Cross-group Secret Sharing for Secure Cloud Storage Service

Views: 25
Downloads: 104
このエントリーをはてなブックマークに追加

Cross-group Secret Sharing for Secure Cloud Storage Service

Format:
Article
Kyushu Univ. Production Kyushu Univ. Production
Responsibility:
Ke, Chenyutao(Graduate School of Information Science and Electrical Engineering, Kyushu University)
柯, 陈毓弢(九州大学システム情報科学府情報学専攻)
Anada, Hiroaki(Institute of Systems, Information Technologies and Nanotechnologies)

穴田, 啓晃(九州先端科学技術研究所)
Kawamoto, Junpei(Faculty of Information Science and Electrical Engineering, Kyushu University : Assistant Professor)
川本, 淳平(九州大学大学院システム情報科学研究院 : 助教)
Morozov, Kirill(Institute of Mathematics for Industry, Kyushu University : Assistant Professor)
Sakurai, Kouichi(Faculty of Information Science and Electrical Engineering, Kyushu University : Professor)
櫻井, 幸一(九州大学大学院システム情報科学研究院 : 教授)

Show more
Language:
English
Publication info:
Proceedings of the 10th International Conference on Ubiquitous Information Management and Communication. ACM
Version:
Author
Abstract:
With the spread of the Internet, many mobile devices are used in our daily lives, such as tablets and mobile phones. Then, personal data are often saved on data servers of the storage providers such as Amazon, Google, Yahoo, Baidu and others. In this context, secret sharing can be used to store personal data with several providers, simultaneously reducing the risk of data loss, the data leakage to unauthorized parties, and data falsification. Secret sharing is one of the solutions to combine security and availability in the distributed storage. However, few works considered servers’ affiliations, and specifically, the problem that a malicious provider may recover secret data illegally through manipulation on servers that hold enough shares to recover the secret. In this paper, to resolve the problem, we propose a two-threshold secret sharing scheme in order to enforce a new type of cross-group policy. By combining t-out-of-m providers’ secret sharing scheme and a k-out-of-n servers’ secret sharing scheme via a one-way function or a one-time pad, we construct a scheme that forces k shares to be collected from m groups. Compared with previous work, our scheme can attain the functionalities of proactively updating shares and adding new shares with simple computation. Read more
View fulltext

Similar Items:

