Amazing technological breakthrough possible @S-Logix pro@slogix.in

Office Address

  • #5, First Floor, 4th Street Dr. Subbarayan Nagar Kodambakkam, Chennai-600 024 Landmark : Samiyar Madam
  • pro@slogix.in
  • +91- 81240 01111

Social List

A Secure Data Forwarding Schema For Cloud Storage Systems - 2012

A Secure Data Forwarding Schema For Cloud Storage Systems

Research paper on A Secure Data Forwarding Schema For Cloud Storage Systems

Research Area:  Cloud Security

Abstract:

Cloud Computing has been envisioned as the next-generation architecture of IT Enterprise. It moves the application software and databases to the centralized large data centers, where the management of the data and services may not be fully trustworthy. This unique paradigm brings about many new security challenges, which have not been well understood. This work studies the problem of ensuring the integrity of data storage in Cloud Computing. In particular, we consider the task of allowing a threshold proxy re-encryption, on behalf of the cloud client, to verify the integrity of the dynamic data stored in the cloud. The introduction of TPA eliminates the involvement of the client through the auditing of whether his data stored in the cloud are indeed intact, which can be important in achieving economies of scale for Cloud Computing. The distributed storage system not only supports secure and robust data storage and retrieval, but also lets a user forward his data in the storage servers to another user without retrieving the data back, since services in Cloud Computing are not limited to archive or backup data only. While prior works on ensuring remote data integrity often lacks the support of either public Audit ability or dynamic data operations, this paper achieves both. We first identify the difficulties and potential security problems of direct extensions with fully dynamic data updates from prior works and then show how to construct an elegant verification scheme for the seamless integration of these two salient features in our protocol design A decentralized erasure code is an erasure code that independently computes each codeword symbol for a message, where TPA can perform multiple auditing tasks simultaneously. Extensive security and performance analysis show that the proposed schemes are highly efficient and provably secure.

Keywords:  
Secure
Data Forwarding
Cloud Storage Systems
trustworthy
Cloud Computing

Author(s) Name:  G.CHINNA PULLAIAH, DILIP VENKATA KUMAR VENGALA

Journal name:  International Journal of Smart Sensor and Adhoc Network

Conferrence name:  

Publisher name:  Interscience Research Network

DOI:  10.47893/IJSSAN.2013.1187

Volume Information:  Vol. 3: Iss. 1, Article 3.