Skip to main content

2018 | OriginalPaper | Buchkapitel

Secure File Storage System Among Distributed Public Clouds

verfasst von : Li Ximing, Chen Weizhao, Guo Yubin, Zhang Senyang, Huang Qiong

Erschienen in: Cloud Computing and Security

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

This paper studies the technology of file storage and retrieval in multiple public clouds based on secret sharing. The research is based on a local storage and multiple public cloud storage to achieve the exchange of data between local storage and public cloud storage. Users can view files, upload files, download files, delete files, and retrieve files through local clients. A file storage directory tree is provided which records the file nodes. Through this storage directory tree, users can examine the structure of file storage on the client, add nodes, that is the simulation of deleting files, and delete nodes, that is the simulation of downloading files. After symmetric encryption, the source file which users upload through the client is stochastically deposited into multiple cloud-storage spaces in the form of encrypted file. Based on the idea of Shamir secret sharing, as the original secret, the storage directory tree is divided into several sub-secrets each of which is deposited individually into a specified cloud-storage space. During the separation, the key data which used for the reconstruction of the original secret is preserved in the local-storage space. The symmetric key is generated by an algorithm, and the seed of the key is preserved in the simulated local storage. The purpose of the study is to improve the data security of public cloud storage, reduce the risk of user data leakage, and provide users with convenient and practical system services.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
3.
Zurück zum Zitat Hadavi, M.A., Jalili, R.: Secure data outsourcing based on threshold secret sharing; towards a more practical solution. In: Proceedings of VLDB Ph.D. Workshop, pp. 54–59 (2010) Hadavi, M.A., Jalili, R.: Secure data outsourcing based on threshold secret sharing; towards a more practical solution. In: Proceedings of VLDB Ph.D. Workshop, pp. 54–59 (2010)
4.
Zurück zum Zitat Hadavi, M.A., Noferesti, M., Jalili, R., Damiani, E.: Database as a service: towards a unified solution for security requirements. In: 36th Annual IEEE Computer Software and Applications Conference Workshops, COMPSAC 2012, Izmir, Turkey, July 16–20, 2012, pp. 415–420 (2012) Hadavi, M.A., Noferesti, M., Jalili, R., Damiani, E.: Database as a service: towards a unified solution for security requirements. In: 36th Annual IEEE Computer Software and Applications Conference Workshops, COMPSAC 2012, Izmir, Turkey, July 16–20, 2012, pp. 415–420 (2012)
5.
Zurück zum Zitat Hadavi, M.A., Damiani, E., Jalili, R., Cimato, S., Ganjei, Z.: AS5: a secure searchable secret sharing scheme for privacy preserving database outsourcing. In: Di Pietro, R., Herranz, J., Damiani, E., State, R. (eds.) DPM/SETOP -2012. LNCS, vol. 7731, pp. 201–216. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-35890-6_15CrossRef Hadavi, M.A., Damiani, E., Jalili, R., Cimato, S., Ganjei, Z.: AS5: a secure searchable secret sharing scheme for privacy preserving database outsourcing. In: Di Pietro, R., Herranz, J., Damiani, E., State, R. (eds.) DPM/SETOP -2012. LNCS, vol. 7731, pp. 201–216. Springer, Heidelberg (2013). https://​doi.​org/​10.​1007/​978-3-642-35890-6_​15CrossRef
6.
Zurück zum Zitat Hadavi, M.A., Jalili, R., Damiani, E., Cimato, S.: Security and searchability in secret sharing-based data outsourcing. Int. J. Inf. Sec. 14(6), 513–529 (2015)CrossRef Hadavi, M.A., Jalili, R., Damiani, E., Cimato, S.: Security and searchability in secret sharing-based data outsourcing. Int. J. Inf. Sec. 14(6), 513–529 (2015)CrossRef
7.
Zurück zum Zitat Emekçi, F., Metwally, A., Agrawal, D., El Abbadi, A.: Dividing secrets to secure data outsourcing. Inf. Sci. 263, 198–210 (2014)MathSciNetCrossRef Emekçi, F., Metwally, A., Agrawal, D., El Abbadi, A.: Dividing secrets to secure data outsourcing. Inf. Sci. 263, 198–210 (2014)MathSciNetCrossRef
8.
Zurück zum Zitat Attasena, V., Harbi, N., Darmont, J.: fVSS: a new secure and cost-efficient scheme for cloud data warehouses. In: Proceedings of the 17th International Workshop on Data Warehousing and OLAP, DOLAP 2014, Shanghai, China, November 3–7, 2014, pp. 81–90 (2014) Attasena, V., Harbi, N., Darmont, J.: fVSS: a new secure and cost-efficient scheme for cloud data warehouses. In: Proceedings of the 17th International Workshop on Data Warehousing and OLAP, DOLAP 2014, Shanghai, China, November 3–7, 2014, pp. 81–90 (2014)
9.
Zurück zum Zitat Ferretti, L., Colajanni, M., Marchetti, M.: Distributed, concurrent, and independent access to encrypted cloud databases. IEEE Trans. Parallel Distrib. Syst. 25(2), 437–446 (2014)CrossRef Ferretti, L., Colajanni, M., Marchetti, M.: Distributed, concurrent, and independent access to encrypted cloud databases. IEEE Trans. Parallel Distrib. Syst. 25(2), 437–446 (2014)CrossRef
11.
Zurück zum Zitat Dolev, S., Gilboa, N., Li, X.: Accumulating automata and cascaded equations automata for communicationless information theoretically secure multi-party computation: extended abstract. In: Proceedings of the 3rd International Workshop on Security in Cloud Computing, SCC@ASIACCS 2015, Singapore, Republic of Singapore, April 14, 2015, pp. 21–29 (2015) Dolev, S., Gilboa, N., Li, X.: Accumulating automata and cascaded equations automata for communicationless information theoretically secure multi-party computation: extended abstract. In: Proceedings of the 3rd International Workshop on Security in Cloud Computing, SCC@ASIACCS 2015, Singapore, Republic of Singapore, April 14, 2015, pp. 21–29 (2015)
13.
Zurück zum Zitat Hadavi, M.A., Jalili, R., Karimi, L.: Access control aware data retrieval for secret sharing based database outsourcing. Distrib. Parallel Databases 34(4), 1–30 (2016)CrossRef Hadavi, M.A., Jalili, R., Karimi, L.: Access control aware data retrieval for secret sharing based database outsourcing. Distrib. Parallel Databases 34(4), 1–30 (2016)CrossRef
Metadaten
Titel
Secure File Storage System Among Distributed Public Clouds
verfasst von
Li Ximing
Chen Weizhao
Guo Yubin
Zhang Senyang
Huang Qiong
Copyright-Jahr
2018
DOI
https://doi.org/10.1007/978-3-030-00012-7_26