Lin et al.4 proposed a threshold proxy re-encryption scheme and combined it with a non-centralized erasure code to design a secure distributed storage system that offers secure and strong data storage and recovery. In addition, the formulated storage system allows users to forward their data to the server and to other user