SlideShare a Scribd company logo
Secure Erasure Code-Based Distributed
Storage System with Secure Data
Forwarding
Introduction
 Constructing a secure storage system that supports multiple
functions is challenging when it is distributed and has no
central authority
 The proposed system consist of threshold proxy re-
encryption scheme, integrated with a decentralized erasure
code
 The main focus is on designing a storage system for
robustness, confidentiality, and functionality
Secure erasure code based distributed storage system with secure data forwarding
Modules
 System setup
 Data storage
 Data forwarding
 Data retrieval
1. System setup
 create set of users, n storage servers SS1, SS2, . . .,
SSn, and m key servers KS1, KS2, . . . , KSm.
 Each user A is assigned a public-secret key pair
(PKA, SKA).
2.Data Storage:
 In the data storage phase, user A encrypts his message
M and dispatches it to storage servers.
 A message M is decomposed into k blocks m1, m2..
 User A encrypts each block mi into a ciphertext Ci and
sends it to v randomly chosen storage servers
 Each storage server linearly combines them with
randomly chosen coefficients into a codeword symbol
and stores it.
3.Data Forwarding:
 User A forwards his encrypted message with an identifier
ID stored in storage servers to user B such that B can
decrypt the forwarded message by his secret key.
 compute a re-encryption key RK AB
 Each storage server uses the re-encryption key to re-encrypt
its codeword symbol for later requests by B .
 The re-encrypted codeword symbol is the combination of
cipher texts under B’s public key.
4.Data Retrieval:
 user A requests to retrieve a message from storage
servers
 User A sends a retrieval request to key servers
 user A combines the partially decrypted codeword
symbols to obtain the original message M.
Work Done
 Setting servers and users
 Each user has assigned with a key pair
 Selecting a file
 Splitting file into blocks
 Encrypting each block
 Sending cipher text to storage server
Work To Be Done
Encoding each block and storing.
Data Forwarding
 Generating re-encryption key
 Re-encrypting codeword
Data Retrieval
 Decrypting each block
 Combing all blocks
THANK YOU

More Related Content

PPTX
Cryptography
PPT
DOCX
A secure erasure code based cloud storage system with secure data forwarding
PPTX
Attribute Based Encryption with Privacy Preserving In Clouds
PPTX
Key aggregate cryptosystem for scalable data sharing in cloud
PDF
Audit free cloud storage via deniable attribute-based encryption
DOC
Key aggregate cryptosystem for scalable data sharing in cloud storage
PPTX
Decentralized access control with anonymous authentication of data stored in ...
Cryptography
A secure erasure code based cloud storage system with secure data forwarding
Attribute Based Encryption with Privacy Preserving In Clouds
Key aggregate cryptosystem for scalable data sharing in cloud
Audit free cloud storage via deniable attribute-based encryption
Key aggregate cryptosystem for scalable data sharing in cloud storage
Decentralized access control with anonymous authentication of data stored in ...

What's hot (12)

PPT
Distributed System by Pratik Tambekar
PPTX
key aggregate cryptosystem for scalable data sharing in cloud storage abstract
PPTX
Key aggregate cryptosystem for scalable data sharing in cloud storage
DOC
An efficient certificate less encryption for
DOC
Decentralized access control with anonymous authentication of data stored in ...
DOCX
KEY-AGGREGATE SEARCHABLE ENCRYPTION (KASE) FOR GROUP DATA SHARING VIA CLOUD ...
PPTX
key aggregate cryptosystem for scalable data sharing in cloud
DOCX
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
PPTX
An efficient certificateless encryption for data sharing on public cloud
PPTX
Key aggregate cryptosystem for scalable data sharing in cloud storage
PPTX
Message integrity protocol
PDF
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Distributed System by Pratik Tambekar
key aggregate cryptosystem for scalable data sharing in cloud storage abstract
Key aggregate cryptosystem for scalable data sharing in cloud storage
An efficient certificate less encryption for
Decentralized access control with anonymous authentication of data stored in ...
KEY-AGGREGATE SEARCHABLE ENCRYPTION (KASE) FOR GROUP DATA SHARING VIA CLOUD ...
key aggregate cryptosystem for scalable data sharing in cloud
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
An efficient certificateless encryption for data sharing on public cloud
Key aggregate cryptosystem for scalable data sharing in cloud storage
Message integrity protocol
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Ad

Similar to Secure erasure code based distributed storage system with secure data forwarding (20)

PDF
Psdot 12 a secure erasure code-based cloud storage
DOC
126689454 jv6
PDF
IRJET- A Secure Erasure Code-Based Cloud Storage Framework with Secure Inform...
PDF
As03302670271
PDF
E0952731
PPTX
Secureerasurecodebasedcloudstoragesystemwithsecuredataforwarding
DOCX
A secure erasure code based cloud storage
PDF
Securely Data Forwarding and Maintaining Reliability of Data in Cloud Computing
PDF
Secret keys and the packets transportation for privacy data forwarding method...
PDF
Secret keys and the packets transportation for privacy data forwarding method...
PPTX
Identity Based Secure Distributed Storage Scheme
DOC
documentation for identity based secure distrbuted data storage schemes
PPTX
Secure erasure code based cloud storage system with secure data forwarding
PPT
6. cryptography
PPT
Major project presentation
PDF
Securing the cloud computing systems with matrix vector and multi-key using l...
PPT
13528 l8
PPT
Psdot 12 a secure erasure code-based cloud storage
126689454 jv6
IRJET- A Secure Erasure Code-Based Cloud Storage Framework with Secure Inform...
As03302670271
E0952731
Secureerasurecodebasedcloudstoragesystemwithsecuredataforwarding
A secure erasure code based cloud storage
Securely Data Forwarding and Maintaining Reliability of Data in Cloud Computing
Secret keys and the packets transportation for privacy data forwarding method...
Secret keys and the packets transportation for privacy data forwarding method...
Identity Based Secure Distributed Storage Scheme
documentation for identity based secure distrbuted data storage schemes
Secure erasure code based cloud storage system with secure data forwarding
6. cryptography
Major project presentation
Securing the cloud computing systems with matrix vector and multi-key using l...
13528 l8
Ad

