{"title":"Secure Data Sharing with Fast Access Revocation through Untrusted Clouds","authors":"K. Kapusta, Han Qiu, G. Memmi","doi":"10.1109/NTMS.2019.8763850","DOIUrl":null,"url":null,"abstract":"With the introduction of recent regulations concerning data privacy, encrypting data before uploading it to a public cloud becomes a widespread approach. Such processing reinforces data confidentiality but raises a challenge for efficient access revocation. In this paper, we introduce a conceptual multi-cloud architecture supporting a fast access revocation of outsourced data. The proposed data processing method is based on a combination of encryption, all-or-nothing transformation, and data dispersal. Theoretical and experimental evaluations show that our technique is the fastest among the state-of-the- art solutions.","PeriodicalId":368680,"journal":{"name":"2019 10th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 10th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/NTMS.2019.8763850","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 6
Abstract
With the introduction of recent regulations concerning data privacy, encrypting data before uploading it to a public cloud becomes a widespread approach. Such processing reinforces data confidentiality but raises a challenge for efficient access revocation. In this paper, we introduce a conceptual multi-cloud architecture supporting a fast access revocation of outsourced data. The proposed data processing method is based on a combination of encryption, all-or-nothing transformation, and data dispersal. Theoretical and experimental evaluations show that our technique is the fastest among the state-of-the- art solutions.