Minimize the Replication for Secure Cloud Data Storage Systems Using Error Correction Codes


Article Preview

Cloud data centers should be flexible and available to the data forever. The replication method is used to achieve high availability and durability of cloud data center, if there is any failure to recover the messages from the cloud databases. The concern of this replication technology is that, the replica size is equal to the size of the original data object. When Error Detection Schemes were used, there is a reduction in the number of cloud distributed storage systems. The scope of this paper is to store the data efficiently in cloud data centers unlike the previous schemes which used erasure codes such as Reed Solomon codes only with a view to store data in datacenters. This paper proposes to encrypt the message using DES and to encode the message using Reed Solomon code before storing the message. Storing time is convincingly good in Reed Solomon code when compared with tornado code.



Edited by:

R. Edwin Raj, M. Marsaline Beno and M. Carolin Mabel




J. G. Sahaya Stalin and C. C. Seldev, "Minimize the Replication for Secure Cloud Data Storage Systems Using Error Correction Codes", Applied Mechanics and Materials, Vol. 626, pp. 26-31, 2014

Online since:

August 2014




* - Corresponding Author

[1] Hsiao-yinglin, Wen-guey Tzeng.: A Secure Erasure Code-based Cloud Storage System with Secure Data Forwarding, IEEE Transactions on parallel and Distributed Systems, vol-23, No. 6, June (2012).

[2] Yijie Wang and Sijun Li.: Research and Performance Evaluation of Data Replication Technology in Distributed Storage System, Elsiver, Computers and Mathmaticses with applications 51(2006) 1625-1632.


[3] Hsiao-yinglin, Wen-guey Tzeng.: A Secure Decentralized Erasure Code For Distributed Networked Storage, IEEE Transactions on parallel and Distributed Systems, vol 21, No. 11, November2010.


[4] Paulo F. oliveira, Luisa Lima, Tiago T.V. vinhoza, Joao Barros, Muriel medard.: Coding For Trusted Storage in Untrusted Networks, IEEE transactions on information forensics and security, vol 7, No. 6, December (2012).


[5] Quian Wang Cong wang, Kui Ren, Wenjing Lou, Jin Li.: Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing, IEEE Transactions on parallel and Distributed Systems, Vol. 22, No. 5, may (2011).


[6] Luby M. G., M. Mitzenmacher, M.A. Shokrollahi, and D.A. Spielman, (February 2001).: Efficient Erasure Correcting Codes, IEEE Transactions on Information Theory, 47(2), 569-584.


[7] Cong wang, Quian Wang, Kui Ren, Ning Car, Wenjing Lou.: Toward Secure and Dependable Storage Services in Cloud Computing, IEEE Transactions On Service Computing, Vol. 5, No. 2, April-June (2012).

[8] Christina Delimitrou, Sriram Sankar, Kushagra Vaid , and Christos Kozyrakis.: Decoupling Data Center Storage Studies From Access To Large-Scale Applications, IEEE Computer Architecture Letters, Vol. 11, No. 2, July-December (2012).


[9] Dong Yuan, Yun Yang, Xiao Liu, Jinjun Chen.: A Data Placement Strategy in Scientific Cloud WorkFlows, Elsevier, Future generation Computer System 26(2010) 1200-1204.

[10] Byers, J. W., M. Luby, and M. Mitzenmacher, (1999): Accessing Multiple Mirror Sites in Parallel: Using Tornado Codes to Speed Up Downloads, Proceedings of IEEE INFOCOM, 275-283.


[11] William stallings.: Cryptography and Network Security Principles and Practice, Pearson education, fourth edition-(2011).

[12] Greg Schulz.: Cloud and Virtual Data Storage Networking: Yours Journey to efficient and Effective Information Services, ISBN 978-1-4398-5173-9, Taylor and Francis group, LLC, (2012).

[13] John W. Rittinghouse, James F. Ransome.: Cloud Computing Implementation, Management and Security, ISBN 978-1-4398-0680-7, Taylor and Francis Group, LLC, (2010).

[14] Kris Jamsa.: Cloud Computing, SaaS, PaaS, IaaS, Virtualization, Business Models, Mobile Security and more, ISBN 978-1-4496-4739-1, first edition, Jones & Barlett Learning LLC, (2013).

[15] Bernald Sklar, Pabitra kumar Ray.: Digital communication, Fundamentals and Application, Pearson, second edition.