IJMTES – ENSURING TRUST IN CLOUD STORAGE USING MPNR SCHEME WITH DATA FORWARDING

Journal Title : International Journal of Modern Trends in Engineering and Science

Author’s Name : B.Vaishnavi, M.Sivakumar

Volume 01 Issue o5  Year 2014  

ISSN no:  2348-3121  

Page no: 149-153

Abstract—Cloud computing is internet based and allows users to access resources available in pay as you use model under three deployment services. This paper focuses on ensuring security and trust between the users and the provider. The storage method uses mechanism like homomorphic secret sharing for sharing the encrypted block of data, Proxy re-encryption method is used for forwarding the data between users on the command of the sender to the receiver via the cloud provider and the MPNR Scheme for avoiding the repudiation and fairness.

Keywords—Proxy re-encryption, Non repudiation, Data Forwarding.

Reference

[1] J. Kubiatowicz, D. Bindel, Y. Chen, P. Eaton, D. Geels, R.Gummadi, S. Rhea, H. Weatherspoon, W. Weimer, C. Wells, and B. Zhao, “Oceanstore: An Architecture for Global-Scale Persistent Storage,” Proc. Ninth Int’l Conf. Architectural Support for Programming Languages and Operating Systems (ASPLOS), pp. 190-201, (2000).
[2] P. Druschel and A. Rowstron, “PAST: A Large-Scale, Persistent Peer-to-Peer Storage Utility,” Proc. Eighth Workshop Hot Topics in Operating System (HotOS VIII), pp. 75-80, (2001).
[3] A. Adya, W.J. Bolosky, M. Castro, G. Cermak, R. Chaiken, J.R. Douceur, J. Howell, J.R. Lorch, M. Theimer, and R. Wattenhofer, “Farsite: Federated, Available, and Reliable Storage for an Incompletely Trusted Environment,” Proc. Fifth Symp. Operating System Design and Implementation (OSDI), pp. 1-14, (2002).
[4] Dimakis.A.G, V.Prabhakaran, and K.Ramchandran, “Ubiquitous Access to Distributed Data in Large-Scale Sensor Networks through Decentralized Erasure Codes,” Proc. Fourth Int’l Symp. Information Processing in Sensor Networks (IPSN), pp. 111- 117, (2005).
[5] Dimakis..G., V. Prabhakaran, and K. Ramchandran, “Decentralized Erasure Codes for Distributed Networked Storage,” IEEE Trans. Information Theory, vol. 52, no. 6 pp. 2809-2816, June (2006).
[6] Druschel. P and A. Rowstron, “PAST: A Large-Scale, Persistent Peer-to-Peer Storage Utility,” Proc. Eighth Workshop Hot Topics in Operating System (HotOS VIII), pp. 75-80, (2001).
[7] Haeberlen.A, A. Mislove, and P. Druschel, “Glacier: Highly Durable, Decentralized Storage Despite Massive Correlated Failures,” Proc. Second Symp. Networked Systems Design and Implementation (NSDI), pp. 143-158, (2005).
[8]Hsiao-Ying Lin, Member, IEEE, and Wen-Guey Tzeng, Member “A Secure Erasure Code-Based Cloud Storage System with Secure Data Forwarding” Vol. 23, No. 6, june (2012).
[9] G.Ashok kumar, P.Srinivasulu ,” Protection Of Data Using Linear Programming And FHE Technique in Cloud Computing” Volume 4, Issue 1, January – April (2013), pp. 24-30.
[10] A.G. Dimakis, V. Prabhakaran, and K. Ramchandran, “Decentralized Erasure Codes for Distributed Networked Storage,” IEEE Trans. Information Theory, Vol. 52, No. 6 pp. 2809-2816, June (2006).
[11] M. Mambo and E. Okamoto, “Proxy Cryptosystems: Delegation of the Power to Decrypt Ciphertexts,” IEICE Trans. Fundamentals of Electronics, Comm. and Computer Sciences, Vol. E80-A, No. 1, pp. 54-63, (1997).
[12] S. Gurgens, C. Rudolph, and H. Vogt, “On the Security of Fair Non-repudiation Protocols,” Proceedings of (2003) Information Security Conference, Bristol, UK, October (2003).
[13] B. Agreiter, M. Hafner, and R. Breu, “A Fair nonrepudiation Service in a Web Service Peer-to-Peer Environment,” Computer Standards & Interfaces, Vol 30, No 6, pp372–378, August (2008).
[14] A. Juels and B. S. K. Jr. Pors: “Proofs of retrievability for large files”. In Proc. ACM CCS, pages 584–597, (2007).
[15] M. Kallahalla, E. Riedel, R. Swaminathan, Q. Wang, and K. Fu, “Plutus: Scalable Secure File Sharing on Untrusted Storage,” In USENIX FAST, pages 29 ~ 42, (2003).
[16] S. Kamara and K. Lauter. “Cryptographic Cloud storage”,In ACM Workshop on Cloud Security, (2009).
[17] A. Shamir, “How to Share a Secret,” ACM Comm., vol. 22, pp. 612-613, (1979).
[18] G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, “Provable Data Possession at Untrusted Stores,” Proc. 14th ACM Conf. Computer and Comm. Security (CCS),pp. 598-609, (2007).
[19] G. Chiou and W. Chen, “Secure broadcasting using the secure lock,” IEEE Transactions on Software Engineering, Vol 15, No 8, pp929-934, Aug. (1989).

Full Pdf Paper-Click Here

Scroll Up