{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T00:29:41Z","timestamp":1761611381619,"version":"build-2065373602"},"reference-count":24,"publisher":"MDPI AG","issue":"4","license":[{"start":{"date-parts":[[2015,11,24]],"date-time":"2015-11-24T00:00:00Z","timestamp":1448323200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Future Internet"],"abstract":"<jats:p>The Public Key Infrastructure (PKI) is crumbling, partially due to the lack of a strong understanding of how encryption actually works, but also due to weaknesses in its implementation. This paper outlines an Internet storage technique using secret sharing methods which could be used to overcome the problems inherent with PKI, while supporting new types of architectures incorporating such things as automated failover and break-glass data recovery. The paper outlines a novel architecture: SECRET, which supports a robust cloud-based infrastructure with in-built privacy and failover. In order to understand the performance overhead of SECRET, the paper outlines a range of experiments that investigate the overhead of this and other secret share methods.<\/jats:p>","DOI":"10.3390\/fi7040445","type":"journal-article","created":{"date-parts":[[2015,11,24]],"date-time":"2015-11-24T12:08:12Z","timestamp":1448366892000},"page":"445-464","update-policy":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["The Future Internet: A World of Secret Shares"],"prefix":"10.3390","volume":"7","author":[{"given":"William","family":"Buchanan","sequence":"first","affiliation":[{"name":"Centre for Distributed Systems and Security, Edinburgh Napier University, Edinburgh EH10 5DT, UK"}]},{"given":"David","family":"Lanc","sequence":"additional","affiliation":[{"name":"Centre for Distributed Systems and Security, Edinburgh Napier University, Edinburgh EH10 5DT, UK"}]},{"given":"Elochukwu","family":"Ukwandu","sequence":"additional","affiliation":[{"name":"Centre for Distributed Systems and Security, Edinburgh Napier University, Edinburgh EH10 5DT, UK"}]},{"given":"Lu","family":"Fan","sequence":"additional","affiliation":[{"name":"Centre for Distributed Systems and Security, Edinburgh Napier University, Edinburgh EH10 5DT, UK"}]},{"given":"Gordon","family":"Russell","sequence":"additional","affiliation":[{"name":"Centre for Distributed Systems and Security, Edinburgh Napier University, Edinburgh EH10 5DT, UK"}]},{"given":"Owen","family":"Lo","sequence":"additional","affiliation":[{"name":"Centre for Distributed Systems and Security, Edinburgh Napier University, Edinburgh EH10 5DT, UK"}]}],"member":"1968","published-online":{"date-parts":[[2015,11,24]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Abbadi, I.M. (2014). Cloud Management and Security, John Wiley & Sons Ltd.","DOI":"10.1002\/9781118817087"},{"key":"ref_2","unstructured":"Buchanan, W.J. Storing The Keys to your House Under a Plant Pot. Available online: https:\/\/linproxy.fan.workers.dev:443\/https\/www.linkedin.com\/pulse\/storing-keys-your-house-under-plant-pot-william-buchanan."},{"key":"ref_3","unstructured":"Zeng, L., Chen, S., Wei, Q., and Feng, D. (November, January 31). Sedas: A self-destructing data system based on active storage framework. Proceedings of the 2012 Digest APMRC, Singapore."},{"key":"ref_4","unstructured":"Cipra, B.A. (1993). The Ubiquitous Reed-Solomon Codes, SIAM."},{"key":"ref_5","unstructured":"Morozan, I. Multi-Clouds Database: A New Model to Provide Security in Cloud Computing. Available online: https:\/\/linproxy.fan.workers.dev:443\/https\/www.researchgate.net\/publication\/273136522."},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Dodis, Y. (2000). Exposure-Resilient Cryptography. [PhD Thesis, Massachusetts Institute of Technology].","DOI":"10.1007\/3-540-44987-6_19"},{"key":"ref_7","first-page":"268","article-title":"Three Major Security Issues in Single Cloud Environment","volume":"4","author":"Patel","year":"2014","journal-title":"Int. J. Adv. Res. Comput. Sci. Software Eng."},{"key":"ref_8","first-page":"47","article-title":"Survey of Cloud Security Techniques","volume":"3","author":"Padsala","year":"2015","journal-title":"Int. J. Res. Appl. Sci. Eng. Technol."},{"key":"ref_9","first-page":"83","article-title":"Optimized Multi-Clouds using Shamir Shares","volume":"1","author":"Mounica","year":"2013","journal-title":"Int. J. Dev. Comput. Sci. Technol."