The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we show how a dealer with limited resources is possible to share the secrets to players via an untrusted cloud server without compromising the privacy of the secrets. This scheme permits a batch of two secret messages to be shared to two players in such a way that the secrets are reconstructable if and only if two of them collaborate. An individual share reveals absolutely no information...
We investigate the use of the SPDZ multiparty computation platform to facilitate secure cloud storage of graphstructured data such as telecommunications metadata. We report on an implementation of a simple scheme for answering adjacency, nearest-neighbour and second-hop queries. Our solution hides the data, the query and the answer from the cloud servers unless they all collude to recover them.
In this paper we introduce Password Authenticated Keyword Search (PAKS), a cryptographic scheme where any user can use a single human-memorizable password to outsource encrypted data with associated keywords to a group of servers and later retrieve this data through the encrypted keyword search procedure. PAKS ensures that only the legitimate user who knows the initially registered password can perform...
Day by day the use of memory is increases rapidly. A lot of data created every day so the data management is become a critical task. Most of time much amount of memory wastage because of same copies present on various locations. The process of eliminating the repeated or duplicates copies of data is called as Data deduplication. This data deduplication process is widely used in cloud storage to decrease...
The open nature and outsourced model of cloud computing, coupled with increasing sophistication of cyber attackers and rapid advancement in quantum computing, mandates a more adaptive and flexible approach to cloud data security. In this paper, we introduce a secure cloud storage system which can be layered transparently on existing public & private cloud infrastructure. Our approach combines...
Traditional methods of securing data are challenged by specific nature and architecture of cloud. With increasing sophistication of cyber attackers and advancement of cryptanalysis techniques, encryption alone is not sufficient to ensure data security. A more adaptive and flexible approach to data security is thus required. In this paper, we introduce a secure distributed file system which can be...
When private data or sensitive information is stored in the database, a typical way to protect the data is to encrypt the data before storing it. For efficiently retrieving the data, an effective search mechanism is needed that works over the encrypted data smoothly. When data is encrypted the performance of querying the database is degraded. In this paper we are going through the various search techniques...
Needs for secret sharing scheme is increasing as demands for cloud services grow. However, secret sharing scheme possesses a drawback in that unauthorized users who can access storages storing partial information can reconstruct a secret. Password-Protected Secret Sharing (PPSS) was proposed in order to resolve such a drawback. PPSS is a secret sharing scheme that ensures only the owner of the secret...
Database-as-a-Service provides a scalable cloud database for data owners. However, existing cloud database has its limitations. Intermittent unavailability of cloud service increases the response time for the database. In addition, vendor lock-in makes it difficult for data owners to change the service provider when necessary. In this paper, we propose a secure model based on multi-cloud, adopting...
CDStore is a unified, multicloud storage solution for users to outsource backup data with reliability, security, and cost-efficiency guarantees. CDStore builds on an augmented secret-sharing scheme called convergent dispersal, which supports deduplication by using deterministic, content-derived hashes as input to secret sharing. CDStore's design is presented here, with an emphasis on how it combines...
In this paper, we present an open cloud DRM service provider to protect the digital content's copyright. The proposed architecture enables the service providers to use an on-the fly DRM technique with digital signature and symmetric-key encryption. Unlike other similar works, our system does not keep the encrypted digital content but lets the content creators do so in their own cloud storage. Moreover,...
It is widely recognized that clouds have advantages in initial installation cost and availability. However, with the popularity of public cloud services, the concern of confidentiality is recognized as the largest problem. We propose a secret distribution data management approach for multiple clouds to maintain confidentiality that involves a secret sharing scheme. With our proposed approach, secret...
Data deduplication is an attractive technology to reduce storage space and upload bandwidth for increasing vast amount of duplicated and redundant data. In a cloud storage system with data deduplication, duplicate copies of data will be eliminated and only one copy will be kept in the storage. To protect the confidentiality of sensitive data while supporting deduplication, the convergent encryption...
Secret sharing schemes have recently been considered to apply for cloud computing in which many users distribute multiple data to servers. However, when Shamir's (k, n) secret sharing is applied to cloud systems, the amount of share increases more than n times the amount of the secret. Therefore, in this paper we propose a new secret sharing scheme that can reduce the amount of share different from...
Security of database outsourcing, due to the untrustworthiness of service provider, is a basic challenge to have Database As a Service in a cloud computing environment. Having disparate assumptions to solve different aspects of security such as confidentiality and integrity is an obstacle for an integrated secure solution through the combination of existing approaches. Concentrating on confidentiality...
Cloud Storage systems provide user a safe and consistent place to save user's valuable data and documents. However, user's files are not encrypted on some open source cloud storage systems, such as Hadoop and Sector. The storage service provider can easily access the user's files. This brings a big concern about user's privacy. This paper describes a cloud storage system named YI Cloud. This system...
Many research and development efforts have been devoted towards the design of dependable storage systems, but the effort in evaluating and comparing different designs for widely distributed environment is limited. In this paper, we develop models to evaluate the availability, security, and access performance of various storage designs for the cloud environment where storage resources are offered by...
Mobile ad hoc network is a new multi-hop wireless communication network. It has wide application, but it is exposed to kinds of security threats. Key management is vital important in ad hoc network security research field. Firstly the related work about key management in mobile ad hoc network is analyzed, and then an algorithm is proposed based on identity-based generalized signcryption. Lastly a...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.