Enabling Cloud Storage Security based on Rate less Codes

被引:0
作者
Pahariya, Parth [1 ]
Pasupuleti, Syam Kumar [2 ]
机构
[1] IITBHU, Comp Sci & Engn, Varanasi, Uttar Pradesh, India
[2] IDRBT, Hyderabad, India
来源
2016 INTERNATIONAL CONFERENCE ON RECENT ADVANCES AND INNOVATIONS IN ENGINEERING (ICRAIE) | 2016年
关键词
Cloud Storage; rate less codes; availability; confidentiality; integrity check; ERASURE CODE;
D O I
暂无
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
As the cloud storage is becoming center part for storing data remotely, user no longer store his data in local depository and user can access data from anywhere. Mostly the users store their data to public cloud, it reduces the storage management of data locally. But there are also security issues such as confidentiality, integrity and availability. Shen et al.[6] has proposed an effective integrity verification scheme for secure erasure code based storage system. As the public cloud is untrustworthy we cannot be reliable on cloud server for encoding the data and keeping in the cloud. In this paper, we propose a new approach based on rate less codes. Our scheme uses proxy server for encoding the cipher text using rate less codes, OFG algorithm for decoding and TPA is used for checking the integrity of data. The analysis shows that our secure cloud storage scheme has better data integrity, availability and confidentiality.
引用
收藏
页数:6
相关论文
共 12 条
[1]   Exploiting Rateless Codes in Cloud Storage Systems [J].
Anglano, Cosimo ;
Gaeta, Rossano ;
Grangetto, Marco .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2015, 26 (05) :1313-1322
[2]   On the Fly Gaussian Elimination for LT Codes [J].
Bioglio, Valerio ;
Grangetto, Marco ;
Gaeta, Rossano ;
Sereno, Matteo .
IEEE COMMUNICATIONS LETTERS, 2009, 13 (12) :953-955
[3]  
Cao N., 2012, P 31 IEEE INT C COMP
[4]  
Chen B., 2010, P 2 ACM WORKSH CLOUD, P3142
[5]  
Juels A., 2007, P 14 ACM C COMP COMM
[6]   A Secure Decentralized Erasure Code for Distributed Networked Storage [J].
Lin, Hsiao-Ying ;
Tzeng, Wen-Guey .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2010, 21 (11) :1586-1594
[7]   Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage [J].
Liu, Jian ;
Huang, Kun ;
Rong, Hong ;
Wang, Huimei ;
Xian, Ming .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (07) :1513-1528
[8]  
Luby M, 2002, ANN IEEE SYMP FOUND, P271, DOI 10.1109/SFCS.2002.1181950
[9]  
Malviya AR, 2015, 2015 INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION & AUTOMATION (ICCCA), P577, DOI 10.1109/CCAA.2015.7148474
[10]  
Rosen Kenneth H., DISCRETE MATH ITS AP