Secure Keyless Multi-party Storage Scheme

被引:0
|
作者
Lafourcade, Pascal [1 ]
Mallordy, Lola-Baie [1 ]
Olivier-Anclin, Charles [1 ,2 ,4 ]
Robert, Leo [3 ]
机构
[1] Univ Clermont Auvergne, CNRS, LIMOS, Clermont Ferrand, France
[2] Be Ys Pay, Clermont Ferrand, France
[3] Univ Picardie Jules Verne, Amiens, France
[4] Univ Orleans, INSA Ctr Val Loire, LIFO, Bourges, France
来源
关键词
INFORMATION;
D O I
10.1007/978-3-031-70896-1_14
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Using threshold secret sharing, we propose a solution tailored for forgetful clients (i.e., not required to keep any cryptographic secret) while accommodating the dynamic nature of multi-cloud deployments. Furthermore, we delegate the computation and distribution of shares to an intermediate server (proxy), effectively minimizing the client workload. We propose two variants of a keyless, space-efficient multi-cloud storage scheme named KAPRE and KAME. Our solution KAPRE requires less communications and computations, while KAME preserves data confidentiality against a colluding proxy. Our protocols offer robust guarantees for data integrity, and we demonstrate the proxy's ability to identify and attribute blame to servers responsible for sending corrupted shares during data reconstruction. We establish a comprehensive security model and provide proofs of the security properties of our protocols. To complement this theoretical analysis, we present a proof-of-concept to illustrate the practical implementation of our proposed scheme.
引用
收藏
页码:279 / 298
页数:20
相关论文
共 50 条
  • [21] SECURE MULTI-PARTY CONSENSUS GOSSIP ALGORITHMS
    Lazzeretti, Riccardo
    Horn, Steven
    Braca, Paolo
    Willett, Peter
    2014 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP), 2014,
  • [22] Secure multi-party computation over networks
    Nishitani, Y
    Igarashi, Y
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2000, E83D (03) : 561 - 569
  • [23] Secure multi-party computation without agreement
    Goldwasser, S
    Lindell, Y
    JOURNAL OF CRYPTOLOGY, 2005, 18 (03) : 247 - 287
  • [24] Secure multi-party computation made simple
    Maurer, U
    DISCRETE APPLIED MATHEMATICS, 2006, 154 (02) : 370 - 381
  • [25] Secure multi-party computation with a quantum manner
    Lu, Changbin
    Miao, Fuyou
    Hou, Junpeng
    Su, Zhaofeng
    Xiong, Yan
    JOURNAL OF PHYSICS A-MATHEMATICAL AND THEORETICAL, 2021, 54 (08)
  • [26] A New Efficient Secure Multi-party Computation
    Tang Yonglong
    EMERGING SYSTEMS FOR MATERIALS, MECHANICS AND MANUFACTURING, 2012, 109 : 626 - 630
  • [27] FairplayMP - A System for Secure Multi-Party Computation
    Ben-David, Assaf
    Nisan, Noam
    Pinkas, Benny
    CCS'08: PROCEEDINGS OF THE 15TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2008, : 257 - 266
  • [28] SecureGBM: Secure Multi-Party Gradient Boosting
    Feng, Zhi
    Xiong, Haoyi
    Song, Chuanyuan
    Yang, Sijia
    Zhao, Baoxin
    Wang, Licheng
    Chen, Zeyu
    Yang, Shengwen
    Liu, Liping
    Huan, Jun
    2019 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2019, : 1312 - 1321
  • [29] Secure Multi-party Comparison Protocol and Application
    Zhang, Jing
    Luo, Shoushan
    Yang, Yixian
    DATA SCIENCE, PT 1, 2017, 727 : 292 - 304
  • [30] Wiretap Codes for Secure Multi-Party Computation
    Thobaben, Ragnar
    Dan, Gyorgy
    Sandberg, Henrik
    2014 GLOBECOM WORKSHOPS (GC WKSHPS), 2014, : 1349 - 1354