SlideShare a Scribd company logo
1 of 23
A SECURE ERASURE CODE-
BASED CLOUD STORAGE
SYSTEM WITH SECURE DATA
FORWARDING




           Phase 1 Presentation
ABSTRACT
 Constructing  a secure cloud storage system
  that supports multiple functions over a
  distributed system.
 Storing data in a third party’s cloud system
  causes serious concern on data
  confidentiality.
 In order to provide strong confidentiality for
  messages in storage servers, a user can
  encrypt messages by a cryptographic
  method.
 We address the problem of forwarding data to
  another user by storage servers directly.
 The methods we implemented threshold proxy re-
  encryption and decentralized erasure code.
 Storing cryptographic keys in a single device is
  risky.
 User distributes his cryptographic key to key
  servers that shall perform cryptographic functions
  on behalf of the user.
EXISTING SYSTEM
 In Existing System we use a straightforward
  integration method.
 In order to provide strong confidentiality for
  messages in storage servers, a user can encrypt
  messages by a cryptographic method.
 To retrieve the Codeword symbols from storage
  servers, decode them, and then decrypt them by
  using cryptographic keys.
 Limit the functionality of the storage system .
EXISTING
SYSTEM
ARCHITECTU
RE
PROBLEM
STATEMENT
We mainly concentrating on 2 aspects.
    o Data Storage Security.

    o Data Forwarding.




Data Storage Security
   Data storage mechanism.
   Data availability.
   Type of encryption.
Data Forwarding

    First, the user has to do most computation and the
    communication traffic between the user and storage
    servers is high.
   Second, the user has to manage his cryptographic keys.
    If the user’s device of storing the keys is lost or
    compromised, the security is broken.
   Finally, besides data storing and retrieving, it is hard for
    storage servers to directly support other functions.

For example, storage servers cannot directly forward a
  user’s messages to another one. The owner of messages
  has to retrieve, decode, decrypt and then forward them
  to another user.
PROPOSED
SYSTEM
 A new threshold proxy re-encryption scheme.
 Encoding of data is done by erasure codes.
 Decentralized code to form a secure distributed
  storage system.
The storage system independently perform the
  following.
 Encoding.
 Re-encryption.
 Key servers.
 Partial decryption.
o We integrate the above mentioned encryption
  scheme and secure distribution.
Data
Flow
For
The
Propose
d
System
What do we get by
doing all this?
o   Efficiency in the following aspects,
     Data robustness.
     Data confidentiality.
     Data forwarding.
Literature Survey
   Decentralized Erasure Codes for
    Distributed Networked Storage.
   Type-based Proxy Re-encryption and its
    Construction.
   CCA-Secure Proxy Re-encryption without
    Pairings.
   Glacier: highly durable, decentralized
    storage despite massive correlated
    failures.
   Plutus : Scalable secure file sharing on
    untrusted storage
List of Modules
 Process Encryption
 Threshold-Proxy Function

 Secure Cloud Storage

 Decentralization

 Data Forwarding
Process Encryption
 The process can be encrypted by using
  cryptographic keys.
 After the process can be encrypted, it can be
  Spitted as different process.
 Process splitting can also be sectorized by the
  data owner.
Conclusion
 We integrate the newly proposed threshold proxy
  re-encryption scheme and erasure codes over
  exponents.
 Key servers act as access nodes for providing a
  front-end layer.
 The proposed system supports the following
  features in a distributed way,
     Encrypting  the k blocks
     Encoding the n codeword symbols
     Partial decryption operations.
What’s Next ???

      Threshold-Proxy Function
      Secure Cloud Storage

      Decentralization

      Data Forwarding

More Related Content

What's hot

M-Tech Project Attribute-Based Storage Supporting Secure Deduplication of Enc...
M-Tech Project Attribute-Based Storage Supporting Secure Deduplication of Enc...M-Tech Project Attribute-Based Storage Supporting Secure Deduplication of Enc...
M-Tech Project Attribute-Based Storage Supporting Secure Deduplication of Enc...CloudTechnologies
 
Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...Nexgen Technology
 
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Key aggregate searchable encryption (kase) for group data sharing via cloud s...Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Key aggregate searchable encryption (kase) for group data sharing via cloud s...CloudTechnologies
 
Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...IGEEKS TECHNOLOGIES
 
Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...Adz91 Digital Ads Pvt Ltd
 
Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...LeMeniz Infotech
 
Attribute-Based Storage Supporting Secure Deduplication of Encrypted Data in ...
Attribute-Based Storage Supporting Secure Deduplication of Encrypted Data in ...Attribute-Based Storage Supporting Secure Deduplication of Encrypted Data in ...
Attribute-Based Storage Supporting Secure Deduplication of Encrypted Data in ...CloudTechnologies
 
A secure erasure code based cloud storage
A secure erasure code based cloud storageA secure erasure code based cloud storage
A secure erasure code based cloud storageIMPULSE_TECHNOLOGY
 
A hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplicationA hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplicationLeMeniz Infotech
 
Key aggregate cryptosystem for scalable data sharing in cloud
Key aggregate cryptosystem for scalable data sharing in cloudKey aggregate cryptosystem for scalable data sharing in cloud
Key aggregate cryptosystem for scalable data sharing in cloudMeka Subramanyam
 
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Key aggregate searchable encryption (kase) for group data sharing via cloud s...Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Key aggregate searchable encryption (kase) for group data sharing via cloud s...LeMeniz Infotech
 
key aggregate cryptosystem for scalable data sharing in cloud
key aggregate cryptosystem for scalable data sharing in cloudkey aggregate cryptosystem for scalable data sharing in cloud
key aggregate cryptosystem for scalable data sharing in cloudSravan Narra
 
Key aggregate cryptosystem for scalable data sharing in cloud storage
Key aggregate cryptosystem for scalable data sharing in cloud storageKey aggregate cryptosystem for scalable data sharing in cloud storage
Key aggregate cryptosystem for scalable data sharing in cloud storageMugesh Mukkandan
 
JPJ1408 Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
JPJ1408   Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud StorageJPJ1408   Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
JPJ1408 Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storagechennaijp
 
key aggregate cryptosystem for scalable data sharing in cloud storage abstract
key aggregate cryptosystem for scalable data sharing in cloud storage abstractkey aggregate cryptosystem for scalable data sharing in cloud storage abstract
key aggregate cryptosystem for scalable data sharing in cloud storage abstractSanjana Yemajala
 
Key aggregate cryptosystem for scalable data sharing in cloud storage
Key aggregate cryptosystem for scalable data sharing in cloud storageKey aggregate cryptosystem for scalable data sharing in cloud storage
Key aggregate cryptosystem for scalable data sharing in cloud storageShruthi Iyer
 
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Key aggregate searchable encryption (kase) for group data sharing via cloud s...Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Key aggregate searchable encryption (kase) for group data sharing via cloud s...Pvrtechnologies Nellore
 
KEY-AGGREGATE SEARCHABLE ENCRYPTION (KASE) FOR GROUP DATA SHARING VIA CLOUD ...
 KEY-AGGREGATE SEARCHABLE ENCRYPTION (KASE) FOR GROUP DATA SHARING VIA CLOUD ... KEY-AGGREGATE SEARCHABLE ENCRYPTION (KASE) FOR GROUP DATA SHARING VIA CLOUD ...
KEY-AGGREGATE SEARCHABLE ENCRYPTION (KASE) FOR GROUP DATA SHARING VIA CLOUD ...Nexgen Technology
 

What's hot (18)

M-Tech Project Attribute-Based Storage Supporting Secure Deduplication of Enc...
M-Tech Project Attribute-Based Storage Supporting Secure Deduplication of Enc...M-Tech Project Attribute-Based Storage Supporting Secure Deduplication of Enc...
M-Tech Project Attribute-Based Storage Supporting Secure Deduplication of Enc...
 
Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...
 
