A Study on Secure Cloud server System using Proxy Re-Encryption Model

Authors

  • Praveen G Dept. of Computer Science, RCR Institute of Management & Technology, S V Uuniversity, Tirupati, India
  • Ravikumar Chowdary V Dept. of Computer Science, RCR Institute of Management & Technology, S V Uuniversity, Tirupati, India

Keywords:

Architecture, Construction of Secure Cloud Storage Systems

Abstract

A cloud storage system, consisting of a collection of storage servers, provides long-term storage services over the Internet. Storing data in a third party’s cloud system causes serious concern over data confidentiality. General encryption schemes protect data confidentiality, but also limit the functionality of the storage system because a few operations are supported over encrypted data. Constructing a secure storage system that supports multiple functions is challenging when the storage system is distributed and has no central authority. We propose a threshold proxy re-encryption scheme and integrate it with a decentralized erasure code such that a secure distributed storage system is formulated.

References

[1] J. Kubiatowicz, D. Bindel, Y. Chen, P. Eaton, D. Geels, An Architecture for Global-Scale Persistent Storage,” Proc. Ninth Int’l Conf. Architectural Support for Programming Languages and Operating Systems (ASPLOS), pp. 190-201, 2000.

[2] P. Druschel and A. Rowstron, “PAST: A Large-Scale, Persistent Peer-to-Peer Storage Utility,” Proc. Eighth Workshop Hot Topics in Operating System (HotOS VIII), pp. 75-80, 2001.

[3] A. Adya, W.J. Bolosky, M. Castro, G. Cermak, R. Chaiken, J.R.Douceur, J. Howell, J.R. Lorch, M. Theimer, and R. Wattenhofer, “Farsite: Federated, Available, and Reliable Storage for an Incompletely Trusted Environment,” Proc. Fifth Symp. Operating System Design and Implementation (OSDI), pp. 1-14, 2002.

[4] Haeberlen, A. Mislove, and P. Druschel, “Glacier: Highly Durable, Decentralized Storage Despite Massive Corr elated Failures,” Proc. Second Symp.Networked Systems Design and Implementation (NSDI), pp. 143-158, 2005.

[5] A.G. Dimakis, V. Prabhakaran, and K. Ramchandran, “Decentralized Erasure Codes for Distributed Networked Storage,” IEEE Trans. Information Theory, vol. 52, no. 6 pp. 2809-2816, June 2006.

Downloads

Published

2025-11-25

How to Cite

[1]
G. Praveen and V. Ravikumar Chowdary, “A Study on Secure Cloud server System using Proxy Re-Encryption Model”, Int. J. Comp. Sci. Eng., vol. 7, no. 6, pp. 99–102, Nov. 2025.