Skip to main content

User-Centric Security Service Model for Cloud Storage

  • Conference paper
  • First Online:
Frontier and Innovation in Future Computing and Communications

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 301))

  • 2116 Accesses

Abstract

For the Personal Cloud Storage, security is an important issue. There is latent threat when it comes to the data loss or leakage which may be committed by malicious Cloud Service Provider (CSP) employee. The most basic solution is to encrypt user’s data. However, when the encryption key is directly managed by CSP or user’s device, then there is latent threat, too. In this paper, we propose the User-Centric Security Service Model (USSM). This security service model enables user to store mandatory key fragment and enables only user to use the encryption key since optional key fragments are stored in a dispersed manner. Meanwhile, even when mandatory key fragment is lost, this prevents leakage of encryption key.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 329.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Drago I, Mellia M, Munafo MM, Sperotto A, Sadre R, Pras A (2012) Inside dropbox: understanding personal cloud storage services. In: Proceedings of the 2012 ACM conference on internet measurement conference, pp 481–494 (Nov 2012)

    Google Scholar 

  2. Archer J, Boehm A (2009) Security guidance for critical areas of focus in cloud computing. Cloud Secur Alliance

    Google Scholar 

  3. Shamir A (1979) How to share a secret. Commun ACM 22(11):612–613

    Article  MATH  MathSciNet  Google Scholar 

  4. Blakley GR (1979) Safeguarding cryptographic keys. In: Proceedings of the national computer conference, pp 313–317

    Google Scholar 

  5. Berrut JP, Lloyd NT (2004) Barycentric lagrange interpolation. Siam Rev 46(3):501–517

    Article  MATH  MathSciNet  Google Scholar 

Download references

Acknowledgments

This work was partly supported by the IT R&D program of MSIP/KEIT. [10041579, Development the Personal Information Security service solution using tokenization technology] and the R&D program of MKE (Ministry of Knowledge Economy) [Project No. 10043380].

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to SeongMin Yoo .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer Science+Business Media Dordrecht

About this paper

Cite this paper

Yoo, S., Park, P., Shin, J., Ryu, H., Ryou, J. (2014). User-Centric Security Service Model for Cloud Storage. In: Park, J., Zomaya, A., Jeong, HY., Obaidat, M. (eds) Frontier and Innovation in Future Computing and Communications. Lecture Notes in Electrical Engineering, vol 301. Springer, Dordrecht. https://doi.org/10.1007/978-94-017-8798-7_45

Download citation

  • DOI: https://doi.org/10.1007/978-94-017-8798-7_45

  • Published:

  • Publisher Name: Springer, Dordrecht

  • Print ISBN: 978-94-017-8797-0

  • Online ISBN: 978-94-017-8798-7

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics