Cloud computing has nice potential of providing sturdy procedure power to the society at reduced value. It enables customers with restricted procedure resources to source their giant computation workloads to the cloud, and economically relish the large procedure power, bandwidth, storage, and even applicable code which will be shared in a pay-per-use manner. Storing knowledge in a very third party’s cloud system causes serious concern over knowledge confidentiality. General encryption schemes defend knowledge confidentiality, however conjointly limit the practicality of the storage system as a result of many operations are supported over encrypted knowledge. Constructing a secure storage system that supports multiple functions is difficult once the storage system is distributed and has no central authority. We have a tendency to propose a threshold proxy re-encryption theme and integrate it with a localized erasure code specified a secure distributed storage system is developed. The distributed storage system not only supports secure and sturdy knowledge storage and retrieval, however conjointly lets a user forward his knowledge within the storage servers to another user while not retrieving the info back. The most technical contribution is that the proxy re-encryption theme supports encoding operations over encrypted messages yet as forwarding operations over encoded and encrypted messages. Our method totally integrates encrypting, encoding, and forwarding. We analyze and suggest appropriate parameters for the amount of copies of a message sent to storage servers and also the variety of storage servers queried by a key server.
Article Details
Unique Paper ID: 145576
Publication Volume & Issue: Volume 4, Issue 10
Page(s): 375 - 378
Article Preview & Download
Share This Article
Join our RMS
Conference Alert
NCSEM 2024
National Conference on Sustainable Engineering and Management - 2024