Towards Usable Cloud Storage Auditing

被引:16
作者
Chen, Fei [1 ,2 ]
Meng, Fengming [1 ]
Xiang, Tao [3 ]
Dai, Hua [4 ]
Li, Jianqiang [1 ]
Qin, Jing [5 ]
机构
[1] Shenzhen Univ, Coll Comp Sci & Engn, Shenzhen 518060, Peoples R China
[2] Nanjing Univ Posts & Telecommun, Jiangsu Key Lab Big Data Secur & Intelligent Proc, Nanjing 210049, Peoples R China
[3] Chongqing Univ, Coll Comp Sci, Chongqing 400044, Peoples R China
[4] Nanjing Univ Posts & Telecommun, Sch Comp Sci & Technol, Nanjing 210049, Peoples R China
[5] Hong Kong Polytech Univ, Ctr Smart Hlth, Sch Nursing, Hong Kong, Peoples R China
基金
中国国家自然科学基金;
关键词
Cloud computing; Authentication; Error correction codes; Usability; Indexes; Encoding; Cloud storage; integrity checking; usability; homomorphic authentication; error correction code; DATA POSSESSION; SCHEME;
D O I
10.1109/TPDS.2020.2998462
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cloud storage security has gained considerable research efforts with the wide adoption of cloud computing. As a security mechanism, researchers have been investigating cloud storage auditing schemes that enable a user to verify whether the cloud keeps the user's outsourced data undamaged. However, existing schemes have usability issues in compatibility with existing real world cloud storage applications, error-tolerance, and efficiency. To mitigate this usability gap, this article proposes a new general cloud storage auditing scheme that is more usable. The proposed scheme uses the idea of integrating linear error correcting codes and linear homomorphic authentication schemes together. This integration uses only one additional block to achieve error tolerance and authentication simultaneously. To demonstrate the power of the general construction, we also propose one detailed scheme based on the proposed general construction using the Reed Solomon code and the universal hash based MAC authentication scheme, both of which are implemented over the computation-efficient Galois field GF(2(8)). We also show that the proposed scheme is secure under the standard definition. Moreover, we implemented and open-sourced the proposed scheme. Experimental results show that the proposed scheme is orders of magnitude more efficient than the state-of-the-art scheme.
引用
收藏
页码:2605 / 2617
页数:13
相关论文
共 44 条
[1]  
Ateniese G, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P598
[2]  
Azraoui M, 2014, LECT NOTES COMPUT SC, V8712, P239, DOI 10.1007/978-3-319-11203-9_14
[3]   Provable Multicopy Dynamic Data Possession in Cloud Computing Systems [J].
Barsoum, Ayad F. ;
Hasan, M. Anwar .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (03) :485-497
[4]   Secure Cloud Storage Meets with Secure Network Coding [J].
Chen, Fei ;
Xiang, Tao ;
Yang, Yuanyuan ;
Chow, Sherman S. M. .
IEEE TRANSACTIONS ON COMPUTERS, 2016, 65 (06) :1936-1948
[5]  
Deoras S., 2019, 8 CLOUD OUTAGES SHOO
[6]   A Distributed Trust Evaluation Protocol with Privacy Protection for Intercloud [J].
Dou, Yi ;
Chan, Henry C. B. ;
Au, Man Ho .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2019, 30 (06) :1208-1221
[7]   Dynamic Provable Data Possession [J].
Erway, C. Chris ;
Kupcu, Alptekin ;
Papamanthou, Charalampos ;
Tamassia, Roberto .
ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2015, 17 (04)
[8]   DIPOR: An IDA-based dynamic proof of retrievability scheme for cloud storage systems [J].
Fu, Anmin ;
Li, Yuhan ;
Yu, Shui ;
Yu, Yan ;
Zhang, Gongxuan .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2018, 104 :97-106
[9]  
GOLDREICH O, 1991, J ACM, V38, P691, DOI 10.1145/116825.116852
[10]   A Privacy-Preserving Remote Data Integrity Checking Protocol with Data Dynamics and Public Verifiability [J].
Hao, Zhuo ;
Zhong, Sheng ;
Yu, Nenghai .
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2011, 23 (09) :1432-1437