Abstract
With the increase of data quantity, people have begun to attach importance to cloud storage, however, traditional single cloud can’t ensure the privacy of users’ data to a certain extent. To solve the security issue, we present a multi-cloud storage system called CloudS which spreads data over multiple cloud storage servers by using a new kind of XOR-based non-systematic erasure codes - Privacy Protecting Codes (PPC). For better user experiences and tradeoffs between security and performance, CloudS provides multiple levels of security by a variety of combinations of compression, encryption and coding schemes. In addition, we also put forward a novel Parallel Cyclic Encryption (PCE) scheme to achieve random secret key protection which attains high security and performance. We implement CloudS as a web application which doesn’t require users to perform complicated operations on local.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
China personal cloud storage industry and users’ behavior research. http://www.iimedia.cn/38351.html
Dependable storage in the Intercloud. http://domino.research.ibm.com/library/cyberdig.nsf/papers/630549C46339936C852577C200291E78
Abu-Libdeh, H., Princehouse, L., Weatherspoon, H.: RACS: a case for cloud storage diversity. In: Proceedings of the 1st ACM Symposium on Cloud Computing, pp. 229–240. ACM, Indianapolis (2010)
Ateniese, G., Burns, R., Curtmola, R., Herring, J., Kissner, L., Peterson, Z., Song, D.: Provable data possession at untrusted stores. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, pp. 229–240. ACM, Alexandria (2007)
Bessani, A., Correia, M., Quaresma, B., André, F., Sousa, P.: DepSky: dependable and secure storage in a cloud-of-clouds. ACM Trans. Storage (TOS) 9, 12 (2013)
Bowers, K.D., Juels, A., Oprea, A.: HAIL: a high-availability and integrity layer for cloud storage. In: Proceedings of the 16th ACM Conference on Computer and Communications Security, pp. 187–198. ACM, Chicago (2009)
Cachin, C., Keidar, I., Shraer, A.: Trusting the cloud. ACM SIGACT News 40, 81–86 (2009)
Ghemawat, S., Gobioff, H., Leung, S.T.: The google file system. In: ACM SIGOPS operating systems review, pp. 29–43. ACM, New York (2003)
Hafner, J.L.: WEAVER codes: highly fault tolerant erasure codes for storage systems. In: 4th Conference on File and Storage Technologies, pp. 16–16. USENIX, San Francisco (2005)
Juels, A., Kaliski Jr., B.S.: PORs: proofs of retrievability for large files. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, pp. 584–597. ACM, Alexandria (2007)
Daemen, J., Rijmen, V.: The Design of Rijndael: AES-The Advanced Encryption Standard. Springer Science and Business Media, Heidelberg (2013)
Patterson, D.A., Gibson, G., Katz, R.H.: A case for redundant arrays of inexpensive disks (RAID). ACM (1988)
Plank, J.S., Schuman, C.D., Robison, B.D.: Heuristics for optimizing matrix-based erasure codes for fault-tolerant storage systems. In: Proceedings of the 42nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, pp. 1–12. IEEE/IFIP, Boston (2012)
Plank, J.S., et al.: A tutorial on Reed-Solomon coding for fault-tolerance in RAID-like systems. Softw. Prac. Exp. 27, 995–1012 (1997)
Plank, JS, Huang C: Tutorial: erasure coding for storage applications. In: Slides presented at FAST-2013: 11th Usenix Conference on File and Storage Technologies. USENIX, San Jose (2013)
Rabin, M.O.: Efficient dispersal of information for security, load balancing, and fault tolerance. J. ACM (JACM) 36, 335–348 (1989)
Rashmi, K., Nakkiran, P., Wang, J., Shah, N.B., Ramchandran, K.: Having your cake and eating it too: jointly optimal erasure codes for I/O, storage, and network-bandwidth. In: Proceedings of the 13th USENIX Conference on File and Storage Technologies, pp. 81–94. USENIX, Santa Clara (2015)
Resch, J.K., Plank, J.S.: AONT-RS: blending security and performance in dispersed storage systems. In: Proceedings of the 9th USENIX Conference on File and Storage Technologies. USENIX, San Jose (2011)
Singleton, R.: Maximum distance-nary codes. In: IEEE Transactions on Information Theory, pp. 116–118. IEEE (1964)
Shamir, A.: How to share a secret. Communications of the ACM. 22, 612–613 (1979)
Sun, J., Xu, M., Feng, S., Li, Z., Wang, G., Liu, X.: Secure store of user authentication tokens in multi-cloud storage system. J. Comput. Inf. Syst. 11, 1013–1020 (2015)
Acknowledgments
This work is partially supported by NSF of China (grant numbers: 61373018, 11301288), Program for New Century Excellent Talents in University (grant number: NCET130301) and the Fundamental Research Funds for the Central Universities (grant number: 65141021).
Author information
Authors and Affiliations
Corresponding authors
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Shen, L., Feng, S., Sun, J., Li, Z., Wang, G., Liu, X. (2015). CloudS: A Multi-cloud Storage System with Multi-level Security. In: Wang, G., Zomaya, A., Martinez, G., Li, K. (eds) Algorithms and Architectures for Parallel Processing. ICA3PP 2015. Lecture Notes in Computer Science(), vol 9530. Springer, Cham. https://doi.org/10.1007/978-3-319-27137-8_51
Download citation
DOI: https://doi.org/10.1007/978-3-319-27137-8_51
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-27136-1
Online ISBN: 978-3-319-27137-8
eBook Packages: Computer ScienceComputer Science (R0)