Main Reference PaperA Secure Erasure Code-Based Cloud Storage System with Secure Data Forwarding, IEEE Transactions on Parallel and Distributed Systems, June 2012.
  • Erasure encoding supports the forwarding scheme and applicable in decentralized distributed system. A decentralized erasure code is used to ensure the data robustness in the distributed cloud storage system. In erasure codes, the copy of the message is stored in the each storage servers. If one of the storage servers is failed, the message can be retrieved by one of the surviving server.

+ Description
  • Erasure encoding supports the forwarding scheme and applicable in decentralized distributed system. A decentralized erasure code is used to ensure the data robustness in the distributed cloud storage system. In erasure codes, the copy of the message is stored in the each storage servers. If one of the storage servers is failed, the message can be retrieved by one of the surviving server.

  • Ensuring secure data forwarding

  • Reducing the computational overhead and Minimizing the storage size of the storage servers.

  • Using erasure codes for recovering the failure severs and providing high secure storage system by enabling threshold proxy re-encryption scheme.

+ Aim & Objectives
  • Ensuring secure data forwarding

  • Reducing the computational overhead and Minimizing the storage size of the storage servers.

  • Using erasure codes for recovering the failure severs and providing high secure storage system by enabling threshold proxy re-encryption scheme.

  • This project is extended by ensuring secure key sharing with key server. The cryptographic algorithm is used for ensuring the authentication of key sharing. The system manager provides public, private pair for both user and key server. The user sends encrypted secret key to the key server. The key server decrypts the encrypted secret key using his secret key and used for further processing on behalf of the client. The data confidentiality is further enhanced by imposing the secure key sharing technique.

+ Contribution
  • This project is extended by ensuring secure key sharing with key server. The cryptographic algorithm is used for ensuring the authentication of key sharing. The system manager provides public, private pair for both user and key server. The user sends encrypted secret key to the key server. The key server decrypts the encrypted secret key using his secret key and used for further processing on behalf of the client. The data confidentiality is further enhanced by imposing the secure key sharing technique.

  • Java JDK 1.8, MySQL 5.5.40

  • Netbeans 8.0.1, J2SE, (Cloudsim)

+ Software Tools & Technologies
  • Java JDK 1.8, MySQL 5.5.40

  • Netbeans 8.0.1, J2SE, (Cloudsim)

  • B.E / B.Tech / M.E / M.Tech

+ Project Recommended For
  • B.E / B.Tech / M.E / M.Tech

Professional Ethics: We S-Logix would appreciate the students those who willingly contribute with atleast a line of thinking of their own while preparing the project with us. It is advised that the project given by us be considered only as a model project and be applied with confidence to contribute your own ideas through our expert guidance and enrich your knowledge.