A Don’t Trust the Cloud, Verify: Integrity and Consistency for Cloud Object Stores
نویسندگان
چکیده
More and more data is outsourced to the cloud, and collaborating on a shared resource using cloud services has become easier than ever. Programmers work together on online source code repositories, global project teams produce technical deliverables, and friends share their photo albums. Nevertheless, the clients need to trust the cloud provider as they rely on it for the confidentiality and correctness of their data. Encryption may preserve the confidentiality of data but cannot prevent inadvertent or malicious data modifications. This work shows how to protect the integrity and consistency of data on an untrusted cloud storage service accessed by multiple clients. With a single client only, the client may locally keep a short cryptographic hash value of the outsourced data. Later, this can be used to verify the integrity of the data returned by the cloud storage service. However, with multiple disconnected clients, no common synchronization, and no communication among the clients, neither hashing
منابع مشابه
Formal Modelling of Resilient Data Storage in Cloud
Reliable and highly performant handling of large data stores constitutes one of the major challenges of cloud computing. In this paper, we propose a formalisation of a cloud solution implemented by F-Secure – a provider of secure data storage services. The solution is based on massive replication and the write-ahead logging mechanism. To achieve high performance, the company has abandoned a tra...
متن کاملBandwidth and Delay Optimization by Integrating of Software Trust Estimator with Multi-User Cloud Resource Competence
Trust Establishment is one of the significant resources to enhance the scalability and reliability of resources in the cloud environment. To establish a novel trust model on SaaS (Software as a Service) cloud resources and to optimize the resource utilization of multiple user requests, an integrated software trust estimator with multi-user resource competence (IST-MRC) optimization mechanism is...
متن کاملCloud Computing Technology Algorithms Capabilities in Managing and Processing Big Data in Business Organizations: MapReduce, Hadoop, Parallel Programming
The objective of this study is to verify the importance of the capabilities of cloud computing services in managing and analyzing big data in business organizations because the rapid development in the use of information technology in general and network technology in particular, has led to the trend of many organizations to make their applications available for use via electronic platforms hos...
متن کاملDistributed Provable Data Possession in Multi-Cloud Storage through Client Authentication
Identity-Based Provable data possession (PDP) is a technique for ensuring the integrity of data in storage outsourcing construction of an efficient scheme for distributed cloud storage to support the scalability of service and data migration, in which of multiple cloud service providers to cooperatively store and maintain the clients’ data. Cloud computing has become an important thing in compu...
متن کاملIdentity Based Distributed Provable Data Possession in Multi Cloud Storage
loud computing has become an important thing in computer field. Cloud computing takes information processing as a service, such as storage and computing. Data integrity is important thing in cloud storage. In certain situations, clients should store their data such as image or text in multi cloud. When the client stores his/her data on multi-cloud servers, the distributed storage and integrity ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2017