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Key aggregate searchable encryption (kase) for group data sharing via cloud s...Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
 
Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...
 
Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...
 
Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...
 
Attribute-Based Storage Supporting Secure Deduplication of Encrypted Data in ...
Attribute-Based Storage Supporting Secure Deduplication of Encrypted Data in ...Attribute-Based Storage Supporting Secure Deduplication of Encrypted Data in ...
Attribute-Based Storage Supporting Secure Deduplication of Encrypted Data in ...
 
A secure erasure code based cloud storage
A secure erasure code based cloud storageA secure erasure code based cloud storage
A secure erasure code based cloud storage
 
A hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplicationA hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplication
 
Key aggregate cryptosystem for scalable data sharing in cloud
Key aggregate cryptosystem for scalable data sharing in cloudKey aggregate cryptosystem for scalable data sharing in cloud
Key aggregate cryptosystem for scalable data sharing in cloud
 
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Key aggregate searchable encryption (kase) for group data sharing via cloud s...Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
 
key aggregate cryptosystem for scalable data sharing in cloud
key aggregate cryptosystem for scalable data sharing in cloudkey aggregate cryptosystem for scalable data sharing in cloud
key aggregate cryptosystem for scalable data sharing in cloud
 
Key aggregate cryptosystem for scalable data sharing in cloud storage
Key aggregate cryptosystem for scalable data sharing in cloud storageKey aggregate cryptosystem for scalable data sharing in cloud storage
Key aggregate cryptosystem for scalable data sharing in cloud storage
 
JPJ1408 Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
JPJ1408   Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud StorageJPJ1408   Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
JPJ1408 Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
 
key aggregate cryptosystem for scalable data sharing in cloud storage abstract
key aggregate cryptosystem for scalable data sharing in cloud storage abstractkey aggregate cryptosystem for scalable data sharing in cloud storage abstract
key aggregate cryptosystem for scalable data sharing in cloud storage abstract
 
Key aggregate cryptosystem for scalable data sharing in cloud storage
Key aggregate cryptosystem for scalable data sharing in cloud storageKey aggregate cryptosystem for scalable data sharing in cloud storage
Key aggregate cryptosystem for scalable data sharing in cloud storage
 
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Key aggregate searchable encryption (kase) for group data sharing via cloud s...Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
 
KEY-AGGREGATE SEARCHABLE ENCRYPTION (KASE) FOR GROUP DATA SHARING VIA CLOUD ...
 KEY-AGGREGATE SEARCHABLE ENCRYPTION (KASE) FOR GROUP DATA SHARING VIA CLOUD ... KEY-AGGREGATE SEARCHABLE ENCRYPTION (KASE) FOR GROUP DATA SHARING VIA CLOUD ...
KEY-AGGREGATE SEARCHABLE ENCRYPTION (KASE) FOR GROUP DATA SHARING VIA CLOUD ...
 

Similar to Phase1

A secure erasure code based cloud storage system with secure data forwarding
A secure erasure code based cloud storage system with secure data forwardingA secure erasure code based cloud storage system with secure data forwarding
A secure erasure code based cloud storage system with secure data forwardingJPINFOTECH JAYAPRAKASH
 
IRJET - Multi Authority based Integrity Auditing and Proof of Storage wit...
IRJET -  	  Multi Authority based Integrity Auditing and Proof of Storage wit...IRJET -  	  Multi Authority based Integrity Auditing and Proof of Storage wit...
IRJET - Multi Authority based Integrity Auditing and Proof of Storage wit...IRJET Journal
 
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...Editor IJCATR
 
Securely Data Forwarding and Maintaining Reliability of Data in Cloud Computing
Securely Data Forwarding and Maintaining Reliability of Data in Cloud ComputingSecurely Data Forwarding and Maintaining Reliability of Data in Cloud Computing
Securely Data Forwarding and Maintaining Reliability of Data in Cloud ComputingIJERA Editor
 
Implementation of De-Duplication Algorithm
Implementation of De-Duplication AlgorithmImplementation of De-Duplication Algorithm
Implementation of De-Duplication AlgorithmIRJET Journal
 
