Layered Security for Storage at the Edge: On Decentralized Multi-factor Access Control

In this paper we propose a protocol that allows end-users in a decentralized setup (without requiring any trusted third party) to protect data shipped to remote servers using two factors - knowledge (passwords) and possession (a time based one time password generation for authentication) that is por...

Full description

Saved in:
Bibliographic Details
Main Authors: Esiner, Ertem, Datta, Anwitaman
Other Authors: School of Computer Science and Engineering
Format: Conference or Workshop Item
Language:English
Published: 2017
Subjects:
Online Access:https://hdl.handle.net/10356/81018
http://hdl.handle.net/10220/43444
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Nanyang Technological University
Language: English
id sg-ntu-dr.10356-81018
record_format dspace
spelling sg-ntu-dr.10356-810182020-03-07T11:48:45Z Layered Security for Storage at the Edge: On Decentralized Multi-factor Access Control Esiner, Ertem Datta, Anwitaman School of Computer Science and Engineering Proceedings of the 17th International Conference on Distributed Computing and Networking (ICDCN '16) Layered security Multi-factor access control In this paper we propose a protocol that allows end-users in a decentralized setup (without requiring any trusted third party) to protect data shipped to remote servers using two factors - knowledge (passwords) and possession (a time based one time password generation for authentication) that is portable. The protocol also supports revocation and recreation of a new possession factor if the older possession factor is compromised, provided the legitimate owner still has a copy of the possession factor. Furthermore, akin to some other recent works, our approach naturally protects the outsourced data from the storage servers themselves, by application of encryption and dispersal of information across multiple servers. We also extend the basic protocol to demonstrate how collaboration can be supported even while the stored content is encrypted, and where each collaborator is still restrained from accessing the data through a multi-factor access mechanism. Such techniques achieving layered security is crucial to (opportunistically) harness storage resources from untrusted entities. MOE (Min. of Education, S’pore) Accepted version 2017-07-26T02:26:29Z 2019-12-06T14:19:40Z 2017-07-26T02:26:29Z 2019-12-06T14:19:40Z 2016 Conference Paper Esiner, E., & Datta, A. (2016). Layered Security for Storage at the Edge: On Decentralized Multi-factor Access Control. Proceedings of the 17th International Conference on Distributed Computing and Networking, 9-. https://hdl.handle.net/10356/81018 http://hdl.handle.net/10220/43444 10.1145/2833312.2833452 en © 2016 ACM. This is the author created version of a work that has been peer reviewed and accepted for publication by Proceedings of the 17th International Conference on Distributed Computing and Networking, ACM. It incorporates referee’s comments but changes resulting from the publishing process, such as copyediting, structural formatting, may not be reflected in this document. The published version is available at: [http://dx.doi.org/10.1145/2833312.2833452]. 10 p. application/pdf
institution Nanyang Technological University
building NTU Library
country Singapore
collection DR-NTU
language English
topic Layered security
Multi-factor access control
spellingShingle Layered security
Multi-factor access control
Esiner, Ertem
Datta, Anwitaman
Layered Security for Storage at the Edge: On Decentralized Multi-factor Access Control
description In this paper we propose a protocol that allows end-users in a decentralized setup (without requiring any trusted third party) to protect data shipped to remote servers using two factors - knowledge (passwords) and possession (a time based one time password generation for authentication) that is portable. The protocol also supports revocation and recreation of a new possession factor if the older possession factor is compromised, provided the legitimate owner still has a copy of the possession factor. Furthermore, akin to some other recent works, our approach naturally protects the outsourced data from the storage servers themselves, by application of encryption and dispersal of information across multiple servers. We also extend the basic protocol to demonstrate how collaboration can be supported even while the stored content is encrypted, and where each collaborator is still restrained from accessing the data through a multi-factor access mechanism. Such techniques achieving layered security is crucial to (opportunistically) harness storage resources from untrusted entities.
author2 School of Computer Science and Engineering
author_facet School of Computer Science and Engineering
Esiner, Ertem
Datta, Anwitaman
format Conference or Workshop Item
author Esiner, Ertem
Datta, Anwitaman
author_sort Esiner, Ertem
title Layered Security for Storage at the Edge: On Decentralized Multi-factor Access Control
title_short Layered Security for Storage at the Edge: On Decentralized Multi-factor Access Control
title_full Layered Security for Storage at the Edge: On Decentralized Multi-factor Access Control
title_fullStr Layered Security for Storage at the Edge: On Decentralized Multi-factor Access Control
title_full_unstemmed Layered Security for Storage at the Edge: On Decentralized Multi-factor Access Control
title_sort layered security for storage at the edge: on decentralized multi-factor access control
publishDate 2017
url https://hdl.handle.net/10356/81018
http://hdl.handle.net/10220/43444
_version_ 1681035450554253312