Adaptive encrypted cloud storage model

E. Lopez-Falcon, A. Tchernykh, N. Chervyakov, M. Babenko, E. Nepretimova, V. Miranda-López, A.Y. Drozdov, G. Radchenko, A. Avetisyan, Shaposhnikov S.

    Research output: Contribution to conference (No Proceedings)Paperpeer-review

    Abstract

    In this paper, we propose an adaptive model of data storage in a heterogeneous distributed cloud environment. Our system utilizes the methods of secret sharing schemes and error correction codes based on Redundant Residue Number System (RRNS). We consider data uploading, storing and downloading. To minimize data access, we use data transfer mechanism between cloud providers. We provide theoretical analysis and experimental evaluation of our scheme with six real data storage providers. We show how dynamic adaptive strategies not only increase security, reliability, and reduction of data redundancy but allow processing encrypted data. We also discuss potentials of this approach, and address methods for mitigating the risks of confidentiality, integrity, and availability associated with the loss of information, denial of access for a long time, and information leakage. © 2018 IEEE.
    Original languageEnglish
    Pages329-334
    Number of pages6
    DOIs
    Publication statusPublished - 2018
    Event2018 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering - Saint Petersburg, Russian Federation
    Duration: 29 Jan 20181 Feb 2018

    Conference

    Conference2018 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering
    Abbreviated titleElConRus 2018
    Country/TerritoryRussian Federation
    CitySaint Petersburg
    Period29/01/181/02/18

    Keywords

    • cloud storage
    • Redundant Residue Number System
    • reliability
    • secret sharing schemes
    • security
    • Cryptography
    • Data handling
    • Data transfer
    • Error correction
    • Numbering systems
    • Redundancy
    • Reliability
    • Cloud storages
    • Error correction codes
    • Experimental evaluation
    • Information leakage
    • Redundant residue number systems
    • Secret sharing schemes
    • Transfer mechanisms
    • Digital storage

    Fingerprint

    Dive into the research topics of 'Adaptive encrypted cloud storage model'. Together they form a unique fingerprint.

    Cite this