IJSRED-V2I2P10
IJSRED-V2I2P10IJSRED-V2I2P10
IJSRED-V2I2P10IJSRED
 
Presentation (6).pptx
Presentation (6).pptxPresentation (6).pptx
Presentation (6).pptxMSMuthu5
 
Privacypreservingdelegatedaccesscontrolinpublicclouds
Privacypreservingdelegatedaccesscontrolinpublicclouds Privacypreservingdelegatedaccesscontrolinpublicclouds
Privacypreservingdelegatedaccesscontrolinpublicclouds Shakas Technologies
 
Privacypreservingdelegatedaccesscontrolinpublicclouds 141112073315-conversion...
Privacypreservingdelegatedaccesscontrolinpublicclouds 141112073315-conversion...Privacypreservingdelegatedaccesscontrolinpublicclouds 141112073315-conversion...
Privacypreservingdelegatedaccesscontrolinpublicclouds 141112073315-conversion...Shakas Technologies
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)inventionjournals
 
Secure Access to Outsourced Databases
Secure Access to Outsourced DatabasesSecure Access to Outsourced Databases
Secure Access to Outsourced DatabasesIOSR Journals
 
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud. A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud. IJCERT JOURNAL
 
Secure Redundant Data Avoidance over Multi-Cloud Architecture.
Secure Redundant Data Avoidance over Multi-Cloud Architecture. Secure Redundant Data Avoidance over Multi-Cloud Architecture.
Secure Redundant Data Avoidance over Multi-Cloud Architecture. IJCERT JOURNAL
 
Providing user security guarantees in public infrastructure clouds
Providing user security guarantees in public infrastructure cloudsProviding user security guarantees in public infrastructure clouds
Providing user security guarantees in public infrastructure cloudsKamal Spring
 

Similar to Phase1 (20)

A secure erasure code based cloud storage system with secure data forwarding
A secure erasure code based cloud storage system with secure data forwardingA secure erasure code based cloud storage system with secure data forwarding
A secure erasure code based cloud storage system with secure data forwarding
 
E0952731
E0952731E0952731
E0952731
 
126689454 jv6
126689454 jv6126689454 jv6
126689454 jv6
 
As03302670271
As03302670271As03302670271
As03302670271
 
IRJET - Multi Authority based Integrity Auditing and Proof of Storage wit...
IRJET -  	  Multi Authority based Integrity Auditing and Proof of Storage wit...IRJET -  	  Multi Authority based Integrity Auditing and Proof of Storage wit...
IRJET - Multi Authority based Integrity Auditing and Proof of Storage wit...
 
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
 
Securely Data Forwarding and Maintaining Reliability of Data in Cloud Computing
Securely Data Forwarding and Maintaining Reliability of Data in Cloud ComputingSecurely Data Forwarding and Maintaining Reliability of Data in Cloud Computing
Securely Data Forwarding and Maintaining Reliability of Data in Cloud Computing
 
Implementation of De-Duplication Algorithm
Implementation of De-Duplication AlgorithmImplementation of De-Duplication Algorithm
Implementation of De-Duplication Algorithm
 
12
1212
12
 
12
1212
12
 
IJSRED-V2I2P10
IJSRED-V2I2P10IJSRED-V2I2P10
IJSRED-V2I2P10
 
Paper2
Paper2Paper2
Paper2
 
Presentation (6).pptx
Presentation (6).pptxPresentation (6).pptx
Presentation (6).pptx
 
Privacypreservingdelegatedaccesscontrolinpublicclouds
Privacypreservingdelegatedaccesscontrolinpublicclouds Privacypreservingdelegatedaccesscontrolinpublicclouds
Privacypreservingdelegatedaccesscontrolinpublicclouds
 
Privacypreservingdelegatedaccesscontrolinpublicclouds 141112073315-conversion...
Privacypreservingdelegatedaccesscontrolinpublicclouds 141112073315-conversion...Privacypreservingdelegatedaccesscontrolinpublicclouds 141112073315-conversion...
Privacypreservingdelegatedaccesscontrolinpublicclouds 141112073315-conversion...
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
 
