Making secret sharing based cloud storage usable

The purpose of this paper is to develop a usable configuration management for Archistar, which utilizes secret sharing for redundantly storing data over multiple independent storage clouds in a secure and privacy-friendly manner. Selecting the optimal secret sharing parameters, cloud storage servers and other settings for securely storing the secret data shares, while meeting all of end user’s requirements and other restrictions, is a complex task. In particular, complex trade-offs between different protection goals and legal privacy requirements need to be made.,A human-centered design approach with structured interviews and cognitive walkthroughs of user interface mockups with system administrators and other technically skilled users was used.,Even technically skilled users have difficulties to adequately select secret sharing parameters and other configuration settings for adequately securing the data to be outsourced.,Through these automatic settings, not only system administrators but also non-technical users will be able to easily derive suitable configurations.,The authors present novel human computer interaction (HCI) guidelines for a usable configuration management, which propose to automatically set configuration parameters and to solve trade-offs based on the type of data to be stored in the cloud. Through these automatic settings, not only system administrators but also non-technical users will be able to easily derive suitable configurations.

[1]  Hugo Krawczyk,et al.  Secret Sharing Made Short , 1994, CRYPTO.

[2]  Ronald L. Krutz,et al.  Cloud Security: A Comprehensive Guide to Secure Cloud Computing , 2010 .

[3]  Rajkumar Buyya,et al.  Brokering Algorithms for Optimizing the Availability and Cost of Cloud Storage Services , 2013, 2013 IEEE 5th International Conference on Cloud Computing Technology and Science.

[4]  Sumit Goyal,et al.  Public vs Private vs Hybrid vs Community - Cloud Computing: A Critical Review , 2014 .

[5]  Cong Wang,et al.  Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing , 2010, 2010 Proceedings IEEE INFOCOM.

[6]  Salvatore Venticinque,et al.  Multi-objective Decision Support for Brokering of Cloud SLA , 2013, 2013 27th International Conference on Advanced Information Networking and Applications Workshops.

[7]  Frank Leymann,et al.  Decision Support for Application Migration to the Cloud - Challenges and Vision , 2013, CLOSER.

[8]  Miguel Correia,et al.  Clouds-of-Clouds for Dependability and Security: Geo-replication Meets the Cloud , 2013, Euro-Par Workshops.

[9]  Mingqiang Li On the Confidentiality of Information Dispersal Algorithms and Their Erasure Codes , 2012, ArXiv.

[10]  Daniel Slamanig,et al.  ARCHISTAR: Towards Secure and Robust Cloud Based Data Sharing , 2015, 2015 IEEE 7th International Conference on Cloud Computing Technology and Science (CloudCom).

[11]  Frank Leymann,et al.  CloudDSF - The Cloud Decision Support Framework for Application Migration , 2014, ESOCC.

[12]  Cong Wang,et al.  Security Challenges for the Public Cloud , 2012, IEEE Internet Computing.

[13]  Jérôme Darmont,et al.  Secret sharing for cloud data security: a survey , 2017, The VLDB Journal.

[14]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[15]  Yasser Albagory Direction-of-Arrival Estimation for Stratospheric Platforms Mobile Stations , 2014 .

[16]  James A. Thom,et al.  Cloud Computing Security: From Single to Multi-clouds , 2012, 2012 45th Hawaii International Conference on System Sciences.

[17]  H. Nissenbaum Can Trust be Secured Online? A theoretical perspective , 1999 .

[18]  Siani Pearson,et al.  Privacy Assurance Checking , 2011, Digital Privacy - PRIME.

[19]  Adriano Bessa Albuquerque,et al.  Cloudstep: A step-by-step decision process to support legacy application migration to the cloud , 2012, 2012 IEEE 6th International Workshop on the Maintenance and Evolution of Service-Oriented and Cloud-Based Systems (MESOCA).

[20]  Miguel Correia,et al.  DepSky: Dependable and Secure Storage in a Cloud-of-Clouds , 2013, TOS.

[21]  Sai Manoj Pudukotai Dinakarrao,et al.  A fast and resource efficient FPGA implementation of secret sharing for storage applications , 2018, 2018 Design, Automation & Test in Europe Conference & Exhibition (DATE).

[22]  Thomas Lorünser,et al.  The Archistar Secret-Sharing Backup Proxy , 2017, ARES.

[23]  Victor Muntés-Mulero,et al.  Towards a Method for Decision Support in Multi-cloud Environments , 2013, CLOUD 2013.

[24]  Siani Pearson,et al.  Privacy, Security and Trust in Cloud Computing , 2013 .

[25]  Daniel Slamanig,et al.  PRISMACLOUD Tools: A Cryptographic Toolbox for Increasing Security in Cloud Services , 2016, 2016 11th International Conference on Availability, Reliability and Security (ARES).