skip to main content
10.1145/2896387.2896411acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiccConference Proceedingsconference-collections
research-article

Multiple-Clouds Computing Security Approaches: A Comparative Study

Authors Info & Claims
Published:22 March 2016Publication History

ABSTRACT

Relying on a single cloud as a storage service is not a proper solution for a number of reasons; for instance, the data could be captured while being uploaded to the cloud, and the data could be stolen from the cloud using a stolen ID. There are a number of approaches that have been developed in order to provide a secure data storage relying on the multiple-cloud paradigms. Through this paper we will study, and evaluate the existing approaches that have been proposed as a solution for multiple cloud storage systems in terms of security, privacy, and integrity. In addition, we will provide a brief overview of the concept of information dispersal strategies and provide an overview of state-of-the-art multiple cloud storage approaches. After that, all these approaches will be analysed with respect to pre-defined criteria/properties. Finally, we identify and highlight the obstacles/limitation in terms of usability, operational cost, and the lack of security, privacy, integrity, and access features for these approaches, which are very critical direction for future research on multiple cloud storage.

References

  1. L. Kelion, "Apple toughens iCloud security after celebrity breach", Available at: http://goo.gl/vyxS3S {Last accessed on November 11, 2015}.Google ScholarGoogle Scholar
  2. M. Hogan, F. Liu, A. Sokol and J. Tong, "Nist cloud computing standards roadmap," NIST Special Publication, vol. 35, 2011.Google ScholarGoogle ScholarCross RefCross Ref
  3. M. Vukolić, "The Byzantine empire in the intercloud," ACM SIGACT News, vol. 41, pp. 105--111, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. M. AlZain, B. Soh and E. Pardede, "A Byzantine Fault Tolerance Model for a Multi-cloud Computing," in Computational Science and Engineering (CSE), 2013 IEEE 16th International Conference on, pp. 130--137, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Bessani, M. Correia, B. Quaresma, F. André and P. Sousa, "DepSky: dependable and secure storage in a cloud-of-clouds," ACM Transactions on Storage (TOS), vol. 9, pp. 12, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. P. Verissimo, A. Bessani and M. Pasin, "The TClouds architecture: Open and resilient cloud-of-clouds computing," in Dependable Systems and Networks Workshops (DSN-W), 2012 IEEE/IFIP 42nd International Conference on, pp. 1--6, 2012.Google ScholarGoogle Scholar
  7. P. Riteau, "Building dynamic computing infrastructures over distributed clouds," in Network Cloud Computing and Applications (NCCA), 2011 First International Symposium on, pp. 127--130, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. N. Grozev and R. Buyya, "Inter-Cloud architectures and application brokering: taxonomy and survey," Software: Practice and Experience, vol. 44, pp. 369--390, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. H.S. Alqahtani and G. Kouadri-Mostefaoui, "Towards a Classification of Multiple-Cloud Computing Concepts and Terms," in Advances in Service-Oriented and Cloud Computing, Springer, 2014, pp. 271--277.Google ScholarGoogle Scholar
  10. S. Chen, S. Nepal and R. Liu, "Secure connectivity for intra-cloud and inter-cloud communication," in Parallel Processing Workshops (ICPPW), 2011 40th International Conference on, pp. 154--159, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. A.J. Ferrer, F. HernáNdez, J. Tordsson, E. Elmroth, A. Ali-Eldin, C. Zsigri, R. Sirvent, J. Guitart, R.M. Badia and K. Djemame, "OPTIMIS: A holistic approach to cloud service provisioning," Future Generation Comput.Syst., vol. 28, pp. 66--77, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. M.O. Rabin, "Efficient dispersal of information for security, load balancing, and fault tolerance," Journal of the ACM (JACM), vol. 36, pp. 335--348, 1989. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. J. Spillner and A. Schill, "Towards Dispersed Cloud Computing," in Communications and Networking (BlackSeaCom), 2014 IEEE International Black Sea Conference on, pp. 170--174, 2014.Google ScholarGoogle Scholar
  14. Bessani, L.A. Cutillo, G. Ramunno, N. Schirmer and P. Smiraglia, "The TClouds platform: concept, architecture and instantiations," in Proceedings of the 2nd International Workshop on Dependability Issues in Cloud Computing, pp. 1, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. J. Spillner and J. Müller, "Tutorial on Distributed Data Storage: From Dispersed Files to Stealth Databases," in Proceedings of the 2014 IEEE/ACM 7th International Conference on Utility and Cloud Computing, pp. 535--536, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Shamir, "How to share a secret," Commun ACM, vol. 22, pp. 612--613, 1979. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. H. Krawczyk, "Secret sharing made short," in Advances in Cryptology---CRYPTO'93, pp. 136--146, 1994. