Efficient Real-time Auditing and Proof of Violation for Cloud Storage Systems

被引:0
作者
Hwang, Gwan-Hwan [1 ]
Chen, Hung-Fu [1 ]
机构
[1] Natl Taiwan Normal Univ, Dept Comp Sci & Informat Engn, Taipei, Taiwan
来源
PROCEEDINGS OF 2016 IEEE 9TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (CLOUD) | 2016年
关键词
cloud storage; cloud security; nonrepudiation; real-time auditing; proof of violation; service-level agreement;
D O I
10.1109/CLOUD.2016.25
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper we study how to develop an efficient real-time auditing and proof of violation (POV) scheme for cloud storage systems. A POV scheme enables a user or a service provider to produce cryptographic proofs which can be used to prove either the occurrence of the violation of properties or the innocence of the service provider. POV schemes are solutions for obtaining mutual nonrepudiation between users and the service provider in the cloud. After each file operation, a real-time auditing should be performed so that the violation of the service provider can be found instantly. Existing solutions need to cache the hash values of files in client devices and thus the overhead for storing and synchronizing hash values in client devices which share files is huge. We propose a novel scheme in which client devices do not need to cache any hash values of files. A small portion called slice of a binary hash tree is transferred to the client device for real-time auditing and it can support POV whenever the audit does not pass. Experimental results are presented that demonstrate the feasibility of the proposed scheme and show that our scheme outperforms previous work by one to two order of magnitude. Service providers of cloud storage can use the proposed scheme to provide a mutual nonrepudiation guarantee in their service-level agreements.
引用
收藏
页码:132 / 139
页数:8
相关论文
共 11 条
[1]  
Feng J., 2011, IEEE CONS COMM NETW
[2]  
Goh E.jin., 2003, PROC NETWORK DISTRIB, P131
[3]  
Hwang Gwan-Hwan, 2014, 6 IEEE INT C CLOUD C
[4]  
Hwang Gwan-Hwan, 12 IEEE INT C TRUST
[5]  
Kamara S, 2010, LECT NOTES COMPUT SC, V6054, P136, DOI 10.1007/978-3-642-14992-4_13
[6]  
Li J., 2004, P S OP SYST DES IMPL
[7]  
Merkle R. C., 1987, P C THEOR APPL CRYPT
[8]  
Microsoft corporation, WIND AZ PRIC SERV AG
[9]  
Popa R. A., 2011, USENIX ANN TECHN C U
[10]  
Stefanov E., 2012, 28 ANN COMP SEC APPL