Permanent Participatory Data Security in a Cloud Computing Environment

被引:0
|
作者
El Ahrache, Sara Ibn [1 ]
Badir, Hassan [1 ]
Ghodous, Parisa [2 ]
Sbihi, Abderrahmane [1 ]
机构
[1] Natl Sch Appl Sci, LABTIC, Tangier, Morocco
[2] Claude Bernard Lyon 1 Univ, Dept Comp Sci, Lyon, France
关键词
cloud computing; data security; secret sharing; blinding; treshold cryptography; SECRET;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recently, there has been increasing confidence for a favorable usage of big data drawn out from the huge amount of information deposited in a cloud computing system. Data kept on such systems can be retrieved through the network at the user's convenience. However, the data that users send include private information, and therefore, information leakage from these data is now a major social problem. The usage of secret sharing schemes for cloud computing have lately been approved to be relevant in which users deal out their data to several servers. Notably, in a (k,n) threshold scheme, data security is assured if and only if all through the whole life of the secret the opponent cannot compromise more than k of the n servers. In fact, a number of secret sharing algorithms have been suggested to deal with these security issues. However, a limitation of these methods is that first they do not consider long term data storage and second they assume that data tempering only occurs at retrieval time, after the distribution of the shares has been correctly done. In this paper we address these two problems by presenting a novel scheme to ensure a perpetual secure data storage and retrieval.
引用
收藏
页码:320 / 324
页数:5
相关论文
共 50 条
  • [21] Data Security Model for Cloud Computing
    Dai Yuefa
    Wu Bo
    Gu Yaqiang
    Zhang Quan
    Tang Chaojing
    PROCEEDINGS OF 2009 INTERNATIONAL WORKSHOP ON INFORMATION SECURITY AND APPLICATION, 2009, : 141 - 144
  • [22] Modeling of Data Security in Cloud Computing
    Balogh, Zoltan
    Turcani, Milan
    2016 ANNUAL IEEE SYSTEMS CONFERENCE (SYSCON), 2016, : 940 - 945
  • [23] An Overview on Data Security in Cloud Computing
    Kacha, Lynda
    Zitouni, Abdelhafid
    CYBERNETICS APPROACHES IN INTELLIGENT SYSTEMS: COMPUTATIONAL METHODS IN SYSTEMS AND SOFTWARE 2017, VOL. 1, 2018, 661 : 250 - 261
  • [24] Cryptography and Data Security in Cloud Computing
    Yan, Zheng
    Deng, Robert H.
    Varadharajan, Vijay
    INFORMATION SCIENCES, 2017, 387 : 53 - 55
  • [25] Network Data Security in Cloud Computing
    Li Zhichao
    Cui Congcong
    AGRO FOOD INDUSTRY HI-TECH, 2017, 28 (01): : 445 - 449
  • [26] A Study in Data Security in Cloud Computing
    Jaber, Aws Naser
    Bin Zolkipli, Mohamad Fadli
    Majid, Mazlina Binti Abdul
    Khan, Nusrat Ullah
    2014 INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATIONS, AND CONTROL TECHNOLOGY (I4CT), 2014, : 367 - 371
  • [27] Cloud Computing, Security and Data Concealment
    Delettre, Christian
    Boudaoud, Karima
    Riveill, Michel
    2011 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (ISCC), 2011,
  • [28] Data Security and Privacy in Cloud Computing
    Sun, Yunchuan
    Zhang, Junsheng
    Xiong, Yongping
    Zhu, Guangyu
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2014,
  • [29] Elements of Application Security In the Cloud Computing Environment
    Mathew, George
    2012 IEEE CONFERENCE ON OPEN SYSTEMS (ICOS 2012), 2012, : 174 - 179
  • [30] Network security analysis for cloud computing environment
    Xie, Linjiang
    Hang, Feilu
    Guo, Wei
    Zhang, Zhenhong
    Li, Hanruo
    INTERNATIONAL JOURNAL OF MODELING SIMULATION AND SCIENTIFIC COMPUTING, 2022, 13 (06)