A Seamless Secret Sharing Scheme Implementation for Securing Data in Public Cloud Storage Service

被引:0
|
作者
Nelmiawati [1 ]
Arifandi, Wahyudi [1 ]
机构
[1] Politeknik Negeri Batam, Dept Informat Engn, Batam, Indonesia
关键词
public cloud storage; security; information dispersal; secret sharing;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Public cloud data storage services were considered as a potential alternative to store low-cost digital data in the short term. They are offered by different providers on the Internet. Some providers offer limited free plans for the users who are starting the service. However, data security concern arises when data stored are considered as a valuable asset. This study explores the usage of secret sharing scheme: Rabin's IDA and Shamir's SSA to implement a tool called dCloud for file protection stored in public cloud storage in a seamless way. It addresses data security by hiding its complexities when targeting ordinary non-technical users. The secret key is automatically generated by dCloud in a secure random way on Rabin's IDA. Shamir's SSA completes the process through dispersing the key into each of Rabin's IDA output files. Moreover, the Hash value of the original file is added to each of those output files to confirm the integrity of the file during reconstruction. Besides, the authentication key is used to communicate with all of the defined service providers during storage and reconstruction as well. It is stored into local secure key-store. By having a key to access the key-store, an ordinary non-technical user will be able to use dCloud to store and retrieve targeted file within defined public cloud storage services securely.
引用
收藏
页数:5
相关论文
共 50 条
  • [1] Implementation and Evaluation of Secure Outsourcing Scheme for Secret Sharing Scheme on Cloud Storage Services
    Ohigashi, Toshihiro
    Nishimura, Kouji
    Aibara, Reiji
    Yoshida, Kouta
    [J]. 2014 38TH ANNUAL IEEE INTERNATIONAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE WORKSHOPS (COMPSACW 2014), 2014, : 78 - 83
  • [2] Secret sharing scheme for data confidentiality preserving in a public-private hybrid cloud storage approach
    Butoi, Alexandru
    Tomai, Nicolae
    [J]. 2014 IEEE/ACM 7TH INTERNATIONAL CONFERENCE ON UTILITY AND CLOUD COMPUTING (UCC), 2014, : 992 - 997
  • [3] Collusion resistant secret sharing scheme for secure data storage and over cloud
    Lakshmi, V. S.
    Deepthi, S.
    Deepthi, P. P.
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2021, 60
  • [4] An Efficient Proactive Secret Sharing Scheme for Cloud Storage
    Zhang, Shuihai
    Wang, Jingfu
    Zhang, Yan
    Pei, Bei
    Lyu, Chunli
    [J]. APPLIED CRYPTOGRAPHY AND NETWORK SECURITY WORKSHOPS, ACNS 2021, 2021, 12809 : 346 - 357
  • [5] Securing Public Data Storage in Cloud Environment
    Boopathy, D.
    Sundaresan, M.
    [J]. ICT AND CRITICAL INFRASTRUCTURE: PROCEEDINGS OF THE 48TH ANNUAL CONVENTION OF COMPUTER SOCIETY OF INDIA - VOL I, 2014, 248 : 555 - 562
  • [6] Collusion resistant secret sharing scheme for secure data storage and processing over cloud
    Lakshmi, V.S.
    Deepthi, S.
    Deepthi, P.P.
    [J]. Journal of Information Security and Applications, 2021, 60
  • [7] Secret Sharing Scheme with Efficient Keyword Search for Cloud Storage
    Kikuchi, Hiroaki
    Itoh, Kouichi
    Ushida, Mebae
    Yamaoka, Yuji
    Oikawa, Takanori
    [J]. 2014 NINTH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIA JCIS), 2014, : 164 - 169
  • [8] Lightweight data storage based on secret sharing for cloud data
    Xia, Ying
    Lv, Haitao
    Yin, Chao
    Cui, Zongmin
    Zhou, Caixue
    [J]. 2015 NINTH INTERNATIONAL CONFERENCE ON FRONTIER OF COMPUTER SCIENCE AND TECHNOLOGY FCST 2015, 2015, : 263 - 266
  • [9] Data Sharing Scheme for Cloud Storage Service Using the Concept of Message Recovery
    Yang, Jen-Ho
    Lin, Iuon-Chang
    Chien, Po-Ching
    [J]. INFORMATICA, 2017, 28 (02) : 375 - 386
  • [10] Securing Sensitive Data in Public Cloud Storage Systems
    Deepanjali, T.
    Goranthala, Vishnu Prasad
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2016, 16 (08): : 103 - 106