[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
article

Toward Secure and Dependable Storage Services in Cloud Computing

Published: 01 January 2012 Publication History

Abstract

Cloud storage enables users to remotely store their data and enjoy the on-demand high quality cloud applications without the burden of local hardware and software management. Though the benefits are clear, such a service is also relinquishing users' physical possession of their outsourced data, which inevitably poses new security risks toward the correctness of the data in cloud. In order to address this new problem and further achieve a secure and dependable cloud storage service, we propose in this paper a flexible distributed storage integrity auditing mechanism, utilizing the homomorphic token and distributed erasure-coded data. The proposed design allows users to audit the cloud storage with very lightweight communication and computation cost. The auditing result not only ensures strong cloud storage correctness guarantee, but also simultaneously achieves fast data error localization, i.e., the identification of misbehaving server. Considering the cloud data are dynamic in nature, the proposed design further supports secure and efficient dynamic operations on outsourced data, including block modification, deletion, and append. Analysis shows the proposed scheme is highly efficient and resilient against Byzantine failure, malicious data modification attack, and even server colluding attacks.

Cited By

View all
  1. Toward Secure and Dependable Storage Services in Cloud Computing

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image IEEE Transactions on Services Computing
    IEEE Transactions on Services Computing  Volume 5, Issue 2
    January 2012
    143 pages

    Publisher

    IEEE Computer Society

    United States

    Publication History

    Published: 01 January 2012

    Author Tags

    1. Data integrity
    2. cloud computing.
    3. data dynamics
    4. dependable distributed storage
    5. error localization

    Qualifiers

    • Article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 05 Mar 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Hardening Password-Based Credential DatabasesIEEE Transactions on Information Forensics and Security10.1109/TIFS.2023.332432619(469-484)Online publication date: 1-Jan-2024
    • (2024)A secure dynamic cross-chain decentralized data consistency verification modelJournal of King Saud University - Computer and Information Sciences10.1016/j.jksuci.2023.10189736:1Online publication date: 17-Apr-2024
    • (2024)NAISSComputers and Security10.1016/j.cose.2024.103797140:COnline publication date: 1-May-2024
    • (2024)A watermarking-based authentication and recovery scheme for encrypted audioMultimedia Tools and Applications10.1007/s11042-023-16032-283:4(10969-10987)Online publication date: 1-Jan-2024
    • (2024)A blockchain assisted public auditing scheme for cloud-based digital twin healthcare servicesCluster Computing10.1007/s10586-023-04101-y27:3(2593-2609)Online publication date: 1-Jun-2024
    • (2023)Cost-effective Data Upkeep in Decentralized Storage SystemsProceedings of the 38th ACM/SIGAPP Symposium on Applied Computing10.1145/3555776.3577728(165-173)Online publication date: 27-Mar-2023
    • (2022)Evaluation of Internet Addiction Exercise Intervention Effect for Teenagers Based on Intelligent Psychological Strategy TechnologyWireless Communications & Mobile Computing10.1155/2022/70298552022Online publication date: 1-Jan-2022
    • (2022)Toward secure distributed data storage with error locating in blockchain enabled edge computingComputer Standards & Interfaces10.1016/j.csi.2021.10356079:COnline publication date: 1-Jan-2022
    • (2022)Enhanced cloud security model using QKDP (ECSM-QKDP) for advanced data security over cloudQuantum Information Processing10.1007/s11128-022-03452-621:3Online publication date: 1-Mar-2022
    • (2021)BOSSA: A Decentralized System for Proofs of Data Retrievability and ReplicationIEEE Transactions on Parallel and Distributed Systems10.1109/TPDS.2020.303006332:4(786-798)Online publication date: 1-Apr-2021
    • Show More Cited By

    View Options

    View options

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media