0% found this document useful (0 votes)
17 views1 page

A Secure Erasure Code ABSTRACT

A secure cloud storage system is proposed that uses erasure coding and proxy re-encryption to allow for secure storage, retrieval and forwarding of encrypted data across multiple storage servers without a central authority. The system supports operations like encoding and forwarding of encrypted data by integrating an encryption scheme with erasure codes. Parameters are also analyzed to determine optimal values for the number of data copies and storage servers queried to balance robustness and flexibility.

Uploaded by

Hem Sundar
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
17 views1 page

A Secure Erasure Code ABSTRACT

A secure cloud storage system is proposed that uses erasure coding and proxy re-encryption to allow for secure storage, retrieval and forwarding of encrypted data across multiple storage servers without a central authority. The system supports operations like encoding and forwarding of encrypted data by integrating an encryption scheme with erasure codes. Parameters are also analyzed to determine optimal values for the number of data copies and storage servers queried to balance robustness and flexibility.

Uploaded by

Hem Sundar
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 1

A Secure Erasure Code-Based Cloud Storage System with Secure Data Forwarding

ABSTRACT:
A cloud storage system, consisting of a collection of storage servers, provides long term storage services over the Internet. Storing data in a third partys cloud system causes serious concern over data confidentiality. General encryption schemes protect data confidentiality, but also limit the functionality of the storage system because a few operations are supported over encrypted data. Constructing a secure storage system that supports multiple functions is challenging when the storage system is distributed and has no central authority. We propose a threshold proxy re-encryption scheme and integrate it with a decentralized erasure code such that a secure distributed storage system is formulated. The distributed storage system not only supports secure and robust data storage and retrieval, but also lets a user forward his data in the storage servers to another user without retrieving the data back. The main technical contribution is that the proxy re-encryption scheme supports encoding operations over encrypted messages as well as forwarding operations over encoded and encrypted messages. Our method fully integrates encrypting, encoding, and forwarding. We analyze and suggest suitable parameters for the number of copies of a message dispatched to storage servers and the number of storage servers queried by a key server. These parameters allow more flexible adjustment between the number of storage servers and robustness.

You might also like