1
複数プロバイダに亘る分散ストレージのためのグループ横断秘密分散法 by 柯, 陳毓弢; Ke, Chenyutao; 穴田, 啓晃; Anada, Hiroaki; 川本, 淳平; Kawamoto, Junpei; Kirill, Morozov; 櫻井, 幸一; Sakurai, Koichi
7
グラフクリーク探索問題に対するビットコイン・マイニングの評価 by 松島, 智洋; Matsushima, Tomohiro; 穴田, 啓晃; Anada, Hiroaki; 川本, 淳平; Kawamoto, Junpei; Bag, Samiran; 櫻井, 幸一; Sakurai, Koichi
2
Identity-Embedding Method for Decentralized Public-Key Infrastructure by Anada, Hiroaki; 穴田, 啓晃; Kawamoto, Junpei; 川本, 淳平; Weng, Jian; Sakurai, Kouichi; 櫻井, 幸一; 桜井, 幸一; Sakurai, Koichi
8
端末フィンガープリント情報を用いた鍵乱用を防止可能なハイブリッド暗号化方式 by 陳, 春璐; Chen, Chunlu; 穴田, 啓晃; Anada, Hiroaki; 川本, 淳平; Kawamoto, Junpei; 櫻井, 幸一; Sakurai, Koichi
3
A Hybrid Encryption Scheme with Key-cloning Protection: User / Terminal Double Authentication via Attributes and Fingerprints by Chen, Chunlu; Anada, Hiroaki; 穴田, 啓晃; Kawamoto, Junpei; 川本, 淳平; Sakurai, Kouichi; 櫻井, 幸一; Sakurai, Koichi
9
クラスタリングによるオンラインゲームにおける不正プレーヤー候補の検出 by 張, 忠強; Zhang, Zhongqiang; 穴田, 啓晃; Anada, Hiroaki; 川本, 淳平; Kawamoto, Junpei; 櫻井, 幸一; Sakurai, Koichi
4
Hybrid Encryption Scheme using Terminal Fingerprint and its Application to Attribute-based Encryption without Key Misuse by Chunlu, Chen; Anada, Hiroaki; 穴田, 啓晃; Kawamoto, Junpei; 川本, 淳平; Kawamoto, Jumpei; Sakurai, Kouichi; …
10
P2P 技術に基づくデジタル著作権管理の特徴と電子マネー比較よる考察 by 陳, 春璐; 穴田, 啓晃; Anada, Hiroaki; 川本, 淳平; Kawamoto, Junpei; 櫻井, 幸一; Sakurai, Koichi
5
クラウドサービスにおける盗聴防止及び改ざん検知の一方式 by 柯, 陳毓弢; Ke, Chenyutao; 穴田, 啓晃; Anada, Hiroaki; 川本, 淳平; Kawamoto, Junpei; 櫻井, 幸一; Sakurai, Koichi
11
RSA暗号の公開鍵への所有者情報埋め込み手法とその著作権管理システムへの応用 by 北原, 基貴; Kitahara, Motoki; 穴田, 啓晃; Anada, Hiroaki; 川本, 淳平; Kawamoto, Junpei; 櫻井, 幸一; Sakurai, Koichi
6
Detection of Illegal Players in MMORPG by Classification Algorithms by Zhang, Zhongqiang; Anada, Hiroaki; 穴田, 啓晃; Kawamoto, Junpei; 川本, 淳平; Sakurai, Kouichi; 櫻井, 幸一; Sakurai, Koichi; 桜井, 幸一
12
Privacy-Aware Cloud-based Input Method Editor by Kawamoto, Junpei; 川本, 淳平; Sakurai, Kouichi; 櫻井, 幸一
1.
複数プロバイダに亘る分散ストレージのためのグループ横断秘密分散法 by 柯, 陳毓弢; Ke, Chenyutao; 穴田, 啓晃; Anada, Hiroaki; 川本, 淳平; Kawamoto, Junpei; Kirill, Morozov; 櫻井, 幸一; Sakurai, Koichi
2.
Identity-Embedding Method for Decentralized Public-Key Infrastructure by Anada, Hiroaki; 穴田, 啓晃; Kawamoto, Junpei; 川本, 淳平; Weng, Jian; Sakurai, Kouichi; 櫻井, 幸一; 桜井, 幸一; Sakurai, Koichi
3.
A Hybrid Encryption Scheme with Key-cloning Protection: User / Terminal Double Authentication via Attributes and Fingerprints by Chen, Chunlu; Anada, Hiroaki; 穴田, 啓晃; Kawamoto, Junpei; 川本, 淳平; Sakurai, Kouichi; 櫻井, 幸一; Sakurai, Koichi
4.
Hybrid Encryption Scheme using Terminal Fingerprint and its Application to Attribute-based Encryption without Key Misuse by Chunlu, Chen; Anada, Hiroaki; 穴田, 啓晃; Kawamoto, Junpei; 川本, 淳平; Kawamoto, Jumpei; Sakurai, Kouichi; …
5.
クラウドサービスにおける盗聴防止及び改ざん検知の一方式 by 柯, 陳毓弢; Ke, Chenyutao; 穴田, 啓晃; Anada, Hiroaki; 川本, 淳平; Kawamoto, Junpei; 櫻井, 幸一; Sakurai, Koichi
6.
Detection of Illegal Players in MMORPG by Classification Algorithms by Zhang, Zhongqiang; Anada, Hiroaki; 穴田, 啓晃; Kawamoto, Junpei; 川本, 淳平; Sakurai, Kouichi; 櫻井, 幸一; Sakurai, Koichi; 桜井, 幸一
7.
グラフクリーク探索問題に対するビットコイン・マイニングの評価 by 松島, 智洋; Matsushima, Tomohiro; 穴田, 啓晃; Anada, Hiroaki; 川本, 淳平; Kawamoto, Junpei; Bag, Samiran; 櫻井, 幸一; Sakurai, Koichi
8.
端末フィンガープリント情報を用いた鍵乱用を防止可能なハイブリッド暗号化方式 by 陳, 春璐; Chen, Chunlu; 穴田, 啓晃; Anada, Hiroaki; 川本, 淳平; Kawamoto, Junpei; 櫻井, 幸一; Sakurai, Koichi
9.
クラスタリングによるオンラインゲームにおける不正プレーヤー候補の検出 by 張, 忠強; Zhang, Zhongqiang; 穴田, 啓晃; Anada, Hiroaki; 川本, 淳平; Kawamoto, Junpei; 櫻井, 幸一; Sakurai, Koichi
10.
P2P 技術に基づくデジタル著作権管理の特徴と電子マネー比較よる考察 by 陳, 春璐; 穴田, 啓晃; Anada, Hiroaki; 川本, 淳平; Kawamoto, Junpei; 櫻井, 幸一; Sakurai, Koichi
11.
RSA暗号の公開鍵への所有者情報埋め込み手法とその著作権管理システムへの応用 by 北原, 基貴; Kitahara, Motoki; 穴田, 啓晃; Anada, Hiroaki; 川本, 淳平; Kawamoto, Junpei; 櫻井, 幸一; Sakurai, Koichi
12.
Privacy-Aware Cloud-based Input Method Editor by Kawamoto, Junpei; 川本, 淳平; Sakurai, Kouichi; 櫻井, 幸一