Please use this identifier to cite or link to this item: http://hdl.handle.net/20.500.12258/2856
Title: AC-RRNS: Anti-collusion secured data sharing scheme for cloud storage
Authors: Babenko, M. G.
Бабенко, М. Г.
Chervyakov, N. I.
Червяков, Н. И.
Kuchukov, V. A.
Кучуков, В. А.
Deryabin, M. A.
Дерябин, М. А.
Kucherov, N. N.
Кучеров, Н. Н.
Keywords: Cloud computing;Collusion;Multi-clouds;Residue number system (RNS);Secret sharing schemes;Uncertainty
Issue Date: 2018
Publisher: Elsevier Inc.
Citation: Tchernykh, A., Babenko, M., Chervyakov, N., Miranda-López, V., Kuchukov, V., Cortés-Mendoza, J.M., Deryabin, M., Kucherov, N., Radchenko, G., Avetisyan, A. AC-RRNS: Anti-collusion secured data sharing scheme for cloud storage // International Journal of Approximate Reasoning. - 2018. - Volume 102. - Pages 60-73
Series/Report no.: International Journal of Approximate Reasoning
Abstract: Cloud security issues are important factors for data storage and processing. Apart from the existing security and reliability problems of traditional distributed computing, there are new security and reliability problems. They include attacks on a virtual machine, attacks on the synchronization keys, and so on. According to the assessment of international experts in the field of cloud security, there are risks of cloud collusion under uncertain conditions. To mitigate this type of uncertainty and reduce harms it can cause, we propose AC-RRNS algorithm based on modified threshold Asmuth–Bloom and Mignotte secret sharing schemes. We prove that the algorithm satisfies the formal definition of computational security. If the adversary coalition knows the secret shares, but does not know the secret key, the probability to obtain the secret is less than 1/(2l⋅(k−1)(2l−k−1)). The probability is less than 1/2(l−1) with unknown secret shares and known secret key, and 1/2l⋅k with unknown secret key. Its complexity is equal to brute-force method. We demonstrate that the proposed scheme ensures security under several types of attacks. We propose approaches for selection of parameters for AC-RRNS secret sharing scheme to optimize the system behavior and data redundancy of encryption
URI: https://www.scopus.com/record/display.uri?eid=2-s2.0-85051667005&origin=resultslist&sort=plf-f&src=s&nlo=1&nlr=20&nls=afprfnm-t&affilName=North+Caucasus+Federal+University&sid=10b1f77d2c763d6e07c4167e3be12c85&sot=afnl&sdt=cl&cluster=scopubyr%2c%222018%22%2ct&sl=53&s=%28AF-ID%28%22North+Caucasus+Federal+University%22+60070541%29%29&relpos=0&citeCnt=0&searchTerm=#
http://hdl.handle.net/20.500.12258/2856
Appears in Collections:Статьи, проиндексированные в SCOPUS, WOS

Files in This Item:
File Description SizeFormat 
scopusresults 216 .pdf62.87 kBAdobe PDFThumbnail
View/Open
WoS 285 .pdf105.11 kBAdobe PDFThumbnail
View/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.