Skip to main content

Selective All-Or-Nothing Transform: Protecting Outsourced Data Against Key Exposure

  • Conference paper
  • First Online:
Cyberspace Safety and Security (CSS 2018)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 11161))

Included in the following conference series:

  • 1992 Accesses

Abstract

This paper presents the selective all-or-nothing transform (SAONT). It addresses the needs of users who would like to use inexpensive cloud storage services, but do not trust their providers. Encrypted data are transformed and separated into a small private fragment kept on the user’s device and a large public fragment which can be securely uploaded to a public cloud since decryption of the public fragment is infeasible without the private fragment. Therefore, outsourced data are protected even in a situation of key exposure. SAONT reduces performance overhead by combining block-wise fragmentation of a ciphertext with an application of an all-or-nothing transform only on a subset of the ciphertext.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    https://www.bloomberg.com/news/features/2017-09-29/the-equifax-hack-has-all-the-hallmarks-of-state-sponsored-pros.

  2. 2.

    https://en.wikipedia.org/wiki/Facebook-Cambridge_Analytica_data_scandal.

References

  1. Bacis, E., De Capitani di Vimercati, S., Foresti, S., Paraboschi, S., Rosa, M., Samarati, P.: Mix&Slice: efficient access revocation in the cloud. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, CCS 2016, pp. 217–228. ACM, New York (2016). https://doi.org/10.1145/2976749.2978377

  2. Bessani, A., Correia, M., Quaresma, B., André, F., Sousa, P.: DEPSKY: dependable and secure storage in a cloud-of-clouds. Trans. Storage 9(4), 12:1–12:33 (2013). https://doi.org/10.1145/2535929

    Article  Google Scholar 

  3. Bowers, K.D., Juels, A., Oprea, A.: HAIL: a high-availability and integrity layer for cloud storage. In: Proceedings of the 16th ACM Conference on Computer and Communications Security, CCS 2009, pp. 187–198. ACM, New York (2009). https://doi.org/10.1145/1653662.1653686

  4. Chen, L., Laing, T.M., Martin, K.M.: Revisiting and extending the AONT-RS scheme: a robust computationally secure secret sharing scheme. In: Joye, M., Nitaj, A. (eds.) AFRICACRYPT 2017. LNCS, vol. 10239, pp. 40–57. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-57339-7_3

    Chapter  Google Scholar 

  5. Cincilla, P., Boudguiga, A., Hadji, M., Kaiser, A.: Light blind: Why encrypt if you can share? In: 2015 12th International Joint Conference on e-Business and Telecommunications (ICETE). vol. 04, pp. 361–368 (July 2015)

    Google Scholar 

  6. Desai, A.: The security of all-or-nothing encryption: protecting against exhaustive key search. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol. 1880, pp. 359–375. Springer, Heidelberg (2000). https://doi.org/10.1007/3-540-44598-6_23

    Chapter  Google Scholar 

  7. Kapusta, K., Memmi, G.: Data protection by means of fragmentation in distributed storage systems. In: International Conference on Protocol Engineering (ICPE) and International Conference on New Technologies of Distributed Systems (NTDS), pp. 1–8, July 2015. https://doi.org/10.1109/NOTERE.2015.7293486

  8. Kapusta, K., Memmi, G.: Enhancing data protection with a structure-wise fragmentation and dispersal of encrypted data. In: The 17th International Joint Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom), August 2018

    Google Scholar 

  9. Kapusta, K., Memmi, G., Noura, H.: Secure and resilient scheme for data protection in unattended wireless sensor networks. In: 2017 1st Cyber Security in Networking Conference (CSNet), pp. 1–8, October 2017. https://doi.org/10.1109/CSNET.2017.8241998

  10. Kapusta, K., Memmi, G., Noura, H.: POSTER: a keyless efficient algorithm for data protection by means of fragmentation. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, CCS 2016, pp. 1745–1747. ACM, New York (2016). https://doi.org/10.1145/2976749.2989043

  11. Karame, G.O., Soriente, C., Lichota, K., Capkun, S.: Securing cloud data under key exposure. IEEE Trans. Cloud Comput., p. 1 (2017). https://doi.org/10.1109/TCC.2017.2670559

  12. Krawczyk, H.: Secret sharing made short. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 136–146. Springer, Heidelberg (1994). https://doi.org/10.1007/3-540-48329-2_12

    Chapter  Google Scholar 

  13. Memmi, G., Kapusta, K., Qiu, H.: Data protection: combining fragmentation, encryption, and dispersion. In: 2015 International Conference on Cyber Security of Smart Cities, Industrial Control System and Communications (SSIC), pp. 1–9, August 2015. https://doi.org/10.1109/SSIC.2015.7245680

  14. Reed, I.S., Solomon, G.: Polynomial codes over certain finite fields. J. Soc. Ind. Appl. Math. 8(2), 300–304 (1960). https://doi.org/10.1137/0108018

    Article  MathSciNet  MATH  Google Scholar 

  15. Resch, J.K., Plank, J.S.: AONT-RS: blending security and performance in dispersed storage systems. In: Proceedings of the 9th USENIX Conference on File and Storage Technologies, FAST 2011, p. 14, Berkeley, CA, USA (2011). http://dl.acm.org/citation.cfm?id=1960475.1960489

  16. Rivest, R.L.: All-or-nothing encryption and the package transform. In: Biham, E. (ed.) FSE 1997. LNCS, vol. 1267, pp. 210–218. Springer, Heidelberg (1997). https://doi.org/10.1007/BFb0052348

    Chapter  MATH  Google Scholar 

  17. Stinson, D.R.: Something about all or nothing (transforms). Des. Codes Cryptogr. 22(2), 133–138 (2001). https://doi.org/10.1023/A:1008304703074

    Article  MathSciNet  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Katarzyna Kapusta .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Kapusta, K., Memmi, G. (2018). Selective All-Or-Nothing Transform: Protecting Outsourced Data Against Key Exposure. In: Castiglione, A., Pop, F., Ficco, M., Palmieri, F. (eds) Cyberspace Safety and Security. CSS 2018. Lecture Notes in Computer Science(), vol 11161. Springer, Cham. https://doi.org/10.1007/978-3-030-01689-0_15

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-01689-0_15

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-01688-3

  • Online ISBN: 978-3-030-01689-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics