The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.02 - Second (2012 vol.5)
pp: 220-232
Cong Wang , Illinois Institute of Technology, Chicago
Qian Wang , Illinois Institute of Technology, Chicago
Kui Ren , Illinois Institute of Technology, Chicago
Wenjing Lou , Worcester Polytechnic Institute, Worcester
ABSTRACT
Cloud storage enables users to remotely store their data and enjoy the on-demand high quality cloud applications without the burden of local hardware and software management. Though the benefits are clear, such a service is also relinquishing users' physical possession of their outsourced data, which inevitably poses new security risks toward the correctness of the data in cloud. In order to address this new problem and further achieve a secure and dependable cloud storage service, we propose in this paper a flexible distributed storage integrity auditing mechanism, utilizing the homomorphic token and distributed erasure-coded data. The proposed design allows users to audit the cloud storage with very lightweight communication and computation cost. The auditing result not only ensures strong cloud storage correctness guarantee, but also simultaneously achieves fast data error localization, i.e., the identification of misbehaving server. Considering the cloud data are dynamic in nature, the proposed design further supports secure and efficient dynamic operations on outsourced data, including block modification, deletion, and append. Analysis shows the proposed scheme is highly efficient and resilient against Byzantine failure, malicious data modification attack, and even server colluding attacks.
INDEX TERMS
Data integrity, dependable distributed storage, error localization, data dynamics, cloud computing.
CITATION
Cong Wang, Qian Wang, Kui Ren, Ning Cao, Wenjing Lou, "Toward Secure and Dependable Storage Services in Cloud Computing", IEEE Transactions on Services Computing, vol.5, no. 2, pp. 220-232, Second 2012, doi:10.1109/TSC.2011.24
REFERENCES
[1] C. Wang, Q. Wang, K. Ren, and W. Lou, "Ensuring Data Storage Security in Cloud Computing," Proc. 17th Int'l Workshop Quality of Service (IWQoS '09), pp. 1-9, July 2009.
[2] Amazon.com, "Amazon Web Services (AWS)," http:/aws. amazon.com, 2009.
[3] Sun Microsystems, Inc., "Building Customer Trust in Cloud Computing with Transparent Security," https://www.sun.com/offers/detailssun_transparency.xml , Nov. 2009.
[4] K. Ren, C. Wang, and Q. Wang, "Security Challenges for the Public Cloud," IEEE Internet Computing, vol. 16, no. 1, pp. 69-73, 2012.
[5] M. Arrington, "Gmail Disaster: Reports of Mass Email Deletions," http://www.techcrunch.com/2006/12/28gmail-disasterreports-of-mass-email-deletions , Dec. 2006.
20 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool