A framework with data-centric accountability and auditability for cloud storage

被引:3
作者
Jin, Hao [1 ]
Zhou, Ke [2 ]
Luo, Yan [3 ]
机构
[1] Wuhan Inst Technol, Sch Comp Sci & Engn, Wuhan, Hubei, Peoples R China
[2] Wuhan Inst Technol, Sch Comp Sci & Technol, Wuhan Natl Lab Optoelect, Wuhan, Hubei, Peoples R China
[3] Univ Massachusetts, Dept Elect & Comp Engn, Lowell, MA USA
基金
中国国家自然科学基金; 美国国家科学基金会; 国家重点研发计划;
关键词
Accountability; Auditing; Arbitration; Record history; Misbehavior; TRUST; SECURITY;
D O I
10.1007/s11227-018-2504-5
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The cross-domain characteristic of cloud storage service decides that both users and service providers have limited trust toward each other. Judging from a real-world perspective, both parties may have the motivation to engage in dishonest activity for monetary reasons. Hence, accountability should be seriously treated in designing storage systems with practical security. This paper proposes a general accountable framework for cloud storage in a data-centric manner. We design non-repudiable action records to log all data-related access behavior, and through later auditing to detect possible misbehavior. To resist replay attacks, we adopt signature exchange idea to let both parties verify and maintain different metadata signatures signed by the other party. For potential disputes about data content or access records, we also design arbitration protocol to fairly and efficiently settle the dispute and find out the cheating party. Experimental evaluation of our prototype shows that cryptographic cost, storage overhead and throughput are reasonable and acceptable.
引用
收藏
页码:5903 / 5926
页数:24
相关论文
共 62 条
[1]  
Alhamad Mohammed, 2010, Proceedings of the 13th International Conference on Network-Based Information Systems (NBiS 2010), P321, DOI 10.1109/NBiS.2010.67
[2]  
Alliance C, 2011, SEC GUID CRIT AR FOC
[3]  
Amazon, 2008, AM S3 AV EV
[4]  
[Anonymous], 6 INT WORKSH SYST AP
[5]   A View of Cloud Computing [J].
Armbrust, Michael ;
Fox, Armando ;
Griffith, Rean ;
Joseph, Anthony D. ;
Katz, Randy ;
Konwinski, Andy ;
Lee, Gunho ;
Patterson, David ;
Rabkin, Ariel ;
Stoica, Ion ;
Zaharia, Matei .
COMMUNICATIONS OF THE ACM, 2010, 53 (04) :50-58
[6]  
Ateniese G, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P598
[7]  
Backes M, 2009, P 13 NETW DISTR SYST, V9, P341
[8]  
Backes M, 2006, LECT NOTES COMPUT SC, V4189, P327
[9]  
Bellare M, 2003, LECT NOTES COMPUT SC, V2612, P1
[10]  
Blaze M, 2003, LECT NOTES COMPUT SC, V2692, P284