Intrusion Tolerant Multi-Cloud Distributed Storage

被引:4
作者
Madan, Bharat B. [1 ]
Banik, Manoj [1 ]
Wu, Bo Chen [2 ]
Bein, Doina [3 ]
机构
[1] Old Dominion Univ, Dept Mod Sim & Visual Engr, Norfolk, VA 23529 USA
[2] Intel Corp, Folsom, CA USA
[3] Calif State Univ Fullerton, Dept Comp Sc, Fullerton, CA 92634 USA
来源
2016 IEEE INTERNATIONAL CONFERENCE ON SMART CLOUD (SMARTCLOUD) | 2016年
关键词
Cloud security; Cloud storage; Data storage; Intrusion tolerance; Survivable systems; Erasure coding; Confidentiality; Integrity; Availability;
D O I
10.1109/SmartCloud.2016.30
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Data generation and its utilization in important decision applications has been growing an extremely fast pace, which has made data a valuable resource that needs to be rigorously protected from attackers. Cloud storage systems claim to offer the promise of secure and elastic data storage services that can adapt to changing storage requirements. Despite diligent efforts being made to protect data, recent successful attacks highlight the need for going beyond the existing approaches centered on intrusion prevention, detection and recovery mechanisms. However, most security mechanisms have finite rate of failure, and with intrusion becoming more sophisticated and stealthy, the failure rate appears to be rising. In this paper we propose the use data fragmentation, followed by coding that introduces redundant fragments and dispersing fragments to multiple and independent cloud storage systems with each cloud handling only a single fragments. The paper proposes a multi-cloud fragmented cloud storage system architecture and design of the related software code. Probabilistic analysis is carried to quantify its intrusion tolerance abilities.
引用
收藏
页码:262 / 268
页数:7
相关论文
共 26 条
  • [1] [Anonymous], 2012, 6749 RFC
  • [2] [Anonymous], W32 STUXN
  • [3] [Anonymous], 2015, OPM CYBERSECURITY IN
  • [4] [Anonymous], 2010, PRIVACY RECOMMENDATI
  • [5] Bangalore A., 2009, IEEE 2 INT C DEP ATH
  • [6] Daemen J., 2003, AES proposal: Rijndael, AES algorithm submission
  • [7] Federal Information Processing Standard, 2015, FED INF PROC STAND P, V180-3
  • [8] Gibson G., 1999, P USENIX 1999 LIN WO
  • [9] Golub GH., 2012, MATRIX COMPUTATIONS, V3
  • [10] HUANG Y., 2006, P 1 INT C AV REL SEC