Research Seminar : New Results on Secret Sharing-Based Data Outsourcing
Presented by Dr (Linda) Zhaohui Tang
|Date:||08 July 2020|
|Time:||12:00 PM - 1:30 PM|
|Contact:||For more information, please contact Xiaohui Tao.|
|Save to calendar:||Download|
Despite the huge benefits offered by cloud storage technologies such as low cost, high storage and processing capacity, people are still hesitating to store their (confidential) data to a public cloud server due to their security and privacy concerns. One approach of solving data confidentiality issue in data outsourcing is through traditional encryption which is computationally expensive and faces a big challenge if further complex processing is required because decryption is needed prior to further processing. Homomorphic encryption has therefore been introduced where intermediaries or end users are able to further process encrypted data without decrypting it. Nevertheless, the practicality of homomorphic encryption is still arguable because an efficient homomorphic encryption does not always exist for all computations.
An alternative approach, secret sharing based data outsourcing, has been recently proposed to overcome the challenges faced by encryption-based schemes. Under this approach, each cloud server is given a random share of the secret (i.e., Data Owner’s confidential data); a group of servers are able to reconstruct the secret if and only if they possess a sufficient amount of shares (instead of privately-owned keys in encryption-based schemes). Further processing is possible based on the shares without the need of decryption.
The secret sharing-based approach is relatively less studied. In this work we revisit this approach and propose a new method to resolve some common vulnerabilities in existing secret-sharing based data outsourcing schemes.
Short bio: Dr. (Linda) Zhaohui TANG obtained her PhD in Information Security from the Nanyang Technological University, Singapore. Dr. Tang is particularly interested in the research area of Internet-of-Things (IoT) Security where the solution has to be not only secure but also efficient considering the resource constraints at the low-end IoT devices. Before moving to USQ, Dr. Tang worked in Singapore as an academic with experience of securing research grants in the Cybersecurity area.