Results 1 - 10
of
14
On Verifying Dynamic Multiple Data Copies over Cloud Servers
, 2011
"... Currently, many individuals and organizations outsource their data to remote cloud service providers (CSPs) seeking to reduce the maintenance cost and the burden of large local data storage. The CSP offers paid storage space on its infrastructure to store customers ’ data. Replicating data on multip ..."
Abstract
-
Cited by 12 (2 self)
- Add to MetaCart
Currently, many individuals and organizations outsource their data to remote cloud service providers (CSPs) seeking to reduce the maintenance cost and the burden of large local data storage. The CSP offers paid storage space on its infrastructure to store customers ’ data. Replicating data on multiple servers across multiple data centers achieves a higher level of scalability, availability, and durability. The more copies the CSP is asked to store, the more fees the customers are charged. Therefore, customers need to be strongly convinced that the CSP is storing all data copies that are agreed upon in the service contract, and the data-update requests issued by the customers have been correctly executed on all remotely stored copies. In this paper we propose two dynamic multi-copy provable data possession schemes that achieve two main goals: i) they prevent the CSP from cheating and using less storage by maintaining fewer copies, and ii) they support dynamic behavior of data copies over cloud servers via operations such as block modification, insertion, deletion, and append. We prove the security of the proposed schemes against colluding servers. Through theoretical analysis and experimental results, we demonstrate the performance of these schemes. Additionally, we discuss how to identify corrupted copies by slightly modifying the proposed schemes.
Transparent, Distributed, and Replicated Dynamic Provable Data Possession
, 2013
"... With the growing trend toward using outsourced storage, the problem of efficiently checking and proving data integrity needs more consideration. Starting with PDP and POR schemes in 2007, many cryptography and security researchers have addressed the problem. After the first solutions for static data ..."
Abstract
-
Cited by 7 (3 self)
- Add to MetaCart
(Show Context)
With the growing trend toward using outsourced storage, the problem of efficiently checking and proving data integrity needs more consideration. Starting with PDP and POR schemes in 2007, many cryptography and security researchers have addressed the problem. After the first solutions for static data, dynamic versions were developed (e.g., DPDP). Researchers also considered distributed versions of such schemes. Alas, in all such distributed schemes, the client needs to be aware of the structure of the cloud, and possibly pre-process the file accordingly, even though the security guarantees in the real world are not improved. We propose a distributed and replicated DPDP which is transparent from the client’s viewpoint. It allows for real scenarios where the cloud storage provider (CSP) may hide its internal structure from the client, flexibly manage its resources, while still providing provable service to theclient. TheCSPdecides onhow many andwhich serverswill storethedata. Sincetheload is distributed on multiple servers, we observe one-to-two orders of magnitude better performance in our tests, while availability and reliability are also improved via replication. In addition, we use persistent rank-based authenticated skip lists to create centralized and distributed variants of a dynamic version control system with optimal complexity. 1
Hasan,” Provable MultiCopy Dynamic Data Possession in Cloud Computing Systems
- IEEE Transaction on Information Forensics and Security
, 2015
"... Abstract-Increasingly more and more organizations are opting for outsourcing data to remote cloud service providers (CSPs). Customers can rent the CSPs storage infrastructure to store and retrieve almost unlimited amount of data by paying fees metered in gigabyte/month. For an increased level of sc ..."
Abstract
-
Cited by 2 (0 self)
- Add to MetaCart
(Show Context)
Abstract-Increasingly more and more organizations are opting for outsourcing data to remote cloud service providers (CSPs). Customers can rent the CSPs storage infrastructure to store and retrieve almost unlimited amount of data by paying fees metered in gigabyte/month. For an increased level of scalability, availability, and durability, some customers may want their data to be replicated on multiple servers across multiple data centers. The more copies the CSP is asked to store, the more fees the customers are charged. Therefore, customers need to have a strong guarantee that the CSP is storing all data copies that are agreed upon in the service contract, and all these copies are consistent with the most recent modifications issued by the customers. In this paper, we propose a map-based provable multicopy dynamic data possession (MB-PMDDP) scheme that has the following features: 1) it provides an evidence to the customers that the CSP is not cheating by storing fewer copies; 2) it supports outsourcing of dynamic data, i.e., it supports block-level operations, such as block modification, insertion, deletion, and append; and 3) it allows authorized users to seamlessly access the file copies stored by the CSP. We give a comparative analysis of the proposed MB-PMDDP scheme with a reference model obtained by extending existing provable possession of dynamic single-copy schemes. The theoretical analysis is validated through experimental results on a commercial cloud platform. In addition, we show the security against colluding servers, and discuss how to identify corrupted copies by slightly modifying the proposed scheme.