More from Ali Habeeb (20)

PPT
Anonymous Connections And Onion Routing
PPT
Opinion Mining
PPT
PPT
USB 3.0
PPTX
Blue Eyes
PPT
Cloud Security
PDF
Data-Centric Routing Protocols in Wireless Sensor Network: A survey
PPTX
Web Security
PPT
Organizing User Search Histories
PPTX
Detecting and Resolving Firewall Policy Anomalies
PPT
Bit Torrent Protocol
PPTX
A study of Data Quality and Analytics
PPT
Adhoc and Sensor Networks - Chapter 10
PPT
Adhoc and Sensor Networks - Chapter 09
PPT
Adhoc and Sensor Networks - Chapter 08
PPT
Adhoc and Sensor Networks - Chapter 07
PPT
Adhoc and Sensor Networks - Chapter 06
PPT
Adhoc and Sensor Networks - Chapter 05
PPT
Adhoc and Sensor Networks - Chapter 04
PPT
Adhoc and Sensor Networks - Chapter 03
Anonymous Connections And Onion Routing
Opinion Mining
USB 3.0
Blue Eyes
Cloud Security
Data-Centric Routing Protocols in Wireless Sensor Network: A survey
Web Security
Organizing User Search Histories
Detecting and Resolving Firewall Policy Anomalies
Bit Torrent Protocol
A study of Data Quality and Analytics
Adhoc and Sensor Networks - Chapter 10
Adhoc and Sensor Networks - Chapter 09
Adhoc and Sensor Networks - Chapter 08
Adhoc and Sensor Networks - Chapter 07
Adhoc and Sensor Networks - Chapter 06
Adhoc and Sensor Networks - Chapter 05
Adhoc and Sensor Networks - Chapter 04
Adhoc and Sensor Networks - Chapter 03

Recently uploaded (20)

PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Encapsulation theory and applications.pdf
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PPTX
Big Data Technologies - Introduction.pptx
PDF
Unlocking AI with Model Context Protocol (MCP)
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PPTX
Spectroscopy.pptx food analysis technology
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Spectral efficient network and resource selection model in 5G networks
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Review of recent advances in non-invasive hemoglobin estimation
Network Security Unit 5.pdf for BCA BBA.
Diabetes mellitus diagnosis method based random forest with bat algorithm
Mobile App Security Testing_ A Comprehensive Guide.pdf
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
The Rise and Fall of 3GPP – Time for a Sabbatical?
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
“AI and Expert System Decision Support & Business Intelligence Systems”
Encapsulation theory and applications.pdf
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Big Data Technologies - Introduction.pptx
Unlocking AI with Model Context Protocol (MCP)
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Dropbox Q2 2025 Financial Results & Investor Presentation
20250228 LYD VKU AI Blended-Learning.pptx
Spectroscopy.pptx food analysis technology
Building Integrated photovoltaic BIPV_UPV.pdf
Spectral efficient network and resource selection model in 5G networks
Digital-Transformation-Roadmap-for-Companies.pptx
Understanding_Digital_Forensics_Presentation.pptx
Review of recent advances in non-invasive hemoglobin estimation

Secure erasure code based distributed storage system with secure data forwarding

  • 1. Secure Erasure Code-Based Distributed Storage System with Secure Data Forwarding
  • 2. Introduction  Constructing a secure storage system that supports multiple functions is challenging when it is distributed and has no central authority  The proposed system consist of threshold proxy re- encryption scheme, integrated with a decentralized erasure code  The main focus is on designing a storage system for robustness, confidentiality, and functionality
  • 4. Modules  System setup  Data storage  Data forwarding  Data retrieval
  • 5. 1. System setup  create set of users, n storage servers SS1, SS2, . . ., SSn, and m key servers KS1, KS2, . . . , KSm.  Each user A is assigned a public-secret key pair (PKA, SKA).
  • 6. 2.Data Storage:  In the data storage phase, user A encrypts his message M and dispatches it to storage servers.  A message M is decomposed into k blocks m1, m2..  User A encrypts each block mi into a ciphertext Ci and sends it to v randomly chosen storage servers  Each storage server linearly combines them with randomly chosen coefficients into a codeword symbol and stores it.
  • 7. 3.Data Forwarding:  User A forwards his encrypted message with an identifier ID stored in storage servers to user B such that B can decrypt the forwarded message by his secret key.  compute a re-encryption key RK AB  Each storage server uses the re-encryption key to re-encrypt its codeword symbol for later requests by B .  The re-encrypted codeword symbol is the combination of cipher texts under B’s public key.
  • 8. 4.Data Retrieval:  user A requests to retrieve a message from storage servers  User A sends a retrieval request to key servers  user A combines the partially decrypted codeword symbols to obtain the original message M.
  • 9. Work Done  Setting servers and users  Each user has assigned with a key pair  Selecting a file  Splitting file into blocks  Encrypting each block  Sending cipher text to storage server
  • 10. Work To Be Done Encoding each block and storing. Data Forwarding  Generating re-encryption key  Re-encrypting codeword Data Retrieval  Decrypting each block  Combing all blocks