Data confidentiality in cloud storage protocol based on secret sharing scheme: A brute force attack evaluation

0Citations
Citations of this article
9Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

Outsourcing a company’s data storage and management system increases data security risk and generates a mistrust among adopters, that their data will remain secure and undisclosed. Due to limitations of the SLAs in this direction, the challenge is to build mechanisms that provides data security by design and assures data nondisclosure protection implicitly. In this paper we present an evaluation of the Data Confidentiality in Cloud Storage using a brute-force setup with the aim of studying its effectiveness. Through experimentation on the CloudSim environment we found that the probability of unauthorized data reconstruction can be exponentially decreased by using a sufficiently large number of chunks. Also, increasing the number of used storage volumes leads to a linear decrease of unauthorized data reconstruction.

Cite

CITATION STYLE

APA

Butoi, A., Moca, M., & Tomai, N. (2015). Data confidentiality in cloud storage protocol based on secret sharing scheme: A brute force attack evaluation. In IFIP Advances in Information and Communication Technology (Vol. 454, pp. 177–184). Springer New York LLC. https://doi.org/10.1007/978-3-319-18491-3_13

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free