TerraCheck: Verification of Dedicated Cloud Storage

  • Zhan Wang
  • Kun Sun
  • Sushil Jajodia
  • Jiwu Jing
Conference paper

DOI: 10.1007/978-3-642-39256-6_8

Volume 7964 of the book series Lecture Notes in Computer Science (LNCS)
Cite this paper as:
Wang Z., Sun K., Jajodia S., Jing J. (2013) TerraCheck: Verification of Dedicated Cloud Storage. In: Wang L., Shafiq B. (eds) Data and Applications Security and Privacy XXVII. DBSec 2013. Lecture Notes in Computer Science, vol 7964. Springer, Berlin, Heidelberg

Abstract

When hardware resources are shared between mutually distrustful tenants in the cloud, it may cause information leakage and bring difficulties to regulatory control. To address these concerns, cloud providers are starting to offer hardware resources dedicated to a single user. Cloud users have to pay more for such dedicated tenancy; however, they may not be able to detect the unexpected misuse of their dedicated storage due to the abstraction layer of the cloud. In this paper, we propose TerraCheck to help cloud users verify if their dedicated storage devices have been misused to store other users’ data. TerraCheck detects the malicious occupation of the dedicated device by monitoring the change of the shadow data that are residual bits intentionally left on the disk and are invisible by the file system. When the cloud providers share the dedicated disk with other users, such misuses can be detected since the shadow data will be overwritten and become irretrievable. We describe the theoretical framework of TerraCheck and show experimentally that TerraCheck works well in practice.

Keywords

Dedicated Storage Cloud Security Verification 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© IFIP International Federation for Information Processing 2013

Authors and Affiliations

  • Zhan Wang
    • 1
    • 2
  • Kun Sun
    • 2
  • Sushil Jajodia
    • 2
  • Jiwu Jing
    • 1
  1. 1.State Key Laboratory of Information Security, Institute of Information EngineeringChinese Academy of SciencesBeijingChina
  2. 2.Center for Secure Information SystemsGeorge Mason UniversityFairfaxUSA