Enabling Data Dynamic and Indirect Mutual Trust for Cloud Computing Storage Systems
"... Currently, the amount of sensitive data produced by many organizations is outpacing their storage ability. The management of such huge amount of data is quite expensive due to the requirements of high storage capacity and qualified personnel. Storage-as-a-Service (SaaS) offered by cloud service prov ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
(Show Context)
Currently, the amount of sensitive data produced by many organizations is outpacing their storage ability. The management of such huge amount of data is quite expensive due to the requirements of high storage capacity and qualified personnel. Storage-as-a-Service (SaaS) offered by cloud service providers (CSPs) is a paid facility that enables organizations to outsource their data to be stored on remote servers. Thus, SaaS reduces the maintenance cost and mitigates the burden of large local data storage at the organization’s end. A data owner pays for a desired level of security and must get some compensation in case of any misbehavior committed by the CSP. On the other hand, the CSP needs a protection from any false accusation that may be claimed by the owner to get illegal compensations. In this paper, we propose a cloud-based storage scheme that allows the data owner to benefit from the facilities offered by the CSP and enables indirect mutual trust between them. The proposed scheme has four important features: (i) it allows the owner to outsource sensitive data to a CSP, and perform full block-level dynamic operations on the outsourced data, i.e., block modification, insertion, deletion, and append, (ii) it ensures that authorized users (i.e., those who have the right to access the owner’s file) receive the latest version of the outsourced data, (iii) it enables indirect mutual trust between the owner and the CSP, and (iv) it allows the owner to grant or revoke access to the outsourced data. We discuss the security issues of the proposed scheme. Besides, we justify its performance through theoretical analysis and experimental evaluation of storage, communication, and computation overheads.
Security Enhancement for Enabling Dynamic . . .
, 2014
"... In Cloud Computing, Storage as a Service is one of the most required services, but the security of the data stored in the cloud using these services is the key issue. The outsourced data in the cloud has to be guaranteed with confidentiality, integrity and access control. In this work, we device a ..."
Abstract
- Add to MetaCart
In Cloud Computing, Storage as a Service is one of the most required services, but the security of the data stored in the cloud using these services is the key issue. The outsourced data in the cloud has to be guaranteed with confidentiality, integrity and access control. In this work, we device a mechanism of cloud data storage based on indirect mutual trust between the Cloud Service Provider (CSP) and the cloud users through Trusted Third Party Auditor (TTPA). This work facilitates the user to store their data as blocks and enables them to perform dynamic operations on blocks. The stored data can be accessed by a group of users authorized by the data owner. The owner has the privilege to grant or revoke access of the stored data in the cloud. The present system is providing a good security mechanism for stored data and proper sharing of keys among authorized users, and data owner for the cryptographic mechanism.
Article Lightweight Proofs of Retrievability for Electronic Evidence
, 2013
"... information ..."
(Show Context)
An Efficient and Secure Protocol for Ensuring Data Storage Security in Cloud Computing
"... Currently, there has been an increasing trend in outsourcing data to remote cloud, where the people outsource their data at Cloud Service Provider(CSP) who offers huge storage space with low cost. Thus users can reduce the maintenance and burden of local data storage. Meanwhile, once data goes into ..."
Abstract
- Add to MetaCart
Currently, there has been an increasing trend in outsourcing data to remote cloud, where the people outsource their data at Cloud Service Provider(CSP) who offers huge storage space with low cost. Thus users can reduce the maintenance and burden of local data storage. Meanwhile, once data goes into cloud they lose control of their data, which inevitably brings new security risks toward integrity and confidentiality. Hence, efficient and effective methods are needed to ensure the data integrity and confidentiality of outsource data on untrusted cloud servers. The previously proposed protocols fail to provide strong security assurance to the users. In this paper, we propose an efficient and secure protocol to address these issues. Our design is based on Elliptic Curve Cryptography and Sobol Sequence (random sampling). Our method allows third party auditor to periodically verify the data integrity stored at CSP without retrieving original data. It generates probabilistic proofs of integrity by challenging random sets of blocks from the server, which drastically reduces the communication and I/O costs. The challenge-response protocol transmits a small, constant amount of data, which minimizes network communication. Most importantly, our protocol is confidential: it never reveals the data contents to the malicious parties. The proposed scheme also considers the dynamic data operations at block level while maintaining the same security assurance. Our solution removes the burden of verification from the user, alleviates both the user’s and storage service’s fear about data leakage and data corruptions. Through security analysis, we prove that our method is secure and through performance and experimental results, we also prove that our method is efficient. To compare with existing schemes, our scheme is more secure and efficient.
