Review: The Secret Sharing Algorithms for Data Security in the Cloud

In this century all personal data are stored on cloud or on servers such as passwords, account numbers, notes, and other important information, but there is chance of misusing people's saved data by a competitor, a miscreant, a court of law. Confidentiality, Integrity and Availability (CIA) are the big challenges related with data storage management. Sometimes, the cloud service providers store or cache the personal information without user’s authorization or permission and control. To prevent this, a self-destructing data system providing user’s data security is used. In selfdestructing data system, all the data stored on cloud or on servers are destructed automatically or transform into an unreadable state after the user specified time, without the user’s intervention. In this paper, SeDas: self-destructing system for data security which is based on integration of cryptographic techniques is presented. Here a proof-ofconcept of SeDas prototype is executed. Through the functionalities and properties of SeDas prototype, SeDas is proved to preserve all the data privacy and also it can be practically used. Output of downloading and uploading with SeDas system decreases and latency increases as compared to the system without self-destructing data mechanism. In this paper, different data security techniques are compared.

[1]  Robert B. Ross,et al.  Enabling active storage on parallel I/O software stacks , 2010, 2010 IEEE 26th Symposium on Mass Storage Systems and Technologies (MSST).

[2]  John A. Chandy,et al.  Active storage using object-based devices , 2008, 2008 IEEE International Conference on Cluster Computing.

[3]  Dan Feng,et al.  SafeVanish: An Improved Data Self-Destruction for Protecting Data Privacy , 2010, 2010 IEEE Second International Conference on Cloud Computing Technology and Science.

[4]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[5]  Yu Zhang,et al.  An Active Storage System for High Performance Computing , 2008, 22nd International Conference on Advanced Information Networking and Applications (aina 2008).

[6]  S. Jaya Nirmala,et al.  A Comparative Study of the Secret Sharing Algorithms for Secure Data in the Cloud , 2012, CloudCom 2012.

[7]  Brent Waters,et al.  Defeating Vanish with Low-Cost Sybil Attacks Against Large DHTs , 2010, NDSS.

[8]  Yulai Xie,et al.  Design and evaluation of Oasis: An active storage framework based on T10 OSD standard , 2011, 2011 IEEE 27th Symposium on Mass Storage Systems and Technologies (MSST).

[9]  Dana N. Xu,et al.  Design of an Intelligent Object-based Storage device , 2009 .

[10]  Amit A. Levy,et al.  Vanish: Increasing Data Privacy with Self-Destructing Data , 2009, USENIX Security Symposium.

[11]  Radia J. Perlman,et al.  File system design with assured delete , 2005, Third IEEE International Security in Storage Workshop (SISW'05).

[12]  Dan Feng,et al.  Active Storage Framework for Object-based Storage Device , 2006, 20th International Conference on Advanced Information Networking and Applications - Volume 1 (AINA'06).