A Novel Approach to Secure Cloud Storage Using Network Coding

Authors

  • Mithinti Pavan  CSE Department, St Ann's College of Engineering, Chirala, Andhra Pradesh, India
  • Dr. P. Harini   CSE Department, St Ann's College of Engineering, Chirala, Andhra Pradesh, India

Keywords:

Secure Cloud Storage, Network Coding, Homomorphic Cryptosystems, MAC

Abstract

Exchanging data streams to an advantage rich cloud server for in ward thing appraisal, an essential building block in various surely understood stream applications (e.g., accurate checking), is addressing various associations and individuals. On the other hand, checking the eventual outcome of the remote count accept a basic part in watching out for the issue of trust. Since the outsourced data assembling likely starts from various data sources, it is hungered for the system to have the ability to pinpoint the originator of bumbles by assigning each data source an uncommon secret key, which requires the inward thing affirmation to be performed under any two get-togethers' assorted keys. Regardless, the present plans either depend on upon a single key assumption or extraordinary yet for all intents and purposes wasteful totally homomorphic cryptosystems. In this paper, we focus on the all the more troublesome multi-key circumstance where data streams are exchanged by various data sources with unmistakable keys. We initially exhibit a novel homomorphic unquestionable name system to transparently check the outsourced inward thing figuring on the dynamic data streams, and after that extend it to reinforce the affirmation of cross section thing computation. We exhibit the security of our arrangement in the self-assertive prophet show. What's more, the exploratory outcome moreover shows the practicability of our design.

References

  1. A. Juels and B. Kaliski Jr, “Pors: Proofs of retrievability for large files,” in ACM Conference on Computer and Communications Security (SP), 2007, pp. 584–597.
  2.  G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, “Provable data possession at untrusted stores,” in ACM Conference on Computer and Communications Security (CCS), 2007, pp. 598–609.
  3. H. Shacham and B. Waters, “Compact proofs of retrievability,” in International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT), 2008, pp. 90–107.
  4. C. Wang, S. S. M. Chow, Q. Wang, K. Ren, and W. Lou, “Privacypreserving public auditing for secure cloud storage,” IEEE Transactions on Computers, vol. 62, no. 2, pp. 362–375, 2013.
  5. J. Xu and E.-C. Chang, “Towards efficient proofs of retrievability,” in ACM Symposium on Information, Computer and Communications Security (ASIACCS), 2012, pp. 79–80.
  6.  K. Yang and X. Jia, “An efficient and secure dynamic auditing protocol for data storage in cloud computing,” IEEE Transactions on Parallel and Distributed Systems, vol. 24, no. 9, pp. 1717–1726, 2013.
  7.  N. Cai and R.W. Yeung, “Secure network coding,” in IEEE International Symposium on Information Theory (ISIT), 2002, p. 323.
  8.  C. Gkantsidis and P. R. Rodriguez, “Cooperative security for network coding file distribution,” in IEEE International Conference on Computer Communications (INFOCOM), 2006.
  9.  R. Ahlswede, N. Cai, S.-Y. Li, and R. W. Yeung, “Network information flow,” IEEE Transactions on Information Theory, vol. 46, no. 4, pp. 1204–1216, 2000.
  10. M. A. Shah, R. Swaminathan, and M. Baker, “Privacy-preserving audit and extraction of digital contents,” IACR Cryptology ePrint Archive, vol. 2008, p. 186, 2008.
  11. R. Gennaro, J. Katz, H. Krawczyk, and T. Rabin, “Secure network coding over the integers,” in International Conference on Practice and Theory in Public-Key Cryptography (PKC), 2010, pp. 142–160.
  12. A. G. Dimakis, K. Ramchandran, Y. Wu, and C. Suh, “A survey on network codes for distributed storage,” Proceedings of the IEEE, vol. 99, no. 3, pp. 476–489, 2011.
  13. A. G. Dimakis, P. B. Godfrey, Y. Wu, M. J. Wainwright, and K. Ramchandran, “Network coding for distributed storage systems,” IEEE Transactions on Information Theory, vol. 56, no. 9, pp. 4539–4551, 2010.
  14.  Y. Hu, P. P. Lee, and K. W. Shum, “Analysis and construction of functional regenerating codes with uncoded repair for distributed storage systems,” IEEE International Conference on Computer Communications (INFOCOM), 2013.
  15.  A. Le and A. Markopoulou, “Nc-audit: Auditing for network coding storage,” in International Symposium on Network Coding (NetCod), 2012, pp. 155–160.

Downloads

Published

2017-10-31

Issue

Section

Research Articles

How to Cite

[1]
Mithinti Pavan, Dr. P. Harini , " A Novel Approach to Secure Cloud Storage Using Network Coding, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 2, Issue 5, pp.995-1000, September-October-2017.