A Novel identity based secure distributed data storage scheme
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 6
Abstract
Abstract: Secure distributed data storage can shift the burden of maintaining a large number of files from the owner to proxy servers. Proxy servers can convert encrypted files for the owner to encrypted files for the receiver without the necessity of knowing the content of the original files. In practice, the original files will be removed by the owner for the sake of space efficiency. Hence, the issues on confidentiality and integrity of the outsourced data must be addressed carefully. In this paper, we propose two identity-based secure distributed data storage (IBSDDS) schemes. Our schemes can capture the following properties: (1) The file owner can decide the access permission independently without the help of the private key generator (PKG); (2) For one query, a receiver can only access one file, instead of all files of the owner; (3) Our schemes are secure against the collusion attacks, namely even if the receiver can compromise the proxy servers, he cannot obtain the owner’s secret key. Although the first scheme is only secure against the chosen plaintext attacks (CPA), the second scheme is secure against the chosen cipher text attacks (CCA). To the best of our knowledge, it is the first IBSDDS schemes where access permission is made by the owner for an exact file and collusion attacks can be protected in the standard model.
Authors and Affiliations
M. Ramadevi , D. Bulla Rao
Analysis and Interpretation of Coronary Artery Blockage using Soft Computing Techniques
Abstract: Analysis and interpretation of Myocardial infarction, is very important at the early stage to detect the possible risk for heart attacks. Various non-invasive imaging modalities have been used for better diagno...
SMS EncryptionUsing One-Time Pad Cipher
Abstract: The content of the SMS is very crucial. It consists of an imperative information. Unknown participants can not retrieve it. To protect the SMS content, the sender must provide the unique characterbefore it is...
Empirical Study on Classification Algorithm For Evaluation of Students Academic Performance
Abstract: Data mining techniques (DMT) are extensively used in educational field to find new hidden patterns from student’s data. In recent years, the greatest issues that educational institutions are facing the unstable...
Fast Response Multilevel Scheduling Scheme for Wireless Sensor Networks
Abstract: Wireless sensor networks (WSNs) have a wide variety of military and civil applications. The sensor nodes are powered by batteries with limited energy. Hostile or hazardous environments where the sensor no...
A Block Cipher Based Cryptosystem through Modified Forward Backward Overlapped Modulo Arithmetic Technique (MFBOMAT)
In this paper, a new Cryptosystem based on block cipher has been proposed where the encryption is done through Modified Forward Backward Overlapped Modulo Arithmetic Technique (MFBOMAT). The original messag...