The Community for Technology Leaders
2016 IEEE 35th Symposium on Reliable Distributed Systems (2016)
Budapest, Hungary
Sept. 26, 2016 to Sept. 29, 2016
ISSN: 1060-9857
ISBN: 978-1-5090-3513-7
pp: 157-166
ABSTRACT
Cloud-based storage services such as Dropbox, Google Drive and OneDrive are increasingly popular for storing enterprise data, and they have already become the de facto choice for cloud-based backup of hundreds of millions of regular users. Drawn by the wide range of services they provide, no upfront costs and 24/7 availability across all personal devices, customers are well-aware of the benefits that these solutions can bring. However, most users tend to forget—or worse ignore—some of the main drawbacks of such cloud-based services, namely in terms of privacy. Data entrusted to these providers can be leaked by hackers, disclosed upon request from a governmental agency's subpoena, or even accessed directly by the storage providers (e.g., for commercial benefits). While there exist solutions to prevent or alleviate these problems, they typically require direct intervention from the clients, like encrypting their data before storing it, and reduce the benefits provided such as easily sharing data between users. This practical experience report studies a wide range of security mechanisms that can be used atop standard cloud-based storage services. We present the details of our evaluation testbed and discuss the design choices that have driven its implementation. We evaluate several state-of-the-art techniques with varying security guarantees responding to user-assigned security and privacy criteria. Our results reveal the various trade-offs of the different techniques by means of representative workloads on top of industry-grade storage services.
INDEX TERMS
Cloud computing, Privacy, Encryption, Resistance
CITATION
Dorian Burihabwa, Rogerio Pontes, Pascal Felber, Francisco Maia, Hugues Mercier, Rui Oliveira, Joao Paulo, Valerio Schiavoni, "On the Cost of Safe Storage for Public Clouds: An Experimental Evaluation", 2016 IEEE 35th Symposium on Reliable Distributed Systems, vol. 00, no. , pp. 157-166, 2016, doi:10.1109/SRDS.2016.028
96 ms
(Ver 3.3 (11022016))