Enhanced Cauchy Matrix Reed-Solomon Codes and Role-Based Cryptographic Data Access for Data Recovery and Security in Cloud Environment

Main Article Content

Vijay R. Sonawane, Chetan S. Arage, Jaya R. Suryawanshi, Santosh P. Jadhav, Yogesh H. Palve, Mahesh B. Gunjal

Abstract

In computer systems ensuring proper authorization is a significant challenge, particularly with the rise of open systems and dispersed platforms like the cloud. Role-Based Access Control (RBAC) has been widely adopted in cloud server applications due to its popularity and versatility. When granting authorization access to data stored in the cloud for collecting evidence against offenders, computer forensic investigations play a crucial role. As cloud service providers may not always be reliable, data confidentiality should be ensured within the system. Additionally, a proper revocation procedure is essential for managing users whose credentials have expired.  With the increasing scale and distribution of storage systems, component failures have become more common, making fault tolerance a critical concern. In response to this, a secure data-sharing system has been developed, enabling secure key distribution and data sharing for dynamic groups using role-based access control and AES encryption technology. Data recovery involves storing duplicate data to withstand a certain level of data loss. To secure data across distributed systems, the erasure code method is employed. Erasure coding techniques, such as Reed-Solomon codes, have the potential to significantly reduce data storage costs while maintaining resilience against disk failures. In light of this, there is a growing interest from academia and the corporate world in developing innovative coding techniques for cloud storage systems. The research goal is to create a new coding scheme that enhances the efficiency of Reed-Solomon coding using the sophisticated Cauchy matrix to achieve fault tolerance

Article Details

How to Cite
Vijay R. Sonawane, et al. (2023). Enhanced Cauchy Matrix Reed-Solomon Codes and Role-Based Cryptographic Data Access for Data Recovery and Security in Cloud Environment. International Journal on Recent and Innovation Trends in Computing and Communication, 11(10), 1931–1941. https://doi.org/10.17762/ijritcc.v11i10.8791
Section
Articles
Author Biography

Vijay R. Sonawane, Chetan S. Arage, Jaya R. Suryawanshi, Santosh P. Jadhav, Yogesh H. Palve, Mahesh B. Gunjal

Vijay R.Sonawane1, Chetan S. Arage2, Jaya R.Suryawanshi3, Santosh P.Jadhav4, Yogesh H.Palve5, Mahesh B.Gunjal6

 1MVPS’s K.B.T.College of Engineering, Nashik, Maharashtra, India

2Sanjay Ghodawat University, Kolhapur, Maharashtra, India

3MVPS’s K.B.T.College of Engineering, Nashik, Maharashtra, India

4MVPS’s K.B.T.College of Engineering, Nashik, Maharashtra, India

5MVPS’s K.B.T.College of Engineering, Nashik, Maharashtra, India

6 Amrutvahini College of Engineering, Sangamner, Maharashtra, India

1vijaysonawane11@gmail.com, 2chetan.arage@gmail.com,3suryavanshi.jaya@kbtcoe.org,

4spjadhav375@gmail.com, 5palve.yogesh@kbtcoe.org 6maheshgunjal2010@gmail.com