Layered Security for Storage at the Edge: On Decentralized Multi-factor Access Control
Title | Layered Security for Storage at the Edge: On Decentralized Multi-factor Access Control |
Publication Type | Conference Paper |
Year of Publication | 2016 |
Authors | Esiner, Ertem, Datta, Anwitaman |
Conference Name | Proceedings of the 17th International Conference on Distributed Computing and Networking |
Publisher | ACM |
Conference Location | New York, NY, USA |
ISBN Number | 978-1-4503-4032-8 |
Keywords | composability, data out-sourcing, edge computing, erasure codes, layered security, Metrics, multi-factor access control, network coding, pubcrawl, Resiliency, user controlled encryption |
Abstract | In this paper we propose a protocol that allows end-users in a decentralized setup (without requiring any trusted third party) to protect data shipped to remote servers using two factors - knowledge (passwords) and possession (a time based one time password generation for authentication) that is portable. The protocol also supports revocation and recreation of a new possession factor if the older possession factor is compromised, provided the legitimate owner still has a copy of the possession factor. Furthermore, akin to some other recent works, our approach naturally protects the outsourced data from the storage servers themselves, by application of encryption and dispersal of information across multiple servers. We also extend the basic protocol to demonstrate how collaboration can be supported even while the stored content is encrypted, and where each collaborator is still restrained from accessing the data through a multi-factor access mechanism. Such techniques achieving layered security is crucial to (opportunistically) harness storage resources from untrusted entities. |
URL | https://dl.acm.org/doi/10.1145/2833312.2833452 |
DOI | 10.1145/2833312.2833452 |
Citation Key | esiner_layered_2016 |