Secure Keyless Multi-party Storage Scheme

被引:0
|
作者
Lafourcade, Pascal [1 ]
Mallordy, Lola-Baie [1 ]
Olivier-Anclin, Charles [1 ,2 ,4 ]
Robert, Leo [3 ]
机构
[1] Univ Clermont Auvergne, CNRS, LIMOS, Clermont Ferrand, France
[2] Be Ys Pay, Clermont Ferrand, France
[3] Univ Picardie Jules Verne, Amiens, France
[4] Univ Orleans, INSA Ctr Val Loire, LIFO, Bourges, France
来源
关键词
INFORMATION;
D O I
10.1007/978-3-031-70896-1_14
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Using threshold secret sharing, we propose a solution tailored for forgetful clients (i.e., not required to keep any cryptographic secret) while accommodating the dynamic nature of multi-cloud deployments. Furthermore, we delegate the computation and distribution of shares to an intermediate server (proxy), effectively minimizing the client workload. We propose two variants of a keyless, space-efficient multi-cloud storage scheme named KAPRE and KAME. Our solution KAPRE requires less communications and computations, while KAME preserves data confidentiality against a colluding proxy. Our protocols offer robust guarantees for data integrity, and we demonstrate the proxy's ability to identify and attribute blame to servers responsible for sending corrupted shares during data reconstruction. We establish a comprehensive security model and provide proofs of the security properties of our protocols. To complement this theoretical analysis, we present a proof-of-concept to illustrate the practical implementation of our proposed scheme.
引用
收藏
页码:279 / 298
页数:20
相关论文
共 50 条
  • [31] Secure multi-party computations of geometric intersections
    Li, Shundong
    Dai, Yiqi
    Wang, Daoshun
    Luo, Ping
    Qinghua Daxue Xuebao/Journal of Tsinghua University, 2007, 47 (10): : 1692 - 1695
  • [32] Secure Multi-Party Computation with Identifiable Abort
    Ishai, Yuval
    Ostrovsky, Rafail
    Zikas, Vassilis
    ADVANCES IN CRYPTOLOGY - CRYPTO 2014, PT II, 2014, 8617 : 369 - 386
  • [33] A study of secure multi-party statistical analysis
    Luo, WJ
    Li, X
    2003 INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS AND MOBILE COMPUTING, PROCEEDINGS, 2003, : 377 - 382
  • [34] Quantum protocols for secure multi-party summation
    ZhaoXu Ji
    HuanGuo Zhang
    HouZhen Wang
    FuSheng Wu
    JianWei Jia
    WanQing Wu
    Quantum Information Processing, 2019, 18
  • [35] Research on Secure Multi-party Computational Geometry
    Geng, Tao
    Luo, Shoushan
    Xin, Yang
    Du, Xiaofeng
    Yang, Yixian
    INFORMATION COMPUTING AND APPLICATIONS, 2011, 7030 : 322 - 329
  • [36] Secure multi-party computation made simple
    Maurer, U
    SECURITY IN COMMUNICATION NETWORKS, 2003, 2576 : 14 - 28
  • [37] Quantum protocols for secure multi-party summation
    Ji, ZhaoXu
    Zhang, HuanGuo
    Wang, HouZhen
    Wu, FuSheng
    Jia, JianWei
    Wu, WanQing
    QUANTUM INFORMATION PROCESSING, 2019, 18 (06)
  • [38] A study of secure multi-party ranking problem
    Liu, Wen
    Luo, Shou-Shan
    Chen, Ping
    SNPD 2007: EIGHTH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING, AND PARALLEL/DISTRIBUTED COMPUTING, VOL 2, PROCEEDINGS, 2007, : 727 - +
  • [39] THE STUDY ON GENERAL SECURE MULTI-PARTY COMPUTATION
    Chung, Yu-Fang
    Chen, Tzer-Long
    Chen, Chih-Sheng
    Chen, Tzer-Shyong
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2012, 8 (1B): : 895 - 910
  • [40] Secure multi-party computation in large networks
    Varsha Dani
    Valerie King
    Mahnush Movahedi
    Jared Saia
    Mahdi Zamani
    Distributed Computing, 2017, 30 : 193 - 229