Skip to main content
Top

2017 | OriginalPaper | Chapter

Secure Data Outsourcing in the Cloud Using Multi-secret Sharing Scheme (MSSS)

Authors : Amitava Nag, Soni Choudhary, Subham Dawn, Suryadip Basu

Published in: Proceedings of the First International Conference on Intelligent Computing and Communication

Publisher: Springer Singapore

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

In the last few years, the demand of data outsourcing in the cloud has enormously increased. However, there are some significant barriers to cloud computing adoption. One of the most significant barriers of outsourcing data in the cloud computing is its security issues especially when sensitive data such as personal profile, financial records, medical reports, etc. are outsourced on cloud servers. Therefore, strong security measures are essential to protect data within the cloud. Recently, secret sharing schemes have been applied to protect sensitive data in cloud storage. In this paper, we propose a (t, n) multi secret sharing scheme (MSSS) for secure data outsourcing in the cloud. In the proposed scheme, t secrets are divided into n shares, which are distributed to n cloud servers (one share per server) and a trusted user can recover all secrets by combining shares from at least t servers. The analysis shows that the proposed scheme can provide secure and efficient data outsourcing system in the cloud.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Ching-Nung Yang; Jia-Bin Lai, “Protecting Data Privacy and Security for Cloud Computing Based on Secret Sharing,” in Biometrics and Security Technologies (ISBAST), 2013 International Symposium on, vol., no., pp. 259–266, 2–5 July 2013. Ching-Nung Yang; Jia-Bin Lai, “Protecting Data Privacy and Security for Cloud Computing Based on Secret Sharing,” in Biometrics and Security Technologies (ISBAST), 2013 International Symposium on, vol., no., pp. 259–266, 2–5 July 2013.
2.
go back to reference Kaiping Xue; Peilin Hong, “A Dynamic Secure Group Sharing Framework in Public Cloud Computing,” in Cloud Computing, IEEE Transactions on, vol. 2, no. 4, pp. 459–470, Oct.-Dec. 1 2014. Kaiping Xue; Peilin Hong, “A Dynamic Secure Group Sharing Framework in Public Cloud Computing,” in Cloud Computing, IEEE Transactions on, vol. 2, no. 4, pp. 459–470, Oct.-Dec. 1 2014.
3.
go back to reference Mazhar Ali, Kashif Bilal, Samee Khan, Bharadwaj Veeravalli, Keqin Li, Albert Zomaya, “DROPS: Division and Replication of Data in the Cloud for Optimal Performance and Security”, IEEE Transactions on Cloud Computing, no. 1, pp. 1, PrePrints, doi:10.1109/TCC.2015.2400460. Mazhar Ali, Kashif Bilal, Samee Khan, Bharadwaj Veeravalli, Keqin Li, Albert Zomaya, “DROPS: Division and Replication of Data in the Cloud for Optimal Performance and Security”, IEEE Transactions on Cloud Computing, no. 1, pp. 1, PrePrints, doi:10.​1109/​TCC.​2015.​2400460.
4.
go back to reference Xiong, Jinbo, Ximeng Liu, Zhiqiang Yao, Jianfeng Ma, Qi Li, Kui Geng, and Patrick S. Chen. “A secure data self-destructing scheme in cloud computing.” Cloud Computing, IEEE Transactions on 2, no. 4 (2014): 448–458. Xiong, Jinbo, Ximeng Liu, Zhiqiang Yao, Jianfeng Ma, Qi Li, Kui Geng, and Patrick S. Chen. “A secure data self-destructing scheme in cloud computing.” Cloud Computing, IEEE Transactions on 2, no. 4 (2014): 448–458.
5.
go back to reference Hadavi, Mohammad Ali, et al. “Security and searchability in secret sharing-based data outsourcing.” International Journal of Information Security (2015): 1–17. Hadavi, Mohammad Ali, et al. “Security and searchability in secret sharing-based data outsourcing.” International Journal of Information Security (2015): 1–17.
6.
go back to reference A. Shamir, “How to share a secret”, Communications of the ACM. 22, (11), pp. 612–613 (1979). A. Shamir, “How to share a secret”, Communications of the ACM. 22, (11), pp. 612–613 (1979).
7.
go back to reference G.R Blakely, “Safeguarding cryptography keys,” in Proc. of AFIPS National Computer Conference, vol. 48, pp. 313–317, 1979. G.R Blakely, “Safeguarding cryptography keys,” in Proc. of AFIPS National Computer Conference, vol. 48, pp. 313–317, 1979.
8.
go back to reference Security Limitations of Using Secret Sharing for Data Outsourcing, Jonathan L. Dautrich, Chinya V. Ravishankar, Lecture Notes in Computer Science Volume 7371, 2012, pp 145–160. Security Limitations of Using Secret Sharing for Data Outsourcing, Jonathan L. Dautrich, Chinya V. Ravishankar, Lecture Notes in Computer Science Volume 7371, 2012, pp 145–160.
9.
go back to reference Yanjun Liu, Hsiao-Ling Wu, Chin-Chen Chang, “A Fast and Secure Scheme for Data Outsourcing in the Cloud”, TIIS 8(8): 2708–2722 (2014). Yanjun Liu, Hsiao-Ling Wu, Chin-Chen Chang, “A Fast and Secure Scheme for Data Outsourcing in the Cloud”, TIIS 8(8): 2708–2722 (2014).
10.
go back to reference Nojoumian, M.; Stinson, D.R., “Social secret sharing in cloud computing using a new trust function,” in Privacy, Security and Trust (PST), 2012 Tenth Annual International Conference on, vol., no., pp. 161–167, 16–18 July 2012. Nojoumian, M.; Stinson, D.R., “Social secret sharing in cloud computing using a new trust function,” in Privacy, Security and Trust (PST), 2012 Tenth Annual International Conference on, vol., no., pp. 161–167, 16–18 July 2012.
11.
go back to reference Takahashi, S.; Iwamura, K., “Secret Sharing Scheme Suitable for Cloud Computing,” in Advanced Information Networking and Applications (AINA), 2013 IEEE 27th International Conference on, vol., no., pp. 530–537, 25–28 March 2013. Takahashi, S.; Iwamura, K., “Secret Sharing Scheme Suitable for Cloud Computing,” in Advanced Information Networking and Applications (AINA), 2013 IEEE 27th International Conference on, vol., no., pp. 530–537, 25–28 March 2013.
12.
go back to reference Yoon, M., Jang, M., Shin, Y. S., & Chang, J. W. A Bitmap based Data encryption Scheme in Cloud Computing. International Journal of Security and Its Applications, vol. 9, no. 5, pp. 345–360, 2015. Yoon, M., Jang, M., Shin, Y. S., & Chang, J. W. A Bitmap based Data encryption Scheme in Cloud Computing. International Journal of Security and Its Applications, vol. 9, no. 5, pp. 345–360, 2015.
Metadata
Title
Secure Data Outsourcing in the Cloud Using Multi-secret Sharing Scheme (MSSS)
Authors
Amitava Nag
Soni Choudhary
Subham Dawn
Suryadip Basu
Copyright Year
2017
Publisher
Springer Singapore
DOI
https://doi.org/10.1007/978-981-10-2035-3_34

Premium Partner