Data Confidentiality in Cloud Storage Protocol Based on Secret Sharing Scheme: A Brute Force Attack Evaluation

Abstract : Outsourcing a company’s data storage and management system increases data security risk and generates a mistrust among adopters, that their data will remain secure and undisclosed. Due to limitations of the SLAs in this direction, the challenge is to build mechanisms that provides data security by design and assures data nondisclosure protection implicitly. In this paper we present an evaluation of the Data Confidentiality in Cloud Storage using a brute-force setup with the aim of studying its effectiveness. Through experimentation on the CloudSim environment we found that the probability of unauthorized data reconstruction can be exponentially decreased by using a sufficiently large number of chunks. Also, increasing the number of used storage volumes leads to a linear decrease of unauthorized data reconstruction.
Type de document :
Communication dans un congrès
Christian Damsgaard Jensen; Stephen Marsh; Theo Dimitrakos; Yuko Murayama. 9th IFIP International Conference on Trust Management (TM), May 2015, Hamburg, Germany. IFIP Advances in Information and Communication Technology, AICT-454, pp.177-184, 2015, Trust Management IX. 〈10.1007/978-3-319-18491-3_13〉
Liste complète des métadonnées

https://hal.inria.fr/hal-01416224
Contributeur : Hal Ifip <>
Soumis le : mercredi 14 décembre 2016 - 11:09:47
Dernière modification le : mercredi 14 décembre 2016 - 11:15:45
Document(s) archivé(s) le : mercredi 15 mars 2017 - 13:05:45

Fichier

337890_1_En_13_Chapter.pdf
Fichiers produits par l'(les) auteur(s)

Licence


Distributed under a Creative Commons Paternité 4.0 International License

Identifiants

Citation

Alexandru Butoi, Mircea Moca, Nicolae Tomai. Data Confidentiality in Cloud Storage Protocol Based on Secret Sharing Scheme: A Brute Force Attack Evaluation. Christian Damsgaard Jensen; Stephen Marsh; Theo Dimitrakos; Yuko Murayama. 9th IFIP International Conference on Trust Management (TM), May 2015, Hamburg, Germany. IFIP Advances in Information and Communication Technology, AICT-454, pp.177-184, 2015, Trust Management IX. 〈10.1007/978-3-319-18491-3_13〉. 〈hal-01416224〉

Partager

Métriques

Consultations de la notice

103

Téléchargements de fichiers

13