Selective all-or-nothing transform: Protecting outsourced data against key exposure

Katarzyna Kapusta, Gerard Memmi

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

This paper presents the selective all-or-nothing transform (SAONT). It addresses the needs of users who would like to use inexpensive cloud storage services, but do not trust their providers. Encrypted data are transformed and separated into a small private fragment kept on the user’s device and a large public fragment which can be securely uploaded to a public cloud since decryption of the public fragment is infeasible without the private fragment. Therefore, outsourced data are protected even in a situation of key exposure. SAONT reduces performance overhead by combining block-wise fragmentation of a ciphertext with an application of an all-or-nothing transform only on a subset of the ciphertext.

Original languageEnglish
Title of host publicationCyberspace Safety and Security - 10th International Symposium, CSS 2018, Proceedings
EditorsArcangelo Castiglione, Francesco Palmieri, Massimo Ficco, Florin Pop
PublisherSpringer Verlag
Pages181-193
Number of pages13
ISBN (Print)9783030016883
DOIs
Publication statusPublished - 1 Jan 2018
Externally publishedYes
Event10th International Symposium on Cyberspace Safety and Security, CSS 2018 - Amalfi, Italy
Duration: 29 Oct 201831 Oct 2018

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume11161 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference10th International Symposium on Cyberspace Safety and Security, CSS 2018
Country/TerritoryItaly
CityAmalfi
Period29/10/1831/10/18

Keywords

  • All-or-nothing transform
  • Cloud storage
  • Data protection
  • Fragmentation
  • Key exposure

Fingerprint

Dive into the research topics of 'Selective all-or-nothing transform: Protecting outsourced data against key exposure'. Together they form a unique fingerprint.

Cite this