Cloud Data Recovery and Secure Data Storage with Advanced Cauchy Reed-Solomon Codes and Role-Based Cryptographic Access

Authors

  • Mahesh Bhaskar Gunjal and Dr. Sonawane Vijay Ramnath

Keywords:

Role Based Access Control, AES, Cloud data security, Multi Authority Access Control, Forensic Investigation, Proxy Key, Cauchy matrix, Reed-Solomon codes, data recovery, Revocable-Storage.

Abstract

User assigning permission policies to computer systems, proper authorization is a significant problem. In recent years, open systems and dispersed platforms like the cloud have raised considerable concerns about this issue. The RBAC has been utilized extensively in server applications of the cloud because it is a popular and versatile technique.  When authorization access to data stored in the cloud occurs to collect proof against offenders, the "computer forensic investigation" steps into action. the cloud service provider is no longer a dependable business, the system should offer data confidentiality. Additionally, a suitable revocation procedure should be offered to manage this person once their credential has expired. Component failures have become increasingly prevalent as storage systems scale up and spread across larger networks, raising the bar for fault tolerance. We describe a secure data-sharing system that enables secure key distribution and data sharing for dynamic groups using role-based access control and AES encryption technology. data recovery stores duplicate data to withstand a certain degree of data loss. To secure the data that is present across distributed systems, the erasure code method is used. The cost of data storage appears to be able to be greatly decreased while keeping the same level of resilience against disc failures with current erasure coding techniques as Reed-Solomon codes. In addition to an even greater access delay, its repair costs are far higher. According to this viewpoint, the creation of creative coding techniques for cloud storage systems has garnered a lot of interest from both the academic and corporate worlds. This research goal is to provide a new coding scheme that boosts the efficiency of the Reed-Solomon coding technique, which uses the sophisticated Cauchy matrix to achieve fault tolerance.

Published

2023-04-07

How to Cite

Mahesh Bhaskar Gunjal and Dr. Sonawane Vijay Ramnath. (2023). Cloud Data Recovery and Secure Data Storage with Advanced Cauchy Reed-Solomon Codes and Role-Based Cryptographic Access. SJIS-P, 35(1), 859–869. Retrieved from http://sjis.scandinavian-iris.org/index.php/sjis/article/view/408

Issue

Section

Articles