Visible to the public Layered Security for Storage at the Edge: On Decentralized Multi-factor Access Control

TitleLayered Security for Storage at the Edge: On Decentralized Multi-factor Access Control
Publication TypeConference Paper
Year of Publication2016
AuthorsEsiner, Ertem, Datta, Anwitaman
Conference NameProceedings of the 17th International Conference on Distributed Computing and Networking
PublisherACM
Conference LocationNew York, NY, USA
ISBN Number978-1-4503-4032-8
Keywordscomposability, data out-sourcing, edge computing, erasure codes, layered security, Metrics, multi-factor access control, network coding, pubcrawl, Resiliency, user controlled encryption
Abstract

In this paper we propose a protocol that allows end-users in a decentralized setup (without requiring any trusted third party) to protect data shipped to remote servers using two factors - knowledge (passwords) and possession (a time based one time password generation for authentication) that is portable. The protocol also supports revocation and recreation of a new possession factor if the older possession factor is compromised, provided the legitimate owner still has a copy of the possession factor. Furthermore, akin to some other recent works, our approach naturally protects the outsourced data from the storage servers themselves, by application of encryption and dispersal of information across multiple servers. We also extend the basic protocol to demonstrate how collaboration can be supported even while the stored content is encrypted, and where each collaborator is still restrained from accessing the data through a multi-factor access mechanism. Such techniques achieving layered security is crucial to (opportunistically) harness storage resources from untrusted entities.

URLhttps://dl.acm.org/doi/10.1145/2833312.2833452
DOI10.1145/2833312.2833452
Citation Keyesiner_layered_2016