2015 IEEE 7th International Conference on Cloud Computing Technology and Science (CloudCom) 2015
DOI: 10.1109/cloudcom.2015.71
|View full text |Cite
|
Sign up to set email alerts
|

ARCHISTAR: Towards Secure and Robust Cloud Based Data Sharing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
12
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
6
2

Relationship

1
7

Authors

Journals

citations
Cited by 29 publications
(12 citation statements)
references
References 22 publications
0
12
0
Order By: Relevance
“…Overview. ARCHISTAR is a framework for secure distributed data storage and sharing in the cloud, it constitutes a system that applies Secret Sharing to a multi-cloud setting, meaning that the user's data is divided into "chunks" which are distributed to separate clouds/storage nodes [14]. This implies that an incident at a single cloud/node will not cause the data to be lost, stolen or tampered with.…”
Section: Hcip3 Secret Sharing Configuration Preferencesmentioning
confidence: 99%
See 1 more Smart Citation
“…Overview. ARCHISTAR is a framework for secure distributed data storage and sharing in the cloud, it constitutes a system that applies Secret Sharing to a multi-cloud setting, meaning that the user's data is divided into "chunks" which are distributed to separate clouds/storage nodes [14]. This implies that an incident at a single cloud/node will not cause the data to be lost, stolen or tampered with.…”
Section: Hcip3 Secret Sharing Configuration Preferencesmentioning
confidence: 99%
“…The availability of cloud services is commonly expressed in percentage of uptime -or number of "leading nines" [15]. A typical cloud service availability rate is 99.9%, or three nines [14], which constitutes a downtime of 8.76 hours per year. From that point on, three main categories for setting up the configuration preferences are set and are focusing on: "Cost Minimization", "Data Confidentiality Maximization" and "Data Availability Maximization", which constitute the 3 packages/categories of this pattern.…”
Section: Hcip3 Secret Sharing Configuration Preferencesmentioning
confidence: 99%
“…Loruenser et al [7] presented an architecture for secure cloudbased data sharing known as ARCHISTAR based on secret sharing scheme. The focus of the system is on providing adequate confidentiality to data; make it available against any active attacks as well as robust even in the face of failures.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Here, the information is split into a number of shares [12], of which any subset of a fixed number allows the reconstruction of the original data. This approach is keyless and removes many obstacles in the area of usability and group key management [10]. Additionally it is capable to provide long-term security and everlasting privacy, which is very interesting for archiving of sensitive data.…”
Section: Cryptographic Toolsmentioning
confidence: 99%