Dependable Data Outsourcing Scheme Based on Cloud-of-Clouds Approach with Fast Recovery

被引:6
作者
Fan, Chun-, I [1 ,2 ,3 ]
Huang, Jheng-Jia [1 ]
Tseng, Shang-Wei [1 ]
Chen, I-Te [4 ]
机构
[1] Natl Sun Yat Sen Univ, Dept Comp Sci & Engn, Kaohsiung 804, Taiwan
[2] Natl Sun Yat Sen Univ, Informat Secur Res Ctr, Kaohsiung 804, Taiwan
[3] Natl Sun Yat Sen Univ, Intelligent Elect Commerce Res Ctr, Kaohsiung 804, Taiwan
[4] Kaohsiung Med Univ, Dept Healthcare Adm & Med Informat, Kaohsiung 807, Taiwan
关键词
Data privacy; cloud computing; cloud-of-clouds approach; data outsourcing; dependable system; SECURITY;
D O I
10.1109/TCC.2018.2871181
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing is increasingly popular today. Cloud services such as data-outsourcing services provide a growing number of users access to cloud storage for large quantities of data, and enterprises are turning to cloud storage for cost-effective remote backup. In 2011, DEPSKY shows and overcomes four limitations hinder the effectiveness of cloud storage: loss of availability, loss and corruption of data, loss of privacy, and vendor lock-in. Unfortunately, DEPSKY lacks an error detection mechanism and comes with heavy computing costs. Therefore, we propose a new data-outsourcing scheme overcoming not only the four limitations, but also the shortcomings of DEPSKY. In this paper, we modify Nyberg's accumulator and apply it to our three proposed error-detection methods. Moreover, we specially design a fast recovery method that is faster than DEPSKY and alternative methods.
引用
收藏
页码:546 / 561
页数:16
相关论文
共 37 条
[1]  
Benaloh J., 1994, Advances in Cryptology - EUROCRYPT '93. Workshop on the Theory and Application of Cryptographic Techniques Proceedings, P274
[2]  
Bessani A, 2011, EUROSYS 11: PROCEEDINGS OF THE EUROSYS 2011 CONFERENCE, P31
[3]  
Blakley GR, 1984, LECT NOTES COMPUTER, P242, DOI DOI 10.1007/3-540-39568-7_20
[4]  
Bowers KD, 2009, CCS'09: PROCEEDINGS OF THE 16TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P187
[5]  
Dang Q. H., 2015, FEDERAL INF PROCESS, V180
[6]   Scalable Distributed Service Integrity Attestation for Software-as-a-Service Clouds [J].
Du, Juan ;
Dean, Daniel J. ;
Tan, Yongmin ;
Gu, Xiaohui ;
Yu, Ting .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2014, 25 (03) :730-739
[7]   Scalable Analytics for IaaS Cloud Availability [J].
Ghosh, Rahul ;
Longo, Francesco ;
Frattini, Flavio ;
Russo, Stefano ;
Trivedi, Kishor S. .
IEEE TRANSACTIONS ON CLOUD COMPUTING, 2014, 2 (01) :57-70
[8]  
I. CLEVERSAFE, 2010, COMM PORT
[9]   Strongly secure ramp secret sharing schemes for general access structures [J].
Iwamoto, M ;
Yamamoto, H .
INFORMATION PROCESSING LETTERS, 2006, 97 (02) :52-57
[10]  
Jain P., 2011, Proceedings of the 2011 World Congress on Information and Communication Technologies (WICT), P456, DOI 10.1109/WICT.2011.6141288