Open Access Journal

ISSN : 2394-2320 (Online)

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

Open Access Journal

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

ISSN : 2394-2320 (Online)

Hybrid Attribute Based Encryption for Secured Data Transaction in Cloud Storage System

Author : M.Preethika 1 Priyanka.S 2 Suganya.S 3 Yamuna.A 4 Mrs.R.Manjula 5

Date of Publication :7th March 2016

Abstract: People have the power to access the internet anywhere and anytime. Cloud computing is a concept that treats the resources on the Internet as an unified entity, namely cloud. The data center operators virtualized the resources according to the needs of the customers and expose them as storage pools, which the customers can themselves use to store files or data objects. Physically, the resources may get stored across multiple servers. So, Data robustness is a major requirement for such storage systems. In this paper we have suggested one way to provide data robustness that is by replicating the message such that each storage server stores a copy of the message. We have enhanced the secure cloud storage system by using a threshold proxy reencryption technique. This encryption scheme supports decentralized erasure codes applied over encrypted messages and data forwarding operations over encrypted and encoded messages. Our system is highly distributed where each storage server independently encodes and forward messages and key servers independently perform partial decryption.

Reference :

    1. H.-Y. Lin and W.-G. Tzeng, “A Secure Decentralized Erasure Code for Distributed Network Storage,” IEEE Trans. Parallel and Distributed Systems, vol. 21, no. 11, pp. 1586-1594, Nov. 2010.
    2. A. Juels and B. S. Kaliski, “Pors, proofs of retrievability for large files,”in Proc. 14th ACM Conf. Computer and Commun. Security (CCS'07),2007, pp. 584–597
    3. G. Ateniese,R.Burns,R.Curtmola, J. Herring,O.Khan, L. Kissner, Z.Peterson, andD. Song, “Remote data checking using provable data possession,”ACM Trans. Inf. Syst. Secur., vol. 14, no. 1, pp. 12:1–12:34, Jun. 2011
    4. 4.G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson,and D. Song, “Provable data possession at untrusted stores,” in Proc.14th ACM Conf. Computer andCommun. Security (CCS'07), 2007, pp.
    5. S.-T. Shen and W.-G. Tzeng, “Delegable provable data possession for remote data in the clouds,” in Proc. 13th Int. Conf. Information and common. Security (ICICS'11), 2011, pp. 93–111.
    6. K. D. Bowers, A. Juels, and A. Oprea, “Hail, a highavailability and integrity Layer for cloud storage,” in Proc. 16th ACM Conf. Computer and Commun. Security (CCS'09), 2009, pp. 187–198
    7. B. Chen, R. Curtmola, G. Ateniese, and R. Burns, “Remote data checking for network coding-based distributed storage systems,” in Proc. 2nd ACM Workshop Cloud Computing Security (CCSW'10), 2010, pp. 31–42.

Recent Article