Formation of Data Storage with Identity Based Secure Distributed Plan of Action Schemes

Bouramma.Sadashiv.Varad

Abstract: We are using cloud computing for data storage then secure distributed data storage can shift the burden of maintaining a larger number of files from proxy server. The proxy server are one which convert encrypted files for the owner to encrypted files for the receiver without the necessity of knowing content of the original file. In some situation original file will be removed but the owner for the sake of efficiency hence we are concentrate confidentiality and integrity of the outsourced data will be addressed carefully. It contain following properties

1.  The file owner can decide the access permission independendently without the help of the private key generator.

2.  For one query, a receiver can only access one file, instead of all files of the owner.

3.  We are providing secure against the collusion attacks.

4.  Maintaining chosen plaintext attacks and chosen cipher text attacks.

Keywords: data storage, server, encrypted files, original file, integrity.

Title: Formation of Data Storage with Identity Based Secure Distributed Plan of Action Schemes

Author: Bouramma.Sadashiv.Varad

International Journal of Computer Science and Information Technology Research

ISSN 2348-1196 (print), ISSN 2348-120X (online)

Research Publish Journals

Vol. 3, Issue 2, April 2015 - June 2015

Citation
Share : Facebook Twitter Linked In

Citation
Formation of Data Storage with Identity Based Secure Distributed Plan of Action Schemes by Bouramma.Sadashiv.Varad