Skip to main content

A Proposed Protocol for Periodic Monitoring of Cloud Storage Services Using Trust and Encryption

  • Conference paper
  • First Online:
Computational Science and Its Applications – ICCSA 2016 (ICCSA 2016)

Abstract

The advantages of using cloud computing include scalability, availability and a virtually ‘unlimited’ storage capacity. However, it is challenging to build storage services that are at the same time safe from the customer point-of-view and that run in public cloud infrastructures managed by service providers that can not be fully considered trustworthy. Owners of large amounts of data have to keep their data in the cloud for a long period of time without the need to keep copies of the original data or to access it. In such cases, questions of Integrity, availability, privacy and trust are still challenges in the adoption of Cloud Storage Services to ensure security, especially when losing or leaking information can bring significant damage, be it legal or business-related. With such concerns in mind, this paper proposes a protocol to monitor the information stored in the cloud and the behaviour of contracted storage services periodically. The proposed protocol, which is based on trust and encryption, is validated by analysis and simulation that demonstrate its utilization of computing resources compared to its results regarding cloud storage protection that are achieved over time.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Tandel, S.T., Shah, V.K., Hiranwal, S.: An implementation of effective XML based dynamic data integrity audit service in cloud. Int. J. Soc. Appl. Comput. Sci. 2(8), 449–553 (2014)

    Google Scholar 

  2. Dabas, P., Wadhwa, D.: A recapitulation of data auditing approaches for cloud data. Int. J. Comput. Appl. Technol. Res. (IJCATR) 3(6), 329–332 (2014)

    Article  Google Scholar 

  3. Miller, M.: Cloud Computing Web-Based Applications that Change the Way You Work and Collaborate online. Que Publishing, Pearson Education, Canada (2008)

    Google Scholar 

  4. Velte, T., Velte, A., Elsenpeter, R.: Cloud Computing, A Practical Approach. McGraw-Hill, Inc., New York (2009)

    Google Scholar 

  5. Zhou, M., Zhang, R., Zeng, D., Qian, W.: Services in the cloud computing era: a survey. In: 4th International Universal Communication, Symposium (IUCS), pp. 40–46. IEEE Shanghai, China (2010)

    Google Scholar 

  6. Jing, X., Jian-jun, Z.: A brief survey on the security model of cloud computing. In: Ninth International Symposium on Distributed Computing and Applications to Business, Engineering and Science (DCABES), pp. 475–478. IEEE Hong Kong (2010)

    Google Scholar 

  7. Mell, P., Grance, T.: The NIST definition of cloud computing. Technical report, National Institute of Standards and Technology (2009)

    Google Scholar 

  8. Bellare, M.: Public-Key Encryption in a Multi-user Setting: Security Proofs and Improvements. Springer, Heidelberg (2000)

    MATH  Google Scholar 

  9. Marsh, S.P.: Formalizing trust as a computational concept. Department of Computing Science and Mathematics, University of Stirling, Doctorate Thesis (1994)

    Google Scholar 

  10. Gambetta, D.: Can we trust trust. In: Gambetta, D. (ed.) Trust: Making and Breaking Cooperative Relations, Chap. 13, Electronic edn., pp. 213–237. Department of Sociology, University of Oxford (2008)

    Google Scholar 

  11. Jφsang, A., Knapskog, S.J.: A metric for trusted systems. In: Global IT Security, pp. 541–549 (1998)

    Google Scholar 

  12. Bose, R.: Information Theory, Coding and Cryptography, 2nd Edn., pp. 297–298. Tata McGraw-Hill, New Delhi (2008)

    Google Scholar 

  13. Juels, A., Kaliski, B.S.: Pors: proofs of retrievability for large files. In: 14th ACM Conference on Computer and Communication Security (CCS), Alexandria, VA, pp. 584–59 (2007)

    Google Scholar 

  14. Kumar, R.S., Saxena, A.: Data integrity proofs in cloud storage. In: Third International Conference on Communication Systems and Networks (COMSNETS), Bangalore (2011)

    Google Scholar 

  15. George, R.S., Sabitha, S.: Data anonymization and integrity checking in cloud computing. In: Fourth International Conference on Computing (ICCCNT), Communications and Networking Technologies, Tiruchengode (2013)

    Google Scholar 

  16. Kavuri, S.K.S.V.A., Kancherla, G.R., Bobba, B.R.: Data authentication and integrity verification techniques for trusted/untrusted cloud servers. In: International Conference on Advances in Computing, Communications and Informatics (ICACCI), New Delhi, pp. 2590–2596 (2014)

    Google Scholar 

  17. Al-Jaberi, M.F., Zainal, A.: Data integrity and privacy model in cloud computing. In: International Symposium on Biometrics and Security Technologies (ISBAST), Kuala Lumpur, pp. 280–284 (2014)

    Google Scholar 

  18. Kay, H., et al.: An efficient public batch auditing protocol for data security in multi-cloud storage. In: 8th ChinaGrid Annual Conference (ChinaGrid), Changchun, pp. 51–56 (2013)

    Google Scholar 

  19. Wang, Q., Wang, C., Li, J., Ren, K., Lou, W.: enabling public verifiability and data dynamics for storage security in cloud computing. In: Backes, M., Ning, P. (eds.) ESORICS 2009. LNCS, vol. 5789, pp. 355–370. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  20. Jordão, R., Martins, V.A., Buiati, F., Sousa Jr., R.T., Deus, F.E.: Secure data storage in distributed cloud environments. In: IEEE International Conference on Big Data (IEEE BigData), Washington DC, USA, pp. 6–12 (2014)

    Google Scholar 

Download references

Acknowledgments

The authors wish to thank the Brazilian research, development and innovation Agencies CAPES (Grant FORTE 23038.007604/2014-69), FINEP (Grant RENASIC/PROTO 01.12.0555.00) and the Research Support Foundation of the Federal District FAPDF, as well as the Science and Technology Department of the Brazilian Army, the Brazilian Public Administration School ENAP (Cooperation Agreement 02/2013) and the Brazilian Union Public Defender DPGU (Cooperation Agreement 30/2014), for their support to this work.

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Alexandre Pinheiro , Edna Dias Canedo , Rafael Timóteo de Sousa Jr. or Robson de Oliveira Albuquerque .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this paper

Cite this paper

Pinheiro, A., Canedo, E.D., de Sousa, R.T., de Oliveira Albuquerque, R. (2016). A Proposed Protocol for Periodic Monitoring of Cloud Storage Services Using Trust and Encryption. In: Gervasi, O., et al. Computational Science and Its Applications – ICCSA 2016. ICCSA 2016. Lecture Notes in Computer Science(), vol 9787. Springer, Cham. https://doi.org/10.1007/978-3-319-42108-7_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-42108-7_4

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-42107-0

  • Online ISBN: 978-3-319-42108-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics