Efficient and Secure Data Forwarding for Erasure code Based Cloud Storage

  IJCTT-book-cover
 
International Journal of Computer Trends and Technology (IJCTT)          
 
© 2016 by IJCTT Journal
Volume-35 Number-2
Year of Publication : 2016
Authors : Y.Nagasri, P.Deepika, P.Sandhya Priya, I.Vasu Gopi, K.subbarao
  10.14445/22312803/IJCTT-V35P113

MLA

Y.Nagasri, P.Deepika, P.Sandhya Priya, I.Vasu Gopi, K.subbarao "Efficient and Secure Data Forwarding for Erasure code Based Cloud Storage". International Journal of Computer Trends and Technology (IJCTT) V35(2):76-78, May 2016. ISSN:2231-2803. www.ijcttjournal.org. Published by Seventh Sense Research Group.

Abstract -
A distributed storage framework can be envisioned as accumulation of circulated stockpiling server with self-sufficient calculability. Putting away information in such frameworks prompts a privacy issue that implies sharing information between two gatherings without knowing not individual. The information encryption procedures restrict the quantity of operations in such a substance. Giving security to the information in, for example, circumstances is still a testing issue. An edge based re-encryption plan with decentralized eradication code is proposed to assemble hearty distributed storage framework. This proposed strategy underpins encryption, encoding and sending over the web for its customers.

References
[1]J.Kubiatowicz,D.Bindel,y.chen,P.Eaton,D.Geels,R.Gummadi,s .rhea,h.Weatherspoon,W.Weimer,c.wells, and B. Zhao,” Ocean store: An Architecture for Global-scale persistent store,” proc. Ninth int’l conf. Architectural support for programming languages and operating systems(ASPLOS),pp.190-201,2000.
[2] P.Druschel and A. Rowstron,” PAST: A Large-Scale, Persistent peer-to-peer storage utility,” proc. Eighth workshop Hot topics in operating system(hotos viii),pp.75-80,2001.
[3]A.Adya,W.J.Bolosky,M.Castro,G.Cermak,R.chaiken,J.R.Douc eur,J.Howell,J.R.Lorch,M.Theimer,and R. Wattenhofer, “Farsite: Federated,available, and Reliable storage for an incompletely Trusted Environment,”Proc.Fifth Symp.Operating system Design and implementation (OSDI),Tp.1-14,2002.
[4]A.Haeberlen, A.Mislove , and P.Druschel, ”Glacier:Highly Durable ,Decentralized Storage Despite Massive Correlated Failures,”Proc.Second Symp.Networked System Design and implementation (NSDI),PP.143-158,2005.
[5]Z.Wilcox-O’Heral and B.Warner,”Tahoe: The Latest – Authority File System,”Proc.Fourth ACM int’1Workshop Storage Security and Survivability (StorageSS),PP.21-26,2008.
[6]R.Sandberg, D.Goldberg, S.Kleiman, D.Walsh, and B.Lyon,”Design and Implementation of the Sun Networks FileSystem,”Proc.USENIX Assoc.Conf.,1985.

Keywords
Secure Erasure code, Data Forwarding, Data Encoding, Netbeans7.1.2.