Abstract
In recent years, researchers are investigating plenty of efforts to design cloud storage integrity checking protocols to ensure the outsourced data’s security. In such protocols, parameters are often chosen in an ad-hoc way. In this paper, we show that an optimal parameter selection exists in the economical sense when considering current cloud storage practices. We derive the optimal parameter selection by establishing a cost model for the previously already proposed cloud storage integrity checking protocols. The cost model takes account of storage cost, data transfer cost, and data access request cost as charged by current cloud storage practice. Besides the optimal parameter selection, we show that an optimal total cost also exists. Experimental analysis with one large Chinese cloud storage service provider, Ali OSS, further validates our model. Therefore, we believe that the optimal parameter selection suggested in this work helps the already proposed cloud storage integrity checking protocols more ready to be used in practice.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Juels, A., Kaliski Jr., B.: Pors: proofs of retrievability for large files. In: Proceedings of ACM CCS (2007)
Ateniese, G., Burns, R., Curtmola, R., Herring, J., Kissner, L., Peterson, Z., Song, D.: Provable data possession at untrusted stores. In: Proceedings of ACM CCS (2007)
Shacham, H., Waters, B.: Compact proofs of retrievability. In: Pieprzyk, J. (ed.) ASIACRYPT 2008. LNCS, vol. 5350, pp. 90–107. Springer, Heidelberg (2008). doi:10.1007/978-3-540-89255-7_7
Erway, C., Küpçü, A., Papamanthou, C., Tamassia, R.: Dynamic provable data possession. In: Proceedings of ACM CCS (2009)
Wang, C., Ren, K., Lou, W., Li, J.: Toward publicly auditable secure cloud data storage services. IEEE Netw. Mag. 24(4), 19–24 (2010)
Wang, C., Chow, S.S., Wang, Q., Ren, K., Lou, W.: Privacy-preserving public auditing for secure cloud storage. IEEE Trans. Comput. 62(2), 362–375 (2013)
Yang, K., Jia, X.: An efficient and secure dynamic auditing protocol for data storage in cloud computing. IEEE Trans. Parallel Distrib. Syst. 24(9), 1717–1726 (2013)
Shi, E., Stefanov, E., Papamanthou, C.: Practical dynamic proofs of retrievability. In: Proceedings of ACM CCS (2013)
Azraoui, M., Elkhiyaoui, K., Molva, R., Önen, M.: StealthGuard: proofs of retrievability with hidden watchdogs. In: Kutyłowski, M., Vaidya, J. (eds.) ESORICS 2014. LNCS, vol. 8712, pp. 239–256. Springer, Heidelberg (2014). doi:10.1007/978-3-319-11203-9_14
Chen, F., Xiang, T., Yang, Y., Chow, S.S.: Secure cloud storage meets with secure network coding. IEEE Trans. Comput. 65(6), 1936–1948 (2016)
Armknecht, F., Bohli, J.-M., Karame, G.O., Liu, Z., Reuter, C.A.: Outsourced proofs of retrievability. In: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, pp. 831–843. ACM (2014)
Chen, F., Xiang, T., Yang, Y., Wang, C., Zhang, S.: Secure cloud storage hits distributed string equality checking: more efficient, conceptually simpler, and provably secure. In: Proceeding of INFOCOM (2015)
Li, J., Tan, X., Chen, X., Wong, D.S., Xhafa, F.: Opor: enabling proof of retrievability in cloud computing with resource-constrained devices. IEEE Trans. Cloud Comput. 3(2), 195–205 (2015)
Yuan, J., Yu, S.: Pcpor: public and constant-cost proofs of retrievability in cloud1. J. Comput. Secur. 23(3), 403–425 (2015)
Guan, C., Ren, K., Zhang, F., Kerschbaum, F., Yu, J.: Symmetric-key based proofs of retrievability supporting public verification. In: Pernul, G., Ryan, P.Y.A., Weippl, E. (eds.) ESORICS 2015. LNCS, vol. 9326, pp. 203–223. Springer, Heidelberg (2015). doi:10.1007/978-3-319-24174-6_11
Knapp, K.: Cloud storage adoption strong despite lock-in concerns (2015). http://searchcloudcomputing.techtarget.com/news/4500258090/Cloud-storage-adoption-strong-despite-lock-in-concerns
Alibaba: Ali OSS pricing (2016). https://www.aliyun.com/price/product-/oss/detail
Juels, A., Oprea, A.: New approaches to security and availability for cloud data. Commun. ACM 56(2), 64–73 (2013). http://doi.acm.org/10.1145/2408776.2408793
Chen, F., Zhang, T., Chen, J., Xiang, T.: Cloud storage integrity checking: going from theory to practice. In: Proceedings of the 4th ACM International Workshop on Security in Cloud Computing, pp. 24–28. ACM (2016)
Juels, A., Oprea, A.M., Van Dijk, M.E., Stefanov, E.P.: Remote verification of file protections for cloud data storage, Jan 5 2016. US Patent 9,230,114
Acknowledgments
The authors are grateful for the anonymous reviewers’ insightful comments. The work in this paper was supported in part by the National Natural Science Foundation of China (Nos. 61502314 61672358), the Science and Technology Plan Projects of Shenzhen (Nos. JCYJ20160307115030281 and GJHZ20160226202520268), the Tencent Rhinoceros Birds Scientific Research Foundation (2015), and the Technology Planning Project from Guangdong Province, China (Grant No. 2014B010118005).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Chen, F., Xiong, X., Zhang, T., Li, J., Chen, J. (2017). Making Cloud Storage Integrity Checking Protocols Economically Smarter. In: Qiu, M. (eds) Smart Computing and Communication. SmartCom 2016. Lecture Notes in Computer Science(), vol 10135. Springer, Cham. https://doi.org/10.1007/978-3-319-52015-5_30
Download citation
DOI: https://doi.org/10.1007/978-3-319-52015-5_30
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-52014-8
Online ISBN: 978-3-319-52015-5
eBook Packages: Computer ScienceComputer Science (R0)