A secure data outsourcing scheme based on Asmuth-Bloom secret sharing

被引:5
|
作者
Muhammad, Yusuf Idris [1 ]
Kaiiali, Mustafa [1 ]
Habbal, Adib [2 ]
Wazan, A. S. [3 ]
Ilyasu, Auwal Sani [1 ]
机构
[1] Mevlana Univ, Dept Comp Engn, Konya, Turkey
[2] Univ Utara Malaysia, Sch Comp, InterNetWorks Res Lab, Sintok, Kedah, Malaysia
[3] Irit, Paris, France
关键词
Data outsourcing; indexing; secret sharing;
D O I
10.1080/17517575.2015.1120347
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Data outsourcing is an emerging paradigm for data management in which a database is provided as a service by third-party service providers. One of the major benefits of offering database as a service is to provide organisations, which are unable to purchase expensive hardware and software to host their databases, with efficient data storage accessible online at a cheap rate. Despite that, several issues of data confidentiality, integrity, availability and efficient indexing of users' queries at the server side have to be addressed in the data outsourcing paradigm. Service providers have to guarantee that their clients' data are secured against internal (insider) and external attacks. This paper briefly analyses the existing indexing schemes in data outsourcing and highlights their advantages and disadvantages. Then, this paper proposes a secure data outsourcing scheme based on Asmuth-Bloom secret sharing which tries to address the issues in data outsourcing such as data confidentiality, availability and order preservation for efficient indexing.
引用
收藏
页码:1001 / 1023
页数:23
相关论文
共 50 条
  • [41] Toward a secure protection scheme for visual secret sharing
    Lee, C. -C.
    Lee, C. -C.
    Liu, H. -T.
    Tsai, C. -S.
    IMAGING SCIENCE JOURNAL, 2014, 62 (06): : 342 - 352
  • [42] Security Limitations of Using Secret Sharing for Data Outsourcing
    Dautrich, Jonathan L.
    Ravishankar, Chinya V.
    DATA AND APPLICATIONS SECURITY AND PRIVACY XXVI, 2012, 7371 : 145 - 160
  • [43] Blockchain-Based Secure and Efficient Secret Image Sharing With Outsourcing Computation in Wireless Networks
    Zhou, Zhili
    Wan, Yao
    Cui, Qi
    Yu, Keping
    Mumtaz, Shahid
    Yang, Ching-Nung
    Guizani, Mohsen
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2024, 23 (01) : 423 - 435
  • [44] A Fast and Secure Scheme for Data Outsourcing in the Cloud
    Liu, Yanjun
    Wu, Hsiao-Ling
    Chang, Chin-Chen
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2014, 8 (08): : 2708 - 2721
  • [45] A secure Boolean-based multi-secret image sharing scheme
    Chen, Chien-Chang
    Wu, Wei-Jie
    JOURNAL OF SYSTEMS AND SOFTWARE, 2014, 92 : 107 - 114
  • [46] Optimized Scheme to Secure IoT Systems Based on Sharing Secret in Multipath Protocol
    El Mahdi, Fatna
    Habbani, Ahmed
    Kartit, Zaid
    Bouamoud, Bachir
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2020, 2020
  • [47] A Forward-Secure Threshold Signature Scheme Based on Multiplicative Secret Sharing
    Lu Dian-jun
    Li Xin-yan
    Wang Yun
    Zhang Bing-ru
    PROCEEDINGS OF THE 14TH YOUTH CONFERENCE ON COMMUNICATION, 2009, : 476 - +
  • [48] Forward-secure threshold signature scheme based on polynomial secret sharing
    Lu, Dian-Jun
    Zhang, Bing-Ru
    Zhao, Hai-Xing
    Tongxin Xuebao/Journal on Communication, 2009, 30 (01): : 45 - 49
  • [49] An efficient and secure multiparty quantum secret sharing scheme based on single photons
    Wang, Tian-yin
    Wen, Qiao-yan
    Chen, Xiu-bo
    Guo, Fen-zhuo
    Zhu, Fu-chen
    OPTICS COMMUNICATIONS, 2008, 281 (24) : 6130 - 6134
  • [50] Access control aware data retrieval for secret sharing based database outsourcing
    Mohammad Ali Hadavi
    Rasool Jalili
    Leila Karimi
    Distributed and Parallel Databases, 2016, 34 : 505 - 534