Energy Efficiency in Secure and Dynamic Cloud Storage

被引:3
作者
Kachkeev, Adilet [1 ]
Esiner, Ertem [1 ]
Kupcu, Alptekin [1 ]
Ozkasap, Oznur [1 ]
机构
[1] Koc Univ, Dept Comp Sci & Engn, Istanbul, Turkey
来源
ENERGY EFFICIENCY IN LARGE SCALE DISTRIBUTED SYSTEMS, EE-LSDS 2013 | 2013年 / 8046卷
关键词
Energy efficiency; Cloud storage; Skip list; Provable data possession; PROOFS; RETRIEVABILITY;
D O I
10.1007/978-3-642-40517-4_12
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The popularity of the cloud storage systems has brought a number of challenges. Two of them are data integrity and energy efficiency. There are many proposed static solutions to prove the integrity of a file. For the dynamic case, Rank-Based Authenticated Skip list (RBASL) has been presented. It provides the update operations with logarithmic complexity. However, an RBASL expects the block size to be fixed. In a realistic scenario, where the updates can be of variable size, an RBASL performs O(n) update operations on the data structure when a change in the file occurs, where n is the number of blocks. To overcome this problem, we propose Flexible-length based authenticated skip list (FlexList) to make O(u) update operations where u is the number of the update operations. Moreover, we developed an algorithm to carry out multiple challenges at once. We have tested our algorithm, and the results show time and energy efficiencies of 60%, 45%, 35% and 20% for file sizes 4MB, 40MB, 400MB, and 4GB respectively.
引用
收藏
页码:125 / 130
页数:6
相关论文
共 12 条
  • [1] Ateniese G., 2008, SecureComm
  • [2] Ateniese G, 2009, LECT NOTES COMPUT SC, V5912, P319, DOI 10.1007/978-3-642-10366-7_19
  • [3] Ateniese Giuseppe., 2007, ACM CCS
  • [4] Energy-Efficient Cloud Computing
    Berl, Andreas
    Gelenbe, Erol
    Di Girolamo, Marco
    Giuliani, Giovanni
    De Meer, Hermann
    Dang, Minh Quan
    Pentikousis, Kostas
    [J]. COMPUTER JOURNAL, 2010, 53 (07) : 1045 - 1051
  • [5] Dodis Y, 2009, LECT NOTES COMPUT SC, V5444, P109
  • [6] Erway Chris., 2009, ACM CCS
  • [7] Esiner E, 2013, TECHNICAL REPORT
  • [8] Goodrich M.T., 2001, DARPA
  • [9] Juels A., 2007, ACM CCS
  • [10] Meiklejohn Sarah., 2010, USENIX Security