},{"key":"ref_10","first-page":"15","article-title":"Secured Data Storage and Retrieval in Multi-Cloud using Shamir\u2019s Secret Sharing Algorithm","volume":"2","author":"Bharambe","year":"2013","journal-title":"Int. J. Comput. Sci. Eng."},{"key":"ref_11","first-page":"910","article-title":"A Single to Multi-Cloud Security based on Secret Sharing Algorithm","volume":"1","author":"Mallareddy","year":"2014","journal-title":"Int. J. Res."},{"key":"ref_12","first-page":"103","article-title":"The Security of Cloud Computing System Enabled by Shamir\u2019s Secret Sharing Algorithm","volume":"1","author":"Padmavathi","year":"2014","journal-title":"Int. J. Res. Stud. Sci. Eng. Technol."},{"key":"ref_13","first-page":"362","article-title":"A Shamir Secret Based Secure Data sharing between Data owners","volume":"16","author":"Makkena","year":"2014","journal-title":"Int. J. Eng. Trends Technol."},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Beimel, A., Chee, Y.M., Guo, Z., Ling, S., Shao, F., Tang, Y., Wang, H., and Xing, C. (2011). Secret-Sharing Schemes: A Survey, Springer.","DOI":"10.1007\/978-3-642-20901-7_2"},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"612","DOI":"10.1145\/359168.359176","article-title":"How to share a secret","volume":"22","author":"Shamir","year":"1979","journal-title":"Commun. ACM"},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"335","DOI":"10.1145\/62044.62050","article-title":"Efficient Dispersal of Information for Security, Load Balancing and Fault Tolerance","volume":"36","author":"Rabin","year":"1989","journal-title":"J. ACM"},{"key":"ref_17","unstructured":"Krawczyk, H. (1993, January 22\u201326). Secret Sharing Made Short. Proceedings of the 13th Annual International Cryptology Conference on Advances in Cryptology, Santa Barbara, CA, USA."},{"key":"ref_18","unstructured":"Resch, J., and Plank, J. (2011, January 15\u201317). AONT-RS: Blending Security and Performance in Dispersed Storage Systems. Proceedings of the 9th USENIX on File and Storage Technologies, San Jose, CA, USA."},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Rabin, T., and Ben-Or, M. (1989, January 14\u201317). Verifiable secret sharing and multiparty protocols with honest majority. Proceedings of the Annual ACM Symposium on Theory of Computing, Seattle, WA, USA.","DOI":"10.1145\/73007.73014"},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"249","DOI":"10.1049\/iet-ifs.2011.0201","article-title":"Critical survey of existing publicly verifiable secret sharing schemes","volume":"6","author":"Peng","year":"2012","journal-title":"Inf. Secur."},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Ermakova, T., and Fabian, B. (2013, January 15\u201318). Secret sharing for health data in multi-provider clouds. Proceedings of the 2013 IEEE 15th Conference on Business Informatics (CBI), Vienna, Austria.","DOI":"10.1109\/CBI.2013.22"},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"132","DOI":"10.1016\/j.is.2014.05.004","article-title":"Collaborative and secure sharing of healthcare data in multi-clouds","volume":"48","author":"Fabian","year":"2015","journal-title":"Inf. Syst."},{"key":"ref_23","unstructured":"Srinivasan, S. (July, January 30). Building Trust in Cloud Computing: Challenges in the midst of outages. Proceedings of the Informing Science & IT Education Conference (InSITE), Wollongong, Australia."},{"key":"ref_24","first-page":"39","article-title":"Disaster recovery in cloud computing: A survey","volume":"7","author":"Khoshkholghi","year":"2014","journal-title":"Comput. Inf. Sci."}],"container-title":["Future Internet"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/www.mdpi.com\/1999-5903\/7\/4\/445\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T20:52:41Z","timestamp":1760215961000},"score":1,"resource":{"primary":{"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/www.mdpi.com\/1999-5903\/7\/4\/445"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,11,24]]},"references-count":24,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2015,12]]}},"alternative-id":["fi7040445"],"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.3390\/fi7040445","relation":{},"ISSN":["1999-5903"],"issn-type":[{"type":"electronic","value":"1999-5903"}],"subject":[],"published":{"date-parts":[[2015,11,24]]}}}