Abstract
Cloud computing is growing exponentially, whereby there are now hundreds of cloud service providers (CSPs) of various sizes. While the cloud consumers may enjoy cheaper data storage and computation offered in this multi-cloud environment, they are also in face of more complicated reliability issues and privacy preservation problems of their outsourced data. In this paper, we propose a privacy-preserving STorage and REtrieval (STRE) mechanism that not only ensures security and privacy but also provides reliability guarantees for the outsourced searchable encrypted data. The STRE mechanism enables the cloud users to distribute and search their encrypted data in multiple cloud service providers (CSPs), and is robust even when a certain number of CSPs crash. Besides the reliability, STRE also offers the benefit of partially hidden search pattern.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Bai, L., Zou, X.: A proactive secret sharing scheme in matrix projection method. Int. J. Secur. Netw. 4(4), 201–209 (2009)
Chen, H.C.H., Lee, P.P.C.: Enabling data integrity protection in regenerating-coding-based cloud storage. In: Proceedings of the 31st IEEE International Symposium on Reliable Distributed Systems, pp. 51–60 (2012)
Curtmola, R., Garay, J.A., Kamara, S., Ostrovsky, R.: Searchable symmetric encryption: improved definitions and efficient constructions. In: ACM Conference on Computer and Communications Security, pp. 79–88 (2006)
Kamara, S., Papamanthou, C., Roeder, T.: Dynamic searchable symmetric encryption. In: ACM Conference on Computer and Communications Security, pp. 965–976 (2012)
Li, J., Wang, Q., Wang, C., Cao, N., Ren, K., Lou, W.: Fuzzy keyword search over encrypted data in cloud computing. In: IEEE Conference on Information Communications, pp. 441–445 (2010)
Li, J., Li, J., Chen, X., Liu, Z., Jia, C.: Privacy-preserving data utilization in hybrid clouds. Future Gener. Comput. Syst. 30(1), 98–106 (2014)
Owens, D.: Securing elasticity in the cloud. Commun. ACM 53, 46–51 (2010)
Song, D.X., Wagner, D., Perrig, A.: Practical techniques for searches on encrypted data. In: IEEE Symposium on Security and Privacy, pp. 44–55 (2000)
Zhao, X., Li, L., Xue, G., Silva, G.: Efficient anonymous message submission. In: 31th IEEE International Conference on Computer Communications, pp. 2228–2236 (2012)
Zhu, Y., Hu, H., Ahn, G.J., Yu, M.: Cooperative provable data possession for integrity verification in multicloud storage. IEEE Trans. Parallel Distrib. Syst. 23(12), 2231–2244 (2012)
Acknowledgments
Jingwei Li’s work was funded by China Scholarship Council. Dan Lin’s work was funded by the National Science Foundation (NSF-CNS-1250327 and NSF-DGE-1433659). Chunfu Jia’s work was supported by grant National Key Basic Research Program of China (Grant No. 2013CB834204), National Natural Science Foundation of China (Grant No. 61272423), Natural Science Foundation of Tianjin, China(Grant No. 14JCYBJC15300).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Li, J., Lin, D., Squicciarini, A., Jia, C. (2015). STRE: Privacy-Preserving Storage and Retrieval over Multiple Clouds. In: Tian, J., Jing, J., Srivatsa, M. (eds) International Conference on Security and Privacy in Communication Networks. SecureComm 2014. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 152. Springer, Cham. https://doi.org/10.1007/978-3-319-23829-6_3
Download citation
DOI: https://doi.org/10.1007/978-3-319-23829-6_3
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-23828-9
Online ISBN: 978-3-319-23829-6
eBook Packages: Computer ScienceComputer Science (R0)