Protecting Data Privacy and Security for Cloud Computing Based on Secret Sharing

Cloud computing is an Internet-based computing. Computing services, such as data, storage, software, computing, and application, are delivered to local devices through Internet. The major security issue of cloud computing is that the cloud provider must ensure that their infrastructure is secure, and that prevent illegal data accesses from outsiders, other clients, or even the unauthorized cloud employees. In this paper, we deal with cloud security services including key agreement and authentication. By using Elliptic Curve Diffie-Hellman (ECDH) and symmetric bivariate polynomial based secret sharing, we design the secure cloud computing (SCC). Two types of SCC are proposed. One requires a trusted third party (TTP), and the other does not need a TTP. Also, our SCC can be extended to multi-server SCC (MSCC) to fit an environment, where each multi-server system contains multiple servers to collaborate for serving applications. Due to the strong security and operation efficiency, the proposed SCC and MSCC are extremely suitable for use in cloud computing.

[1]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[2]  Josh Benaloh,et al.  Secret Sharing Homomorphisms: Keeping Shares of A Secret Sharing , 1986, CRYPTO.

[3]  Jonathan Katz,et al.  Improving the round complexity of VSS in point-to-point networks , 2008, Inf. Comput..

[4]  Mark Ryan,et al.  Cloud computing security: The scientific challenge, and a survey of solutions , 2013, J. Syst. Softw..

[5]  Zhibin Zhou,et al.  Secure data processing framework for mobile cloud computing , 2011, 2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).

[6]  Dimitrios Zissis,et al.  Addressing cloud computing security issues , 2012, Future Gener. Comput. Syst..

[7]  Chunlin Chen,et al.  Two-Level Verification of Data Integrity for Data Storage in Cloud Computing , 2011, ICEC 2011.

[8]  Blair MacIntyre,et al.  An Evaluation of Graphical Context as a Means for Ameliorating the Effects of Registration Error , 2009, IEEE Transactions on Visualization and Computer Graphics.

[9]  Vijay Varadharajan,et al.  Enforcing Role-Based Access Control for Secure Data Storage in the Cloud , 2011, Comput. J..

[10]  C. Pandu Rangan,et al.  The Round Complexity of Verifiable Secret Sharing: The Statistical Case , 2010, ASIACRYPT.

[11]  Jyh-haw Yeh,et al.  A PASS Scheme in Cloud Computing-Protecting Data Privacy by Authentication and Secret Sharing , 2011 .

[12]  Meng-Yen Hsieh,et al.  Secure Map Reduce Data Transmission Mechanism in Cloud Computing Using Threshold Secret Sharing Scheme , 2012 .

[13]  Jyh-Shyan Lin,et al.  Cloud Data Storage with Group Collaboration Supports , 2011, NDT 2011.

[14]  Mr. Tushar Kailas Mendhe,et al.  Survey on Security, Storage, and Networking of Cloud Computing , 2012 .

[15]  Katarina Stanoevska-Slabeva,et al.  Grid and Cloud Computing, A Business Perspective on Technology and Applications , 2009, Grid and Cloud Computing.

[16]  P. Mell,et al.  The NIST Definition of Cloud Computing , 2011 .

[17]  Yuval Ishai,et al.  The round complexity of verifiable secret sharing and secure multicast , 2001, STOC '01.

[18]  Ivan Damgård,et al.  Efficient Multiparty Computations Secure Against an Adaptive Adversary , 1999, EUROCRYPT.

[19]  K. Srinathan,et al.  Round-Optimal and Efficient Verifiable Secret Sharing , 2006, TCC.

[20]  Chan Yeob Yeun,et al.  New Secure Storage Architecture for Cloud Computing , 2011 .

[21]  C. Pandu Rangan,et al.  The Round Complexity of Verifiable Secret Sharing Revisited , 2009, CRYPTO.

[22]  Kenli Li,et al.  Customer-Satisfaction-Aware Optimal Multiserver Configuration for Profit Maximization in Cloud Computing , 2017, IEEE Transactions on Sustainable Computing.

[23]  Yinong Chen,et al.  Robot as a Service in Cloud Computing , 2010, 2010 Fifth IEEE International Symposium on Service Oriented System Engineering.

[24]  Chao Mei,et al.  CloudStream: Delivering high-quality streaming videos through a cloud-based SVC proxy , 2011, 2011 Proceedings IEEE INFOCOM.

[25]  Ilya Mironov,et al.  Publicly Verifiable Secret Sharing for Cloud-Based Key Management , 2011, INDOCRYPT.

[26]  S. Jaya Nirmala,et al.  A Comparative Study of the Secret Sharing Algorithms for Secure Data in the Cloud , 2012, CloudCom 2012.