Secure Cloud Storage Meets with Secure Network Coding

被引:59
作者
Chen, Fei [1 ]
Xiang, Tao [2 ]
Yang, Yuanyuan [3 ]
Chow, Sherman S. M. [4 ]
机构
[1] Shenzhen Univ, Coll Comp Sci & Engn, Shenzhen, Peoples R China
[2] Chongqing Univ, Coll Comp Sci, Chongqing 400044, Peoples R China
[3] SUNY Stony Brook, Dept Elect & Comp Engn, Stony Brook, NY 11794 USA
[4] Chinese Univ Hong Kong, Dept Informat Engn, Hong Kong, Hong Kong, Peoples R China
基金
中国国家自然科学基金;
关键词
Cloud storage auditing; network coding; security; user anonymity; third-party public auditing; SHARED DATA;
D O I
10.1109/TC.2015.2456027
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
This paper reveals an intrinsic relationship between secure cloud storage and secure network coding for the first time. Secure cloud storage was proposed only recently while secure network coding has been studied for more than ten years. Although the two areas are quite different in their nature and are studied independently, we show how to construct a secure cloud storage protocol given any secure network coding protocol. This gives rise to a systematic way to construct secure cloud storage protocols. Our construction is secure under a definition which captures the real world usage of the cloud storage. Furthermore, we propose two specific secure cloud storage protocols based on two recent secure network coding protocols. In particular, we obtain the first publicly verifiable secure cloud storage protocol in the standard model. We also enhance the proposed generic construction to support user anonymity and third-party public auditing, which both have received considerable attention recently. Finally, we prototype the newly proposed protocol and evaluate its performance. Experimental results validate the effectiveness of the protocol.
引用
收藏
页码:1936 / 1948
页数:13
相关论文
共 31 条
[1]   Homomorphic MACs: MAC-Based Integrity for Network Coding [J].
Agrawal, Shweta ;
Boneh, Dan .
APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, 2009, 5536 :292-+
[2]   Network information flow [J].
Ahlswede, R ;
Cai, N ;
Li, SYR ;
Yeung, RW .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2000, 46 (04) :1204-1216
[3]  
Anh Le, 2012, 2012 International Symposium on Network Coding (NetCod 2012), P155, DOI 10.1109/NETCOD.2012.6261901
[4]  
[Anonymous], 2013, IEEE T COMPUT, DOI DOI 10.1109/TC.2011.245
[5]  
[Anonymous], BYOD DATA LOSS TOP L
[6]  
[Anonymous], Y NEWS
[7]  
Ateniese G, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P598
[8]   DEPSKY: Dependable and Secure Storage in a Cloud-of-Clouds [J].
Bessani, Alysson ;
Correia, Miguel ;
Quaresma, Bruno ;
Andre, Fernando ;
Sousa, Paulo .
ACM TRANSACTIONS ON STORAGE, 2013, 9 (04)
[9]   Secure network coding [J].
Cai, N ;
Yeung, RW .
ISIT: 2002 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, PROCEEDINGS, 2002, :323-323
[10]  
Catalano D, 2012, LECT NOTES COMPUT SC, V7293, P680, DOI 10.1007/978-3-642-30057-8_40