Advertisement

A Cloud Provider-Agnostic Secure Storage Protocol

  • Nikos Virvilis
  • Stelios Dritsas
  • Dimitris Gritzalis
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 6712)

Abstract

Over the last years Cloud Computing has been seen as an emerging technology, which has changed the way computing services are delivered. Cloud computing is not a new technology paradigm, but rather introduces a new way of delivering computing services and resources. On top of its potential value and the several advantages it offers, we can foresee a number of drawbacks of cloud computing, in terms of security and privacy issues. In specific, cloud computing raises the level of expertise needed to protect security and privacy of its stakeholders (i.e. organizations and end-users), mainly due to the fact that the massive concentration of computer resources and data could be a more attractive target to malicious users. In this paper, we present a cloud provider-agnostic model for outsourcing both static and dynamic data to third parties, while preserving their confidentiality and integrity. In addition to a detailed presentation of our model, we also depict an evaluation of it, in terms of its capabilities and weaknesses.

Keywords

Cloud Computing Security Storage Services Confidentiality Integrity 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    European Network and Information Security Agency (ENISA), Cloud Computing Security Risk Assessment, Technical Report (November 2009)Google Scholar
  2. 2.
    Stoner, M., Greenan, K., Miller, E., Voruganti, K.: POTSHARDS: Secure Long-Term Storage Without Encryption. In: Proc. of the USENIX Annual Technical Conference, USA, pp. 143–156 (2007)Google Scholar
  3. 3.
    Kamara, S., Lauter, K.: Cryptographic Cloud Storage. In: Proc. of the Financial Cryptography: Workshop on Real-Life Cryptographic Protocols and Standardization, Canary Islands, Spain (2010)Google Scholar
  4. 4.
    Wang, W., Li, Z., Owens, R., Bhargava, B.: Secure and Efficient Access to Outsourced Data. In: Proc. of the 2009 ACM Workshop on Cloud Computing Security, USA, pp. 55–66 (2009)Google Scholar
  5. 5.
    Yun, A., Shi, C., Kim, Y.: On Protecting Integrity and Confidentiality of Cryptographic File System for Outsourced Storage. In: Proc. of the 2009 ACM Workshop on Cloud Computing Security, USA, pp. 67–76 (2009)Google Scholar
  6. 6.
    Blaze, M.: A Cryptographic File System for Unix. In: Proc. of the 1st ACM Conference on Computer and Communications Security, USA, pp. 9–16 (1993)Google Scholar
  7. 7.
    Cattaneo, G., Catuogno, L., Sorbo, A., Persiano, P.: The Design and Implementation of a Transparent Cryptographic File System for Unix. In: Proc. of the USENIX Annual Technical Conference, USA, pp. 199–212 (2001)Google Scholar
  8. 8.
    EncFS Encrypted Filesystem, http://www.arg0.net/encfs
  9. 9.
    Ateniese, G., Burns, R., Curtmola, R., Herring, J., Kissner, L., Peterson, Z., Song, D.: Provable Data Possession at Untrusted Stores. In: Proc. of the 14th ACM Conference on Computer and Communications Security, USA, pp. 598–609 (2007)Google Scholar
  10. 10.
    Ateniese, G., Di Pietro, R., Mancini, V., Tsudik, G.: Scalable and efficient provable data possession. In: Proc. of the 4th International Conference on Security and Privacy in Communication Networks, Turkey (2008)Google Scholar
  11. 11.
    Juels, A., Kaliski, B.: Pors: Proofs of Retrievability for Large Files. In: Proc. of the 14th ACM Conference on Computer and Communications Security, USA, pp. 584–597 (2007)Google Scholar
  12. 12.
    Bowers, K., Juels, A., Oprea, A.: Proofs of Retrievability: Theory and implementation. In: Proc. of the 2009 ACM Workshop on Cloud Computing Security, USA, pp. 43–54 (2009)Google Scholar
  13. 13.
    Wang, Q., Wang, C., Ren, K., Lou, W.: Ensuring Data Storage Security in Cloud Computing. In: 17th IEEE International Workshop on Quality of Service (IWQoS 2009), USA (2009)Google Scholar
  14. 14.
    Erway, C., Kupcu, A., Papamanthou, C., Tamassia, R.: Dynamic Provable Data Possession. In: Proc. of the 16th ACM Conference on Computer and Communications Security, USA, pp. 213–222 (2009)Google Scholar
  15. 15.
    Wang, Q., Wang, C., Li, J., Ren, K., Lou, W.: Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing. In: Backes, M., Ning, P. (eds.) ESORICS 2009. LNCS, vol. 5789, pp. 355–370. Springer, Heidelberg (2009)CrossRefGoogle Scholar
  16. 16.
    Golle, P., Jarecki, S., Mironov, I.: Cryptographic Primitives Enforcing Communication and Storage Complexity. In: Proc. of the 6th International Conference on Financial Cryptography, Bermuda, pp. 120–135 (2002)Google Scholar
  17. 17.
    Shamir, A.: How to share a secret. Com. of the ACM, 612–613 (November 1979)Google Scholar
  18. 18.
    Wei, M., Chandran, A., Chang, H., Chang, J., Nichols, C.: Comprehensive Analysis of Smart Phone OS Capabilities and Performance. University of Southern California (2009)Google Scholar
  19. 19.
    Schneier, B., Kelsey, J., Whiting, D., Wagner, D., Hall, C., Ferguson, N.: Performance Comparison of the AES Submissions. In: Proc. Second AES Candidate Conference, NIST, pp. 15–34 (March 1999)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2011

Authors and Affiliations

  • Nikos Virvilis
    • 1
  • Stelios Dritsas
    • 1
  • Dimitris Gritzalis
    • 1
  1. 1.Information Security and Critical Infrastructure Protection Research Group, Dept. of InformaticsAthens University of Economics & Business (AUEB)AthensGreece

Personalised recommendations