Skip to main content

Secure Data Outsourcing in the Cloud Using Multi-secret Sharing Scheme (MSSS)

  • Conference paper
  • First Online:
Proceedings of the First International Conference on Intelligent Computing and Communication

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 458))

Abstract

In the last few years, the demand of data outsourcing in the cloud has enormously increased. However, there are some significant barriers to cloud computing adoption. One of the most significant barriers of outsourcing data in the cloud computing is its security issues especially when sensitive data such as personal profile, financial records, medical reports, etc. are outsourced on cloud servers. Therefore, strong security measures are essential to protect data within the cloud. Recently, secret sharing schemes have been applied to protect sensitive data in cloud storage. In this paper, we propose a (t, n) multi secret sharing scheme (MSSS) for secure data outsourcing in the cloud. In the proposed scheme, t secrets are divided into n shares, which are distributed to n cloud servers (one share per server) and a trusted user can recover all secrets by combining shares from at least t servers. The analysis shows that the proposed scheme can provide secure and efficient data outsourcing system in the cloud.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Ching-Nung Yang; Jia-Bin Lai, “Protecting Data Privacy and Security for Cloud Computing Based on Secret Sharing,” in Biometrics and Security Technologies (ISBAST), 2013 International Symposium on, vol., no., pp. 259–266, 2–5 July 2013.

    Google Scholar 

  2. Kaiping Xue; Peilin Hong, “A Dynamic Secure Group Sharing Framework in Public Cloud Computing,” in Cloud Computing, IEEE Transactions on, vol. 2, no. 4, pp. 459–470, Oct.-Dec. 1 2014.

    Google Scholar 

  3. Mazhar Ali, Kashif Bilal, Samee Khan, Bharadwaj Veeravalli, Keqin Li, Albert Zomaya, “DROPS: Division and Replication of Data in the Cloud for Optimal Performance and Security”, IEEE Transactions on Cloud Computing, no. 1, pp. 1, PrePrints, doi:10.1109/TCC.2015.2400460.

  4. Xiong, Jinbo, Ximeng Liu, Zhiqiang Yao, Jianfeng Ma, Qi Li, Kui Geng, and Patrick S. Chen. “A secure data self-destructing scheme in cloud computing.” Cloud Computing, IEEE Transactions on 2, no. 4 (2014): 448–458.

    Google Scholar 

  5. Hadavi, Mohammad Ali, et al. “Security and searchability in secret sharing-based data outsourcing.” International Journal of Information Security (2015): 1–17.

    Google Scholar 

  6. A. Shamir, “How to share a secret”, Communications of the ACM. 22, (11), pp. 612–613 (1979).

    Google Scholar 

  7. G.R Blakely, “Safeguarding cryptography keys,” in Proc. of AFIPS National Computer Conference, vol. 48, pp. 313–317, 1979.

    Google Scholar 

  8. Security Limitations of Using Secret Sharing for Data Outsourcing, Jonathan L. Dautrich, Chinya V. Ravishankar, Lecture Notes in Computer Science Volume 7371, 2012, pp 145–160.

    Google Scholar 

  9. Yanjun Liu, Hsiao-Ling Wu, Chin-Chen Chang, “A Fast and Secure Scheme for Data Outsourcing in the Cloud”, TIIS 8(8): 2708–2722 (2014).

    Google Scholar 

  10. Nojoumian, M.; Stinson, D.R., “Social secret sharing in cloud computing using a new trust function,” in Privacy, Security and Trust (PST), 2012 Tenth Annual International Conference on, vol., no., pp. 161–167, 16–18 July 2012.

    Google Scholar 

  11. Takahashi, S.; Iwamura, K., “Secret Sharing Scheme Suitable for Cloud Computing,” in Advanced Information Networking and Applications (AINA), 2013 IEEE 27th International Conference on, vol., no., pp. 530–537, 25–28 March 2013.

    Google Scholar 

  12. Yoon, M., Jang, M., Shin, Y. S., & Chang, J. W. A Bitmap based Data encryption Scheme in Cloud Computing. International Journal of Security and Its Applications, vol. 9, no. 5, pp. 345–360, 2015.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Amitava Nag .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer Science+Business Media Singapore

About this paper

Cite this paper

Amitava Nag, Soni Choudhary, Subham Dawn, Suryadip Basu (2017). Secure Data Outsourcing in the Cloud Using Multi-secret Sharing Scheme (MSSS). In: Mandal, J., Satapathy, S., Sanyal, M., Bhateja, V. (eds) Proceedings of the First International Conference on Intelligent Computing and Communication. Advances in Intelligent Systems and Computing, vol 458. Springer, Singapore. https://doi.org/10.1007/978-981-10-2035-3_34

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-2035-3_34

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-2034-6

  • Online ISBN: 978-981-10-2035-3

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics