CFP last date
22 April 2024
Call for Paper
May Edition
IJCA solicits high quality original research papers for the upcoming May edition of the journal. The last date of research paper submission is 22 April 2024

Submit your paper
Know more
Reseach Article

Persistent Data Security in Public Clouds

by Sara Ibn El Ahrache, Hassan Badir, Abderrahmane Sbihi
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 155 - Number 9
Year of Publication: 2016
Authors: Sara Ibn El Ahrache, Hassan Badir, Abderrahmane Sbihi
10.5120/ijca2016912430

Sara Ibn El Ahrache, Hassan Badir, Abderrahmane Sbihi . Persistent Data Security in Public Clouds. International Journal of Computer Applications. 155, 9 ( Dec 2016), 31-36. DOI=10.5120/ijca2016912430

@article{ 10.5120/ijca2016912430,
author = { Sara Ibn El Ahrache, Hassan Badir, Abderrahmane Sbihi },
title = { Persistent Data Security in Public Clouds },
journal = { International Journal of Computer Applications },
issue_date = { Dec 2016 },
volume = { 155 },
number = { 9 },
month = { Dec },
year = { 2016 },
issn = { 0975-8887 },
pages = { 31-36 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume155/number9/26635-2016912430/ },
doi = { 10.5120/ijca2016912430 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:00:50.443237+05:30
%A Sara Ibn El Ahrache
%A Hassan Badir
%A Abderrahmane Sbihi
%T Persistent Data Security in Public Clouds
%J International Journal of Computer Applications
%@ 0975-8887
%V 155
%N 9
%P 31-36
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Recently, there has been increasing confidence for a favorable usage of big data drawn out from the huge amount of information deposited in a cloud computing system. Data kept on such systems can be retrieved through the network at the user’s convenience. However, the data that users send include private information, and therefore, information leakage from these data is now a major social problem. The usage of secret sharing schemes for cloud computing have lately been approved to be relevant in which users deal out their data to several servers. Notably, in a (k,n) threshold scheme, data security is assured if and only if all through the whole life of the secret the opponent cannot compromise more than k of the n servers. In fact, a number of secret sharing algorithms have been suggested to deal with these security issues. However, a limitation of these methods is that first they do not consider long term data storage and second they assume that data tempering only occurs at retrieval time, after the distribution of the shares has been correctly done. In this paper these two problems are addressed by presenting a novel scheme to ensure a perpetual secure data storage and retrieval.

References
  1. Shamir, A.: How to share a secret. Commun. ACM 22(11), 612–613 (1979).
  2. Ito, M., Saito, A., Nishizeki, T.: Secret sharing scheme realizing general access structure. Electron. Commun. Jpn. (Part III: Fundam. Electron. Sci.) 72(9), 56–64 (1989)
  3. Kurihara, J., Kiyomoto, S., Fukushima, K., Tanaka, T.: A New (k,n)-threshold secret sharing scheme and its extension. In: Wu, T.-C., Lei, C.-L., Rijmen, V., Lee, D.-T. (eds.) ISC 2008. LNCS, vol. 5222, pp. 455–470. Springer, Heidelberg (2008)
  4. Lin, C., Harn, L., Ye, D.: Ideal perfect multilevel threshold secret sharing scheme. In: Fifth International Conference on Information Assurance and Security, IAS 2009, vol. 2. IEEE (2009)
  5. KBeimel, A., Ben-Efraim, A., Padr´o, C., Tyomkin, I.: Multi-linear secret-sharing schemes. In: Lindell, Y. (ed.) TCC 2014. LNCS, vol. 8349, pp. 394–418. Springer, Heidelberg (2014)
  6. Tassa, T.: Hierarchical threshold secret sharing. J. Cryptol. 20(2), 237–264 (2007)
  7. Blakley, G.R.: Safeguarding cryptographic keys. In: International Workshop on Managing Requirements Knowledge. IEEE Computer Society (1989).
  8. Alsolami, F., Boult, T.E.: CloudStash: using secret-sharing scheme to secure data, not keys, in multi-clouds. In: 11th International Conference on Information Technology: New Generations, ITNG 2014. IEEE (2014)
  9. Cachin, C., Haas, R., Vukolic, M.: Dependable storage in the intercloud. Research report RZ 3783 (2010)
  10. Alsolami, F., Chow, C.E.: N-Cloud: improving performance and security in cloud storage. In: IEEE 14th International Conference on High Performance Switching and Routing, HPSR 2013. IEEE (2013)
  11. Bessani, A., et al.: DepSky: dependable and secure storage in a cloud-of-clouds. ACM Trans. Storage (TOS) 9(4), Article No. 12 (2013)
  12. Xiong, H., Zhang, X., Zhu, W., Yao, D.: CloudSeal: end-to-end content protection in cloudbased storage and delivery services. In: Rajarajan, M., Piper, F., Wang, H., Kesidis, G. (eds.) SecureComm 2011. LNICST, vol. 96, pp. 491–500. Springer, Heidelberg (2012)
  13. Juan A. Garay, Rosario Gennaro, Charanjit Jutla, Tal Rabin: Secure distributed storage and retrieval. In: Theoretical Computer Science 243 pp. 363-389 (2000)
Index Terms

Computer Science
Information Sciences

Keywords

cloud computing data security secret sharing blinding distributed digital signature threshold cryptography.