Rateless Erasure Code Based Secure Storage in Cloud Computing

نویسنده

  • Ramasami
چکیده

Cloud computing is a promising computing model that enables convenient and on-demand network access to a shared pool of configurable computing resources. The first offered cloud service is moving data into the cloud: data owners let cloud service providers host their data on cloud servers and data consumers can access the data from the cloud servers. This new paradigm of data storage service also introduces new security challenges, because data owners and data servers have different identities and different business interests. In this paper, to ensure the correctness of users’ data in the cloud, we propose an effective and flexible distributed scheme with two salient features, opposing to its predecessors. By utilizing the homomorphic token with distributed verification of raptor coded data, our scheme achieves the integration of storage correctness insurance and data error localization, i.e., the identification of misbehaving server(s). The proposed design further support secure and efficient dynamic operations on data block. Our result shows that, our proposed model provides a secure storage for data in

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Secure Data Compression and Error Correcting Codes for Networks and Cloud Storage

of “Secure Data Compression and Error Correcting Codes for Networks and Cloud Storage” by James Alan Kelley, Ph.D., Brown University, May 2015. We present several novel constructions—combining cryptography, error correcting codes (ECCs), and data compression—that find ready application in enhancing security and fault-tolerance in cloud storage. We demonstrate this by presenting a simple (yet no...

متن کامل

A Secure Code Based Cloud Storage System Using Proxy Re-Encryption Scheme in Cloud Computing

Cloud computing is a model for enabling convenient, on demand network access to a shared pool of computing resources. The cloud storage system consists of a collection of storage servers and key servers. Storing data in a third party cloud system causes serious concern on data confidentiality, so a user divides the data into blocks, encrypts and stores them in various storage servers. The stora...

متن کامل

Threshold Proxy Re-Encryption Scheme and Decentralized Erasure Code in Cloud Storage With Secure Data Forwarding

A cloud storage system, used to store large number of data in storage server. Cloud system is used to provide large number storage servers, which provide long-term storage service over the Internet. Third party’s cloud system does not provide data confidentiality. Constructing centralized storage system for the cloud system makes hackers stole data easily. General encryption schemes protect dat...

متن کامل

A Reliable and Secure Cloud Storage Schema Using Multiple Service Providers

Despite the many advantages provided by cloud-based storage services, there are still major concerns such as security, reliability and confidentiality of data stored in the cloud. In this paper, we propose a reliable and secure cloud storage schema using multiple service providers. Different from existing approaches to achieving data reliability using redundancy at the server side, we propose a...

متن کامل

Reliable Enhanced Secure Code Dissemination with Rateless Erasure Codes in WSNs

Code dissemination is very useful to remotely fix bugs or add now functions in wireless sensor networks (WSNs) after sensors deployed. Hostile environments keep the secure code dissemination a major concern. The Delugebased protocols are the widely used code disseminations, however, which have to take much energy and memory to deal with the problem caused by out of order delivery of packets in ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013