SSeCloud: Using secret sharing scheme to secure keys

被引:2
|
作者
Hu, Liang [1 ]
Huang, Yang [1 ]
Yang, Disheng [1 ]
Zhang, Yuzhen [1 ]
Liu, Hengchang [1 ]
机构
[1] Univ Sci & Technol China, Hefei, Anhui, Peoples R China
来源
2ND INTERNATIONAL CONFERENCE ON MATERIALS SCIENCE, ENERGY TECHNOLOGY AND ENVIRONMENTAL ENGINEERING (MSETEE 2017) | 2017年 / 81卷
基金
中国国家自然科学基金;
关键词
ATTACK;
D O I
10.1088/1755-1315/81/1/012207
中图分类号
TE [石油、天然气工业]; TK [能源与动力工程];
学科分类号
0807 ; 0820 ;
摘要
With the use of cloud storage services, one of the concerns is how to protect sensitive data securely and privately. While users enjoy the convenience of data storage provided by semi-trusted cloud storage providers, they are confronted with all kinds of risks at the same time. In this paper, we present SSeCloud, a secure cloud storage system that improves security and usability by applying secret sharing scheme to secure keys. The system encrypts uploading files on the client side and splits encrypted keys into three shares. Each of them is respectively stored by users, cloud storage providers and the alternative third trusted party. Any two of the parties can reconstruct keys. Evaluation results of prototype system show that SSeCloud provides high security without too much performance penalty.
引用
收藏
页数:7
相关论文
共 50 条
  • [1] CloudStash: Using Secret-Sharing Scheme to Secure Data, Not Keys, in Multi-Clouds
    Alsolami, Fahad
    Boult, Terrance
    2014 11TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: NEW GENERATIONS (ITNG), 2014, : 315 - 320
  • [2] Improved protocols for secure multiplication using secret sharing scheme
    Kamal, Ahmad Akmal Aminuddin Mohd
    Fujisawa, Masaya
    ICT EXPRESS, 2024, 10 (05): : 1019 - 1025
  • [3] Unconditionally secure social secret sharing scheme
    Nojoumian, M.
    Stinson, D. R.
    Grainger, M.
    IET INFORMATION SECURITY, 2010, 4 (04) : 202 - 211
  • [4] A Secure Verifiable Scheme for Secret Image Sharing
    Rose, Angel A.
    Thampi, Sabu M.
    SECOND INTERNATIONAL SYMPOSIUM ON COMPUTER VISION AND THE INTERNET (VISIONNET'15), 2015, 58 : 140 - 150
  • [5] Secure electronic voting using Publicly Verifiable Secret Sharing scheme
    Song, Chun-lai
    Yin, Xin-chun
    2005 International Symposium on Computer Science and Technology, Proceedings, 2005, : 627 - 630
  • [6] Secure Protocol with Variable Security Level Using Secret Sharing Scheme
    Ueno, Shohei
    Kanai, Atsushi
    Tanimoto, Shigeaki
    Sato, Hiroyuki
    2015 IEEE 4TH GLOBAL CONFERENCE ON CONSUMER ELECTRONICS (GCCE), 2015, : 626 - 627
  • [7] Secure Broadcasting Using Independent Secret Keys
    Schaefer, Rafael F.
    Khisti, Ashish
    Poor, H. Vincent
    IEEE TRANSACTIONS ON COMMUNICATIONS, 2018, 66 (02) : 644 - 661
  • [8] Provably Secure On-Line Secret Sharing Scheme
    Oba, Tatsumi
    Ogata, Wakaha
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2011, E94A (01) : 139 - 149
  • [9] Secure and Optimal Secret Sharing Scheme for Color Images
    Shankar, K.
    Taniar, David
    Yang, Eunmok
    Yi, Okyeon
    MATHEMATICS, 2021, 9 (19)
  • [10] A forward-secure scheme based on secret sharing
    Zhang, Jing
    Wei, Feng
    2008 PROCEEDINGS OF INFORMATION TECHNOLOGY AND ENVIRONMENTAL SYSTEM SCIENCES: ITESS 2008, VOL 4, 2008, : 1134 - 1138