0Remote Data Auditing in Cloud Computing Environments: A Survey, Taxonomy, and Open Issues
"... Cloud computing has emerged as a long dreamt vision of utility computing paradigm that provides reliable and resilient infrastructure for users to remotely store data, and use on demand applications and services. Currently, many individuals and organizations mitigate the burden of local data storage ..."
Abstract
- Add to MetaCart
(Show Context)
Cloud computing has emerged as a long dreamt vision of utility computing paradigm that provides reliable and resilient infrastructure for users to remotely store data, and use on demand applications and services. Currently, many individuals and organizations mitigate the burden of local data storage and reduce the maintenance cost by outsourcing data to the cloud. However, the outsourced data is not always trustworthy due to the loss of physical control and possession over the data. As a result, many scholars have concentrated on relieving the security threats of the outsourced data by designing the Remote Data Auditing (RDA) technique as a new concept to enable public auditability for the stored data in the cloud. The RDA is a useful technique to check the reliability and integrity of data outsourced to a single or distributed servers. This is because all of the RDA techniques for single cloud servers are unable to support data recovery, such techniques are complemented with redundant storage mechanisms. The article also reviews techniques of remote data auditing more comprehensively in the domain of the distributed clouds in conjunction with the presentation of classifying on-going developments within this specified area. The thematic taxonomy of the distributed storage auditing is presented based on significant parameters, such as scheme nature, security pattern, objective functions, auditing mode, update mode, cryptography model, and dynamic data structure. The more recent remote auditing approaches, which have not gained considerable attention in distributed
Set of Security Parameters for Cloud Computing Storage System
"... Storage-as-a-Service offered by cloud service suppliers (CSPs) could be a paid facility that permits organizations to source their sensitive information to be hold on remote servers. During this paper, we tend to propose a cloud-based storage theme permits} the info owner to learn from the facilitie ..."
Abstract
- Add to MetaCart
Storage-as-a-Service offered by cloud service suppliers (CSPs) could be a paid facility that permits organizations to source their sensitive information to be hold on remote servers. During this paper, we tend to propose a cloud-based storage theme permits} the info owner to learn from the facilities offered by the CSP and enables indirect mutual trust between them. The planned theme has four vital features: (i) it permits the owner to source sensitive information to a CSP, and perform full block-level dynamic operations on the outsourced information, i.e., block modification, insertion, deletion, and append, (ii) it ensures that licensed users (i.e., those that have the proper to access the owner’s file) receive the most recent version of the outsourced information, (iii) it allows indirect mutual trust between the owner and also the CSP, and (iv) it permits the owner to grant or revoke access to the outsourced information. we tend to discuss the protection problems with the planned theme. Besides, we tend to justify its performance through theoretical analysis and a model implementation on Amazon cloud platform to judge storage, communication, and computation overheads. IndexTerm Outsourcing information storage, dynamic atmosphere, mutual trust, access management 1.
Automated Identity based Approach to verify Data
"... Cloud-based outsourced storage relieves the client’s load of storage management and preservation by providing an equivalently flexible, inexpensive, location-independent platform. As clients no longer have physical control of data, outsourced data integrity checking is of crucial importance in cloud ..."
Abstract
- Add to MetaCart
(Show Context)
Cloud-based outsourced storage relieves the client’s load of storage management and preservation by providing an equivalently flexible, inexpensive, location-independent platform. As clients no longer have physical control of data, outsourced data integrity checking is of crucial importance in cloud storage. It allows the clients to verify data intactness and correctness without downloading the entire data. As the verification is to be done at client end, the integrity checking protocol must be efficient to save client’s time. Another aspect of the protocol is flexibility, which improves the quality of integrity checking by allowing user specific block partition size. Moreover in case of company oriented scenario, maintaining log records of each verification request can help in security analysis. Taking these three points into consideration, we have proposed the flexible, automated and log based RDPC model as: Auto ID-RDPC model for single-cloud storage. The proposed model is based on bilinear pairings and RDPC technique. The approach eliminates certification management with the help of Identity management and additionally provides log management towards data integrity. The model makes client free from initiating verification request and keeps track of previous records which reduces client’s time. The principle concept here is to make data integrity checking a painless job for any client. Our results demonstrate the effectiveness of our approach.