A Verifiable Secret Sharing Approach for Secure MultiCloud Storage

被引:2
|
作者
Benzekki, Kamal [1 ]
El Fergougui, Abdeslam [1 ]
Elalaoui, Abdelbaki Elbelrhiti [1 ]
机构
[1] Moulay Ismail Univ, Fac Sci, Lab Comp Networks & Syst, Meknes, Morocco
来源
关键词
Cloud computing; Shamir's secret sharing; Verifiable secret sharing; Hash; Outsourcing; Authentication;
D O I
10.1007/978-3-319-68179-5_20
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing is a model to access shared pool of configurable computing resources which comprise servers, applications, services and network components. The fact that this model can provide both computation and storage at low tax makes it popular among corporations. This also makes it a very captivating proposition for the future. But in spite of its promise and potential, security in the cloud proves to be a cause for concerns to the business sector. This is due to the outsourcing of data onto third party managed cloud platform. These security concerns also make the use of cloud services not so much flexible. The main issues associated with data storage management are confidentiality and integrity. However, a novel approach of "multi-cloud" or "cloud of clouds" has emerged currently using Shamir's Secret Sharing algorithm to address both confidentiality and integrity concerns. The implementation of Shamir's Secret Sharing algorithm is performed to authenticate a unique user and to access a particular file from the Cloud storage. There are many different Secret Sharing algorithms and each of them has its pros and cons. In this paper, data is protected using a secure Shamir's Secret Sharing scheme and our novel approach for Verifiable Secret Sharing to identify the honest dealer and the shareholders.
引用
收藏
页码:225 / 234
页数:10
相关论文
共 50 条
  • [1] Simple Approach to Realizing Verifiable Secret Sharing for Secure Cloud System
    Iwamura, Keiichi
    Kamal, Ahmad Akmal Aminuddin Mohd
    [J]. IEEE ACCESS, 2022, 10 : 76794 - 76804
  • [2] A Secure Verifiable Scheme for Secret Image Sharing
    Rose, Angel A.
    Thampi, Sabu M.
    [J]. SECOND INTERNATIONAL SYMPOSIUM ON COMPUTER VISION AND THE INTERNET (VISIONNET'15), 2015, 58 : 140 - 150
  • [3] Secure Verifiable Secret Short Sharing Scheme for Multi-Cloud Storage
    Deryabin, Maxim
    Chervyakov, Nikolay
    Tchernykh, Andrei
    Babenko, Mikhail
    Kucherov, Nikolay
    Miranda-Lopez, Vanessa
    Avetisyan, Arutyun
    [J]. PROCEEDINGS 2018 INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING & SIMULATION (HPCS), 2018, : 700 - 706
  • [4] Universal Adaptive Construction of Verifiable Secret Sharing and Its Application to Verifiable Secure Distributed Data Storage
    Hayashi, Masahito
    Koshiba, Takeshi
    [J]. IEEE-ACM TRANSACTIONS ON NETWORKING, 2024, 32 (01) : 253 - 267
  • [5] A Survey on Perfectly Secure Verifiable Secret-sharing
    Chandramouli, Anirudh
    Choudhury, Ashish
    Patra, Arpita
    [J]. ACM COMPUTING SURVEYS, 2022, 54 (11S)
  • [6] Lightweight, Maliciously Secure Verifiable Function Secret Sharing
    de Castro, Leo
    Polychroniadou, Anitgoni
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2022, PT I, 2022, 13275 : 150 - 179
  • [7] Secure and verifiable vector space secret sharing scheme
    Xiao, QH
    Ping, LD
    Pan, XZ
    [J]. PROCEEDINGS OF THE 8TH INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN, VOL 2, 2004, : 689 - 693
  • [8] A Publicly Verifiable Dynamic Secret Sharing Protocol for Secure and Dependable Data Storage in Cloud Computing
    Kumar, P. Syam
    Ashok, Marie Stanislas
    Subramanian, R.
    [J]. INTERNATIONAL JOURNAL OF CLOUD APPLICATIONS AND COMPUTING, 2012, 2 (03) : 1 - 25
  • [9] NONINTERACTIVE AND INFORMATION-THEORETIC SECURE VERIFIABLE SECRET SHARING
    PEDERSEN, TP
    [J]. LECTURE NOTES IN COMPUTER SCIENCE, 1992, 576 : 129 - 140
  • [10] INFORMATION-THEORETICALLY SECURE STRONG VERIFIABLE SECRET SHARING
    Lin, Changlu
    Harn, Lein
    Ye, Dingfeng
    [J]. SECRYPT 2009: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2009, : 233 - +