Abstract
Data storage is one of the most profitable applications on cloud computing platforms. Although a transparent service model provides flexibility and convenience, it also brings new challenges with respect to data security. For example, the existing vulnerabilities in some commercial cloud storage services can potentially lead to repudiation problems. In part I of this two-part chapter, a basic TPNR protocol is introduced that addresses disputes between an individual user and a service provider. In this chapter, we introduce a framework that supports a fair data transmission procedure without the risk of disputes in environments where data sharing among multiple users is required. An advanced MPNR protocol is presented. Fairness is achieved with the help of a TTP. Both parties can get evidence at the end of a round. In addition, taking advantage of the Merkle hash tree, the MPNR protocol can prevent rollback attacks by limiting the data access priorities of individual users. The rationale behind the new protocol’s design and its working modes are analyzed in detail. We also discuss its robustness under typical malicious network attacks.
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Amazon Inc.: Amazon import/export developer guide version 1.2. http://aws.amazon.com/documentation (2009). Accessed Aug 2009
Microsoft Azure Services Platform: http://www.microsoft.com/azure/default.mspx (2009). Accessed 2009
Kamara, S., Lauter, K.: Cryptographic cloud storage. In: Sion, R., et al. (eds.) Financial Cryptography and Data Security. LNCS6054, pp. 136–149. Springer, Berlin/Heidelberg (2009)
Popa, R.A., Lorch, J., Molnar, D., et al.: Enabling security in cloud storage SLAs with CloudProof. Microsoft TechReport MSR-TR-2010–46. http://research.microsoft.com/apps/pubs/default.aspx?id=131137 (2010). Accessed May 2010
Bagga, W., Molva, R.: Collusion-free policy-based encryption. In: Katsikas, S., et al. (eds.) Information Security, LNCS 4176, pp. 233–245. Springer, Berlin/Heidelberg (2006)
Bairavasundaram, L.N., Goodson, G.R., Schroeder, B., Arpaci-Dusseau, A.C., Arpaci-Dusseau, R.H.: An analysis of data corruption in the storage stack. In: USENIX conference on File and Storage Technologies, pp. 223–238. USENIX Association, San Jose, CA (2008)
Yun, A., Shi, C., Kim, Y.: On protecting integrity and confidentiality of cryptographic file system for outsourced storage. In: Proceedings of the 2009 ACM Workshop on Cloud Computing Security (CCSW ′09), pp. 67–76. ACM, New York, NY (2009)
Zhou, J., Gollmann, D.: A fair non-repudiation protocol. In: Proceedings of 1996 IEEE Symposium on Security and Privacy, pp. 55–61. IEEE Computer Society, Oakland (1996)
Zhou, J., Gollmann, D.: An efficient non-repudiation protocol. In: Proceedings of the 10th Computer Security Foundations Workshop, pp. 126–132. IEEE Computer, Oakland (1996)
Feng, J., Chen, Y., Liu, P.: Bridging the missing link of cloud data storage security in AWS. In: The 7th IEEE Consumer Communications and Networking Conference Security for CE Communications (CCNC’10, Short Position Paper), IEEE Press, Las Vegas, Nevada (2010)
Feng, J., Chen, Y., Ku, W.S., Liu, P.: Analysis of integrity vulnerabilities and a non-repudiation protocol for cloud data storage platforms. In: The 2nd International Workshop on Security in Cloud Computing (SCC 2010), in Conjunction with ICPP 2010, IEEE Computer Society, San Diego, CA (2010)
Carbonell, M., Sierra, J.M., Lopez, J.: Secure multiparty payment with an intermediary entity. Comput. Secur 28(5), 289–300 (2009)
Li, S., Wang, G., Zhou, J., Chen, K.: Fair and secure mobile billing systems. Wirel. Pers. Commun. 51(1), 81–93 (2009)
Onieva, J., Lopez, J., Zhou, J.: Secure Multi-party Non-repudiation Protocols and Applications. Springer, Boston (2009)
Certicom Inc.: ECDSA fast verify. http://www.certicom.com/index.php/software-security-solutions (2005). Accessed 2005
Bella, G., Paulson, L.C.: Mechanical proofs about a non-repudiation protocol. In: TPHOL01, vol. 2152 of LNCS, pp. 91–104. Springer, Heidelberg (2001)
Bruso, M., Cortesi, A.: Non-repudiation analysis with LYSA with annotations. Comput. Lang. Syst. Struct. 36, 352–377 (2010)
Amazon Developer Forum: S3 data corruption? http://developer.amazonwebservices.com/connect/thread.jspa?threadID=22709 (2008). Accessed 2008
Menezes, A.J., van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1996)
Zhou, J., Gollmann, D.: Towards verification of non-repudiation protocols. In: Proceedings of International Refinement Workshop and Formal Methods Pacific, pp. 370–380. Springer, Canberra (1998)
Louridas, P.: Some guidelines for non-repudiation protocols. SIGCOMM Comput. Commun. Rev. 30(5), 29–38 (2000)
Kim, K., Park, S., Baek, J.: Improving fairness and privacy of Zhou-Gollmann’s fair non-repudiation protocol. In: Proceedings of 1999 ICPP Workshop on Security, pp. 140–145. IEEE Computer Society, Aizu, Japan (1999)
Markowitch, O., Kremer, S.: A multi-party optimistic non-repudiation protocol. In: Proceedings of 2000 International Conference on Information Security and Cryptology, pp. 109–122. Spinger, Seoul, Korea (2000)
Gurgens, S., Rudolph, C., Vogt, H.: On the security of fair non-repudiation protocols. Int. J. Inf. Secur. 4(4), 253–262 (2005)
Boyd, C., Kearney, P.: Exploring fair exchange protocols using specification animation, lecture notes in computer science 1975. In: Proceedings of 2000 Information Security Workshop, pp. 209–223. Springer, Wollongong, Australia (2000)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag London Limited
About this chapter
Cite this chapter
Feng, J., Chen, Y., Summerville, D.H., Hwang, K. (2011). Fair Non-repudiation Framework for Cloud Storage: Part II. In: Mahmood, Z., Hill, R. (eds) Cloud Computing for Enterprise Architectures. Computer Communications and Networks. Springer, London. https://doi.org/10.1007/978-1-4471-2236-4_15
Download citation
DOI: https://doi.org/10.1007/978-1-4471-2236-4_15
Published:
Publisher Name: Springer, London
Print ISBN: 978-1-4471-2235-7
Online ISBN: 978-1-4471-2236-4
eBook Packages: Computer ScienceComputer Science (R0)