Secure Access to Outsourced Databases
Secure Access to Outsourced DatabasesSecure Access to Outsourced Databases
Secure Access to Outsourced Databases
 
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud. A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
 
Secure Redundant Data Avoidance over Multi-Cloud Architecture.
Secure Redundant Data Avoidance over Multi-Cloud Architecture. Secure Redundant Data Avoidance over Multi-Cloud Architecture.
Secure Redundant Data Avoidance over Multi-Cloud Architecture.
 
Providing user security guarantees in public infrastructure clouds
Providing user security guarantees in public infrastructure cloudsProviding user security guarantees in public infrastructure clouds
Providing user security guarantees in public infrastructure clouds
 

Phase1

  • 1. A SECURE ERASURE CODE- BASED CLOUD STORAGE SYSTEM WITH SECURE DATA FORWARDING Phase 1 Presentation
  • 3.  Constructing a secure cloud storage system that supports multiple functions over a distributed system.  Storing data in a third party’s cloud system causes serious concern on data confidentiality.  In order to provide strong confidentiality for messages in storage servers, a user can encrypt messages by a cryptographic method.
  • 4.  We address the problem of forwarding data to another user by storage servers directly.  The methods we implemented threshold proxy re- encryption and decentralized erasure code.  Storing cryptographic keys in a single device is risky.  User distributes his cryptographic key to key servers that shall perform cryptographic functions on behalf of the user.
  • 6.  In Existing System we use a straightforward integration method.  In order to provide strong confidentiality for messages in storage servers, a user can encrypt messages by a cryptographic method.  To retrieve the Codeword symbols from storage servers, decode them, and then decrypt them by using cryptographic keys.  Limit the functionality of the storage system .
  • 9. We mainly concentrating on 2 aspects. o Data Storage Security. o Data Forwarding. Data Storage Security  Data storage mechanism.  Data availability.  Type of encryption.
  • 10. Data Forwarding  First, the user has to do most computation and the communication traffic between the user and storage servers is high.  Second, the user has to manage his cryptographic keys. If the user’s device of storing the keys is lost or compromised, the security is broken.  Finally, besides data storing and retrieving, it is hard for storage servers to directly support other functions. For example, storage servers cannot directly forward a user’s messages to another one. The owner of messages has to retrieve, decode, decrypt and then forward them to another user.
  • 12.  A new threshold proxy re-encryption scheme.  Encoding of data is done by erasure codes.  Decentralized code to form a secure distributed storage system. The storage system independently perform the following.  Encoding.  Re-encryption.  Key servers.  Partial decryption. o We integrate the above mentioned encryption scheme and secure distribution.
  • 14. What do we get by doing all this?
  • 15. o Efficiency in the following aspects,  Data robustness.  Data confidentiality.  Data forwarding.
  • 17. Decentralized Erasure Codes for Distributed Networked Storage.  Type-based Proxy Re-encryption and its Construction.  CCA-Secure Proxy Re-encryption without Pairings.  Glacier: highly durable, decentralized storage despite massive correlated failures.  Plutus : Scalable secure file sharing on untrusted storage
  • 19.  Process Encryption  Threshold-Proxy Function  Secure Cloud Storage  Decentralization  Data Forwarding
  • 20. Process Encryption  The process can be encrypted by using cryptographic keys.  After the process can be encrypted, it can be Spitted as different process.  Process splitting can also be sectorized by the data owner.
  • 22.  We integrate the newly proposed threshold proxy re-encryption scheme and erasure codes over exponents.  Key servers act as access nodes for providing a front-end layer.  The proposed system supports the following features in a distributed way,  Encrypting the k blocks  Encoding the n codeword symbols  Partial decryption operations.
  • 23. What’s Next ???  Threshold-Proxy Function  Secure Cloud Storage  Decentralization  Data Forwarding