Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage Systems

被引:68
作者
Barsoum, Ayad [1 ]
Hasan, Anwar [1 ]
机构
[1] Univ Waterloo, Dept Elect & Comp Engn, Waterloo, ON N2L 3G1, Canada
关键词
Outsourcing data storage; dynamic environment; mutual trust; access control;
D O I
10.1109/TPDS.2012.337
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Storage-as-a-service offered by cloud service providers (CSPs) is a paid facility that enables organizations to outsource their sensitive data to be stored on remote servers. In this paper, we propose a cloud-based storage scheme that allows the data owner to benefit from the facilities offered by the CSP and enables indirect mutual trust between them. The proposed scheme has four important features: 1) it allows the owner to outsource sensitive data to a CSP, and perform full block-level dynamic operations on the outsourced data, i.e., block modification, insertion, deletion, and append, 2) it ensures that authorized users (i.e., those who have the right to access the owner's file) receive the latest version of the outsourced data, 3) it enables indirect mutual trust between the owner and the CSP, and 4) it allows the owner to grant or revoke access to the outsourced data. We discuss the security issues of the proposed scheme. Besides, we justify its performance through theoretical analysis and a prototype implementation on Amazon cloud platform to evaluate storage, communication, and computation overheads.
引用
收藏
页码:2375 / 2385
页数:11
相关论文
共 32 条
[1]  
Atallah M.J., 2005, P ACM C COMPUTER COM, P190
[2]  
Ateniese G., 2006, ACM Transactions on Information and Systems Security, V9, P1, DOI 10.1145/1127345.1127346
[3]  
Ateniese G., 2008, P 4 EAI SECURECOMM, P1, DOI 10.1145/1460877.1460889
[4]  
Ateniese G, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P598
[5]  
Backes M, 2006, LECT NOTES COMPUT SC, V4189, P327
[6]  
Barreto P.S.L.M., 2006, P13633 IEEE STAND AS
[7]  
Barreto PSLM, 2006, LECT NOTES COMPUT SC, V3897, P319
[8]  
Barsoum A.F., 2010, Provable Possession and Replication of Data over Cloud Servers
[9]  
Barsoum A. F., 2011, IACR Cryptol. ePrint Arch., V2011, P447
[10]  
Blaze M, 1998, LECT NOTES COMPUT SC, V1403, P127, DOI 10.1007/BFb0054122