Abstract

Cloud storage has gained increasing attention from the industry and research communities with concerns about data stored in cloud computing environments, despite its many advantages. The reasons come from economic viability to the latency along with behavioral changes that may affect the applications that use data stored remotely. Among those challenges, there is the problem of ensuring the integrity and retrievability of users' data in the cloud. Several schemas have been proposed: proof of data possession (PDP), proof of retrievability (PoR), and proof of ownership (PoW) that differ on the approach to guarantee the effective retrieval of data stored remotely. In this paper, a novel PoR protocol is proposed: hyper-scalability, availability, and integrity layer (Hy-SAIL), where a new PoR scheme adds higher availability to data stored and a flexible manner to perform integrity checks. It is demonstrated that Hy-SAIL leads to an efficient and scalable cryptographic system that meets near-optimal bounds in terms of communication and storage complexities. It is also proposed a new adversarial model that aggregates the main functionalities of a realistic adversary in cloud computing environments. Hy-SAIL operates on data that are not affected by any kind of incremental change or update, which is the characteristic of various file types stored in clouds, such as stored video and audio streams. When compared to other systems, such as HAIL, Hy-SAIL is more scalable and efficient. The results collected with an unoptimized implementation of Hy-SAIL point to a better perspective than other approaches.

Highlights

  • As technology aggregates and collaborates in global businesses, large enterprises have realized data center scalability is constrained by cost, subject to regulatory requirements and geographic limitations

  • Like in HAIL [1], the user computes and stores an amount of message authentication code of each file block and by some properties presented in homomorphic hash function, it will be possible to execute a reasonable amount of integrity checks

  • Hy-SAIL has an abstraction layer implemented through error correcting codes, ensuring availability against a realistic adversarial model and retrievability of files stored remotely even if a fraction is corrupted

Read more

Summary

INTRODUCTION

As technology aggregates and collaborates in global businesses, large enterprises have realized data center scalability is constrained by cost, subject to regulatory requirements and geographic limitations. The main attractive feature of cloud storage is possibly the dramatic reduction in the cost of storing information with the increase in reliability, elasticity, scalability for data stored remotely On this approach, even small companies will obtain large enterprise grade services inexpensively [2]. Like in HAIL [1], the user computes and stores an amount of message authentication code of each file block and by some properties presented in homomorphic hash function, it will be possible to execute a reasonable amount of integrity checks. Flexible PoR scheme: In order to execute integrity checks, Hy-SAIL has both approaches, bounded and unbounded models, with low communication complexity, compared to other approaches It focuses on the amounts of blocks not in storage providers and a complete verification on entire file in one single query, which improves on previous work. The attacker that tries to respond the challenges about MAC of given blocks has a negligible probability to be successful, in according to section VI

PREVIOUS RELATED WORK
BACKGROUND
POLYNOMIAL ALGEBRA AND GALOIS FIELD
PROBLEM DESCRIPTION
A PoR protocol in its elementary form has three distinct phases
BUILIDING A MAC FOR Hy-SAIL
PROOF OF SECURITY
INTEGRITY PROOF Theorem 1
CONCLUSION
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call