An Approach to provide Secure Storage using Self Destructing Erasure Codes

Authors

  • Anusha B Dept. of Computer Science and Engineering, Prasad V Potluri Siddhartha Institute of Technology, Kanuru, India
  • S Phani Praveen Dept. of Computer Science and Engineering, Prasad V Potluri Siddhartha Institute of Technology, Kanuru, India

Keywords:

Proxy Re-Encryption, Decentralized Erasure Code, RSA, AES, Erasure Codes

Abstract

Several encryption schemes provide data confidentiality but at the same time functionality of the storage system is limited. A threshold proxy re-encryption scheme which is integrated with decentralized erasure code was proposed to formulate a secure storage system. This scheme provides robust and secure storage and retrieval and also lets the user forward the data to other users. The main technical contribution is that encoding operations over encrypted messages as well as forwarding operations over encoded and encrypted message are supported by this scheme.

References

Introduction to Information Security, https://en.wikipedia.org/wiki/Information_security, Wednesday, July 1, 2015.

Hsiao-Ying Lin, Member, IEEE, and Wen-Guey Tzeng, Member, IEEE.,‖ A Secure Erasure Code-Based Cloud Storage System with Secure Data Forwarding‖, IEEE transactions on parallel and distributed systems, vol. 23, no.6, pp.995-1003 , june 2012.

Rachna Jain, Sushila Madan and Bindu Garg, “Analyzing Various existing Security Techniques to Secure Data Access in Cloud Environment”, Volume-3, Issue-1, January-2015.

Evgeny Milanov ― The RSA Alorithm‖ 3 june, 2009.

G. Ateniese, K. Fu, M. Green, and S. Hohenberger, ―Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage,‖ ACM Trans. Information and System Security, vol. 9, no. 1, pp. 1-30, 2006.

G. Ateniese, K. Benson, and S. Hohenberger, ―Key-Private Proxy Re-Encryption,‖ Proc. Topics in Cryptology (CT-RSA), pp. 279-294, 2009.

J. Shao and Z. Cao, ―CCA-Secure Proxy Re-Encryption without Pairings,‖ Proc. 12th Int’l Conf. Practice and Theory in Public Key Cryptography (PKC), pp. 357-376, 2009.

Shamir, ―How to Share a Secret,‖ ACM Comm., vol. 22, pp. 612-613, 1979

Downloads

Published

2025-11-10

How to Cite

[1]
B. Anusha and S. Phani Praveen, “An Approach to provide Secure Storage using Self Destructing Erasure Codes”, Int. J. Comp. Sci. Eng., vol. 3, no. 9, pp. 87–90, Nov. 2025.