Anti-hacker team develops data sharing scheme for cloud storage

December 21, 2018, South Ural State University
SUSU students. Credit: SUSU

In cloud computing, there is still a pressing issue of data security. Scientists from the Laboratory of Problem-Oriented Cloud Computing at South Ural State University have developed an algorithm of improving information security, which allows to avoid providers' conspiracy.

For several years, the relevant methods of ensuring security in have been studied by the SUSU scientists, members of the international team supervised by Andrei Tchernykh, Head of the Laboratory of Problem-Oriented Cloud Computing Environments at the University and Director of the Laboratory at the Centre for Scientific Research and Higher Education at Ensenada, Mexico.

"There exist different methods of ensuring , like cryptography. With the appearance of cloud computing, distributed , and information saving in cloud computing, we also get a problem of how to save information stored in a cloud," explains Andrei Tchernykh.

One of the main problems is putting trust in a , along with guaranteeing confidentiality, integrity, authenticity and fail-safety of information at all stages of its existence, as well as with smoothness of operation, protection against unauthorised access, and saving of users' personal data transferred and processed via a cloud. Moreover, experts claim that there exists a risk of a cloud providers' collusion.

Prof. Andrei Tchernykh. Credit: SUSU

The international team of researchers has managed to close access to information in case of such a "collusion." The article, published in the International Journal of Approximate Reasoning (listed in Q1 of Scopus scientometrical database), suggested a mechanism of double coding of information.

"We have proved that the developed algorithm complies with the formal definition of computing security. If the conspirators do not know the secret key, the chance of getting to the secret is minimal. This solution is reliable when it comes to protection against insiders; even if you have access to some part on the inside, you won't be able to obtain the complete information," states Andrei Tchernykh.

The existing reliable systems that are next-to-impossible to be hacked are overly redundant, as when standard coding methods are used, the volume of information has to be increased so that it could not be restored from separate chunks. This requires additional financial expenses. The algorithm suggested by the SUSU scientists and their partners is less redundant but still solves the security problem.

To test the feasibility of the suggested approach, an experiment is being designed, which will allow for simultaneous use of up to 10 cloud resources to store data. To read the data, the system will retrieve them upon a user's click. Such an approach will ensure automatic distribution of the user's data among a number of cloud services while improving the and reliability of cloud storage.

Explore further: Study: How to calculate pricing and resources for cloud computing

More information: Andrei Tchernykh et al. AC-RRNS: Anti-collusion secured data sharing scheme for cloud storage, International Journal of Approximate Reasoning (2018). DOI: 10.1016/j.ijar.2018.07.010

Related Stories

How secure is your data when it's stored in the cloud?

January 25, 2018

As cloud storage becomes more common, data security is an increasing concern. Companies and schools have been increasing their use of services like Google Drive for some time, and lots of individual users also store files ...

Head for the clouds, feet firmly on the ground

March 5, 2012

Computer engineers in the US writing in the International Journal of Communication Networks and Distributed Systems have reviewed the research literature to get a clear picture of cloud computing, its adoption, use and the ...

Detecting malicious files uploaded to cloud services

August 12, 2015

A powerful new computer security tool, called XDet, can detect malicious files being uploaded to a cloud computing service is reported this month in the International Journal of Space-Based and Situated Computing by researchers ...

Is fog more secure than cloud?

March 17, 2017

Computer scientists in Italy are working on a new concept for remote and distributed storage of documents that could have all the benefits of cloud computing but without the security issues of putting one's sensitive documents ...

Recommended for you

Researchers engineer a tougher fiber

February 22, 2019

North Carolina State University researchers have developed a fiber that combines the elasticity of rubber with the strength of a metal, resulting in a tougher material that could be incorporated into soft robotics, packaging ...

A quantum magnet with a topological twist

February 22, 2019

Taking their name from an intricate Japanese basket pattern, kagome magnets are thought to have electronic properties that could be valuable for future quantum devices and applications. Theories predict that some electrons ...

0 comments

Please sign in to add a comment. Registration is free, and takes less than a minute. Read more

Click here to reset your password.
Sign in to get notified via email when new comments are made.