scholarly journals A Symmetric Key Based Deduplicatable Proof of Storage for Encrypted Data in Cloud Storage Environments

2018 ◽  
Vol 2018 ◽  
pp. 1-16 ◽  
Author(s):  
Cheolhee Park ◽  
Hyunil Kim ◽  
Dowon Hong ◽  
Changho Seo

Over the recent years, cloud storage services have become increasingly popular, where users can outsource data and access the outsourced data anywhere, anytime. Accordingly, the data in the cloud is growing explosively. Among the outsourced data, most of them are duplicated. Cloud storage service providers can save huge amounts of resources via client-side deduplication. On the other hand, for safe outsourcing, clients who use the cloud storage service desire data integrity and confidentiality of the outsourced data. However, ensuring confidentiality and integrity in the cloud storage environment can be difficult. Recently, in order to achieve integrity with deduplication, the notion of deduplicatable proof of storage has emerged, and various schemes have been proposed. However, previous schemes are still inefficient and insecure. In this paper, we propose a symmetric key based deduplicatable proof of storage scheme, which ensures confidentiality with dictionary attack resilience and supports integrity auditing based on symmetric key cryptography. In our proposal, we introduce a bit-level challenge in a deduplicatable proof of storage protocol to minimize data access. In addition, we prove the security of our proposal in the random oracle model with information theory. Implementation results show that our scheme has the best performance.

2017 ◽  
Vol 5 (4) ◽  
pp. 176-181
Author(s):  
Sadeer Dheyaa Abdulameer

Cloud Storage service are frequently required for many corporate and government organizations. Most of cloud storage service providers are un-trusted, so it is not safe to keep the data in cloud for long period. Many are using cloud storage for data sharing that means it is not possible to send a big file in email, maximum 25 GB are allowed, for big files, files are uploaded in cloud storage and link is given to the data consumer. After Data consumer download the file, Data owner has to delete the file from the cloud for the security reasons, but most of time Data Owner forget to delete the file. To overcome this problem data self-destruction is proposed in many papers and now proposed system has Self-Destruction cum Self-Backup Process, which help the file to stay in the public cloud for certain period of times and it will be removed from the cloud storage and securely stored in another storage.  To verify the integrity of the file HMAC is created while file is uploaded and Data Consumer can able to download the file and generate the HMAC, check the integrity of the file.


Author(s):  
Fangfang Shan ◽  
Hui Li ◽  
Fenghua Li ◽  
Yunchuan Guo ◽  
Jinbo Xiong

With the rapid development of cloud computing, it has been increasingly attractive for individuals and groups to store and share data via cloud storage. Once stored in the third-party cloud storage service providers, the privacy and integrity of outsourced data should be attached with more attention as a challenging task. This article presents the attribute-based assured deletion scheme (AADS) which aims to protect and assuredly delete outsourced data in cloud computing. It encrypts outsourced data files with standard cryptographic techniques to guarantee the privacy and integrity, and assuredly deletes data upon revocations of attributes. AADS could be applied to solve important security problems by supporting fine-grained attribute-based policies and their combinations. According to the comparison and analysis, AADS provides efficient data encryption and flexible attribute-based assured deletion for cloud-stored data with an acceptable concession in performance cost.


2020 ◽  
Vol 245 ◽  
pp. 04011
Author(s):  
Ofer Rind ◽  
Hironori Ito ◽  
Guangwei Che ◽  
Tim Chou ◽  
Robert Hancock ◽  
...  

Large scientific data centers have recently begun providing a number of different types of data storage in order to satisfy the various needs of their users. Users with interactive accounts, for example, might want a POSIX interface for easy access to the data from their interactive machines. Grid computing sites, on the other hand, likely need to provide an X509-based storage protocol, like SRM and GridFTP, since the data management system is built upon them. Meanwhile, an experiment producing large amounts of data typically demands a service that provides archival storage for the safe keeping of their unique data. To access these various types of data, users must use specific sets of commands tailored to their respective storage, making access to their data complex and difficult. BNLBox is an attempt to provide a unified and easy to use storage service for all BNL users, to store their important documents, code and data. It is a cloud storage system with an intuitive web interface for novice users. It provides an automated synchronization feature that enables users to upload data to their cloud storage without manual intervention, freeing them to focus on analysis rather than data management software. It provides a POSIX interface for local interactive users, which simplifies data access from batch jobs as well. At the same time, it also provides users with a straightforward mechanism for archiving large data sets for later processing. The storage space can be used for both code and data within the compute job environment. This paper will describe various aspects of the BNLBox storage service.


2017 ◽  
Vol 26 (05) ◽  
pp. 1750072 ◽  
Author(s):  
Min-Shiang Hwang ◽  
Tsuei-Hung Sun ◽  
Cheng-Chi Lee

Recently, storage as a service of cloud computing becomes a new trend to access or share files. Once files are stored in cloud, owner can access files seamlessly by personal computer or mobile device. However, owner may worry about confidentiality and integrity of owner's files stored in cloud because cloud service providers are not always trustworthy. Therefore, there are many kinds of data correctness verification methods proposed to prevent cloud service providers from cheating data owners. Among these models for auditing, bilinear pairing can achieve the most efficient way to verify data correctness and batch auditing. Although auditing methods can ensure whether data is stored properly, it is not considered that the data may be a secret data or a data owner does not want to be known by both auditors and cloud service providers. Another important issue is providing dynamic data of auditing in cloud. Wang et al.13 proposed a scheme that can provide public auditing and dynamic data, but it still cannot guarantee whether cloud has updated data honestly. For this reason, we propose a dynamic data guarantee and data confidentiality scheme for public auditing in cloud storage service.


Sign in / Sign up

Export Citation Format

Share Document