Towards mitigating uncertainty of data security breaches and collusion in cloud computing

A. Tchernykh, M. Babenko, N. Chervyakov, J.M. Cortés-Mendoza, N. Kucherov, V. Miranda-López, M. Deryabin, I. Dvoryaninova, G. Radchenko

    Research output: Contribution to conference (No Proceedings)Paperpeer-review

    Abstract

    Cloud computing has become a part of people's lives. However, there are many unresolved problems with security of this technology. According to the assessment of international experts in the field of security, there are risks in the appearance of cloud collusion in uncertain conditions. To mitigate this type of uncertainty, and minimize data redundancy of encryption together with harms caused by cloud collusion, modified threshold Asmuth-Bloom and weighted Mignotte secret sharing schemes are used. We show that if the villains do know the secret parts, and/or do not know the secret key, they cannot recuperate the secret. If the attackers do not know the required number of secret parts but know the secret key, the probability that they obtain the secret depends the size of the machine word in bits that is less than 1/2 ((l-1)). We demonstrate that the proposed scheme ensures security under several types of attacks. We propose four approaches to select weights for secret sharing schemes to optimize the system behavior based on data access speed: pessimistic, balanced, and optimistic, and on speed per price ratio. We use the approximate method to improve the detection, localization and error correction accuracy under cloud parameters uncertainty. © 2017 IEEE.
    Original languageEnglish
    Pages137-141
    Number of pages5
    DOIs
    Publication statusPublished - 2017
    Event28th International Workshop on Database and Expert Systems Applications - Lyon, France
    Duration: 28 Aug 201731 Aug 2017

    Conference

    Conference28th International Workshop on Database and Expert Systems Applications
    Abbreviated title DEXA 2017
    Country/TerritoryFrance
    CityLyon
    Period28/08/1731/08/17

    Keywords

    • Cloud computing
    • Collusion
    • Redundant residue number system
    • Secret sharing schemes
    • Uncertainty
    • Cryptography
    • Error correction
    • Expert systems
    • Numbering systems
    • Risk assessment
    • Approximate methods
    • Correction accuracy
    • International experts
    • Redundant residue number systems
    • Uncertain condition
    • Distributed computer systems

    Fingerprint

    Dive into the research topics of 'Towards mitigating uncertainty of data security breaches and collusion in cloud computing'. Together they form a unique fingerprint.

    Cite this