Netaji Institute of Engineering & Technology
Dept of Computer Science and Engineering
A Project on
A Secure Erasure Code-based Cloud Storage
System with Secure Data Forwarding
By Under The Guidance of
SRIHARI KADALI Mr.P.Darshan (H.O.D & professor)
Non Functional Requirements
The main technical contribution is that the proxy re-encryption
scheme supports encoding operations over encrypted messages as well
as forwarding operations over encoded and encrypted messages. Our
method fully integrates encrypting, encoding, and forwarding.
Implementing threshold proxy re-encryption and decentralized erasure
Distributed storage System used for distribution purpose, and it
depends on the secure storage system.
Storage server and key server are used.
Parameters are more flexible adjustment between servers(storage and
General encryption schemes protect data confidentiality, but also limit
the functionality of the storage system because a few operations are
supported over encrypted data. Storing data in a third party’s cloud
system causes serious concern on data confidentiality.
General encryption scheme for storing data.
DES algorithm is used for key generation.
For the storage data ,user has to manage his keys .
Single storage server for whole file.
Disadvantages Of Existing System
There are three problems in the above straightforward integration of
encryption and encoding. First, the user has to do most computation
and the communication traffic between the user and storage servers
is high. Second, the user has to manage his cryptographic keys.
Communication traffic between the user and storage servers.
User’s device of storing the keys is lost.
Storing and retrieving, it is hard for storage servers .
Only one time encryption using general encryption schemes.
The method of threshold proxy re-encryption.
Decentralized erasure code method can be used for distributed
Distributed storage system depends on the secure cloud
Storage server and key server those two systems used for
Encryption using Blowfish algorithm.
Advantages Of Proposed System
By using the threshold proxy re-encryption scheme, we present a
secure cloud storage system that provides secure data storage and
secure data forwarding functionality in a decentralized structure
Data is more confidential.
Highly protected by an security mechanism of the Server
Easy distribution and data forwarding.
Less Time consuming.
Non Functional Requirement
A workflow diagram visually represents the movement and transfer
of resources, documents, data and tasks through the entire work process for
a given product or service.
Use case Diagram
Use case diagrams are used to describe a set of actions use cases that
some system or systems subject should or can perform in collaboration
with one or more external users of the system actors.
A sequence diagram is a kind of interaction diagram that shows how
processes operate with one another and in what order.
Integrated a newly proposed threshold proxy re-encryption
scheme and erasure codes over exponents.
The threshold proxy Re-encryption scheme supports
encoding, forwarding, and partial decryption operations in a
By using the threshold proxy re-encryption scheme, we
present a secure cloud storage system that provides secure
data storage and secure data forwarding functionality in a
key servers act as access nodes for providing a front-end layer
such as a traditional file system interface.
IEEE 2012 paper on Distributed and Parallel systems, “A secure
Erasure code based Cloud storage System with Secure Data
Swings (second Edition) By Matthew robinson and Pavel
Fast Software Encryption, Cambridge Security Workshop
Proceedings (December 1993), Springer-Verlag, 1994, pp. 191-
204. IEEE Paper.
A particular slide catching your eye?
Clipping is a handy way to collect important slides you want to go back to later.