Robust and Simple N-Party Entangled Authentication Cloud Storage Protocol Based on Secret Sharing Scheme

Hongfeng Zhu, Tianhua Liu, Dan Zhu, Haiyang Li
2013 Journal of Information Hiding and Multimedia Signal Processing  
Entangled cloud storage schemes think in different ways with traditional cloud storage secure schemes which provide high level security to force cloud storage servers for treating equally between normal users and influential users without discrimination. The current work on cloud secure storage mainly considers some low level rules, i.e. access control, fuzzy keyword search, data integrity checking, and identity-based cryptography. However, either these security mechanisms do not consider a
more » ... ectivity of cloud storage administrator (or called a potentially malicious cloud storage provider) to delete your data and even normal users accounts just because you are a normal user. In this paper, techniques are presented which aim at the cloud storage provider must provide the same quality service for each client. We develop a novel scheme, called EACS (entangled authenticated cloud storage), to settle the aforementioned typical problem. Its main idea is to use entangled method for designing a scheme which has four key policies: (i) N-clients can easily entangle their files into a single secret c to be store by a cloud storage provider S; (ii) Using secret c, each client may easily recovery their own original file respectively; (iii) If the server alters c in any way, no clients will be able to retrieve its original file (this policy is called all-or-noting-integrity). (iv) All the parties in the entangled scheme should be authenticated. Finally, we give a full specification of this scheme, including how to realize specific policies, how to design the scheme, how to prove the schemes security.
dblp:journals/jihmsp/ZhuLZL13 fatcat:hlx35t3bn5chdbgxdcn45tyc7u