Micro-Scholarship, What it is, How can it help me.pdf
Secure erasure code based cloud storage system with secure data forwarding
1. Presentation By
Rupera Priyank Anilkumar 1AM09IS052
Vineet Kumar 1AM09IS074
Ajay Kumar Yadav 1AM09IS004
Krishna Kumar 1AM06IS029
Under the Guidance of
Mrs. V . Rose Priyanka
Asst.Prof, Dept of ISE
2. Content
Abstract
Existing System
Demerits
Proposed System
Architecture
Merits
Functional Requirements
Non Functional Requirements
System Design
Screen Shots
References
3. Abstract
Implementing threshold proxy re-encryption and decentralized
erasure code.
Distributed storage System used for distribution purpose, and it
depends on the secure storage system.
Storage server and key server are used.
Parameters are more flexible adjustment between
servers(storage and key).
4. Existing System
General encryption scheme for storing data.
DES algorithm is used for key generation.
For the storage data ,user has to manage his keys .
Single storage server for whole file.
5. Demerits
Communication traffic between the user and storage servers.
User’s device of storing the keys is lost.
Storing and retrieving, it is hard for storage servers .
Only one time encryption using general encryption schemes.
6. Proposed System
The method of threshold proxy re-encryption.
Decentralized erasure code method can be used for distributed
storage system.
Distributed storage system depends on the secure cloud
storage.
Storage server and key server those two systems used for
storage system.
Encryption using Blowfish algorithm.
8. Merits
Data is more confidential.
Highly protected by an security mechanism of the Server
Easy distribution and data forwarding.
Less Time consuming.
11. System Design
Workflow Diagram
A workflow diagram visually represents the movement and transfer of
resources, documents, data and tasks through the entire work process for a
given product or service.
Use case Diagram
Use case diagrams are used to describe a set of actions use cases that
some system or systems subject should or can perform in collaboration with
one or more external users of the system actors.
Sequence Diagram
A sequence diagram is a kind of interaction diagram that shows how
processes operate with one another and in what order.
40. Integrated a newly proposed threshold proxy re-encryption
scheme and erasure codes over exponents.
The threshold proxy Re-encryption scheme supports encoding,
forwarding, and partial decryption operations in a distributed
way.
By using the threshold proxy re-encryption scheme, we
present a secure cloud storage system that provides secure data
storage and secure data forwarding functionality in a
decentralized structure.
key servers act as access nodes for providing a front-end layer
such as a traditional file system interface.
Conclusion
41. References
IEEE 2012 paper on Distributed and Parallel systems, “A secure
Erasure code based Cloud storage System with Secure Data
forwarding”.
Swings (second Edition) By Matthew robinson and Pavel
vorobiev.
www.youtube.com
Fast Software Encryption, Cambridge Security Workshop
Proceedings (December 1993), Springer-Verlag, 1994, pp. 191-
204. IEEE Paper.