Two-factor authentication for trusted third party free dispersed storage

被引:5
作者
Esiner, Ertem [1 ]
Datta, Anwitaman [1 ]
机构
[1] Nanyang Technol Univ, 50 Nanyang Ave, Singapore 639798, Singapore
来源
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE | 2019年 / 90卷
关键词
Layered security; Two-factor access control; Data out-sourcing; Edge computing; User controlled encryption; Erasure codes; CODES;
D O I
10.1016/j.future.2018.08.001
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We propose a trusted third party free protocol for secure (in terms of content access, manipulation, and confidentiality) data storage and multi-user collaboration over an infrastructure of untrusted storage servers. It is achieved by the application of data dispersal, encryption as well as two-factor (knowledge and possession) based authentication and access control techniques so that unauthorized parties (attackers) or a small set of colluding servers cannot gain access to the stored data. The protocol design takes into account usability issues as opposed to the closest prior work Esiner and Datta (2016). We explore the security implications of the proposed model with event tree analysis and report on experiment results to demonstrate the practicality of the approach concerning computational overheads. Given that the protocol does not rely on any trusted third party, and most operations including actual collaboration do not require users to be online simultaneously, it is suitable not only for traditional multi-cloud setups but also for edge/fog computing environments. (C) 2018 Elsevier B.V. All rights reserved.
引用
收藏
页码:291 / 306
页数:16
相关论文
共 45 条
  • [1] Two Factor Authentication Using Mobile Phones
    Aloul, Fadi
    Zahidi, Syed
    El-Hajj, Wassim
    [J]. 2009 IEEE/ACS INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS, VOLS 1 AND 2, 2009, : 641 - +
  • [2] [Anonymous], 2013, Computer Organization and Design MIPS Edition: The Hardware/Software Interface
  • [3] [Anonymous], 2010, Proc. of the 1st ACM Symposium on Cloud Computing. SoCC'10
  • [4] Ateniese G., 2006, ACM Transactions on Information and Systems Security, V9, P1, DOI 10.1145/1127345.1127346
  • [5] Ateniese G, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P598
  • [6] Beimel Amos, 2011, Coding and Cryptology. Proceedings of the Third International Workshop, IWCC 2011, P11, DOI 10.1007/978-3-642-20901-7_2
  • [7] Bellare M., 1994, Advances in Cryptology - CRYPTO '94. 14th Annual International Cryptology Conference. Proceedings, P216
  • [8] DEPSKY: Dependable and Secure Storage in a Cloud-of-Clouds
    Bessani, Alysson
    Correia, Miguel
    Quaresma, Bruno
    Andre, Fernando
    Sousa, Paulo
    [J]. ACM TRANSACTIONS ON STORAGE, 2013, 9 (04)
  • [9] Blaze M, 1998, LECT NOTES COMPUT SC, V1403, P127, DOI 10.1007/BFb0054122
  • [10] Canetti R, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P185