{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,11]],"date-time":"2026-02-11T13:43:01Z","timestamp":1770817381661,"version":"3.50.1"},"reference-count":25,"publisher":"Emerald","issue":"5","license":[{"start":{"date-parts":[[2019,11,11]],"date-time":"2019-11-11T00:00:00Z","timestamp":1573430400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["ICS"],"published-print":{"date-parts":[[2019,11,11]]},"abstract":"<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Purpose<\/jats:title>\n<jats:p>The purpose of this paper is to develop a usable configuration management for Archistar, which utilizes secret sharing for redundantly storing data over multiple independent storage clouds in a secure and privacy-friendly manner. Selecting the optimal secret sharing parameters, cloud storage servers and other settings for securely storing the secret data shares, while meeting all of end user\u2019s requirements and other restrictions, is a complex task. In particular, complex trade-offs between different protection goals and legal privacy requirements need to be made.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Design\/methodology\/approach<\/jats:title>\n<jats:p>A human-centered design approach with structured interviews and cognitive walkthroughs of user interface mockups with system administrators and other technically skilled users was used.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Findings<\/jats:title>\n<jats:p>Even technically skilled users have difficulties to adequately select secret sharing parameters and other configuration settings for adequately securing the data to be outsourced.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Practical implications<\/jats:title>\n<jats:p>Through these automatic settings, not only system administrators but also non-technical users will be able to easily derive suitable configurations.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Originality\/value<\/jats:title>\n<jats:p>The authors present novel human computer interaction (HCI) guidelines for a usable configuration management, which propose to automatically set configuration parameters and to solve trade-offs based on the type of data to be stored in the cloud. Through these automatic settings, not only system administrators but also non-technical users will be able to easily derive suitable configurations.<\/jats:p>\n<\/jats:sec>","DOI":"10.1108\/ics-01-2019-0016","type":"journal-article","created":{"date-parts":[[2019,10,9]],"date-time":"2019-10-09T05:25:47Z","timestamp":1570598747000},"page":"647-667","source":"Crossref","is-referenced-by-count":9,"title":["Making secret sharing based cloud storage usable"],"prefix":"10.1108","volume":"27","author":[{"given":"Erik","family":"Framner","sequence":"first","affiliation":[]},{"given":"Simone","family":"Fischer-H\u00fcbner","sequence":"additional","affiliation":[]},{"given":"Thomas","family":"Lor\u00fcnser","sequence":"additional","affiliation":[]},{"given":"Ala Sarah","family":"Alaqra","sequence":"additional","affiliation":[]},{"given":"John S\u00f6ren","family":"Pettersson","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"key":"key2020040109442948800_ref001","first-page":"5490","article-title":"Cloud computing security: from single to multi-clouds","volume-title":"Proceedings of the Annual HI International Conference on System Sciences","year":"2012"},{"key":"key2020040109442948800_ref002","first-page":"1241","article-title":"Multi-objective decision support for brokering of cloud SLA","volume-title":"Proceedings \u2013 27th International Conference on Advanced Information Networking and Applications Workshops, WAINA 2013","year":"2013"},{"key":"key2020040109442948800_ref003","first-page":"149","article-title":"Decision support for application migration to the cloud \u2013 challenges and vision","volume-title":"Proceedings of the 3rd International Conference on Cloud Computing and Services Science \u2013 Volume 1: CLOSER","year":"2013"},{"key":"key2020040109442948800_ref004","first-page":"1","article-title":"CloudDSF \u2013 the cloud decision support framework for application migration","year":"2014"},{"issue":"5","key":"key2020040109442948800_ref005","doi-asserted-by":"crossref","first-page":"657","DOI":"10.1007\/s00778-017-0470-9","article-title":"Secret sharing for cloud data security: a survey","volume":"26","year":"2017","journal-title":"The VLDB Journal"},{"key":"key2020040109442948800_ref006","first-page":"7","article-title":"Cloudstep: a step-by-step decision process to support legacy application migration to the cloud","volume-title":"2012 IEEE 6th International Workshop on the Maintenance and Evolution of Service-Oriented and Cloud-Based Systems, MESOCA 2012","year":"2012"},{"key":"key2020040109442948800_ref007","doi-asserted-by":"crossref","unstructured":"Bessani, A. Correia, M. Quaresma, B. Andre, F. and Sousa, P. (2011), \u201cDepSky: dependable and secure storage in a cloud-of-Clouds\u201d, Proc of