Abstract
The advantages of using cloud computing include scalability, availability and a virtually ‘unlimited’ storage capacity. However, it is challenging to build storage services that are at the same time safe from the customer point-of-view and that run in public cloud infrastructures managed by service providers that can not be fully considered trustworthy. Owners of large amounts of data have to keep their data in the cloud for a long period of time without the need to keep copies of the original data or to access it. In such cases, questions of Integrity, availability, privacy and trust are still challenges in the adoption of Cloud Storage Services to ensure security, especially when losing or leaking information can bring significant damage, be it legal or business-related. With such concerns in mind, this paper proposes a protocol to monitor the information stored in the cloud and the behaviour of contracted storage services periodically. The proposed protocol, which is based on trust and encryption, is validated by analysis and simulation that demonstrate its utilization of computing resources compared to its results regarding cloud storage protection that are achieved over time.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Tandel, S.T., Shah, V.K., Hiranwal, S.: An implementation of effective XML based dynamic data integrity audit service in cloud. Int. J. Soc. Appl. Comput. Sci. 2(8), 449–553 (2014)
Dabas, P., Wadhwa, D.: A recapitulation of data auditing approaches for cloud data. Int. J. Comput. Appl. Technol. Res. (IJCATR) 3(6), 329–332 (2014)
Miller, M.: Cloud Computing Web-Based Applications that Change the Way You Work and Collaborate online. Que Publishing, Pearson Education, Canada (2008)
Velte, T., Velte, A., Elsenpeter, R.: Cloud Computing, A Practical Approach. McGraw-Hill, Inc., New York (2009)
Zhou, M., Zhang, R., Zeng, D., Qian, W.: Services in the cloud computing era: a survey. In: 4th International Universal Communication, Symposium (IUCS), pp. 40–46. IEEE Shanghai, China (2010)
Jing, X., Jian-jun, Z.: A brief survey on the security model of cloud computing. In: Ninth International Symposium on Distributed Computing and Applications to Business, Engineering and Science (DCABES), pp. 475–478. IEEE Hong Kong (2010)
Mell, P., Grance, T.: The NIST definition of cloud computing. Technical report, National Institute of Standards and Technology (2009)
Bellare, M.: Public-Key Encryption in a Multi-user Setting: Security Proofs and Improvements. Springer, Heidelberg (2000)
Marsh, S.P.: Formalizing trust as a computational concept. Department of Computing Science and Mathematics, University of Stirling, Doctorate Thesis (1994)
Gambetta, D.: Can we trust trust. In: Gambetta, D. (ed.) Trust: Making and Breaking Cooperative Relations, Chap. 13, Electronic edn., pp. 213–237. Department of Sociology, University of Oxford (2008)
Jφsang, A., Knapskog, S.J.: A metric for trusted systems. In: Global IT Security, pp. 541–549 (1998)
Bose, R.: Information Theory, Coding and Cryptography, 2nd Edn., pp. 297–298. Tata McGraw-Hill, New Delhi (2008)
Juels, A., Kaliski, B.S.: Pors: proofs of retrievability for large files. In: 14th ACM Conference on Computer and Communication Security (CCS), Alexandria, VA, pp. 584–59 (2007)
Kumar, R.S., Saxena, A.: Data integrity proofs in cloud storage. In: Third International Conference on Communication Systems and Networks (COMSNETS), Bangalore (2011)
George, R.S., Sabitha, S.: Data anonymization and integrity checking in cloud computing. In: Fourth International Conference on Computing (ICCCNT), Communications and Networking Technologies, Tiruchengode (2013)
Kavuri, S.K.S.V.A., Kancherla, G.R., Bobba, B.R.: Data authentication and integrity verification techniques for trusted/untrusted cloud servers. In: International Conference on Advances in Computing, Communications and Informatics (ICACCI), New Delhi, pp. 2590–2596 (2014)
Al-Jaberi, M.F., Zainal, A.: Data integrity and privacy model in cloud computing. In: International Symposium on Biometrics and Security Technologies (ISBAST), Kuala Lumpur, pp. 280–284 (2014)
Kay, H., et al.: An efficient public batch auditing protocol for data security in multi-cloud storage. In: 8th ChinaGrid Annual Conference (ChinaGrid), Changchun, pp. 51–56 (2013)
Wang, Q., Wang, C., Li, J., Ren, K., Lou, W.: enabling public verifiability and data dynamics for storage security in cloud computing. In: Backes, M., Ning, P. (eds.) ESORICS 2009. LNCS, vol. 5789, pp. 355–370. Springer, Heidelberg (2009)
Jordão, R., Martins, V.A., Buiati, F., Sousa Jr., R.T., Deus, F.E.: Secure data storage in distributed cloud environments. In: IEEE International Conference on Big Data (IEEE BigData), Washington DC, USA, pp. 6–12 (2014)
Acknowledgments
The authors wish to thank the Brazilian research, development and innovation Agencies CAPES (Grant FORTE 23038.007604/2014-69), FINEP (Grant RENASIC/PROTO 01.12.0555.00) and the Research Support Foundation of the Federal District FAPDF, as well as the Science and Technology Department of the Brazilian Army, the Brazilian Public Administration School ENAP (Cooperation Agreement 02/2013) and the Brazilian Union Public Defender DPGU (Cooperation Agreement 30/2014), for their support to this work.
Author information
Authors and Affiliations
Corresponding authors
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this paper
Cite this paper
Pinheiro, A., Canedo, E.D., de Sousa, R.T., de Oliveira Albuquerque, R. (2016). A Proposed Protocol for Periodic Monitoring of Cloud Storage Services Using Trust and Encryption. In: Gervasi, O., et al. Computational Science and Its Applications – ICCSA 2016. ICCSA 2016. Lecture Notes in Computer Science(), vol 9787. Springer, Cham. https://doi.org/10.1007/978-3-319-42108-7_4
Download citation
DOI: https://doi.org/10.1007/978-3-319-42108-7_4
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-42107-0
Online ISBN: 978-3-319-42108-7
eBook Packages: Computer ScienceComputer Science (R0)