Visible to the public A Seamless Secret Sharing Scheme Implementation for Securing Data in Public Cloud Storage Service

TitleA Seamless Secret Sharing Scheme Implementation for Securing Data in Public Cloud Storage Service
Publication TypeConference Paper
Year of Publication2018
AuthorsNelmiawati, Arifandi, W.
Conference Name2018 International Conference on Applied Engineering (ICAE)
ISBN Number978-1-5386-8066-7
Keywordsauthentication key, cloud computing, Complexity theory, composability, cryptography, data privacy, data security concern, defined public cloud storage services, defined service providers, file protection, free plans, Human Behavior, human factors, information dispersal, Internet, local secure key-store, low-cost digital data, metadata, Metrics, nontechnical user, Organizations, original file, potential alternative, pubcrawl, public cloud data storage services, public cloud storage, public cloud storage service, Rabin's IDA output files, resilience, Resiliency, seamless secret sharing scheme implementation, Secret key, secret sharing, Secure File Sharing, securing data, security, Servers, Shamir's SSA, short term, storage management, targeted file, targeting ordinary nontechnical users
Abstract

Public cloud data storage services were considered as a potential alternative to store low-cost digital data in the short term. They are offered by different providers on the Internet. Some providers offer limited free plans for the users who are starting the service. However, data security concern arises when data stored are considered as a valuable asset. This study explores the usage of secret sharing scheme: Rabin's IDA and Shamir's SSA to implement a tool called dCloud for file protection stored in public cloud storage in a seamless way. It addresses data security by hiding its complexities when targeting ordinary non-technical users. The secret key is automatically generated by dCloud in a secure random way on Rabin's IDA. Shamir's SSA completes the process through dispersing the key into each of Rabin's IDA output files. Moreover, the Hash value of the original file is added to each of those output files to confirm the integrity of the file during reconstruction. Besides, the authentication key is used to communicate with all of the defined service providers during storage and reconstruction as well. It is stored into local secure key-store. By having a key to access the key-store, an ordinary non-technical user will be able to use dCloud to store and retrieve targeted file within defined public cloud storage services securely.

URLhttps://ieeexplore.ieee.org/document/8579388
DOI10.1109/INCAE.2018.8579388
Citation Keynelmiawati_seamless_2018