4.7 Article

Toward Secure and Dependable Storage Services in Cloud Computing

Journal

IEEE TRANSACTIONS ON SERVICES COMPUTING
Volume 5, Issue 2, Pages 220-232

Publisher

IEEE COMPUTER SOC
DOI: 10.1109/TSC.2011.24

Keywords

Data integrity; dependable distributed storage; error localization; data dynamics; cloud computing

Funding

  1. US National Science Foundation [CNS-1054317, CNS-1116939, CNS-1156318, CNS-1117111]
  2. Amazon
  3. Direct For Computer & Info Scie & Enginr
  4. Division Of Computer and Network Systems [1155988] Funding Source: National Science Foundation
  5. Division Of Computer and Network Systems
  6. Direct For Computer & Info Scie & Enginr [0831628] Funding Source: National Science Foundation

Ask authors/readers for more resources

Cloud storage enables users to remotely store their data and enjoy the on-demand high quality cloud applications without the burden of local hardware and software management. Though the benefits are clear, such a service is also relinquishing users' physical possession of their outsourced data, which inevitably poses new security risks toward the correctness of the data in cloud. In order to address this new problem and further achieve a secure and dependable cloud storage service, we propose in this paper a flexible distributed storage integrity auditing mechanism, utilizing the homomorphic token and distributed erasure-coded data. The proposed design allows users to audit the cloud storage with very lightweight communication and computation cost. The auditing result not only ensures strong cloud storage correctness guarantee, but also simultaneously achieves fast data error localization, i.e., the identification of misbehaving server. Considering the cloud data are dynamic in nature, the proposed design further supports secure and efficient dynamic operations on outsourced data, including block modification, deletion, and append. Analysis shows the proposed scheme is highly efficient and resilient against Byzantine failure, malicious data modification attack, and even server colluding attacks.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.7
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available