Malicious Clients in Distributed Secret Sharing Based Storage Networks

  • Andreas HappeEmail author
  • Stephan Krenn
  • Thomas Lorünser
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 10368)


Multi-cloud storage is a viable alternative to traditional storage solutions. Recent approaches realize safe and secure solutions by combining secret-sharing with Byzantine fault-tolerant distribution schemes into safe and secure storage systems protecting a user against arbitrarily misbehaving storage servers.

In the case of cross-company projects with many involved clients it further becomes vital to also protect the storage system and honest users from malicious clients that are trying to cause inconsistencies in the system. So far, this problem has not been considered in the literature. In this paper, we detail the problems arising from a combination of secret sharing with Byzantine fault-tolerance in the presence of malicious clients, and provide first steps towards a practically feasible solution.


Distributed systems Secret sharing Malicious clients Byzantine fault-tolerance 


  1. 1.
    Abu-Libdeh, H., Princehouse, L., Weatherspoon, H.: Racs: a case for cloud storage diversity. In: 1st ACM Symposium on Cloud Computing, pp. 229–240. ACM (2010)Google Scholar
  2. 2.
    Backes, M., Kate, A., Patra, A.: Computational verifiable secret sharing revisited. In: Lee, D.H., Wang, X. (eds.) ASIACRYPT 2011. LNCS, vol. 7073, pp. 590–609. Springer, Heidelberg (2011). doi: 10.1007/978-3-642-25385-0_32 CrossRefGoogle Scholar
  3. 3.
    Bessani, A., Correia, M., Quaresma, B., André, F., Sousa, P.: Depsky: dependable and secure storage in a cloud-of-clouds. ACM Trans. Storage (TOS) 9(4), 12 (2013)Google Scholar
  4. 4.
    Castro, M., Liskov, B.: Practical byzantine fault tolerance and proactive recovery. ACM Trans. Comput. Syst. 20(4), 398–461 (2002)CrossRefGoogle Scholar
  5. 5.
    Kotla, R., Alvisi, L., Dahlin, M., Clement, A., Wong, E.: Zyzzyva: speculative byzantine fault tolerance. In: ACM SIGOPS Operating Systems Review, vol. 41, pp. 45–58. ACM (2007)Google Scholar
  6. 6.
    Krenn, S., Lorünser, T., Striecks, C.: Batch-verifiable secret sharing with unconditional privacy. In: ICISSP, pp. 303–311 (2017)Google Scholar
  7. 7.
    Lamport, L.: How to make a multiprocessor computer that correctly executes multiprocess programs. IEEE Trans. Comput. 100(9), 690–691 (1979)CrossRefzbMATHGoogle Scholar
  8. 8.
    Loruenser, T., Happe, A., Slamanig, D.: ARCHISTAR: towards secure and robust cloud based data sharing. In: 2015 IEEE 7th International Conference on Cloud Computing Technology and Science (CloudCom), pp. 371–378. IEEE (2015)Google Scholar
  9. 9.
    Padilha, R., Pedone, F.: Belisarius: BFT storage with confidentiality. In: International Symposium on Network Computing and Applications, pp. 9–16. IEEE (2011)Google Scholar
  10. 10.
    Patra, A., Choudhury, A., Pandu Rangan, C.: Efficient asynchronous verifiable secret sharing and multiparty computation. J. Cryptol. 28(1), 49–109 (2013)MathSciNetCrossRefzbMATHGoogle Scholar
  11. 11.
    Pedersen, T.P.: Non-interactive and information-theoretic secure verifiable secret sharing. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol. 576, pp. 129–140. Springer, Heidelberg (1992). doi: 10.1007/3-540-46766-1_9 Google Scholar
  12. 12.
    Popescu, B.C., Crispo, B., Tanenbaum, A.S., Bakker, A.: Design and implementation of a secure wide-area object middleware. Comput. Netw. 51(10), 2484–2513 (2007)CrossRefzbMATHGoogle Scholar
  13. 13.
    Savage, K., Coogan, P., Lau, H.: The evolution of ransomware (2015)Google Scholar
  14. 14.
    Selimi, M., Freitag, F.: Tahoe-lafs distributed storage service in community network clouds. In: BdCloud 2014, pp. 17–24. IEEE (2014)Google Scholar
  15. 15.
    Slamanig, D., Hanser, C.: On cloud storage and the cloud of clouds approach. In: ICITST-2012, pp. 649–655. IEEE Press (2012)Google Scholar
  16. 16.
    Spillner, J., Bombach, G., Matthischke, S., Muller, J., Tzschichholz, R., Schill, A.: Information dispersion over redundant arrays of optimal cloud storage for desktop users. In: UCC 2011, pp. 1–8. IEEE (2011)Google Scholar

Copyright information

© Springer International Publishing AG 2017

Authors and Affiliations

  • Andreas Happe
    • 1
    Email author
  • Stephan Krenn
    • 1
  • Thomas Lorünser
    • 1
  1. 1.AIT Austrian Institute of Technology GmbHViennaAustria

Personalised recommendations