A secure erasure code-based cloud storage system with secure data forwarding

Hsiao-Ying Lin*, Wen-Guey Tzeng

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

139 Scopus citations

Abstract

A cloud storage system, consisting of a collection of storage servers, provides long-term storage services over the Internet. Storing data in a third party's cloud system causes serious concern over data confidentiality. General encryption schemes protect data confidentiality, but also limit the functionality of the storage system because a few operations are supported over encrypted data. Constructing a secure storage system that supports multiple functions is challenging when the storage system is distributed and has no central authority. We propose a threshold proxy re-encryption scheme and integrate it with a decentralized erasure code such that a secure distributed storage system is formulated. The distributed storage system not only supports secure and robust data storage and retrieval, but also lets a user forward his data in the storage servers to another user without retrieving the data back. The main technical contribution is that the proxy re-encryption scheme supports encoding operations over encrypted messages as well as forwarding operations over encoded and encrypted messages. Our method fully integrates encrypting, encoding, and forwarding. We analyze and suggest suitable parameters for the number of copies of a message dispatched to storage servers and the number of storage servers queried by a key server. These parameters allow more flexible adjustment between the number of storage servers and robustness.

Original languageEnglish
Article number6035700
Pages (from-to)995-1003
Number of pages9
JournalIEEE Transactions on Parallel and Distributed Systems
Volume23
Issue number6
DOIs
StatePublished - 10 Apr 2012

Keywords

  • Decentralized erasure code
  • proxy re-encryption
  • secure storage system
  • threshold cryptography

Fingerprint Dive into the research topics of 'A secure erasure code-based cloud storage system with secure data forwarding'. Together they form a unique fingerprint.

Cite this