IPAL: An integrity preservation and accountability layer for cloud storage

被引:0
作者
An, Baoyu [1 ,2 ]
Xiao, Da [1 ,2 ]
Yang, Yixian [1 ,2 ]
Xing, Guoqiang [3 ]
机构
[1] National Engineering Laboratory for Disaster Backup and Recovery, Beijing University of Posts and Telecommunications, Beijing
[2] Information Security Center, Beijing University of Posts and Telecommunications, Beijing
[3] Beijing
关键词
Accountability; Cloud storage; Integrity preservation; POR; Tamper-evident logs;
D O I
10.4156/jcit.vol7.issue18.10
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we introduce into cloud storage IPAL (Integrity Preserving and Accounting Layer), which integrates a POR (Proof Of Retrievability) algorithm and an integrity accountability scheme as an organic mechanism for data integrity preserving and accounting. Based on a distributed Cassandra platform, we promote the main architecture as well as the storage models. We combine accountable data writing with data possession checking to generate tamper-evident logs, which enables mutual-accountability between users and the service provider. We show through experiments in a distributed clustering environment that IPAL brings acceptable overheads to the performance of data accessing.
引用
收藏
页码:90 / 99
页数:9
相关论文
共 21 条
[1]  
Ateniese G., Burns R., Curtmola R., Herring J., Kissner L., Peterson Z., Song D., Provable Data Possession at Untrusted Stores, Proceedings of 14th ACM CCS, pp. 598-609, (2007)
[2]  
Ateniese G., Pietro R.D., Mancini L.V., Tsudik G., Scalable and Efficient Provable Data Possession, Proceedings of 4th International Conference on Security and Privacy in Communication Networks, (2008)
[3]  
Wang C., Wang Q., Ren K., Lou W., Privacy-preserving Public Auditing for Data storage Security in Cloud Computing, Proceedings of 29th IEEE INFOCOM, pp. 1-9, (2010)
[4]  
Wang Q., Wang C., Li J., Et al., Enabling Public Verifiability and Data Dynamics for Storage Seccurity in Cloud Computing, Proceedings of ESORICS'09, pp. 355-370, (2009)
[5]  
Juels A., Kaliski B., PORs: Proofs of Retrievability for Large Files, Proceedings of 14th ACM CCS, pp. 584-597, (2007)
[6]  
Shacham H., Waters B., Compact Proofs of Retrievability, Proceedings of 14th ASIACRYPT, pp. 90-107, (2008)
[7]  
Bowers K.D., Juels A., Oprea A., Proofs of Retrievability: Theory and Implementation, Proceedings of ACM workshop on Cloud Computing security, pp. 43-53, (2009)
[8]  
An B., Zhou L., Gong Z., Xiao D., Yang Y., Xu G., Chen J., Light-weight Proofs of Retrievability in Cloud Archive Storage with Replications, JDCTA:International Journal of Digital Content Technology and its Applications, 6, 10, pp. 127-135, (2012)
[9]  
Xiao D., Yang Y., Yao W.B., Et al., Multiple-File Remote Data Checking for Cloud Storage, Computers and Security, 31, 2, pp. 192-205, (2012)
[10]  
Chen L., Guo G., An Efficient Remote Data Possession Checking in Cloud Storage, JDCTA: International Journal of Digital Content Technology and its Applications, 5, 4, pp. 43-50, (2011)