2014 11th International Conference on Information Technology: New Generations 2014
DOI: 10.1109/itng.2014.119
|View full text |Cite
|
Sign up to set email alerts
|

CloudStash: Using Secret-Sharing Scheme to Secure Data, Not Keys, in Multi-clouds

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
13
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 18 publications
(13 citation statements)
references
References 19 publications
0
13
0
Order By: Relevance
“…Alsolami, Fahad, and Terrance E. Boult [14], they proposed the CloudStash scheme, a system that applied the secret-sharing scheme directly on the file to store multi-shares of a file into multi-clouds. CloudStash utilizes secret-sharing, low cost cloud storages and multi-threading to improve confidentiality, availability, performance and fault tolerance.…”
Section: Related Workmentioning
confidence: 99%
“…Alsolami, Fahad, and Terrance E. Boult [14], they proposed the CloudStash scheme, a system that applied the secret-sharing scheme directly on the file to store multi-shares of a file into multi-clouds. CloudStash utilizes secret-sharing, low cost cloud storages and multi-threading to improve confidentiality, availability, performance and fault tolerance.…”
Section: Related Workmentioning
confidence: 99%
“…Encryption and fragmentation techniques offer secure ways to protect data from hackers. Researchers in [6] proposed a cloud stash to split data to multi shares, where threshold shares are required to reconstruct the file. They used multithreading to manage secret sharing in to multiple clouds.…”
Section: Literature Reviewmentioning
confidence: 99%
“…There are many ways to protect data, such as hiding identities of communication parties; however, still let them authenticate each other, encryption and authentication [5]. Moreover, as managing and protecting key is a problem, authors in [6] propose a cloud stash, which splits the files to multi shares, and send it to multiple clouds where the files are reconstructed by the threshold. Whereas, authors in [7] propose a threshold scheme to divide the data in a number of pieces in such a way that the individual pieces do not reveal any information about the data.…”
Section: Introductionmentioning
confidence: 99%
“…Cloudstash [10] applies the secret-sharing scheme directly on the file that spit into multiple shares of secret and then distributed them into multiple clouds simultaneously where shares are required to reconstruct the file. The InterCloud [11] system works by using symmetric encryption on the data and spitting the key into shares using secret sharing scheme.…”
Section: Related Workmentioning
confidence: 99%
“…Although, there are some researchs using the threshold cryptography to provide security for key stored on cloud [10][11][12][13][14], there are no researches attempting to find a suitable threshold for any number of shares distributed. The objective of this paper is, therefore to design and implement a method that is able to assist in finding such values.…”
Section: Introductionmentioning
confidence: 99%