A secure data outsourcing scheme based on Asmuth-Bloom secret sharing

被引:5
|
作者
Muhammad, Yusuf Idris [1 ]
Kaiiali, Mustafa [1 ]
Habbal, Adib [2 ]
Wazan, A. S. [3 ]
Ilyasu, Auwal Sani [1 ]
机构
[1] Mevlana Univ, Dept Comp Engn, Konya, Turkey
[2] Univ Utara Malaysia, Sch Comp, InterNetWorks Res Lab, Sintok, Kedah, Malaysia
[3] Irit, Paris, France
关键词
Data outsourcing; indexing; secret sharing;
D O I
10.1080/17517575.2015.1120347
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Data outsourcing is an emerging paradigm for data management in which a database is provided as a service by third-party service providers. One of the major benefits of offering database as a service is to provide organisations, which are unable to purchase expensive hardware and software to host their databases, with efficient data storage accessible online at a cheap rate. Despite that, several issues of data confidentiality, integrity, availability and efficient indexing of users' queries at the server side have to be addressed in the data outsourcing paradigm. Service providers have to guarantee that their clients' data are secured against internal (insider) and external attacks. This paper briefly analyses the existing indexing schemes in data outsourcing and highlights their advantages and disadvantages. Then, this paper proposes a secure data outsourcing scheme based on Asmuth-Bloom secret sharing which tries to address the issues in data outsourcing such as data confidentiality, availability and order preservation for efficient indexing.
引用
收藏
页码:1001 / 1023
页数:23
相关论文
共 50 条
  • [21] A Secure Routing Scheme in MANET with CRT based Secret Sharing
    Sinha, Ditipriya
    Chaki, Rituparna
    Bhattacharya, Uma
    2012 15TH INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY (ICCIT), 2012, : 225 - 229
  • [22] Provably secure secret sharing scheme based on bilinear maps
    Li, Hui-Xian
    Pang, Liao-Jun
    Tongxin Xuebao/Journal on Communications, 2008, 29 (10): : 45 - 50
  • [23] Security and searchability in secret sharing-based data outsourcing
    Mohammad Ali Hadavi
    Rasool Jalili
    Ernesto Damiani
    Stelvio Cimato
    International Journal of Information Security, 2015, 14 : 513 - 529
  • [24] Unconditionally secure social secret sharing scheme
    Nojoumian, M.
    Stinson, D. R.
    Grainger, M.
    IET INFORMATION SECURITY, 2010, 4 (04) : 202 - 211
  • [25] A Secure Verifiable Scheme for Secret Image Sharing
    Rose, Angel A.
    Thampi, Sabu M.
    SECOND INTERNATIONAL SYMPOSIUM ON COMPUTER VISION AND THE INTERNET (VISIONNET'15), 2015, 58 : 140 - 150
  • [26] Modification of the Scheme of Division of Asmuth Bloom Data with the Application of the Method of Fractal Geometry
    Kuzmenko, Irina
    Chervyakov, Nikolay
    Kocherov, Yuriy
    Samoylenko, Dmitriy
    2017 FOURTH INTERNATIONAL CONFERENCE ON ENGINEERING AND TELECOMMUNICATION (EN&T), 2017, : 28 - 32
  • [27] A SIMPLE AND SECURE QUANTUM SECRET SHARING SCHEME BASED ON PRODUCT STATES
    Xu Juan
    Chen Hanwu
    Liu Zhihao
    INTERNATIONAL JOURNAL OF QUANTUM INFORMATION, 2012, 10 (03)
  • [28] A Publicly Verifiable Multi-Secret Sharing Scheme With Outsourcing Secret Reconstruction
    Lin, Changlu
    Hu, Huidan
    Chang, Chin-Chen
    Tang, Shaohua
    IEEE ACCESS, 2018, 6 : 70666 - 70673
  • [29] Collusion resistant secret sharing scheme for secure data storage and over cloud
    Lakshmi, V. S.
    Deepthi, S.
    Deepthi, P. P.
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2021, 60
  • [30] A secret sharing-based scheme for secure and energy efficient data transfer in sensor-based IoT
    Anubhav Shivhare
    Manish Kumar Maurya
    Jafar Sarif
    Manish Kumar
    The Journal of Supercomputing, 2022, 78 : 17132 - 17149