SSeCloud: Using secret sharing scheme to secure keys

被引:2
|
作者
Hu, Liang [1 ]
Huang, Yang [1 ]
Yang, Disheng [1 ]
Zhang, Yuzhen [1 ]
Liu, Hengchang [1 ]
机构
[1] Univ Sci & Technol China, Hefei, Anhui, Peoples R China
来源
2ND INTERNATIONAL CONFERENCE ON MATERIALS SCIENCE, ENERGY TECHNOLOGY AND ENVIRONMENTAL ENGINEERING (MSETEE 2017) | 2017年 / 81卷
基金
中国国家自然科学基金;
关键词
ATTACK;
D O I
10.1088/1755-1315/81/1/012207
中图分类号
TE [石油、天然气工业]; TK [能源与动力工程];
学科分类号
0807 ; 0820 ;
摘要
With the use of cloud storage services, one of the concerns is how to protect sensitive data securely and privately. While users enjoy the convenience of data storage provided by semi-trusted cloud storage providers, they are confronted with all kinds of risks at the same time. In this paper, we present SSeCloud, a secure cloud storage system that improves security and usability by applying secret sharing scheme to secure keys. The system encrypts uploading files on the client side and splits encrypted keys into three shares. Each of them is respectively stored by users, cloud storage providers and the alternative third trusted party. Any two of the parties can reconstruct keys. Evaluation results of prototype system show that SSeCloud provides high security without too much performance penalty.
引用
收藏
页数:7
相关论文
共 50 条
  • [21] Unconditionally secure proactive secret sharing scheme with combinatorial structures
    Stinson, DR
    Wei, R
    SELECTED AREAS IN CRYPTOGRAPHY, PROCEEDINGS, 2000, 1758 : 200 - 214
  • [22] AN EFFICIENT AND SECURE (t, n) THRESHOLD SECRET SHARING SCHEME
    Pang Liaojun Sun Xi Wang Yumin (The National Key Lab of Integrated Service Networks
    Journal of Electronics(China), 2006, (05) : 731 - 735
  • [23] New secure distributed secret sharing scheme of n product
    Chen, Zhen-Hua
    Li, Shun-Dong
    Wang, Bao-Cang
    Li, Ji-Liang
    Liu, Xin
    Tongxin Xuebao/Journal on Communications, 2014, 35 (11): : 139 - 145
  • [24] A Secure Routing Scheme in MANET with CRT based Secret Sharing
    Sinha, Ditipriya
    Chaki, Rituparna
    Bhattacharya, Uma
    2012 15TH INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY (ICCIT), 2012, : 225 - 229
  • [25] A Simple and Efficient Secret Sharing Scheme Secure against Cheating
    Araki, Toshinori
    Ogata, Wakaha
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2011, E94A (06) : 1338 - 1345
  • [26] AN EFFICIENT AND SECURE (t, n) THRESHOLD SECRET SHARING SCHEME
    Pang Liaojun Sun Xi Wang Yumin The National Key Lab of Integrated Service Networks Xidian Univ Xian China
    JournalofElectronics, 2006, (05) : 731 - 735
  • [27] Double layer secure secret images sharing scheme for biometrics
    Elavarasi Gunasekaran
    Vanitha Muthuraman
    Distributed and Parallel Databases, 2022, 40 : 861 - 885
  • [28] Double layer secure secret images sharing scheme for biometrics
    Gunasekaran, Elavarasi
    Muthuraman, Vanitha
    DISTRIBUTED AND PARALLEL DATABASES, 2022, 40 (04) : 861 - 885
  • [29] Hardware implementation of secure Shamir's secret sharing scheme
    Luo, Pei
    Lin, Andy Yu-Lun
    Wang, Zhen
    Karpovsky, Mark
    2014 IEEE 15TH INTERNATIONAL SYMPOSIUM ON HIGH-ASSURANCE SYSTEMS ENGINEERING (HASE), 2014, : 193 - 200
  • [30] Provably secure secret sharing scheme based on bilinear maps
    Li, Hui-Xian
    Pang, Liao-Jun
    Tongxin Xuebao/Journal on Communications, 2008, 29 (10): : 45 - 50