Abstract: We are using cloud computing for data storage then secure distributed data storage can shift the burden of maintaining a larger number of files from proxy server. The proxy server are one which convert encrypted files for the owner to encrypted files for the receiver without the necessity of knowing content of the original file. In some situation original file will be removed but the owner for the sake of efficiency hence we are concentrate confidentiality and integrity of the outsourced data will be addressed carefully. It contain following properties
1. The file owner can decide the access permission independendently without the help of the private key generator.
2. For one query, a receiver can only access one file, instead of all files of the owner.
3. We are providing secure against the collusion attacks.
4. Maintaining chosen plaintext attacks and chosen cipher text attacks.
Keywords: data storage, server, encrypted files, original file, integrity.
Title: Formation of Data Storage with Identity Based Secure Distributed Plan of Action Schemes
Author: Bouramma.Sadashiv.Varad
International Journal of Computer Science and Information Technology Research
ISSN 2348-1196 (print), ISSN 2348-120X (online)
Research Publish Journals