Powered by OpenAIRE graph
Found an issue? Give us feedback
image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao ZENODOarrow_drop_down
image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao
ZENODO
Article . 2023
Data sources: Datacite
image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao
ZENODO
Article . 2023
Data sources: Datacite
versions View all 2 versions
addClaim

Cloud Data Recovery and Secure Data Storage with Advanced Cauchy Reed-Solomon Codes and Role-Based Cryptographic Access

Authors: Gunjal, Mahesh Bhaskar;

Cloud Data Recovery and Secure Data Storage with Advanced Cauchy Reed-Solomon Codes and Role-Based Cryptographic Access

Abstract

User assigning permission policies to computer systems, proper authorization is a significant problem. In recent years, open systems and dispersed platforms like the cloud have raised considerable concerns about this issue. The RBAC has been utilized extensively in server applications of the cloud because it is a popular and versatile technique. When authorization access to data stored in the cloud occurs to collect proof against offenders, the "computer forensic investigation" steps into action. the cloud service provider is no longer a dependable business, the system should offer data confidentiality. Additionally, a suitable revocation procedure should be offered to manage this person once their credential has expired. Component failures have become increasingly prevalent as storage systems scale up and spread across larger networks, raising the bar for fault tolerance. We describe a secure data-sharing system that enables secure key distribution and data sharing for dynamic groups using role-based access control and AES encryption technology. data recovery stores duplicate data to withstand a certain degree of data loss. To secure the data that is present across distributed systems, the erasure code method is used. The cost of data storage appears to be able to be greatly decreased while keeping the same level of resilience against disc failures with current erasure coding techniques as Reed-Solomon codes. In addition to an even greater access delay, its repair costs are far higher. According to this viewpoint, the creation of creative coding techniques for cloud storage systems has garnered a lot of interest from both the academic and corporate worlds. This research goal is to provide a new coding scheme that boosts the efficiency of the Reed-Solomon coding technique, which uses the sophisticated Cauchy matrix to achieve fault tolerance.

Keywords

Role Based Access Control, AES, Cloud data security, Multi Authority Access Control, Forensic Investigation, Proxy Key, Cauchy matrix, Reed-Solomon codes, data recovery, Revocable-Storage.

  • BIP!
    Impact byBIP!
    selected citations
    These citations are derived from selected sources.
    This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    0
    popularity
    This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
    Average
    influence
    This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    Average
    impulse
    This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
    Average
    OpenAIRE UsageCounts
    Usage byUsageCounts
    visibility views 6
  • 6
    views
    Powered byOpenAIRE UsageCounts
Powered by OpenAIRE graph
Found an issue? Give us feedback
visibility
selected citations
These citations are derived from selected sources.
This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Citations provided by BIP!
popularity
This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
BIP!Popularity provided by BIP!
influence
This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Influence provided by BIP!
impulse
This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
BIP!Impulse provided by BIP!
views
OpenAIRE UsageCountsViews provided by UsageCounts
0
Average
Average
Average
6
Upload OA version
Are you the author of this publication? Upload your Open Access version to Zenodo!
It’s fast and easy, just two clicks!