Secure Data Outsourcing on Cloud Using Secret Sharing Scheme
نویسندگان
چکیده
Data Outsourcing in Cloud (DOC) has its exclusive benefits like low-cost, lower management overhead, elasticity of storage etc and these encourage organizations to use cloud computing to outsource massive amount of data to the cloud providers. The outsourced environment of the cloud and its inherent loss of control cause risk of exposing highly sensitive data to internal or external attacks. Traditionally, the data are kept encrypted to have secure authorized-only access. But, encrypting and decrypting large data files are computationally costly. Hence, secret sharing based DOC schemes have emerged due to their low complexity. Here, the proposed scheme uses simple Boolean based encryption and decryption of the data files (only image-files are considered in this paper) which is low in computational cost. The encrypted data files will be shared on the cloud. A threshold (t, n)-secret sharing scheme applied on the symmetric key of the encryption algorithm. The n share-keys will be generated from the secret key and will be distributed among participants. If t or more (≤ n) shared-keys are submitted, the original data files can be retrieved. Hence, it allows a threshold authorized-group of t or more data-users.
منابع مشابه
An Efficient Secret Sharing-based Storage System for Cloud-based Internet of Things
Internet of things (IoTs) is the newfound information architecture based on the internet that develops interactions between objects and services in a secure and reliable environment. As the availability of many smart devices rises, secure and scalable mass storage systems for aggregate data is required in IoTs applications. In this paper, we propose a new method for storing aggregate data in Io...
متن کاملSeparating indexes from data: a distributed scheme for secure database outsourcing
Database outsourcing is an idea to eliminate the burden of database management from organizations. Since data is a critical asset of organizations, preserving its privacy from outside adversary and untrusted server should be warranted. In this paper, we present a distributed scheme based on storing shares of data on different servers and separating indexes from data on a distinct server. Shamir...
متن کاملComputationally secure multiple secret sharing: models, schemes, and formal security analysis
A multi-secret sharing scheme (MSS) allows a dealer to share multiple secrets among a set of participants. in such a way a multi-secret sharing scheme (MSS) allows a dealer to share multiple secrets among a set of participants, such that any authorized subset of participants can reconstruct the secrets. Up to now, existing MSSs either require too long shares for participants to be perfect secur...
متن کاملSimple and Efficient Secret Sharing Schemes for Sharing Data and Image
Secret sharing is a new alternative for outsourcing data in a secure way. It avoids the need for time consuming encryption decryption process and also the complexity involved in key management. The data must also be protected from untrusted cloud service providers. Secret sharing based solution provides secure information dispersal by making shares of the original data and distributes them amon...
متن کاملAn Approach Secret Sharing Algorithm in Cloud Computing Security over Single to Multi Cloud
These days rapid use of cloud computing in several IT industries and organizations offers new software at a reasonable cost. Cloud computing is an emerging technology that is at the top in the IT industry. Data is used, processed and stored in cloud environment all over the world. With, this there is unlimited benefits but the security risks are alarming in cloud computing environment. One of t...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- I. J. Network Security
دوره 19 شماره
صفحات -
تاریخ انتشار 2017