A Novel Multi-Secret Sharing Approach for Secure Data Warehousing and On-Line Analysis Processing in the Cloud

Author:

Attasena Varunya1,Harbi Nouria1,Darmont Jérôme1

Affiliation:

1. Université de Lyon (Laboratoire ERIC), Lyon, France

Abstract

Cloud computing helps reduce costs, increase business agility and deploy solutions with a high return on investment for many types of applications, including data warehouses and on-line analytical processing. However, storing and transferring sensitive data into the cloud raises legitimate security concerns. In this paper, the authors' propose a new multi-secret sharing approach for deploying data warehouses in the cloud and allowing on-line analysis processing, while enforcing data privacy, integrity and availability. The authors' first validate the relevance of their approach theoretically and then experimentally with both a simple random dataset and the Star Schema Benchmark. The authors also demonstrate its superiority to related methods.

Publisher

IGI Global

Subject

Hardware and Architecture,Software

Reference31 articles.

1. A modular approach to key safeguarding

2. Attasena, V., Harbi, N., & Darmont, J. (2013) Sharing-based Privacy and Availability of Cloud Data Warehouses. 9th French-speaking days on Data Warehouse and On-line Analysis (EDA 2013), Blois, France: RNTI, B-9.17-32.

3. Incremental Cryptography: The Case of Hashing and Signing. Advances in Cryptology (CRYPTO’94);M.Bellare;LNCS,1994

4. Safeguarding Cryptographic Keys.;G. R.Blakley;1979 AFIPS National Computer Conference, Monval, NJ, USA.,1979

5. Proofs of Retrievability: Theory and Implementation.;K. D.Bowers;1st ACM Workshop on Cloud Computing Security (CCSW’09),2009

Cited by 15 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. Secret sharing: A comprehensive survey, taxonomy and applications;Computer Science Review;2024-02

2. A Data Obfuscation Method Using Ant-Lion-Rider Optimization for Privacy Preservation in the Cloud;International Journal of Distributed Systems and Technologies;2022-05-20

3. fVSS-Based Secure Database for IoT Cloud Platform;2022 Joint International Conference on Digital Arts, Media and Technology with ECTI Northern Section Conference on Electrical, Electronics, Computer and Telecommunications Engineering (ECTI DAMT & NCON);2022-01-26

4. Efficient information-theoretically secure schemes for cloud data outsourcing;Cluster Computing;2021-07-02

5. Rings for Privacy: An Architecture for Large Scale Privacy-Preserving Data Mining;IEEE Transactions on Parallel and Distributed Systems;2021-06-01

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3