An Effective Integrity Check Scheme for Secure Erasure Code-Based Storage Systems


In the appliance of cloud storage, a user no longer possesses his files in his local depository. Therefore, he is concerned concerning the safety of the stored files. Data confidentiality and data robustness are the most security issues. For data confidentiality, the user can 1st encrypt files and then store the encrypted files in a very cloud storage. For knowledge robustness, there are two concerns: service failure, and service corruption. We are involved regarding data robustness in cloud storage services. Lin and Tzeng proposed a secure erasure code-based storage system with multiple key servers recently. Their system supports a repair mechanism, where a replacement storage server can compute a new ciphertext from the ciphertexts obtained from the remaining storage servers. Their system considers data confidentiality in the cloud, and data robustness against storage server failure. During this paper, we have a tendency to propose an integrity check scheme for their system to boost data robustness against storage server corruption, that returns tampered ciphertexts. With our integrity check scheme, their storage system can house not solely the problem of storage server failure, but also the problem of storage server corruption. The challenging half of our work is to own homomorphic integrity tags. New integrity tags will be computed from previous integrity tags by storage servers without involvement of the user's secret key or backup servers. We prove the safety of our integrity check scheme formally, and establish the parameters for achieving an amazing probability of a successful information retrieval.

Did you like this research project?

To get this research project Guidelines, Training and Code... Click Here

PROJECT TITLE : Subgraph Matching with Effective Matching Order and Indexing ABSTRACT: When a query graph is compared to a data graph, the subgraph matching operation locates all embeddings in the data graph that are identical
PROJECT TITLE : ESVSSE Enabling Efficient, Secure, Verifiable Searchable Symmetric Encryption ABSTRACT: It is believed that symmetric searchable encryption, also known as SSE, will solve the problem of privacy in data outsourcing
PROJECT TITLE : Secure Cloud Data Deduplication with Efficient Re-encryption ABSTRACT: The data deduplication technique has seen widespread adoption among commercial cloud storage providers, which is both important and necessary
PROJECT TITLE : Scheduling Algorithms for Efficient Execution of Stream Workflow Applications in Multicloud Environments ABSTRACT: The applications used for processing large amounts of data are becoming increasingly complicated.
PROJECT TITLE : ES2: Building an Efficient and Responsive Event Path for I/O Virtualization ABSTRACT: I/O virtualization's primary performance bottleneck is hypervisor intervention in the virtual I/O event path. This is due to

Ready to Complete Your Academic MTech Project Work In Affordable Price ?

Project Enquiry