Towards secure and reliable cloud storage against data re-outsourcing

被引:29
作者
Jiang, Tao [1 ]
Chen, Xiaofeng [1 ]
Li, Jin [2 ]
Wong, Duncan S. [3 ]
Ma, Jianfeng [1 ]
Liu, Joseph K. [4 ]
机构
[1] Xidian Univ, State Key Lab Integrated Serv Networks ISN, Xian, Peoples R China
[2] Guangzhou Univ, Sch Comp Sci, Guangzhou, Guangdong, Peoples R China
[3] City Univ Hong Kong, Dept Comp Sci, Hong Kong, Hong Kong, Peoples R China
[4] Inst Infocomm Res, Singapore, Singapore
来源
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE | 2015年 / 52卷
基金
中国国家自然科学基金;
关键词
Cloud storage; Economical server collusion; Storage security; Probabilistic scheme; PROOFS;
D O I
10.1016/j.future.2014.11.002
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
To increase the profit, a semi-trusted cloud service provider may outsource the files of its client to some low expensive cloud service providers, which may violate the wishes of cloud users and impair their legitimate rights and interests. In this paper, a probabilistic challenge-response scheme is proposed to prove that users' files are available and stored in a specified cloud server. In our scheme, common cloud infrastructure with some reasonable limits, such as rational economic security model, semi-collusion security model and response time bound, are exploited to resist the collusion of cloud servers. These limits guarantee that a malicious cloud service provider could not conduct a t-round communication in a limited time. The security and performance analysis demonstrate that our scheme provides strong incentives against an economically rational cloud service provider from re-outsourcing its clients' data to some other cloud providers. (C) 2014 Elsevier B.V. All rights reserved.
引用
收藏
页码:86 / 94
页数:9
相关论文
共 28 条
[1]  
[Anonymous], 2009, EAI TRIDENTCOM, DOI DOI 10.1109/TRIDENTCOM.2009.4976258
[2]  
[Anonymous], 2009, FAST
[3]  
[Anonymous], 04429 U ROV VIRG
[4]  
[Anonymous], 2006, P IEEE INT C DISTR C
[5]  
[Anonymous], 1993, ACM CCS 1993, DOI DOI 10.1145/168588.168596
[6]  
[Anonymous], ISEC200548105 IEICE
[7]  
Ateniese G., 2008, P 4 EAI SECURECOMM, P1, DOI 10.1145/1460877.1460889
[8]  
Ateniese G, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P598
[9]  
Bowers KD, 2011, PROCEEDINGS OF THE 18TH ACM CONFERENCE ON COMPUTER & COMMUNICATIONS SECURITY (CCS 11), P501
[10]  
Capkun S., 2006, P IEEE INT C COMPUTE, P1