Custom Based Protocol for Information Retrieval in Cloud Computing

Authors(2) :-P. Gowri, K. Sangeetha

Prominent issue in cloud computing is security in which storing and retrieving the data in a third party’s cloud system and public auditing scheme which causes serious problems and conflict over data confidentiality during the transaction of data. Though there are number of methods are available to overcome this problem like cryptography, key encryption etc. The general encryption schemes protect data confidentiality during the transaction; along with this process but the main drawback is its limits the functionality of the storage system because of only few operations are supported over encrypted data. This project proposes a secured threshold proxy re-encryption server and integrates it along with a decentralized erasure code which provides a secure distributed storage system for processing big data in which multiple users can interact with the storage system. In this environment users can upload their data in to the distributed storage system which will be stored in database in the encrypted format. User in the cloud will authorize the sender request to generate the key with the authorized one time key sender can access the encrypted file in decrypted format at once. The key becomes invalid after one use. The proxy server provides security for big data in cloud with proxy re encryption method which process effective way.

Authors and Affiliations

P. Gowri
Department of Information Technology, SNS College of Technology, Coimbatore, Tamil Nadu, India
K. Sangeetha
Department of Information Technology, SNS College of Technology, Coimbatore, Tamil Nadu, India

Proxy Server, Re-Encryption Key, Cloud Storage.

  1. Hsiao-Ying Lin ; Dept. of Comput. Sci., Nat. Chiao Tung Univ., Hsinchu, Taiwan ; Wen-Guey Tzeng,” A Secure Decentralized Erasure Code for Distributed Network Storage”, Parallel and Distributed Systems, IEEE Transactions on (Volume:21 , Issue: 11 ), February 2010, pp. 1586 - 1594.
  2. Mell P, Grance T (2012) The NIST definition of cloud computing. NIST Spec Publ 800:145. National Institute of Standards and Technology, U.S. Department of Commerce. Source: http:// Accessed on Oct 2012
  3. Wikipedia definition of Cloud computing (2012). Source: computing. Accessed on Oct 2012.
  4. Rocha F, Abreu S, Correia M (2011) The final Frontier: confidentiality and privacy in the cloud, pp 44–50.
  5. Huang R, Gui X, Yu S, Zhuang W (2011) Research on privacy-preserving cloud storage framework supporting ciphertext retrieval. International conference on network computing and information security 2011:93–97.
  6. G. Ateniese, K. Benson, and S. Hohenberger, “Key-Private Proxy Re-Encryption, ”Proc. Topics in Cryptology (CT-RSA),pp. 279-294, 2009.
  7. Renjith P , Sabitha S,”Survey on Data Sharing and Re-Encryption in Cloud”, International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 2, Issue 2, February 2013.
  8. Tushar A. Rane , Shrishail T. Patil , Anita H. Khade,”Survey on Security Challenge for Data forwarding in Cloud”, International Journal of Science and Research (IJSR), India Online ISSN: 2319-7064.
  9. Anurag Porwal, Rohit Maheshwari, B.L.Pal, Gaurav Kakhani, “An Approach for Secure Data Transmission in Private Cloud”, International Journal of Soft Computing and Engineering (IJSCE), Volume-2, Issue-1, March 2012
  10. Varsha S.Agme , Prof. Archana C.Lomte, “ Cloud Data Storage Security Enhancement Using Identity Based Encryption”, International Journal of Application or Innovation in Engineering & Management (IJAIEM), Volume 3, Issue 4, April 2014.
  11. Ivan and Y. Dodis, “Proxy cryptography revisited,” in Proc.Network and Distributed System Security Symposium - NDSS’03, (San Diego, California, USA), pp. 1–20, The Internet Society, Feb. 2003 .
  12. H. Y. Lin and W. Tzeng, “A secure erasure code-based cloud storage system with secure data forwarding,” IEEE Transactions on Parallel and Distributed Systems, vol. 23, pp. 995 – 1003, June 2012.
  13. G. R. Blakley. Safeguarding cryptographic keys. In Proceedings of the National Computer Conference, 48, pages 313–317. American Federation of Information Processing Societies Pro- ceedings, 1979.
  14. A. Shamir. How to share a secret. Communications of the ACM, 22(11):612–613, November 1979.
  15. Dimakis, A.G. , Prabhakaran, V. Ramchandran, K., “Ubiquitous access to distributed data in large-scale sensor networks through decentralized erasure codes” Information Processing in Sensor Networks, 2005. IPSN 2005. Fourth International Symposium ,pp. 111 – 117
  16. Dimakis, A.G. Prabhakaran, V. Ramchandran, K. Decentralized erasure codes for distributed networked storage”, Information Theory, IEEE Transactions on (Volume:52 , Issue: 6 ), pp.2809 - 2816

Publication Details

Published in : Volume 2 | Issue 1 | January-February 2016
Date of Publication : 2016-02-25
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 321-326
Manuscript Number : IJSRSET162160
Publisher : Technoscience Academy

Print ISSN : 2395-1990, Online ISSN : 2394-4099

Cite This Article :

P. Gowri, K. Sangeetha, " Custom Based Protocol for Information Retrieval in Cloud Computing, International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 2, Issue 1, pp.321-326, January-February-2016.
Journal URL :

Article Preview