Open Access   Article Go Back

An Approach to provide Secure Storage using Self Destructing Erasure Codes

B.Anusha 1 , S. Phani Praveen2

Section:Review Paper, Product Type: Journal Paper
Volume-3 , Issue-9 , Page no. 88-90, Sep-2015

Online published on Oct 01, 2015

Copyright © B.Anusha , S. Phani Praveen . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: B.Anusha , S. Phani Praveen, “An Approach to provide Secure Storage using Self Destructing Erasure Codes,” International Journal of Computer Sciences and Engineering, Vol.3, Issue.9, pp.88-90, 2015.

MLA Style Citation: B.Anusha , S. Phani Praveen "An Approach to provide Secure Storage using Self Destructing Erasure Codes." International Journal of Computer Sciences and Engineering 3.9 (2015): 88-90.

APA Style Citation: B.Anusha , S. Phani Praveen, (2015). An Approach to provide Secure Storage using Self Destructing Erasure Codes. International Journal of Computer Sciences and Engineering, 3(9), 88-90.

BibTex Style Citation:
@article{Praveen_2015,
author = {B.Anusha , S. Phani Praveen},
title = {An Approach to provide Secure Storage using Self Destructing Erasure Codes},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {9 2015},
volume = {3},
Issue = {9},
month = {9},
year = {2015},
issn = {2347-2693},
pages = {88-90},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=646},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=646
TI - An Approach to provide Secure Storage using Self Destructing Erasure Codes
T2 - International Journal of Computer Sciences and Engineering
AU - B.Anusha , S. Phani Praveen
PY - 2015
DA - 2015/10/01
PB - IJCSE, Indore, INDIA
SP - 88-90
IS - 9
VL - 3
SN - 2347-2693
ER -

VIEWS PDF XML
2379 2318 downloads 2331 downloads
  
  
           

Abstract

Several encryption schemes provide data confidentiality but at the same time functionality of the storage system is limited. A threshold proxy re-encryption scheme which is integrated with decentralized erasure code was proposed to formulate a secure storage system. This scheme provides robust and secure storage and retrieval and also lets the user forward the data to other users. The main technical contribution is that encoding operations over encrypted messages as well as forwarding operations over encoded and encrypted message are supported by this scheme.

Key-Words / Index Term

Proxy Re-Encryption, Decentralized Erasure Code, RSA, AES, Erasure Codes

References

[1] Introduction to Information Security, https://en.wikipedia.org/wiki/Information_security, Wednesday, July 1, 2015.
[2] Hsiao-Ying Lin, Member, IEEE, and Wen-Guey Tzeng, Member, IEEE.,‖ A Secure Erasure Code-Based Cloud Storage System with Secure Data Forwarding‖, IEEE transactions on parallel and distributed systems, vol. 23, no.6, pp.995-1003 , june 2012.
[3] Rachna Jain, Sushila Madan and Bindu Garg, “Analyzing Various existing Security Techniques to Secure Data Access in Cloud Environment”, Volume-3, Issue-1, January-2015.
[4] Evgeny Milanov ― The RSA Alorithm‖ 3 june, 2009.
[5] G. Ateniese, K. Fu, M. Green, and S. Hohenberger, ―Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage,‖ ACM Trans. Information and System Security, vol. 9, no. 1, pp. 1-30, 2006.
[6] G. Ateniese, K. Benson, and S. Hohenberger, ―Key-Private Proxy Re-Encryption,‖ Proc. Topics in Cryptology (CT-RSA), pp. 279-294, 2009.
[7] J. Shao and Z. Cao, ―CCA-Secure Proxy Re-Encryption without Pairings,‖ Proc. 12th Int’l Conf. Practice and Theory in Public Key Cryptography (PKC), pp. 357-376, 2009.
[8] Shamir, ―How to Share a Secret,‖ ACM Comm., vol. 22, pp. 612-613, 1979