Permanent Participatory Data Security in a Cloud Computing Environment

被引:0
|
作者
El Ahrache, Sara Ibn [1 ]
Badir, Hassan [1 ]
Ghodous, Parisa [2 ]
Sbihi, Abderrahmane [1 ]
机构
[1] Natl Sch Appl Sci, LABTIC, Tangier, Morocco
[2] Claude Bernard Lyon 1 Univ, Dept Comp Sci, Lyon, France
关键词
cloud computing; data security; secret sharing; blinding; treshold cryptography; SECRET;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recently, there has been increasing confidence for a favorable usage of big data drawn out from the huge amount of information deposited in a cloud computing system. Data kept on such systems can be retrieved through the network at the user's convenience. However, the data that users send include private information, and therefore, information leakage from these data is now a major social problem. The usage of secret sharing schemes for cloud computing have lately been approved to be relevant in which users deal out their data to several servers. Notably, in a (k,n) threshold scheme, data security is assured if and only if all through the whole life of the secret the opponent cannot compromise more than k of the n servers. In fact, a number of secret sharing algorithms have been suggested to deal with these security issues. However, a limitation of these methods is that first they do not consider long term data storage and second they assume that data tempering only occurs at retrieval time, after the distribution of the shares has been correctly done. In this paper we address these two problems by presenting a novel scheme to ensure a perpetual secure data storage and retrieval.
引用
收藏
页码:320 / 324
页数:5
相关论文
共 50 条
  • [41] Susceptible data classification and security reassurance in cloud-IoT based computing environment
    Ray, Soumya
    Mishra, Kamta Nath
    Dutta, Sandip
    SADHANA-ACADEMY PROCEEDINGS IN ENGINEERING SCIENCES, 2021, 46 (04):
  • [42] A Study on Security Considerations in IoT Environment and Data Protection Methodologies for Communication in Cloud Computing
    Sarmila, K. B.
    Manisekaran, S., V
    2019 IEEE 53RD INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY (ICCST 2019), 2019,
  • [43] E-Commerce Network Security Based on Big Data in Cloud Computing Environment
    Zeng, Yifu
    Ouyang, Shuosi
    Zhu, Tuanfei
    Li, Chuang
    MOBILE INFORMATION SYSTEMS, 2022, 2022
  • [44] Marketing data security and privacy protection based on federated gamma in cloud computing environment
    Zhang C.
    Pan Z.
    Hou C.
    International Journal of Intelligent Networks, 2023, 4 : 261 - 271
  • [45] Susceptible data classification and security reassurance in cloud-IoT based computing environment
    Soumya Ray
    Kamta Nath Mishra
    Sandip Dutta
    Sādhanā, 2021, 46
  • [46] Hierarchical network security situation awareness data fusion method in cloud computing environment
    Zhang, Hongwu
    Kang, Kai
    Bai, Wei
    JOURNAL OF COMPUTATIONAL METHODS IN SCIENCES AND ENGINEERING, 2023, 23 (01) : 237 - 251
  • [47] Research on Data Dynamic Adjustment Method Considering Security Requirements in Cloud Computing Environment
    Guo, Yinzhang
    Li, Xiaoyan
    Zhao, Xinyu
    COMPUTER SUPPORTED COOPERATIVE WORK AND SOCIAL COMPUTING, CHINESECSCW 2021, PT I, 2022, 1491 : 102 - 112
  • [48] Security Analysis of Cloud Computing in the Mobile Internet Environment
    Luo Mingwan
    PROCEEDINGS OF THE 2016 3RD INTERNATIONAL CONFERENCE ON MATERIALS ENGINEERING, MANUFACTURING TECHNOLOGY AND CONTROL, 2016, 67 : 1699 - 1705
  • [49] Analysing Security and Privacy Management For Cloud Computing Environment
    Gourkhede, Manish H.
    Theng, Deepti P.
    2014 FOURTH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT), 2014, : 677 - 680
  • [50] A Nucleic Filter to Enhance the Security in Cloud Computing Environment
    Singh, Oinam David
    Asthana, Amit
    Kushwaha, Yogesh
    PROCEEDINGS OF THE 10TH INDIACOM - 2016 3RD INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT, 2016, : 3762 - 3765