Two-factor authentication for trusted third party free dispersed storage

We propose a trusted third party free protocol for secure (in terms of content access, manipulation, and confidentiality) data storage and multi-user collaboration over an infrastructure of untrusted storage servers. It is achieved by the application of data dispersal, encryption as well as two-fact...

Full description

Bibliographic Details
Main Authors: Esiner, Ertem, Datta, Anwitaman
Other Authors: School of Computer Science and Engineering
Format: Journal Article
Language:English
Published: 2019
Subjects:
Online Access:https://hdl.handle.net/10356/104249
http://hdl.handle.net/10220/50219
_version_ 1826118699098046464
author Esiner, Ertem
Datta, Anwitaman
author2 School of Computer Science and Engineering
author_facet School of Computer Science and Engineering
Esiner, Ertem
Datta, Anwitaman
author_sort Esiner, Ertem
collection NTU
description We propose a trusted third party free protocol for secure (in terms of content access, manipulation, and confidentiality) data storage and multi-user collaboration over an infrastructure of untrusted storage servers. It is achieved by the application of data dispersal, encryption as well as two-factor (knowledge and possession) based authentication and access control techniques so that unauthorized parties (attackers) or a small set of colluding servers cannot gain access to the stored data. The protocol design takes into account usability issues as opposed to the closest prior work Esiner and Datta (2016). We explore the security implications of the proposed model with event tree analysis and report on experiment results to demonstrate the practicality of the approach concerning computational overheads. Given that the protocol does not rely on any trusted third party, and most operations including actual collaboration do not require users to be online simultaneously, it is suitable not only for traditional multi-cloud setups but also for edge/fog computing environments.
first_indexed 2024-10-01T04:47:44Z
format Journal Article
id ntu-10356/104249
institution Nanyang Technological University
language English
last_indexed 2024-10-01T04:47:44Z
publishDate 2019
record_format dspace
spelling ntu-10356/1042492020-03-07T11:50:49Z Two-factor authentication for trusted third party free dispersed storage Esiner, Ertem Datta, Anwitaman School of Computer Science and Engineering Engineering::Computer science and engineering Two-factor Access Control Layered Security We propose a trusted third party free protocol for secure (in terms of content access, manipulation, and confidentiality) data storage and multi-user collaboration over an infrastructure of untrusted storage servers. It is achieved by the application of data dispersal, encryption as well as two-factor (knowledge and possession) based authentication and access control techniques so that unauthorized parties (attackers) or a small set of colluding servers cannot gain access to the stored data. The protocol design takes into account usability issues as opposed to the closest prior work Esiner and Datta (2016). We explore the security implications of the proposed model with event tree analysis and report on experiment results to demonstrate the practicality of the approach concerning computational overheads. Given that the protocol does not rely on any trusted third party, and most operations including actual collaboration do not require users to be online simultaneously, it is suitable not only for traditional multi-cloud setups but also for edge/fog computing environments. Accepted version 2019-10-22T08:10:02Z 2019-12-06T21:29:01Z 2019-10-22T08:10:02Z 2019-12-06T21:29:01Z 2018 Journal Article Esiner, E., & Datta, A. (2019). Two-factor authentication for trusted third party free dispersed storage. Future Generation Computer Systems, 90, 291-306. doi:10.1016/j.future.2018.08.001 0167-739X https://hdl.handle.net/10356/104249 http://hdl.handle.net/10220/50219 10.1016/j.future.2018.08.001 en Future Generation Computer Systems © 2018 Elsevier B.V. All rights reserved. This paper was published in Future Generation Computer Systems and is made available with permission of Elsevier B.V. 46 p. application/pdf
spellingShingle Engineering::Computer science and engineering
Two-factor Access Control
Layered Security
Esiner, Ertem
Datta, Anwitaman
Two-factor authentication for trusted third party free dispersed storage
title Two-factor authentication for trusted third party free dispersed storage
title_full Two-factor authentication for trusted third party free dispersed storage
title_fullStr Two-factor authentication for trusted third party free dispersed storage
title_full_unstemmed Two-factor authentication for trusted third party free dispersed storage
title_short Two-factor authentication for trusted third party free dispersed storage
title_sort two factor authentication for trusted third party free dispersed storage
topic Engineering::Computer science and engineering
Two-factor Access Control
Layered Security
url https://hdl.handle.net/10356/104249
http://hdl.handle.net/10220/50219
work_keys_str_mv AT esinerertem twofactorauthenticationfortrustedthirdpartyfreedispersedstorage
AT dattaanwitaman twofactorauthenticationfortrustedthirdpartyfreedispersedstorage