[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
article

A Publicly Verifiable Dynamic Secret Sharing Protocol for Secure and Dependable Data Storage in Cloud Computing

Published: 01 July 2012 Publication History

Abstract

Data storage is an important application of cloud computing, where the users can remotely store their data into the cloud. This new paradigm of data storage service also introduces security challenges, such as Confidentiality, Integrity and Availability of data. The protection of these issues in cloud is a very challenging and potentially formidable task, especially for the users with constrained resources. Therefore, an independent auditing service is required to address these issues of data stored in the cloud. The existing schemes may not scale well for this purpose. This paper proposes a publicly verifiable dynamic secret sharing scheme for the Availability, Integrity and Confidentiality of data. Their scheme takes advantages of both Secret Sharing and Tornado code which can achieve the computational security and maintain low communication overhead in terms of shortened data dispersing size. The authors' model gives probabilistic proofs of Integrity of data by challenging random blocks from the server to reduce the computation and communication overhead, and also supports dynamic data operations to data shares in cloud using index table. Through extensive security analysis, their scheme can provide secure, dependable, and publicly verifiable cloud data storage in the Cloud against threats. Through the performance and experimental results, the authors prove that their scheme is efficient than existing schemes.

References

[1]
Amazon. 2008. Amazon Web Services AWS. Retrieved from http://aws.amazon.com
[2]
Apple. 2010. ICloud. Retrieved from http://www.apple.com/icloud/what-is.html
[3]
Barsoum, A. F.,&Hasan, M. A. 2010. Provable possession and replication of data over cloud servers. Waterloo, ON, Canada: Centre for Applied Cryptographic Research CACR, University of Waterloo. Retrieved from http://eprint.iacr.org/http://www.cacr.math.uwaterloo.ca/techreports/2010/cacr2010- 32.pdf
[4]
Bowers, K. D., Juels, A.,&Oprea, A. 2008. HAIL: A high-availability and integrity layer for cloud storage. In Proceedings of the 16th ACM Conference on Computer and Communications Security pp. 187-198.
[5]
Buyya, R., Yeo, C. S., Venugopal, S., Broberg, J.,&Brandic, I. 2009. Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility. Future Generation Computer Systems, 256, 599-616.
[6]
Byes, J. W., Luby, M., Mitzenmacher, M.,&Rege, A. 2002. A digital fountain approach to asynchronous reliable multicast. IEEE Journal on Selected Areas in Communications, 208, 1528-1540.
[7]
Cellan-Jones, R. 2009. The sidekick cloud disaster. BBC News, 1.
[8]
Hao, Z.,&Yu, N. 2010. A multiple-replica remote data possession checking protocol with public verifiability. In Proceedings of the Second International Symposium on Data, Privacy, and E-Commerce pp. 84-89.
[9]
Hao, Z., Zhong, S.,&Yu, N. 2011. A privacy-preserving remote data integrity checking protocol with data dynamics and public verifiability. IEEE Transactions on Knowledge and Data Engineering, 239, 1432-1437.
[10]
Kan, Y.,&Jia, X. 2011. Data storage auditing service in cloud computing: Challenges, methods and opportunities. World Wide Web, 154, 409-428.
[11]
Krawczyk, H. 1993a. Secret sharing made short. In Proceedings of the 13th Annual International Cryptology Conference pp. 136-146.
[12]
Krawczyk, H. 1993b. Distributed fingerprints and secure information dispersal. In Proceedings of the 12th Annual ACM Symposium on Principles of Distributed Computing pp. 207-218.
[13]
Li, Q., Lui, J. C. S.,&Chiu, D.-M. 2012. On the security and efficiency of content distribution via network coding. IEEE Transactions on Dependable and Secure Computing, 92, 211-221.
[14]
Mather, T., Kumaraswamy, S.,&Latif, S. 2009. Cloud security and privacy. Sebastopol, CA: O'Reilly.
[15]
Matossian, V.,&Parashar, M. 2003. Enabling peer-to-peer interactions for scientific applications on the grid. In H. Kosch, L. Bööszörményi,&H. Hellwagner Eds., Proceedings of the Ninth International Euro-Par Conference on Parallel Processing LNCS 2790, pp. 1240-1247.
[16]
Miller, R. 2010, May 10. Amazon addresses EC2 power outages. Data Center Knowledge.
[17]
Rabin, M. 1989. Efficient dispersal of information for security, loadbalancing, and fault tolerance. Journal of the ACM, 362, 335-348.
[18]
Ren, W., Ren, Y.,&Zhag, H. 2010. Secure, dependable and publicly verifiable distributed data storage in unattended wireless sensor networks. Science China . Information Sciences, 535, 964-979.
[19]
Shamir, A. 1979. How to share a secret. Communications of the ACM, 2211, 612-613.
[20]
Syam, K. P.,&Subramanian, R. 2011a. Homomorpic distributed verification ptorotocol for ensuring data storage security in cloud computing. Journal of Information, 1410, 3465-3476.
[21]
Syam, K. P.,&Subramanian, R. 2011b. An efficient and secure protocol for ensuring data storage security in cloud computing. International Journal of Computer Science Issues, 86, 261-274.
[22]
Takabi, H., Joshi, J. B. D.,&Ahn, G. 2010. Security and privacy challenges in cloud computing environments. IEEE Transactions on Security and Privacy, 86, 24-31.
[23]
Tu, M., Li, P.,&Yen, I. 2010. Secure data objects replication in data grid. IEEE Transactions on Dependable and Secure Computing, 71, 50-64.
[24]
Wang, C., Wang, Q., Ren, K., Cao, N.,&Lou, W. 2012. Towards secure and dependable storage services in cloud computing. IEEE Transactions on Service Computing, 52, 220-232.
[25]
Wang, C., Wang, Q., Ren, K.,&Lou, W. 2011, March. Privacy-preserving public auditing for data storage security in cloud computing. In Proceedings of the IEEE International Conference INFOCOM, San Diego, CA pp. 1-9.
[26]
Wang, Q., Ren, K., Yu, S.,&Lou, W. 2011. Dependable and secure sensor data storage with dynamic Integrity assurance. ACM Transactions on Sensor Networks, 81, article 9.
[27]
Wang, Q., Wang, C., Li, J., Ren, K.,&Lou, W. 2011. Enabling public verifiability and data dynamics for storage security in cloud computing. IEEE Transactions on Parallel and Distributed Systems, 225, 355-370.
[28]
Xiao, L., Yen, I., Zhang, Y.,&Bastani, F. 2007. Evaluating dependable distributed storage systems. In Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications.
[29]
Yang, J., Wang, H., Wang, J., Tan, C.,&Yu, D. 2011. Provable data possession of resource-constrained mobile devices in cloud computing. Journal of Networks, 67, 1033-1040.
[30]
Ye, Y., Yen, I., Xiao, L.,&Bastani, F. 2010. Secure, dependable and high performance cloud storage Tech. Rep. No. UTDCS-10-10. In Proceedings of the 29th IEEE Symposium on Reliable Distributed Systems pp. 194-203.
[31]
Zhu, Y., Wang, H., Hu, Z., Ahn, G., Hu, H.,&Yau, S. 2011, March 21-24. Dynamic audit services for integrity verification of outsourced storages in clouds. In Proceedings of the 26th ACM Symposium on Applied Computing, TaiChung, Taiwan.

Cited By

View all
  • (2024)Economic and financial news hybrid- classification based on category-associated feature setIntelligent Data Analysis10.3233/IDA-23737328:1(185-201)Online publication date: 1-Jan-2024
  • (2024)Fast American Option Pricing using Nonlinear StencilsProceedings of the 29th ACM SIGPLAN Annual Symposium on Principles and Practice of Parallel Programming10.1145/3627535.3638506(316-332)Online publication date: 2-Mar-2024
  • (2024)On the Numerical Option Pricing Methods: Fractional Black-Scholes Equations with CEV AssetsComputational Economics10.1007/s10614-023-10482-464:3(1463-1488)Online publication date: 1-Sep-2024
  • Show More Cited By
  1. A Publicly Verifiable Dynamic Secret Sharing Protocol for Secure and Dependable Data Storage in Cloud Computing

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image International Journal of Cloud Applications and Computing
    International Journal of Cloud Applications and Computing  Volume 2, Issue 3
    July 2012
    109 pages
    ISSN:2156-1834
    EISSN:2156-1826
    Issue’s Table of Contents

    Publisher

    IGI Global

    United States

    Publication History

    Published: 01 July 2012

    Author Tags

    1. Availability
    2. Cloud Storage
    3. Confidentiality
    4. Integrity
    5. Linear Code
    6. Probability Detection
    7. Secret Sharing
    8. Tornado Code

    Qualifiers

    • Article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 08 Feb 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Economic and financial news hybrid- classification based on category-associated feature setIntelligent Data Analysis10.3233/IDA-23737328:1(185-201)Online publication date: 1-Jan-2024
    • (2024)Fast American Option Pricing using Nonlinear StencilsProceedings of the 29th ACM SIGPLAN Annual Symposium on Principles and Practice of Parallel Programming10.1145/3627535.3638506(316-332)Online publication date: 2-Mar-2024
    • (2024)On the Numerical Option Pricing Methods: Fractional Black-Scholes Equations with CEV AssetsComputational Economics10.1007/s10614-023-10482-464:3(1463-1488)Online publication date: 1-Sep-2024
    • (2024)An Efficient Numerical Scheme to Approach the Time Fractional Black–Scholes Model Using Orthogonal Gegenbauer PolynomialsComputational Economics10.1007/s10614-023-10444-w64:1(211-224)Online publication date: 1-Jul-2024
    • (2024)A Hybrid Spectral-Finite Difference Method for Numerical Pricing of Time-Fractional Black–Scholes EquationComputational Economics10.1007/s10614-023-10441-z64:2(841-869)Online publication date: 1-Aug-2024
    • (2024)Analytical and Numerical Solution for the Time Fractional Black-Scholes Model Under Jump-DiffusionComputational Economics10.1007/s10614-023-10386-363:5(1853-1878)Online publication date: 1-May-2024
    • (2023)Numerical Approximation to a Variable-Order Time-Fractional Black–Scholes Model with Applications in Option PricingComputational Economics10.1007/s10614-022-10295-x62:3(1155-1175)Online publication date: 1-Oct-2023
    • (2021)Novel ANN Method for Solving Ordinary and Time-Fractional Black–Scholes EquationComplexity10.1155/2021/55113962021Online publication date: 1-Jan-2021
    • (2020)Distributed Multi-User Secret SharingIEEE Transactions on Information Theory10.1109/TIT.2020.302819467:1(164-178)Online publication date: 18-Dec-2020
    • (2019)A Computational Method Based on the Moving Least-Squares Approach for Pricing Double Barrier Options in a Time-Fractional Black–Scholes ModelComputational Economics10.1007/s10614-019-09880-455:1(119-141)Online publication date: 2-Feb-2019
    • Show More Cited By

    View Options

    View options

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media