YI Cloud: Improving user privacy with secret key recovery in cloud storage

Zheng Huang*, Qiang Li, Dong Zheng, Kefei Chen, Xiang Xue Li

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

7 Scopus citations

Abstract

Cloud Storage systems provide user a safe and consistent place to save user's valuable data and documents. However, user's files are not encrypted on some open source cloud storage systems, such as Hadoop and Sector. The storage service provider can easily access the user's files. This brings a big concern about user's privacy. This paper describes a cloud storage system named YI Cloud. This system allows the users to encrypt their files in the cloud storage. User's primary encryption key is shared between trusted entities using secret sharing algorithm. The primary key can be recovered when the user loses it. User's privacy is protected because user's files are encrypted in cloud storage. Using secret sharing algorithm, the YI Cloud also decreases the risk that user may lose all his/her encrypted files if he/she loses the encryption key.

Original languageEnglish
Title of host publicationProceedings - 6th IEEE International Symposium on Service-Oriented System Engineering, SOSE 2011
Pages268-272
Number of pages5
DOIs
StatePublished - 2011
Event6th IEEE International Symposium on Service-Oriented System Engineering, SOSE 2011 - Irvine, CA, United States
Duration: 12 Dec 201114 Dec 2011

Publication series

NameProceedings - 6th IEEE International Symposium on Service-Oriented System Engineering, SOSE 2011

Conference

Conference6th IEEE International Symposium on Service-Oriented System Engineering, SOSE 2011
Country/TerritoryUnited States
CityIrvine, CA
Period12/12/1114/12/11

Keywords

  • Cloud Storage
  • Key Recovery
  • Privacy
  • Secret Sharing

Fingerprint

Dive into the research topics of 'YI Cloud: Improving user privacy with secret key recovery in cloud storage'. Together they form a unique fingerprint.

Cite this