A secure data outsourcing scheme based on Asmuth-Bloom secret sharing

被引:5
|
作者
Muhammad, Yusuf Idris [1 ]
Kaiiali, Mustafa [1 ]
Habbal, Adib [2 ]
Wazan, A. S. [3 ]
Ilyasu, Auwal Sani [1 ]
机构
[1] Mevlana Univ, Dept Comp Engn, Konya, Turkey
[2] Univ Utara Malaysia, Sch Comp, InterNetWorks Res Lab, Sintok, Kedah, Malaysia
[3] Irit, Paris, France
关键词
Data outsourcing; indexing; secret sharing;
D O I
10.1080/17517575.2015.1120347
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Data outsourcing is an emerging paradigm for data management in which a database is provided as a service by third-party service providers. One of the major benefits of offering database as a service is to provide organisations, which are unable to purchase expensive hardware and software to host their databases, with efficient data storage accessible online at a cheap rate. Despite that, several issues of data confidentiality, integrity, availability and efficient indexing of users' queries at the server side have to be addressed in the data outsourcing paradigm. Service providers have to guarantee that their clients' data are secured against internal (insider) and external attacks. This paper briefly analyses the existing indexing schemes in data outsourcing and highlights their advantages and disadvantages. Then, this paper proposes a secure data outsourcing scheme based on Asmuth-Bloom secret sharing which tries to address the issues in data outsourcing such as data confidentiality, availability and order preservation for efficient indexing.
引用
收藏
页码:1001 / 1023
页数:23
相关论文
共 50 条
  • [1] Threshold cryptography based on asmuth-bloom secret sharing
    Kaya, Kamer
    Selcuk, Ali Aydin
    Tezcan, Zahir
    COMPUTER AND INFORMATION SCIENCES - ISCIS 2006, PROCEEDINGS, 2006, 4263 : 935 - +
  • [2] On the asymptotic idealness of the Asmuth-Bloom threshold secret sharing scheme
    Dragan, Constantin Catalin
    Tiplea, Ferucio Laurentiu
    INFORMATION SCIENCES, 2018, 463 : 75 - 85
  • [3] Threshold cryptography based on Asmuth-Bloom secret sharing
    Kaya, Kamer
    Selcuk, Ali Aydin
    INFORMATION SCIENCES, 2007, 177 (19) : 4148 - 4160
  • [4] A novel secure data outsourcing scheme based on data hiding and secret sharing for relational databases
    Rahmani, Peyman
    Taheri, Mohammad
    Fakhrahmad, Seyed Mostafa
    IET COMMUNICATIONS, 2023, 17 (07) : 775 - 789
  • [5] Secret Sharing-Based IoT Text Data Outsourcing: A Secure and Efficient Scheme
    Tang, Zhaohui
    IEEE ACCESS, 2021, 9 : 76908 - 76920
  • [6] Towards the design of a secure data outsourcing using fragmentation and secret sharing scheme
    Sareen, Sanjay
    Sood, Sandeep K.
    Gupta, Sunil Kumar
    INFORMATION SECURITY JOURNAL, 2016, 25 (1-3): : 39 - 53
  • [7] Secret Sharing Scheme Based on Cauchy Matrix for Data Outsourcing
    Prasad, Vishnu C.
    Kumar, Arun Raj P.
    SIN'17: PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON SECURITY OF INFORMATION AND NETWORKS, 2017, : 315 - 318
  • [8] Secure Data Outsourcing in the Cloud Using Multi-secret Sharing Scheme (MSSS)
    Nag, Amitava
    Choudhary, Soni
    Dawn, Subham
    Basu, Suryadip
    PROCEEDINGS OF THE FIRST INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND COMMUNICATION, 2017, 458 : 337 - 343
  • [9] Implementation and Evaluation of Secure Outsourcing Scheme for Secret Sharing Scheme on Cloud Storage Services
    Ohigashi, Toshihiro
    Nishimura, Kouji
    Aibara, Reiji
    Yoshida, Kouta
    2014 38TH ANNUAL IEEE INTERNATIONAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE WORKSHOPS (COMPSACW 2014), 2014, : 78 - 83
  • [10] Outsourcing secret sharing scheme based on homomorphism encryption
    Zhang, En
    Peng, Jie
    Li, Ming
    IET INFORMATION SECURITY, 2018, 12 (01) : 94 - 99