Skip to main content
Top

2018 | OriginalPaper | Chapter

Secure File Storage System Among Distributed Public Clouds

Authors : Li Ximing, Chen Weizhao, Guo Yubin, Zhang Senyang, Huang Qiong

Published in: Cloud Computing and Security

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

This paper studies the technology of file storage and retrieval in multiple public clouds based on secret sharing. The research is based on a local storage and multiple public cloud storage to achieve the exchange of data between local storage and public cloud storage. Users can view files, upload files, download files, delete files, and retrieve files through local clients. A file storage directory tree is provided which records the file nodes. Through this storage directory tree, users can examine the structure of file storage on the client, add nodes, that is the simulation of deleting files, and delete nodes, that is the simulation of downloading files. After symmetric encryption, the source file which users upload through the client is stochastically deposited into multiple cloud-storage spaces in the form of encrypted file. Based on the idea of Shamir secret sharing, as the original secret, the storage directory tree is divided into several sub-secrets each of which is deposited individually into a specified cloud-storage space. During the separation, the key data which used for the reconstruction of the original secret is preserved in the local-storage space. The symmetric key is generated by an algorithm, and the seed of the key is preserved in the simulated local storage. The purpose of the study is to improve the data security of public cloud storage, reduce the risk of user data leakage, and provide users with convenient and practical system services.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
3.
go back to reference Hadavi, M.A., Jalili, R.: Secure data outsourcing based on threshold secret sharing; towards a more practical solution. In: Proceedings of VLDB Ph.D. Workshop, pp. 54–59 (2010) Hadavi, M.A., Jalili, R.: Secure data outsourcing based on threshold secret sharing; towards a more practical solution. In: Proceedings of VLDB Ph.D. Workshop, pp. 54–59 (2010)
4.
go back to reference Hadavi, M.A., Noferesti, M., Jalili, R., Damiani, E.: Database as a service: towards a unified solution for security requirements. In: 36th Annual IEEE Computer Software and Applications Conference Workshops, COMPSAC 2012, Izmir, Turkey, July 16–20, 2012, pp. 415–420 (2012) Hadavi, M.A., Noferesti, M., Jalili, R., Damiani, E.: Database as a service: towards a unified solution for security requirements. In: 36th Annual IEEE Computer Software and Applications Conference Workshops, COMPSAC 2012, Izmir, Turkey, July 16–20, 2012, pp. 415–420 (2012)
5.
go back to reference Hadavi, M.A., Damiani, E., Jalili, R., Cimato, S., Ganjei, Z.: AS5: a secure searchable secret sharing scheme for privacy preserving database outsourcing. In: Di Pietro, R., Herranz, J., Damiani, E., State, R. (eds.) DPM/SETOP -2012. LNCS, vol. 7731, pp. 201–216. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-35890-6_15CrossRef Hadavi, M.A., Damiani, E., Jalili, R., Cimato, S., Ganjei, Z.: AS5: a secure searchable secret sharing scheme for privacy preserving database outsourcing. In: Di Pietro, R., Herranz, J., Damiani, E., State, R. (eds.) DPM/SETOP -2012. LNCS, vol. 7731, pp. 201–216. Springer, Heidelberg (2013). https://​doi.​org/​10.​1007/​978-3-642-35890-6_​15CrossRef
6.
go back to reference Hadavi, M.A., Jalili, R., Damiani, E., Cimato, S.: Security and searchability in secret sharing-based data outsourcing. Int. J. Inf. Sec. 14(6), 513–529 (2015)CrossRef Hadavi, M.A., Jalili, R., Damiani, E., Cimato, S.: Security and searchability in secret sharing-based data outsourcing. Int. J. Inf. Sec. 14(6), 513–529 (2015)CrossRef
7.
go back to reference Emekçi, F., Metwally, A., Agrawal, D., El Abbadi, A.: Dividing secrets to secure data outsourcing. Inf. Sci. 263, 198–210 (2014)MathSciNetCrossRef Emekçi, F., Metwally, A., Agrawal, D., El Abbadi, A.: Dividing secrets to secure data outsourcing. Inf. Sci. 263, 198–210 (2014)MathSciNetCrossRef
8.
go back to reference Attasena, V., Harbi, N., Darmont, J.: fVSS: a new secure and cost-efficient scheme for cloud data warehouses. In: Proceedings of the 17th International Workshop on Data Warehousing and OLAP, DOLAP 2014, Shanghai, China, November 3–7, 2014, pp. 81–90 (2014) Attasena, V., Harbi, N., Darmont, J.: fVSS: a new secure and cost-efficient scheme for cloud data warehouses. In: Proceedings of the 17th International Workshop on Data Warehousing and OLAP, DOLAP 2014, Shanghai, China, November 3–7, 2014, pp. 81–90 (2014)
9.
go back to reference Ferretti, L., Colajanni, M., Marchetti, M.: Distributed, concurrent, and independent access to encrypted cloud databases. IEEE Trans. Parallel Distrib. Syst. 25(2), 437–446 (2014)CrossRef Ferretti, L., Colajanni, M., Marchetti, M.: Distributed, concurrent, and independent access to encrypted cloud databases. IEEE Trans. Parallel Distrib. Syst. 25(2), 437–446 (2014)CrossRef
11.
go back to reference Dolev, S., Gilboa, N., Li, X.: Accumulating automata and cascaded equations automata for communicationless information theoretically secure multi-party computation: extended abstract. In: Proceedings of the 3rd International Workshop on Security in Cloud Computing, SCC@ASIACCS 2015, Singapore, Republic of Singapore, April 14, 2015, pp. 21–29 (2015) Dolev, S., Gilboa, N., Li, X.: Accumulating automata and cascaded equations automata for communicationless information theoretically secure multi-party computation: extended abstract. In: Proceedings of the 3rd International Workshop on Security in Cloud Computing, SCC@ASIACCS 2015, Singapore, Republic of Singapore, April 14, 2015, pp. 21–29 (2015)
13.
go back to reference Hadavi, M.A., Jalili, R., Karimi, L.: Access control aware data retrieval for secret sharing based database outsourcing. Distrib. Parallel Databases 34(4), 1–30 (2016)CrossRef Hadavi, M.A., Jalili, R., Karimi, L.: Access control aware data retrieval for secret sharing based database outsourcing. Distrib. Parallel Databases 34(4), 1–30 (2016)CrossRef
Metadata
Title
Secure File Storage System Among Distributed Public Clouds
Authors
Li Ximing
Chen Weizhao
Guo Yubin
Zhang Senyang
Huang Qiong
Copyright Year
2018
DOI
https://doi.org/10.1007/978-3-030-00012-7_26

Premium Partner