Eurosys, available at: www.navigators.di.fc.ul.pt\/archive\/papers\/eurosys219-bessani_.pdf","DOI":"10.1145\/1966445.1966449"},{"key":"key2020040109442948800_ref008","first-page":"95","volume-title":"Clouds-of-Clouds for Dependability and Security: Geo-Replication Meets the Cloud","year":"2014"},{"key":"key2020040109442948800_ref009","author":"European Commission","year":"2016"},{"issue":"3","key":"key2020040109442948800_ref010","doi-asserted-by":"crossref","first-page":"20","DOI":"10.5815\/ijcnis.2014.03.03","article-title":"Public vs private vs hybrid vs community-cloud computing: a critical review","volume":"6","year":"2014","journal-title":"International Journal of Computer Network and Information Security"},{"key":"key2020040109442948800_ref011","first-page":"88","article-title":"The archistar Secret-Sharing backup proxy","volume-title":"Proceedings of the 12th International Conference on Availability, Reliability and Security, ACM","year":"2017"},{"key":"key2020040109442948800_ref012","first-page":"136","article-title":"Secret sharing made short","volume-title":"Advances in Cryptology \u2013 CRYPTO\u2019 93, 13th Annual International Cryptology Conference, Santa Barbara, CA, August 22-26, 1993, Proceedings","year":"1994"},{"key":"key2020040109442948800_ref013","volume-title":"Cloud Security: A Comprehensive Guide to Secure Cloud Computing","year":"2010"},{"key":"key2020040109442948800_ref014","first-page":"1","article-title":"On the confidentiality of information dispersal algorithms and their erasure codes","volume-title":"ArXiv Preprint ArXiv:1206.4123","year":"2012"},{"key":"key2020040109442948800_ref015","first-page":"371","article-title":"ARCHISTAR: towards secure and robust cloud based data sharing","volume-title":"Cloud Computing Technology and Science (CloudCom), 2015 IEEE 7th International Conference On","year":"2015"},{"key":"key2020040109442948800_ref016","first-page":"733","article-title":"PRISMACLOUD tools: a cryptographic toolbox for increasing security in cloud services","volume-title":"Availability, Reliability and Security (ARES), 2016 11th International Conference On","year":"2016"},{"key":"key2020040109442948800_ref017","first-page":"581","article-title":"Brokering algorithms for optimizing the availability and cost of cloud storage services","volume-title":"Proceedings of the International Conference on Cloud Computing Technology and Science","year":"2013"},{"key":"key2020040109442948800_ref018","year":"1999"},{"key":"key2020040109442948800_ref019","first-page":"162","article-title":"Towards a method for decision support in multi-cloud environments","volume-title":"4th International Conference on Cloud Computing, Grids, and Virtualization (CLOUD COMPUTING 2013)","year":"2013"},{"key":"key2020040109442948800_ref020","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1007\/978-1-4471-4189-1_1","article-title":"Privacy, security and trust in cloud computing","volume-title":"Privacy and Security for Cloud Computing","year":"2013"},{"key":"key2020040109442948800_ref021","first-page":"427","article-title":"Privacy assurance checking","volume-title":"Digital Privacy","year":"2011"},{"issue":"1","key":"key2020040109442948800_ref022","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1109\/MIC.2012.14","article-title":"Security challenges for the public cloud","volume":"16","year":"2012","journal-title":"IEEE Internet Computing"},{"issue":"11","key":"key2020040109442948800_ref023","doi-asserted-by":"crossref","first-page":"612","DOI":"10.1145\/359168.359176","article-title":"How to share a secret","volume":"22","year":"1979","journal-title":"Communications of the Acm"},{"key":"key2020040109442948800_ref024","first-page":"654","article-title":"A fast and resource efficient FPGA implementation of secret sharing for storage applications","volume-title":"2018 Design, Automation and Test in Europe Conference and Exhibition (DATE)","year":"2018"},{"key":"key2020040109442948800_ref025","first-page":"534","article-title":"Achieving secure, scalable, and fine-grained data access control in cloud computing","volume-title":"INFOCOM 2010","year":"2010"}],"container-title":["Information &amp; Computer Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/ICS-01-2019-0016\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/ICS-01-2019-0016\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,25]],"date-time":"2025-07-25T01:22:36Z","timestamp":1753406556000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/ics\/article\/27\/5\/647-667\/109023"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11,11]]},"references-count":25,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2019,11,11]]}},"alternative-id":["10.1108\/ICS-01-2019-0016"],"URL":"https:\/\/doi.org\/10.1108\/ics-01-2019-0016","relation":{},"ISSN":["2056-4961","2056-4961"],"issn-type":[{"value":"2056-4961","type":"print"},{"value":"2056-4961","type":"print"}],"subject":[],"published":{"date-parts":[[2019,11,11]]}}}