Skip to main content

Secure File Storage System Among Distributed Public Clouds

  • Conference paper
  • First Online:
Book cover Cloud Computing and Security (ICCCS 2018)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 11065))

Included in the following conference series:

  • 2282 Accesses

Abstract

This paper studies the technology of file storage and retrieval in multiple public clouds based on secret sharing. The research is based on a local storage and multiple public cloud storage to achieve the exchange of data between local storage and public cloud storage. Users can view files, upload files, download files, delete files, and retrieve files through local clients. A file storage directory tree is provided which records the file nodes. Through this storage directory tree, users can examine the structure of file storage on the client, add nodes, that is the simulation of deleting files, and delete nodes, that is the simulation of downloading files. After symmetric encryption, the source file which users upload through the client is stochastically deposited into multiple cloud-storage spaces in the form of encrypted file. Based on the idea of Shamir secret sharing, as the original secret, the storage directory tree is divided into several sub-secrets each of which is deposited individually into a specified cloud-storage space. During the separation, the key data which used for the reconstruction of the original secret is preserved in the local-storage space. The symmetric key is generated by an algorithm, and the seed of the key is preserved in the simulated local storage. The purpose of the study is to improve the data security of public cloud storage, reduce the risk of user data leakage, and provide users with convenient and practical system services.

This work is supported by Demonstration on the Construction of Guangdong Survey and Geomatics Industry Technology Innovation Alliance (2017B090907030), The Demonstration of Big Data Application for Land Resource Management and Service (2015B010110006). Qiong Huang is supported by Guangdong Natural Science Funds for Distinguished Young Scholar (No. 2014A030306021), Guangdong Program for Special Support of Top-notch Young Professionals (No. 2015TQ01X796), Pearl River Nova Program of Guangzhou (No. 201610010037), and the National Natural Science Foundation of China (Nos. 61472146, 61672242).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Shamir, A.: How to share a secret. Commun. ACM 22(11), 612–613 (1979)

    Article  MathSciNet  Google Scholar 

  2. Benaloh, J.C.: Secret sharing homomorphisms: keeping shares of a secret secret (extended abstract). In: Odlyzko, A.M. (ed.) CRYPTO 1986. LNCS, vol. 263, pp. 251–260. Springer, Heidelberg (1987). https://doi.org/10.1007/3-540-47721-7_19

    Chapter  Google Scholar 

  3. Hadavi, M.A., Jalili, R.: Secure data outsourcing based on threshold secret sharing; towards a more practical solution. In: Proceedings of VLDB Ph.D. Workshop, pp. 54–59 (2010)

    Google Scholar 

  4. Hadavi, M.A., Noferesti, M., Jalili, R., Damiani, E.: Database as a service: towards a unified solution for security requirements. In: 36th Annual IEEE Computer Software and Applications Conference Workshops, COMPSAC 2012, Izmir, Turkey, July 16–20, 2012, pp. 415–420 (2012)

    Google Scholar 

  5. Hadavi, M.A., Damiani, E., Jalili, R., Cimato, S., Ganjei, Z.: AS5: a secure searchable secret sharing scheme for privacy preserving database outsourcing. In: Di Pietro, R., Herranz, J., Damiani, E., State, R. (eds.) DPM/SETOP -2012. LNCS, vol. 7731, pp. 201–216. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-35890-6_15

    Chapter  Google Scholar 

  6. Hadavi, M.A., Jalili, R., Damiani, E., Cimato, S.: Security and searchability in secret sharing-based data outsourcing. Int. J. Inf. Sec. 14(6), 513–529 (2015)

    Article  Google Scholar 

  7. Emekçi, F., Metwally, A., Agrawal, D., El Abbadi, A.: Dividing secrets to secure data outsourcing. Inf. Sci. 263, 198–210 (2014)

    Article  MathSciNet  Google Scholar 

  8. Attasena, V., Harbi, N., Darmont, J.: fVSS: a new secure and cost-efficient scheme for cloud data warehouses. In: Proceedings of the 17th International Workshop on Data Warehousing and OLAP, DOLAP 2014, Shanghai, China, November 3–7, 2014, pp. 81–90 (2014)

    Google Scholar 

  9. Ferretti, L., Colajanni, M., Marchetti, M.: Distributed, concurrent, and independent access to encrypted cloud databases. IEEE Trans. Parallel Distrib. Syst. 25(2), 437–446 (2014)

    Article  Google Scholar 

  10. Avni, H., Dolev, S., Gilboa, N., Li, X.: SSSDB: database with private information search. In: Karydis, I., Sioutas, S., Triantafillou, P., Tsoumakos, D. (eds.) ALGOCLOUD 2015. LNCS, vol. 9511, pp. 49–61. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-29919-8_4

    Chapter  Google Scholar 

  11. Dolev, S., Gilboa, N., Li, X.: Accumulating automata and cascaded equations automata for communicationless information theoretically secure multi-party computation: extended abstract. In: Proceedings of the 3rd International Workshop on Security in Cloud Computing, SCC@ASIACCS 2015, Singapore, Republic of Singapore, April 14, 2015, pp. 21–29 (2015)

    Google Scholar 

  12. Dautrich, J.L., Ravishankar, C.V.: Security limitations of using secret sharing for data outsourcing. In: Cuppens-Boulahia, N., Cuppens, F., Garcia-Alfaro, J. (eds.) DBSec 2012. LNCS, vol. 7371, pp. 145–160. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-31540-4_12

    Chapter  Google Scholar 

  13. Hadavi, M.A., Jalili, R., Karimi, L.: Access control aware data retrieval for secret sharing based database outsourcing. Distrib. Parallel Databases 34(4), 1–30 (2016)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Guo Yubin .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Ximing, L., Weizhao, C., Yubin, G., Senyang, Z., Qiong, H. (2018). Secure File Storage System Among Distributed Public Clouds. In: Sun, X., Pan, Z., Bertino, E. (eds) Cloud Computing and Security. ICCCS 2018. Lecture Notes in Computer Science(), vol 11065. Springer, Cham. https://doi.org/10.1007/978-3-030-00012-7_26

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-00012-7_26

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-00011-0

  • Online ISBN: 978-3-030-00012-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics