Skip to main content

Making Cloud Storage Integrity Checking Protocols Economically Smarter

  • Conference paper
  • First Online:
Smart Computing and Communication (SmartCom 2016)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 10135))

Included in the following conference series:

  • 2547 Accesses

Abstract

In recent years, researchers are investigating plenty of efforts to design cloud storage integrity checking protocols to ensure the outsourced data’s security. In such protocols, parameters are often chosen in an ad-hoc way. In this paper, we show that an optimal parameter selection exists in the economical sense when considering current cloud storage practices. We derive the optimal parameter selection by establishing a cost model for the previously already proposed cloud storage integrity checking protocols. The cost model takes account of storage cost, data transfer cost, and data access request cost as charged by current cloud storage practice. Besides the optimal parameter selection, we show that an optimal total cost also exists. Experimental analysis with one large Chinese cloud storage service provider, Ali OSS, further validates our model. Therefore, we believe that the optimal parameter selection suggested in this work helps the already proposed cloud storage integrity checking protocols more ready to be used in practice.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Juels, A., Kaliski Jr., B.: Pors: proofs of retrievability for large files. In: Proceedings of ACM CCS (2007)

    Google Scholar 

  2. Ateniese, G., Burns, R., Curtmola, R., Herring, J., Kissner, L., Peterson, Z., Song, D.: Provable data possession at untrusted stores. In: Proceedings of ACM CCS (2007)

    Google Scholar 

  3. Shacham, H., Waters, B.: Compact proofs of retrievability. In: Pieprzyk, J. (ed.) ASIACRYPT 2008. LNCS, vol. 5350, pp. 90–107. Springer, Heidelberg (2008). doi:10.1007/978-3-540-89255-7_7

    Chapter  Google Scholar 

  4. Erway, C., Küpçü, A., Papamanthou, C., Tamassia, R.: Dynamic provable data possession. In: Proceedings of ACM CCS (2009)

    Google Scholar 

  5. Wang, C., Ren, K., Lou, W., Li, J.: Toward publicly auditable secure cloud data storage services. IEEE Netw. Mag. 24(4), 19–24 (2010)

    Article  Google Scholar 

  6. Wang, C., Chow, S.S., Wang, Q., Ren, K., Lou, W.: Privacy-preserving public auditing for secure cloud storage. IEEE Trans. Comput. 62(2), 362–375 (2013)

    Article  MathSciNet  Google Scholar 

  7. Yang, K., Jia, X.: An efficient and secure dynamic auditing protocol for data storage in cloud computing. IEEE Trans. Parallel Distrib. Syst. 24(9), 1717–1726 (2013)

    Article  Google Scholar 

  8. Shi, E., Stefanov, E., Papamanthou, C.: Practical dynamic proofs of retrievability. In: Proceedings of ACM CCS (2013)

    Google Scholar 

  9. Azraoui, M., Elkhiyaoui, K., Molva, R., Önen, M.: StealthGuard: proofs of retrievability with hidden watchdogs. In: Kutyłowski, M., Vaidya, J. (eds.) ESORICS 2014. LNCS, vol. 8712, pp. 239–256. Springer, Heidelberg (2014). doi:10.1007/978-3-319-11203-9_14

    Google Scholar 

  10. Chen, F., Xiang, T., Yang, Y., Chow, S.S.: Secure cloud storage meets with secure network coding. IEEE Trans. Comput. 65(6), 1936–1948 (2016)

    Article  MathSciNet  Google Scholar 

  11. Armknecht, F., Bohli, J.-M., Karame, G.O., Liu, Z., Reuter, C.A.: Outsourced proofs of retrievability. In: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, pp. 831–843. ACM (2014)

    Google Scholar 

  12. Chen, F., Xiang, T., Yang, Y., Wang, C., Zhang, S.: Secure cloud storage hits distributed string equality checking: more efficient, conceptually simpler, and provably secure. In: Proceeding of INFOCOM (2015)

    Google Scholar 

  13. Li, J., Tan, X., Chen, X., Wong, D.S., Xhafa, F.: Opor: enabling proof of retrievability in cloud computing with resource-constrained devices. IEEE Trans. Cloud Comput. 3(2), 195–205 (2015)

    Article  Google Scholar 

  14. Yuan, J., Yu, S.: Pcpor: public and constant-cost proofs of retrievability in cloud1. J. Comput. Secur. 23(3), 403–425 (2015)

    Article  Google Scholar 

  15. Guan, C., Ren, K., Zhang, F., Kerschbaum, F., Yu, J.: Symmetric-key based proofs of retrievability supporting public verification. In: Pernul, G., Ryan, P.Y.A., Weippl, E. (eds.) ESORICS 2015. LNCS, vol. 9326, pp. 203–223. Springer, Heidelberg (2015). doi:10.1007/978-3-319-24174-6_11

    Chapter  Google Scholar 

  16. Knapp, K.: Cloud storage adoption strong despite lock-in concerns (2015). http://searchcloudcomputing.techtarget.com/news/4500258090/Cloud-storage-adoption-strong-despite-lock-in-concerns

  17. Alibaba: Ali OSS pricing (2016). https://www.aliyun.com/price/product-/oss/detail

  18. Juels, A., Oprea, A.: New approaches to security and availability for cloud data. Commun. ACM 56(2), 64–73 (2013). http://doi.acm.org/10.1145/2408776.2408793

    Article  Google Scholar 

  19. Chen, F., Zhang, T., Chen, J., Xiang, T.: Cloud storage integrity checking: going from theory to practice. In: Proceedings of the 4th ACM International Workshop on Security in Cloud Computing, pp. 24–28. ACM (2016)

    Google Scholar 

  20. Juels, A., Oprea, A.M., Van Dijk, M.E., Stefanov, E.P.: Remote verification of file protections for cloud data storage, Jan 5 2016. US Patent 9,230,114

    Google Scholar 

Download references

Acknowledgments

The authors are grateful for the anonymous reviewers’ insightful comments. The work in this paper was supported in part by the National Natural Science Foundation of China (Nos. 61502314 61672358), the Science and Technology Plan Projects of Shenzhen (Nos. JCYJ20160307115030281 and GJHZ20160226202520268), the Tencent Rhinoceros Birds Scientific Research Foundation (2015), and the Technology Planning Project from Guangdong Province, China (Grant No. 2014B010118005).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jianyong Chen .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Chen, F., Xiong, X., Zhang, T., Li, J., Chen, J. (2017). Making Cloud Storage Integrity Checking Protocols Economically Smarter. In: Qiu, M. (eds) Smart Computing and Communication. SmartCom 2016. Lecture Notes in Computer Science(), vol 10135. Springer, Cham. https://doi.org/10.1007/978-3-319-52015-5_30

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-52015-5_30

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-52014-8

  • Online ISBN: 978-3-319-52015-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics