Your SlideShare is downloading. ×
Psdot 12 a secure erasure code-based cloud storage
Psdot 12 a secure erasure code-based cloud storage
Psdot 12 a secure erasure code-based cloud storage
Psdot 12 a secure erasure code-based cloud storage
Psdot 12 a secure erasure code-based cloud storage
Psdot 12 a secure erasure code-based cloud storage
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Psdot 12 a secure erasure code-based cloud storage

1,424

Published on

0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
1,424
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
67
Comments
0
Likes
1
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. A SECURE ERASURE CODE-BASED CLOUD STORAGE SYSTEM WITH SECURE DATA FORWARDINGOBJECTIVE: The main objective of this project is constructing a secure data storagesystem that supports multiple functions is challenging when the storage system isdistributed and has no central authority.PROBLEM DIFINITION:  Data robustness is a major requirement for storage systems.  Cryptography technique is used to encrypt and decrypt the data in cloud storage. So that hackers can easily hack the encrypted data by using some techniques.  Storing data in a third party’s cloud system causes serious concern on data confidentiality.ABSTRACT: A cloud storage system, consisting of a collection of storage servers,provides long-term storage services over the Internet. Storing data in a third party’scloud system causes serious concern over data confidentiality. Constructing asecure storage system that supports multiple functions is challenging when thestorage system is distributed and has no central authority. We propose a thresholdproxy re-encryption scheme and integrate it with a decentralized erasure code suchthat a secure distributed storage system is formulated.
  • 2. The distributed storage system not only supports secure and robust datastorage and retrieval, but also lets a user forward his data in the storage servers toanother user without retrieving the data back. The main technical contribution isthat the proxy re-encryption scheme supports encoding operations over encryptedmessages as well as forwarding operations over encoded and encrypted messages.Our method fully integrates encrypting, encoding, and forwarding. We analyze andsuggest suitable parameters for the number of copies of a message dispatched tostorage servers and the number of storage servers queried by a key server. Theseparameters allow more flexible adjustment between the number of storage serversand robustness.EXISTING SYSTEM: In existing system normal encryption and decryption technique is used toencrypt and decrypt the data in cloud storage system. Data robustness is a majorrequirement for storage systems. Storing data in a third party’s cloud system causesserious concern on data confidentiality. In order to provide strong confidentialityfor messages in storage servers, a user can encrypt messages by a cryptographicmethod before applying an erasure code method to encode and store messages.When he wants to use a message, he needs to retrieve the codeword symbols fromstorage servers, decode them, and then decrypt them by using cryptographic keys.
  • 3. DISADVANTAGES:  The user has to do mostcomputation and the communication traffic between the user and storage devices is high.  The user has to manage his cryptographic keys.  If the user’s device of storing the keys is lost or compromised, the security is broken.  It is hard for storage servers to directly forward a user’s messages to another one.  The owner of the message has to retrieve, decode, decrypt and then forward them to another user.PROPOSED SYSTEM: In proposed system, we address the problem of forwarding data to anotheruser by storage servers directly under the command of the data owner. We considerthe system model that consists of distributed storage servers and key servers. Sincestoring cryptographic keys in a single device is risky, a user distributes hiscryptographic key to key servers that shall perform cryptographic functions onbehalf of the user. These key servers are highly protected by security mechanisms.To well fit the distributed structure of systems, we require that serversindependently perform all operations. With this consideration, we propose a newthreshold proxy re-encryption scheme and integrate it with a secure decentralizedcode to form a secure distributed storage system.
  • 4. The encryption scheme supports encoding operations over encryptedmessages and forwarding operations over encrypted and encoded messages. Ourstorage servers act as storagenodes in a content addressable storage system forstoringcontent addressable blocks. Our key servers act as accessnodes forproviding a front-end layer such as a traditionalfile system interface.ADVANTAGES:  The tight integration of encoding, encryption, and forwarding makes the storage system efficiently meet the requirements of data robustness, data confidentiality, and data forwarding.  More flexible adjustment between the number of storage servers and robustness.  By using the threshold proxy re-encryption scheme, we present a secure cloud storage system that provides secure data storage and secure data forwarding functionality in a decentralized structure.ALGORITHM USED: 1. AES (Advanced Encryption Standard) 2. Triple DES (Data Encryption Standard)
  • 5. ARCHITECTURE DIAGRAM: Secured Cloud Storage Proxy Re- DecentralizedUSER A Encryption Erasure Code USER A Message Data Or Information USER BSYSTEM REQUIREMENTS: Hardware Requirements:  Windows XP Operating System  Intel Pentium IV  256/512 MB RAM  1 GB Free disk space or greater  1 GB on Boot Drive  17” XVGA display monitor  1 Network Interface Card (NIC)
  • 6. Software Requirements:  Front End :C#.NET (ASP.NET)  Back End : MS SQL Server 2005  .NET Framework: :4.0APPLICATIONS: 1. Organizations 2. Colleges 3. Governments

×