=64 fragments; increasing the storage cost by a       factor of four. Erasure coding in a malicious environment requires the precise identification of failed or corrupted       fragments. Without the ability to identify try to reconstruct the block; that is, (l, k) combinations. As a result, the       system corrupted fragments, here is potentially a factorial combination of fragments to needs to detect when a fragment       has been corrupted and discard it. A secure verification hashing scheme can serve the dual purpose of identifying and       verifying each fragment. It is necessary the case that any m correctly verified fragments can be used to reconstruct the       block. Such a scheme is likely to increase the bandwidth and storage requirements, but can be shown to still be many       times less than replication. | 
        
            | 
                S.Amritha,  S. Saravana Kumar, “Threshold Proxy Re-Encryption Scheme and Decentralized  Erasure Code in Cloud Storage with Secure DataForwarding” Vol 9, Issue 5 (Mar.  - Apr. 2013), PP 27-31
 G.  Ateniese, K. Fu, M. Green, and S. Hohenberger, “Improved Proxy Re-Encryption  Schemes with Applications to Secure Distributed Storage,”ACM Trans. Information  and System Security, vol. 9, no. 1, pp. 1-30, 2006.
 G.  Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D.  Song, “Provable Data Possession at Untrusted Stores,”Proc. 14thACM  Conf. Computer and Comm. Security (CCS), pp. 598-609, 2007.
 G.  Ateniese, R.D. Pietro, L.V. Mancini, and G. Tsudik, “Scalable and Efficient  Provable Data Possession,” Proc. Fourth Int’l Conf. Security andPrivacy in  Comm. Netowrks (SecureComm),pp. 1-10, 2008
 G.  Ateniese, K. Benson, and S. Hohenberger, “Key-Private Proxy Re-Encryption,  ”Proc. Topics in Cryptology (CT-RSA),pp. 279-294, 2009.
 R. Bhagwan,  K. Tati, Y.-C. Cheng, S. Savage, and G.M. Voelker, “Total Recall: System  Support for Automated Availability Management,” Proc.First Symp. Networked  Systems Design and Implementation (NSDI),pp. 337-350, 2004.
 M. Blaze,  G. Bleumer, and M. Strauss, “Divertible Protocols and Atomic Proxy  Cryptography,”Proc. Int’l Conf. Theory and Applica-tion ofCryptographic  Techniques (EUROCRYPT),pp. 127-144, 1998.
 A.G.  Dimakis, V. Prabhakaran, and K. Ramchandran, “Ubiqui-tous Access to Distributed  Data in Large Scale Sensor Networks throughDecentralized Erasure Codes,” Proc.  Fourth Int’l Symp. Information Processing in Sensor Networks (IPSN),pp.  111-117, 2005.
 A.G.  Dimakis, V. Prabhakaran, and K. Ramchandran, “Decentralized Erasure Codes for  Distributed Networked Storage,” IEEE Trans.Information Theory, vol. 52, no. 6  pp. 2809-2816, June 2006.
 Hsiao-Ying  Lin, Member, IEEE, and Wen-GueyTzeng, Member “A Secure Erasure Code-Based Cloud  Storage System with Secure DataForwarding” vol. 23, no. 6, June 2012.
 M.  Kallahalla, E. Riedel, R. Swaminathan, Q. Wang, and K. Fu, “Plautus: Scalable Secure  File Sharing on Untrusted Storage, ”Proc. SecondUSENIX Conf. File and Storage  Technologies (FAST),pp. 29-42, 2003.
 H.-Y. Lin  and W.-G. Tzeng, “A Secure Decentralized Erasure Code for Distributed Network  Storage,” IEEE Trans. Parallel and DistributedSystems, vol. 21, no. 11, pp.  1586-1594, Nov. 2010.
 M. Mambo  and E. Okamoto, “Proxy Cryptosystems: Delegation of the Power to Decrypt Cipher  texts,” IEICE Trans. Fundamentals ofElectronics, Comm. and Computer Sciences,  vol. E80-A, no. 1, pp. 54-63, 1997.
 Priyadharshini.  B, Mrs. Carmel Mary Belinda, M. Ramesh Kumar, “A Secure Code Based Cloud  Storage System Using Proxy Re-EncryptionScheme in Cloud Computing” Vol.9, Issue  2 (Jan. - Feb. 2013), PP 22-27
 Q. Tang,  “Type-Based Proxy Re-Encryption and Its Construction,” Proc. Ninth Int’l Conf.  Cryptology in India: Progress in Cryptology(INDOCRYPT),pp. 130-144, 2008.
 J. Shao and Z. Cao, “CCA-Secure Proxy  Re-Encryption without Pairings,”Proc. 12th Int’l Conf. Practice and Theory in  Public KeyCryptography (PKC),pp. 357-376, 2009. |