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. J. Spillner, G. Bombach, S. Matthischke, J. Müller, R. Tzschichholz and A. Schill, "Information dispersion over redundant arrays of optimal cloud storage for desktop users," in Utility and Cloud Computing (UCC), 2011 Fourth IEEE International Conference on, pp. 1--8, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. J.K. Resch and J.S. Plank, "AONT-RS: Blending Security and Performance in Dispersed Storage Systems," in Proceedings of the 9th USENIX Conference on File and Stroage Technologies, pp. 14--14, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. M.W. Storer, K.M. Greenan, E.L. Miller and K. Voruganti, "POTSHARDS---a secure, recoverable, long-term archival storage system," ACM Transactions on Storage (TOS), vol. 5, pp. 5, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. S. Kamara, C. Papamanthou and T. Roeder, "Cs2: A searchable cryptographic cloud storage system," Microsoft Research, TechReport MSR-TR-2011-58, 2011.Google ScholarGoogle Scholar
  22. Tchana, L. Broto and D. Hagimont, "Approaches to cloud computing fault tolerance," in Computer, Information and Telecommunication Systems (CITS), 2012 International Conference on, pp. 1--6, 2012.Google ScholarGoogle Scholar
  23. W. Zhao, P. Melliar-Smith and L.E. Moser, "Fault tolerance middleware for cloud computing," in Cloud Computing (CLOUD), 2010 IEEE 3rd International Conference on, pp. 67--74, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. L. Wu, B. Liu and W. Lin, "A dynamic data fault-tolerance mechanism for cloud storage," in Emerging Intelligent Data and Web Technologies (EIDWT), 2013 Fourth International Conference on, pp. 95--99, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Correia, P. Costa, M. Pasin, A. Bessani, F. Ramos and P. Verissimo, "On the feasibility of byzantine fault-tolerant mapreduce in clouds-of-clouds," in Reliable Distributed Systems (SRDS), 2012 IEEE 31st Symposium on, pp. 448--453, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Garraghan, P. Townend and J. Xu, "Byzantine fault-tolerance in federated cloud computing," in Service Oriented System Engineering (SOSE), 2011 IEEE 6th International Symposium on, pp. 280--285, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Malik and F. Huet, "Adaptive fault tolerance in real time cloud computing," in Services (SERVICES), 2011 IEEE World Congress on, pp. 280--287, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. H. Abu-Libdeh, L. Princehouse and H. Weatherspoon, "RACS: a case for cloud storage diversity," in Proceedings of the 1st ACM symposium on Cloud computing, pp. 229--240, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Cachin, R. Haas and M. Vukolic, Dependable Storage in the Intercloud, 2010.Google ScholarGoogle Scholar
  30. G. Chockler, R. Guerraoui, I. Keidar and M. Vukolic, "Reliable distributed storage," Computer, pp. 60--67, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. E. Stefanov, M. van Dijk, A. Juels and A. Oprea, "Iris: A scalable cloud file system with efficient integrity checks," in Proceedings of the 28th Annual Computer Security Applications Conference, pp. 229--238, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. Z. Wilcox-O'Hearn and B. Warner, "Tahoe: the least-authority filesystem," in Proceedings of the 4th ACM international workshop on Storage security and survivability, pp. 21--26, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. R.A. Popa, J.R. Lorch, D. Molnar, H.J. Wang and L. Zhuang, "Enabling Security in Cloud Storage SLAs with CloudProof." in USENIX Annual Technical Conference, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. C. Băsescu, C. Cachin, I. Eyal, R. Haas, A. Sorniotti, M. Vukolić and I. Zachevsky, "Robust data sharing with key-value stores," in Dependable Systems and Networks (DSN), 2012 42nd Annual IEEE/IFIP International Conference on, pp. 1--12, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. G. Kecskemeti, A. Kertesz, A. Marosi and P. Kacsuk, "Interoperable resource management for establishing federated clouds," Achieving Federated and Self-Manageable Cloud Infrastructures: Theory and Practice, vol. 2, pp. 18--35, 2012.Google ScholarGoogle ScholarCross RefCross Ref
  36. K.D. Bowers, A. Juels and A. Oprea, "HAIL: a high-availability and integrity layer for cloud storage," in Proceedings of the 16th ACM conference on Computer and communications security, pp. 187--198, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Other conferences
    ICC '16: Proceedings of the International Conference on Internet of things and Cloud Computing
    March 2016
    535 pages
    ISBN:9781450340632
    DOI:10.1145/2896387

    Copyright © 2016 ACM

    © 2016 Association for Computing Machinery. ACM acknowledges that this contribution was authored or co-authored by an employee, contractor or affiliate of a national government. As such, the Government retains a nonexclusive, royalty-free right to publish or reproduce this article, or to allow others to do so, for Government purposes only.

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 22 March 2016

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • research-article
    • Research
    • Refereed limited

    Acceptance Rates

    Overall Acceptance Rate213of590submissions,36%

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader