Basically cloud storage architecture will have a collection of storage servers with higher end configuration which will provides long-term storage services over the Internet and also for the cloud storage system. Proxy re-encryption scheme [5] provides security improvements over other approaches used earlier. The main advantage of this scheme is that they are unidirectional and do not require delegators to reveal their entire secret key to anyone or even interact with the delegate, in order to allow a proxy to re-encrypt their cipher texts. In schemes, only a limited amount of trust is placed in the proxy. For example, it is not able to decrypt the cipher texts it re-encrypts, and we prove our schemes secure even when the proxy publishes all the re-encryption information it knows. This enables a number of applications that would not be practical if the proxy needed to be fully trusted. At the early years, the Network-Attached Storage (NAS) and the Network File System (NFS) provide extra storage devices over the network such that a user can access the storage devices via network connection. Afterward, many improvements on scalability, robustness, efficiency, and security were proposed. Here storing and retrieving the data in a third party’s cloud system causes serious problems and conflict over data confidentiality during the data transactions. Whenever third party storage will involved with the multi cloud server this conflict will occur naturally. Even though there are various methods are available to overcome this problem like cryptography, key encryption and etc. But general encryption processor and verifier schemes protect data confidentiality during the transaction of dual execution, but along with this process the main drawback will, it limits the functionality of the storage system. This is because a few operations only supported over encrypted data. These methods will cause failure. In order to constructing a secure storage system that supports multiple functions is challenging when the storage system is distributed and has no central authority. The application logic proposes a secured threshold proxy re-encryption server and integrates it with a decentralized erasure code such that a secure distributed storage system is formulated. In this method multiple users can interact with the storage system. Users can upload their data in to the distributed storage system. The distributed storage system not only supports secure and robust data storage and retrieval, but also lets a user forward his data in the storage servers to another user without retrieving the data back. This makes the ownership data unused and secured during the time of retrieval. The main technical contribution is that the proxy re-encryption scheme supports encoding operations along with a key over encrypted messages, as well as forwarding operations over encoded and encrypted messages. The content in the database will be in the decrypted format. So that even intruder cant able to access the data even they access the database. The encrypted data will become unused even the data obtained by the intruder. This makes the system so stronger. This project deals with fully integrates encrypting, encoding, and forwarding. The application can be shown in both cloud servers as well as in local host as per the environment. The storage and robustness are more flexible with the users. So that user will authorize the sender request to generate the key. Using the authorized one time key sender can access the encrypted file in decrypted format at once. The key will become invalid after one use. This is method is implemented for secured data forwarding. During data forwarding a proxy server will be created virtually to access the encrypted data from the sender side. The original data from the cloud server will be transmitted to the proxy virtually. This makes less traffic and the original data content will not get affected during the time of data transaction. After the transaction the proxy server will be deleted. An erasure code provides redundancy without the overhead of strict replication. Erasure code divide an object into k fragments and recode them into l fragments, where l>k. we call r=k/l <1 rate of encoding. A rate r code increases storage cost by a factor of 1/r. The key property of erasure code is that the original object can be reconstructed from any m fragments. For example using an r=1/4 encoding on a block divides the block into k=16 fragments and encode the original m fragments into l=64 fragments; increasing the storage cost by a factor of four. Erasure coding in a malicious environment requires the precise identification of failed or corrupted fragments. Without the ability to identify try to reconstruct the block; that is, (l, k) combinations. As a result, the system corrupted fragments, here is potentially a factorial combination of fragments to needs to detect when a fragment has been corrupted and discard it. A secure verification hashing scheme can serve the dual purpose of identifying and verifying each fragment. It is necessary the case that any m correctly verified fragments can be used to reconstruct the block. Such a scheme is likely to increase the bandwidth and storage requirements, but can be shown to still be many times less than replication. |
- S.Amritha, S. Saravana Kumar, “Threshold Proxy Re-Encryption Scheme and Decentralized Erasure Code in Cloud Storage with Secure DataForwarding” Vol 9, Issue 5 (Mar. - Apr. 2013), PP 27-31
- G. Ateniese, K. Fu, M. Green, and S. Hohenberger, “Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage,”ACM Trans. Information and System Security, vol. 9, no. 1, pp. 1-30, 2006.
- G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, “Provable Data Possession at Untrusted Stores,”Proc. 14thACM Conf. Computer and Comm. Security (CCS), pp. 598-609, 2007.
- G. Ateniese, R.D. Pietro, L.V. Mancini, and G. Tsudik, “Scalable and Efficient Provable Data Possession,” Proc. Fourth Int’l Conf. Security andPrivacy in Comm. Netowrks (SecureComm),pp. 1-10, 2008
- G. Ateniese, K. Benson, and S. Hohenberger, “Key-Private Proxy Re-Encryption, ”Proc. Topics in Cryptology (CT-RSA),pp. 279-294, 2009.
- R. Bhagwan, K. Tati, Y.-C. Cheng, S. Savage, and G.M. Voelker, “Total Recall: System Support for Automated Availability Management,” Proc.First Symp. Networked Systems Design and Implementation (NSDI),pp. 337-350, 2004.
- M. Blaze, G. Bleumer, and M. Strauss, “Divertible Protocols and Atomic Proxy Cryptography,”Proc. Int’l Conf. Theory and Applica-tion ofCryptographic Techniques (EUROCRYPT),pp. 127-144, 1998.
- A.G. Dimakis, V. Prabhakaran, and K. Ramchandran, “Ubiqui-tous Access to Distributed Data in Large Scale Sensor Networks throughDecentralized Erasure Codes,” Proc. Fourth Int’l Symp. Information Processing in Sensor Networks (IPSN),pp. 111-117, 2005.
- A.G. Dimakis, V. Prabhakaran, and K. Ramchandran, “Decentralized Erasure Codes for Distributed Networked Storage,” IEEE Trans.Information Theory, vol. 52, no. 6 pp. 2809-2816, June 2006.
- Hsiao-Ying Lin, Member, IEEE, and Wen-GueyTzeng, Member “A Secure Erasure Code-Based Cloud Storage System with Secure DataForwarding” vol. 23, no. 6, June 2012.
- M. Kallahalla, E. Riedel, R. Swaminathan, Q. Wang, and K. Fu, “Plautus: Scalable Secure File Sharing on Untrusted Storage, ”Proc. SecondUSENIX Conf. File and Storage Technologies (FAST),pp. 29-42, 2003.
- H.-Y. Lin and W.-G. Tzeng, “A Secure Decentralized Erasure Code for Distributed Network Storage,” IEEE Trans. Parallel and DistributedSystems, vol. 21, no. 11, pp. 1586-1594, Nov. 2010.
- M. Mambo and E. Okamoto, “Proxy Cryptosystems: Delegation of the Power to Decrypt Cipher texts,” IEICE Trans. Fundamentals ofElectronics, Comm. and Computer Sciences, vol. E80-A, no. 1, pp. 54-63, 1997.
- Priyadharshini. B, Mrs. Carmel Mary Belinda, M. Ramesh Kumar, “A Secure Code Based Cloud Storage System Using Proxy Re-EncryptionScheme in Cloud Computing” Vol.9, Issue 2 (Jan. - Feb. 2013), PP 22-27
- Q. Tang, “Type-Based Proxy Re-Encryption and Its Construction,” Proc. Ninth Int’l Conf. Cryptology in India: Progress in Cryptology(INDOCRYPT),pp. 130-144, 2008.
- J. Shao and Z. Cao, “CCA-Secure Proxy Re-Encryption without Pairings,”Proc. 12th Int’l Conf. Practice and Theory in Public KeyCryptography (PKC),pp. 357-376, 2009.
|