Permanent Participatory Data Security in a Cloud Computing Environment

被引:0
|
作者
El Ahrache, Sara Ibn [1 ]
Badir, Hassan [1 ]
Ghodous, Parisa [2 ]
Sbihi, Abderrahmane [1 ]
机构
[1] Natl Sch Appl Sci, LABTIC, Tangier, Morocco
[2] Claude Bernard Lyon 1 Univ, Dept Comp Sci, Lyon, France
关键词
cloud computing; data security; secret sharing; blinding; treshold cryptography; SECRET;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recently, there has been increasing confidence for a favorable usage of big data drawn out from the huge amount of information deposited in a cloud computing system. Data kept on such systems can be retrieved through the network at the user's convenience. However, the data that users send include private information, and therefore, information leakage from these data is now a major social problem. The usage of secret sharing schemes for cloud computing have lately been approved to be relevant in which users deal out their data to several servers. Notably, in a (k,n) threshold scheme, data security is assured if and only if all through the whole life of the secret the opponent cannot compromise more than k of the n servers. In fact, a number of secret sharing algorithms have been suggested to deal with these security issues. However, a limitation of these methods is that first they do not consider long term data storage and second they assume that data tempering only occurs at retrieval time, after the distribution of the shares has been correctly done. In this paper we address these two problems by presenting a novel scheme to ensure a perpetual secure data storage and retrieval.
引用
收藏
页码:320 / 324
页数:5
相关论文
共 50 条
  • [31] Study on the Security of the Databases in Cloud Computing Environment
    Gele, Aori
    COMPUTER-AIDED DESIGN, MANUFACTURING, MODELING AND SIMULATION III, 2014, 443 : 473 - 476
  • [33] A Review on Security Issue in Security Model of Cloud Computing Environment
    Venkatakotireddy, G.
    Rao, B. Thirumala
    Vurukonda, Naresh
    ARTIFICIAL INTELLIGENCE AND EVOLUTIONARY COMPUTATIONS IN ENGINEERING SYSTEMS, ICAIECES 2017, 2018, 668 : 207 - 212
  • [34] Cloud Computing USING DATA IN THE CLOUD—WHAT IT MEANS FOR DATA SECURITY
    Ward, Stuart
    Lab Manager, 2019, 14 (09): : 24 - 27
  • [35] Data Model for Cloud Computing Environment
    Akintoye, Samson B.
    Bagula, Antoine B.
    Isafiade, Omowumi E.
    Djemaiel, Yacine
    Boudriga, Noureddine
    E-INFRASTRUCTURE AND E-SERVICES FOR DEVELOPING COUNTRIES, AFRICOMM 2018, 2019, 275 : 199 - 215
  • [36] Data integration in Cloud Computing environment
    De la Prieta, Fernando
    Rodriguez, Sara
    Bajo, Javier
    Lopez Batista, Vivian F.
    PROCEEDINGS OF THE FOURTH INTERNATIONAL WORKSHOP ON KNOWLEDGE DISCOVERY, KNOWLEDGE MANAGEMENT AND DECISION SUPPORT (EUREKA-2013), 2013, 51 : 407 - 412
  • [37] A new lightweight data security system for data security in the cloud computing
    Mohammed S.
    Nanthini S.
    Bala Krishna N.
    Srinivas I.V.
    Rajagopal M.
    Ashok Kumar M.
    Measurement: Sensors, 2023, 29
  • [38] State-of-the-art Cloud Computing Security Taxonomies - A classification of security challenges in the present cloud computing environment
    Srinivasan, Madhan Kumar
    Sarukesi, K.
    Rodrigues, Paul
    Manoj, Sai M.
    Revathy, P.
    PROCEEDINGS OF THE 2012 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI'12), 2012, : 470 - 476
  • [39] A Data Security Framework for Cloud Computing Adoption: Mozambican Government Cloud Computing
    Vumo, Ambrosio Patricia
    Spillner, Josef
    Koepsell, Stefan
    PROCEEDINGS OF THE 18TH EUROPEAN CONFERENCE ON CYBER WARFARE AND SECURITY (ECCWS 2019), 2019, : 720 - 729
  • [40] Big Data Security in Cloud Environment
    Reddy, Yenumula B.
    2018 IEEE 4TH INTERNATIONAL CONFERENCE ON BIG DATA SECURITY ON CLOUD (BIGDATASECURITY), 4THIEEE INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE AND SMART COMPUTING, (HPSC) AND 3RD IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT DATA AND SECURITY (IDS), 2018, : 100 - 106