Skip to main content

A Performance Evaluation of Data Storage Approach for High Availability and Confidentiality on Multi-cloud

  • Conference paper
  • First Online:
Advances in Network-Based Information Systems (NBiS 2017)

Abstract

Recently, various public cloud services have been popular, and we can use these services at low cost. However, public cloud services have some security issues, for example, an end user can store a file on public cloud services managed by an uncontrollable administrator. Therefore, we propose an approach to solve this security issue for a storage service from the viewpoints of confidentiality and availability by using multiple public services simultaneously. In this paper, we describe how we developed our prototype for multiple actual public service usage and evaluated the performance of our approach. The practicality of our approach is shown.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Bessani, A., Correia, M., Quaresma, B., André, F., Sousa,P.: DEPSKY: dependable and secure storage in a cloud-of-clouds. In: EuroSys 2011: Proceeding of 6th Conference on Computer Systems, pp. 31–46 (2011)

    Google Scholar 

  2. Abu-Libdeh, H., Princehouse, L., Weatherspoon, H.: RACS: a case for cloud storage diversity. In: SoCC 2010: Proceeding of 1st ACM Symposium on Cloud Computing, pp. 229–240 (2010)

    Google Scholar 

  3. Bowers, K.D., Juels, A., Oprea, A.: HAIL: a high-availability and integrity layer for cloud storage. In: CCS 2009: Proceeding of 16th ACM Conference on Computer and Communications Security, pp. 187–198 (2009)

    Google Scholar 

  4. Tsai, W., Qi, G., Chen, Y.: A cost-effective intelligent configuration model in cloud computing. In: ICDCSW, 2012, pp. 400–408 (2012)

    Google Scholar 

  5. Kajiura, Y., Kanai, A., Tanimoto, S., Sato, H.: A file-distribution approach to achieve high availability and confidentiality for data storage on multi-cloud. In: SAPSE 2013 (2013)

    Google Scholar 

  6. Kanai, A., Tanimoto, S., Sato, H.: Data management approach for multiple clouds using secret sharing scheme. In: 8th International Workshop on Advanced Distributed and Parallel Network Applications (ADPNA-2014), pp. 432–437 (2014)

    Google Scholar 

  7. Sato, H., Kanai, A., Tanimoto, S.: A cloud trust model in a security aware cloud. In: Proceeding of IEEE/IPSJ International Symposium on Applications and the Internet (SAINT2010), pp. 121–124 (2010)

    Google Scholar 

  8. Tanimoto, S., Matsui, S., Sato, H., Kanai, A., et al.: A study of risk management in hybrid cloud configuration. Comput. Inf. Sci. 493, 247–257 (2013). Springer

    Google Scholar 

  9. Tanimoto, S., Sato, H., Kanai, A., et al.: A study of data management in hybrid cloud configuration. In: 14th IEEE/ACIS, SNPD 2013, pp. 381–386 (2013)

    Google Scholar 

  10. Sato, H., Kanai, A., Tanimoto, S.: Building a security aware cloud by extending internal control to cloud. In: Proceeding of 10th International Symposium on Autonomous Decentralized Systems (ISADS 2011), pp. 323–326 (2011)

    Google Scholar 

  11. Sato, H., Tanimoto, S., Kanai, A.: A policy consumption architecture that enables dynamic and fine policy management. In: Proceeding of 3rd ASE International Conference on Cybersecurity, pp. 1–11 (2014)

    Google Scholar 

  12. Yamamoto, H.: Secret sharing system using (k, L, n) threshold scheme. Electron. Commun. Jpn. (Part I: Commun.) 69(9), 46–54 (1986)

    Article  MathSciNet  Google Scholar 

  13. Shamir, A.: How to share a secret. Commun. ACM 22(11), 612–613 (1979)

    Article  MathSciNet  MATH  Google Scholar 

  14. Kajiura, Y., Ueno, S., Kanai, A., Tanimoto, S., Sato, H.: Approach to selecting cloud services for data storage in heterogeneous multicloud environment with high availability and confidentiality. In: The First International Workshop on Service Assurance in System Wide Information Management (SASWIM 2015), pp. 205–210 (2015)

    Google Scholar 

  15. Blakley, G.R.: Security of ramp schemes. In: Crypto 1984, pp. 242–268 (1984)

    Google Scholar 

  16. Kanai, A., Tanimoto, S., Sato, H.: Performance evaluation on data management approach for multiple clouds using secret sharing scheme. In: Proceeding of IEEE/ICCE, ICCE 2016, pp. 471–473 (2016)

    Google Scholar 

  17. Ueno, S., Kanai, A., Tanimoto, S., Sato, H.: Evaluation of selecting cloud services approach for data storage using secret sharing scheme. In: Proceeding of the Sixth International Conference on Performance, Safety and Robustness in Complex Systems and Applications (PESARO 2016), pp. 1–6, February 2016

    Google Scholar 

Download references

Acknowledgments

This work was supported by the Japan Society for the Promotion of Science (JSPS, KAKENHI Grant Number 15H02783)

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yamato Miura .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG

About this paper

Cite this paper

Miura, Y., Wakabayashi, N., Ueno, S., Kanai, A., Tanimoto, S., Sato, H. (2018). A Performance Evaluation of Data Storage Approach for High Availability and Confidentiality on Multi-cloud. In: Barolli, L., Enokido, T., Takizawa, M. (eds) Advances in Network-Based Information Systems. NBiS 2017. Lecture Notes on Data Engineering and Communications Technologies, vol 7. Springer, Cham. https://doi.org/10.1007/978-3-319-65521-5_80

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-65521-5_80

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-65520-8

  • Online ISBN: 978-3-319-65521-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics