Providing Data Confidentiality of Outsourced Data In Cloud
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2014, Vol 3, Issue 9
Abstract
Cloud means collection of storage servers maintained by the cloud service provider which minimizes investment cost for individual users and organizations. It provides on-demand self service, resource pooling, rapid elasticity and measured service. But users are worrying about their data confidentiality stored in untrusted cloud servers. Storing data in a third party’s cloud system causes serious concern over data confidentiality. In order to provide strong confidentiality for messages in storage servers, a user can encrypt messages by a cryptographic method before applying an erasure code method to encode and store messages. Constructing a secure storage system that supports multiple functions is challenging when the storage system is distributed and has no central authority. The proposed method is a proxy re-encryption scheme which was integrated with a decentralized erasure code such that a secure distributed storage system is formulated. The distributed storage system not only supports secure and robust data storage and retrieval, but also lets a user forward his data in the storage servers to another user without retrieving the data back. The main technical contribution is that the proxy re-encryption scheme supports encoding operations over encrypting messages as well as forwarding operations over encoded and encrypted messages.
Authors and Affiliations
N_V_S Sowjanya, S. N. S. V. S. C Ramesh, S. Rama sree
Implementation of a Personalized Mobile Query Search Engine
PMSE, Personalized Mobile Search Engine has been proposed to show any client craved result or re-ranking result as per the client given question (UGQ) which incorporates content and the area of the client. It meets e...
A New Filtering Technique for denoising Speckle Noise from Medical Images Based on Adaptive and Anisotropic Diffusion Filter
This is a preliminary study and the objective of this study has been to compare the performance of some of the primitive and fundamentally different post acquisition image enhancement algorithms as applied to differen...
Multiple Spoofing Identification For Network Level Security
It’s easy to spoof the wireless networks using the mac identity and the ipconfig. The techniques which have been used based on the Matching rules of signal prints for spoofing detection, RSS readings using a Gaussian...
Minimising Attacks Using ATPG On Networks
Today's networks require much human involvement to keep them working. Everyday network engineers struggle with router mis-configurations, fibercuts, faulty interfaces, mislabelled cables, software bugs, intermittent...
After BI: What’s the Future Intelligence?
Traditional Business Intelligence (BI) approaches have fallen short in delivering the expected value and return on investment. High costs, lengthy implementations and increasing complexity have led to frustration and...