A secure data outsourcing scheme based on Asmuth-Bloom secret sharing

被引:5
|
作者
Muhammad, Yusuf Idris [1 ]
Kaiiali, Mustafa [1 ]
Habbal, Adib [2 ]
Wazan, A. S. [3 ]
Ilyasu, Auwal Sani [1 ]
机构
[1] Mevlana Univ, Dept Comp Engn, Konya, Turkey
[2] Univ Utara Malaysia, Sch Comp, InterNetWorks Res Lab, Sintok, Kedah, Malaysia
[3] Irit, Paris, France
关键词
Data outsourcing; indexing; secret sharing;
D O I
10.1080/17517575.2015.1120347
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Data outsourcing is an emerging paradigm for data management in which a database is provided as a service by third-party service providers. One of the major benefits of offering database as a service is to provide organisations, which are unable to purchase expensive hardware and software to host their databases, with efficient data storage accessible online at a cheap rate. Despite that, several issues of data confidentiality, integrity, availability and efficient indexing of users' queries at the server side have to be addressed in the data outsourcing paradigm. Service providers have to guarantee that their clients' data are secured against internal (insider) and external attacks. This paper briefly analyses the existing indexing schemes in data outsourcing and highlights their advantages and disadvantages. Then, this paper proposes a secure data outsourcing scheme based on Asmuth-Bloom secret sharing which tries to address the issues in data outsourcing such as data confidentiality, availability and order preservation for efficient indexing.
引用
收藏
页码:1001 / 1023
页数:23
相关论文
共 50 条
  • [31] Blockchain Data Sharing Query Scheme based on Threshold Secret Sharing
    Chen, Lu
    Zhang, Xin
    Sun, Zhixin
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [32] A secret sharing-based scheme for secure and energy efficient data transfer in sensor-based IoT
    Shivhare, Anubhav
    Maurya, Manish Kumar
    Sarif, Jafar
    Kumar, Manish
    JOURNAL OF SUPERCOMPUTING, 2022, 78 (15): : 17132 - 17149
  • [33] Universally Composable and Statistically Secure Verifiable Secret Sharing Scheme Based on Pre-Distributed Data
    Dowsley, Rafael
    Mueller-Quade, Joern
    Otsuka, Akira
    Hanaoka, Goichiro
    Imai, Hideki
    Nascimento, Anderson C. A.
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2011, E94A (02) : 725 - 734
  • [34] Provably Secure On-Line Secret Sharing Scheme
    Oba, Tatsumi
    Ogata, Wakaha
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2011, E94A (01) : 139 - 149
  • [35] Secure and Optimal Secret Sharing Scheme for Color Images
    Shankar, K.
    Taniar, David
    Yang, Eunmok
    Yi, Okyeon
    MATHEMATICS, 2021, 9 (19)
  • [36] Optimum secret sharing scheme secure against cheating
    Ogata, W
    Kurosawa, K
    Stinson, DR
    SIAM JOURNAL ON DISCRETE MATHEMATICS, 2006, 20 (01) : 79 - 95
  • [37] Optimum secret sharing scheme secure against cheating
    Ogata, W
    Kurosawa, K
    ADVANCES IN CRYPTOLOGY - EUROCRYPT '96, 1996, 1070 : 200 - 211
  • [38] Secure and verifiable vector space secret sharing scheme
    Xiao, QH
    Ping, LD
    Pan, XZ
    PROCEEDINGS OF THE 8TH INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN, VOL 2, 2004, : 689 - 693
  • [39] A Secret Sharing Scheme for Secure Transmission of Color Images
    Kumar, Hirdesh
    Srivastava, Awadhesh
    PROCEEDINGS OF THE 2014 INTERNATIONAL CONFERENCE ON ISSUES AND CHALLENGES IN INTELLIGENT COMPUTING TECHNIQUES (ICICT), 2014, : 857 - 860
  • [40] SSeCloud: Using secret sharing scheme to secure keys
    Hu, Liang
    Huang, Yang
    Yang, Disheng
    Zhang, Yuzhen
    Liu, Hengchang
    2ND INTERNATIONAL CONFERENCE ON MATERIALS SCIENCE, ENERGY TECHNOLOGY AND ENVIRONMENTAL ENGINEERING (MSETEE 2017), 2017, 81