Ensuring data storage security in Cloud Computing
Top Cited Papers
- 1 July 2009
- conference paper
- conference paper
- Published by Institute of Electrical and Electronics Engineers (IEEE)
- Vol. 2009, 1-9
- https://doi.org/10.1109/iwqos.2009.5201385
Abstract
Cloud computing has been envisioned as the next-generation architecture of IT enterprise. In contrast to traditional solutions, where the IT services are under proper physical, logical and personnel controls, cloud computing moves the application software and databases to the large data centers, where the management of the data and services may not be fully trustworthy. This unique attribute, however, poses many new security challenges which have not been well understood. In this article, we focus on cloud data storage security, which has always been an important aspect of quality of service. To ensure the correctness of users' data in the cloud, we propose an effective and flexible distributed scheme with two salient features, opposing to its predecessors. By utilizing the homomorphic token with distributed verification of erasure-coded data, our scheme achieves the integration of storage correctness insurance and data error localization, i.e., the identification of misbehaving server (s). Unlike most prior works, the new scheme further supports secure and efficient dynamic operations on data blocks, including: data update, delete and append. Extensive security and performance analysis shows that the proposed scheme is highly efficient and resilient against Byzantine failure, malicious data modification attack, and even server colluding attacks.Keywords
This publication has 8 references indexed in Scilit:
- Scalable and efficient provable data possessionPublished by Association for Computing Machinery (ACM) ,2008
- MR-PDP: Multiple-Replica Provable Data PossessionPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2008
- PorsPublished by Association for Computing Machinery (ACM) ,2007
- Provable data possession at untrusted storesPublished by Association for Computing Machinery (ACM) ,2007
- Verifying distributed erasure-coded dataPublished by Association for Computing Machinery (ACM) ,2007
- Store, Forget, and Check: Using Algebraic Signatures to Check Remotely Administered StoragePublished by Institute of Electrical and Electronics Engineers (IEEE) ,2006
- Note: Correction to the 1997 tutorial on Reed-Solomon codingSoftware: Practice and Experience, 2005
- Universal classes of hash functionsJournal of Computer and System Sciences, 1979