chronization, so its time complexity is constant. Since
the number of iterations of the second phase is con-
stant as well (10), the time complexity of the second
phase is constant.
Of course the bigger is the input, the more are the
resources needed to parallelize Light Blind. Never-
theless, modern devices have more and more CPU,
and consequently they are able to execute more and
more work in parallel, so our algorithm makes a good
use of current architectures.
5 CONCLUSION
In this paper we show an innovative way to make
use of multi-cloud systems and block ciphering to ob-
tain data confidentiality at a constant time complexity.
Our system provides simultaneously ECB paralleliz-
ability and the ability to hide patterns. This is possible
thanks to the key idea of splitting data into multiple
shares that are stored in different clouds.
Light Blind positions between classic encryption
with ECB mode providing confidentiality at a con-
stant time complexity and the ability of hiding pat-
terns provided by other encryption modes such as
CBC and OFB.
Our system benefits to users who do not encrypt
their data stored in the cloud. The constant time com-
plexity of Light Blind makes suitable data to be pro-
tected in a more systematic way. No matter the size
of your data or how often you need it, the overhead
you have to pay to gain confidentiality is small and
predictable.
ACKNOWLEDGEMENTS
This research work has been carried out in the frame-
work of the Technological Research Institute Sys-
temX, and therefore granted with public funds within
the scope of the French Program Investissements
d’avenir.
REFERENCES
Aggarwal, G., Bawa, M., Ganesan, P., Garcia-Molina, H.,
Kenthapadi, K., Motwani, R., Srivastava, U., Thomas,
D., and Xu, Y. (2005). Two can keep a secret: A
distributed architecture for secure database services.
CIDR 2005.
Bohli, J.-M., Gruschka, N., Jensen, M., Iacono, L., and
Marnau, N. (2013). Security and privacy-enhancing
multicloud architectures. Dependable and Secure
Computing, IEEE Transactions on, 10(4):212–224.
Daemen, J. and Rijmen, V. (1998). Aes proposal: Rijndael.
di Vimercati, S. D. C., Erbacher, R. F., Foresti, S., Jajodia,
S., Livraga, G., and Samarati, P. (2014a). Encryption
and fragmentation for data confidentiality in the cloud.
In Foundations of Security Analysis and Design VII,
pages 212–243. Springer.
di Vimercati, S. D. C., Foresti, S., Paraboschi, S., Pelosi,
G., and Samarati, P. (2014b). Protecting access confi-
dentiality with data distribution and swapping.
Ferguson, N., Schneier, B., and Kohno, T. (2011). Cryptog-
raphy Engineering: Design Principles and Practical
Applications. Wiley.
Hadji, M. (2015). A mathematical programming approach
to multi-cloud storage. In Proceedings of the 5th In-
ternational Conference on Cloud Computing and Ser-
vices Science, CLOSER ’15.
Kamara, S. and Lauter, K. (2010). Cryptographic cloud
storage. In Sion, R., Curtmola, R., Dietrich, S., Ki-
ayias, A., Miret, J., Sako, K., and Seb, F., editors,
Financial Cryptography and Data Security, volume
6054 of Lecture Notes in Computer Science, pages
136–149. Springer Berlin Heidelberg.
Mansouri, Y., Toosi, A. N., and Buyya, R. (2013). Broker-
ing algorithms for optimizing the availability and cost
of cloud storage services. In Proceedings of the 2013
IEEE International Conference on Cloud Computing
Technology and Science - Volume 01, CLOUDCOM
’13, Washington, DC, USA. IEEE Computer Society.
Papaioannou, T. G., Bonvin, N., and Aberer, K. (2012).
Scalia: An adaptive scheme for efficient multi-cloud
storage. In Proceedings of the International Confer-
ence on High Performance Computing, Networking,
Storage and Analysis, SC ’12, pages 20:1–20:10, Los
Alamitos, CA, USA. IEEE Computer Society Press.
Qu, Y. and Xiong, N. (2012). Rfh: A resilient, fault-tolerant
and high-efficient replication algorithm for distributed
cloud storage. In Parallel Processing (ICPP), 2012
41st International Conference on, pages 520–529.
Sachdev, A. and Bhansali, M. (2013). Enhancing cloud
computing security using aes algorithm. International
Journal of Computer Applications, 67(9):19–23. Full
text available.
Srivastava, S., Gupta, V., Yadav, R., and Kant, K. (2012).
Enhanced distributed storage on the cloud. In Com-
puter and Communication Technology (ICCCT), 2012
Third International Conference on, pages 321–325.
Stefanov, E. and Shi, E. (2013). Multi-cloud oblivious stor-
age. In Proceedings of the 2013 ACM SIGSAC Confer-
ence on Computer & Communications Security,
CCS ’13, New York, NY, USA. ACM.
Wang, Q., Wang, C., Ren, K., Lou, W., and Li, J. (2011).
Enabling public auditability and data dynamics for
storage security in cloud computing. Parallel and Dis-
tributed Systems, IEEE Transactions on, 22(5).
SECRYPT2015-InternationalConferenceonSecurityandCryptography
368