Open Access   Article Go Back

A Study on Secure Cloud server System using Proxy Re-Encryption Model

G. Praveen1 , V. Ravikumar Chowdary2

Section:Survey Paper, Product Type: Journal Paper
Volume-07 , Issue-06 , Page no. 99-102, Mar-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7si6.99102

Online published on Mar 20, 2019

Copyright © G. Praveen, V. Ravikumar Chowdary . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: G. Praveen, V. Ravikumar Chowdary, “A Study on Secure Cloud server System using Proxy Re-Encryption Model,” International Journal of Computer Sciences and Engineering, Vol.07, Issue.06, pp.99-102, 2019.

MLA Style Citation: G. Praveen, V. Ravikumar Chowdary "A Study on Secure Cloud server System using Proxy Re-Encryption Model." International Journal of Computer Sciences and Engineering 07.06 (2019): 99-102.

APA Style Citation: G. Praveen, V. Ravikumar Chowdary, (2019). A Study on Secure Cloud server System using Proxy Re-Encryption Model. International Journal of Computer Sciences and Engineering, 07(06), 99-102.

BibTex Style Citation:
@article{Praveen_2019,
author = {G. Praveen, V. Ravikumar Chowdary},
title = {A Study on Secure Cloud server System using Proxy Re-Encryption Model},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {3 2019},
volume = {07},
Issue = {06},
month = {3},
year = {2019},
issn = {2347-2693},
pages = {99-102},
url = {https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=876},
doi = {https://doi.org/10.26438/ijcse/v7i6.99102}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i6.99102}
UR - https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=876
TI - A Study on Secure Cloud server System using Proxy Re-Encryption Model
T2 - International Journal of Computer Sciences and Engineering
AU - G. Praveen, V. Ravikumar Chowdary
PY - 2019
DA - 2019/03/20
PB - IJCSE, Indore, INDIA
SP - 99-102
IS - 06
VL - 07
SN - 2347-2693
ER -

           

Abstract

A cloud storage system, consisting of a collection of storage servers, provides long-term storage services over the Internet. Storing data in a third party’s cloud system causes serious concern over data confidentiality. General encryption schemes protect data confidentiality, but also limit the functionality of the storage system because a few operations are supported over encrypted data. Constructing a secure storage system that supports multiple functions is challenging when the storage system is distributed and has no central authority. We propose a threshold proxy re-encryption scheme and integrate it with a decentralized erasure code such that a secure distributed storage system is formulated.

Key-Words / Index Term

Architecture, Construction of Secure Cloud Storage Systems

References

[1] J. Kubiatowicz, D. Bindel, Y. Chen, P. Eaton, D. Geels, An Architecture for Global-Scale Persistent Storage,” Proc. Ninth Int’l Conf. Architectural Support for Programming Languages and Operating Systems (ASPLOS), pp. 190-201, 2000.
[2] P. Druschel and A. Rowstron, “PAST: A Large-Scale, Persistent Peer-to-Peer Storage Utility,” Proc. Eighth Workshop Hot Topics in Operating System (HotOS VIII), pp. 75-80, 2001.
[3] A. Adya, W.J. Bolosky, M. Castro, G. Cermak, R. Chaiken, J.R.Douceur, J. Howell, J.R. Lorch, M. Theimer, and R. Wattenhofer, “Farsite: Federated, Available, and Reliable Storage for an Incompletely Trusted Environment,” Proc. Fifth Symp. Operating System Design and Implementation (OSDI), pp. 1-14, 2002.
[4] Haeberlen, A. Mislove, and P. Druschel, “Glacier: Highly Durable, Decentralized Storage Despite Massive Corr elated Failures,” Proc. Second Symp.Networked Systems Design and Implementation (NSDI), pp. 143-158, 2005.
[5] A.G. Dimakis, V. Prabhakaran, and K. Ramchandran, “Decentralized Erasure Codes for Distributed Networked Storage,” IEEE Trans. Information Theory, vol. 52, no. 6 pp. 2809-2816, June 2006.