Main Reference PaperA Secure Erasure Code-Based Cloud Storage System with Secure Data Forwarding, IEEE Transactions on Parallel and Distributed Systems, June 2012.
  • This paper considers a cloud storage system that consists of storage servers and key servers. The work integrates a newly proposed threshold proxy re-encryption scheme and erasure codes over exponents. The threshold proxy reencryption scheme supports encoding, forwarding, and partial decryption operations in a distributed way.

+ Description
  • This paper considers a cloud storage system that consists of storage servers and key servers. The work integrates a newly proposed threshold proxy re-encryption scheme and erasure codes over exponents. The threshold proxy reencryption scheme supports encoding, forwarding, and partial decryption operations in a distributed way.

  • Ensuring secure data forwarding

  • Reducing the computational overhead and Minimizing the storage size of the storage servers.

  • Using erasure codes for recovering the failure severs and providing high secure storage system by enabling threshold proxy re-encryption scheme.

+ Aim & Objectives
  • Ensuring secure data forwarding

  • Reducing the computational overhead and Minimizing the storage size of the storage servers.

  • Using erasure codes for recovering the failure severs and providing high secure storage system by enabling threshold proxy re-encryption scheme.

  • This project is extended by ensuring secure key sharing with key server. The cryptographic algorithm is used for ensuring the authentication of key sharing. The system manager provides public, private pair for both user and key server. The user sends encrypted secret key to the key server. The key server decrypts the encrypted secret key using his secret key and used for further processing on behalf of the client. The data confidentiality is further enhanced by imposing the secure key sharing technique.

+ Contribution
  • This project is extended by ensuring secure key sharing with key server. The cryptographic algorithm is used for ensuring the authentication of key sharing. The system manager provides public, private pair for both user and key server. The user sends encrypted secret key to the key server. The key server decrypts the encrypted secret key using his secret key and used for further processing on behalf of the client. The data confidentiality is further enhanced by imposing the secure key sharing technique.

  • Java JDK 1.8, MySQL 5.5.40

  • Netbeans 8.0.1, J2SE, (Cloudsim)

+ Software Tools & Technologies
  • Java JDK 1.8, MySQL 5.5.40

  • Netbeans 8.0.1, J2SE, (Cloudsim)

  • M.E / M.Tech / MS / Ph.D.- Customized according to the client requirements.

+ Project Recommended For
  • M.E / M.Tech / MS / Ph.D.- Customized according to the client requirements.

  • No Readymade Projects-Depending on the complexity of the project and requirements.

+ Order To Delivery
  • No Readymade Projects-Depending on the complexity of the project and requirements.

Professional Ethics: We S-Logix would appreciate the students those who willingly contribute with atleast a line of thinking of their own while preparing the project with us. It is advised that the project given by us be considered only as a model project and be applied with confidence to contribute your own ideas through our expert guidance and enrich your knowledge.