Skip to main content

InterCloud RAIDer: A Do-It-Yourself Multi-cloud Private Data Backup System

  • Conference paper
Distributed Computing and Networking (ICDCN 2014)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 8314))

Included in the following conference series:

Abstract

In this paper, we introduce InterCloud RAIDer, which realizes a multi-cloud private data backup system by composing (i) a data deduplication technique to reduce the overall storage overhead, (ii) erasure coding to achieve redundancy at low overhead, which is dispersed across multiple cloud services to realize fault-tolerance against individual service providers, specifically we use non-systematic instances of erasure codes to provide a basic level of privacy from individual cloud stores, and finally, (iii) a proof of data possession mechanism to detect misbehaving services - where we optimize the implementation by exploiting hash digests that are created in the prior deduplication phase. Apart from the uniqueness and non-triviality of putting these modules together, the system design also had to deal with artefacts and heterogeneity across different cloud storage services we used, namely Dropbox, Google drive and SkyDrive.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Abu-Libdeh, H., Princehouse, L., Weatherspoon, H.: RACS: A Case for Cloud Storage Diversity. In: SOCC (2010)

    Google Scholar 

  2. Bessani, A., Correia, M., Quaresma, B., Andre, F., Sousa, P.: DEPSKY: Dependable and Secure Storage in a Cloud-of-Clouds. In: EuroSys 2011 (2011)

    Google Scholar 

  3. Sharma, R., Datta, A., Dell’Amico, M.: An empirical study of availability in friend-to-friend storage systems. In: P2P (2011)

    Google Scholar 

  4. Hewlett-Packard, “Understanding the HP Data Deduplication Strategy: Why One Size Doesn’t Fit Everyone” (2008), http://networkworld.com/documents/whitepaper/HPDataDeduper.pdf

  5. Muthitacharoen, A., Chen, B., Mazieres, D.: A Low-bandwidth Network File System. In: SOSP (2001)

    Google Scholar 

  6. Eshghi, K., Tang, H.K.: A Framework for Analyzing and Improving Content-Based Chunking Algorithms. HP Labs Tech. Rep. HPL-2005-30(R.1) (2005)

    Google Scholar 

  7. Manber, U.: Finding Similar Files in a Large File System. USENIX ATC (2004)

    Google Scholar 

  8. Forman, G., Eshghi, K., Chiocchetti, S.: Finding Similar Files in Large Document Repositories. In: KDD (2005)

    Google Scholar 

  9. Quilan, S., Dorward, S.: Venti: A New Approach to Archival Storage. In: FAST (2002)

    Google Scholar 

  10. Zhu, B., Li, K., Patterson, H.: Avoiding the Disk Bottleneck in the Data Domain Deduplication File System. In: FAST (2008)

    Google Scholar 

  11. Lilibridge, M., Eshghi, K., Bhagwat, D., Deolaikar, V., Trezise, G., Campbell, P.: Sparse Indexing: Large Scale, Inline Deduplication Using Sampling and Locality. In: FAST (2009)

    Google Scholar 

  12. Rivest, R.: The MD5 Message-Digest Algorithm. IETF, Request For Comments (RFC) 1321 (1992), http://tools.ietf.org/html/rfc1321

  13. National Institute of Standards and Technology, “Secure Hash Standard”, FIPS 180-1 (1995), http://www.itl.nist.gov/fipspubs/fip180-1.htm

  14. National Institute of Standards and Technology, “Secure Hash Standard”, FIPS 180-4 (2012), http://csrc.nist.gov/publications/fips/fips180-4/fips-180-4.pdf

  15. Bellare, M., Canetti, R., Krawczyk, H.: Keying Hash Functions for Message Authentication. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 1–15. Springer, Heidelberg (1996)

    Google Scholar 

  16. Ateniese, G., Pietro, R.D., Mancini, L.V., Tsudik, G.: Scalable and Efficient Provable Data Possession. In: SecureComm (2008)

    Google Scholar 

  17. Ateniese, G., Burns, R., Curtmola, R., Herring, J., Kissner, L., Song, D.: Provable Data Possession at Untrusted Stores. In: CCS (2007)

    Google Scholar 

  18. Juels, A., Kaliski, B.: PORs: Proofs of Retrievability for Large Files. In: CCS 2007 (2007)

    Google Scholar 

  19. Oggier, F., Datta, A.: Self-repairing Homomorphic Codes for Distributed Storage Systems. In: Infocom 2011 (2011)

    Google Scholar 

  20. http://techcrunch.com/2011/06/20/dropbox-security-bug-made-passwords-optional-for-four-hours/

  21. http://blogs.computerworld.com/carbonite_loses_7500_customers_files

  22. http://gigaom.com/2009/10/10/when-cloud-fails-t-mobile-microsoft-lose-sidekick-customer-data/

  23. http://www.pcworld.com/article/226128/Sony_Makes_it_Official_PlayStation_Network_Hacked.html

  24. http://news.cnet.com/8301-1009_3-57448465-83/linkedin-confirms-passwords-were-compromised/

  25. http://broadcast.oreilly.com/2011/04/the-aws-outage-the-clouds-shining-moment.html

  26. http://www.spacemonkey.com/

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Ling, C.W., Datta, A. (2014). InterCloud RAIDer: A Do-It-Yourself Multi-cloud Private Data Backup System. In: Chatterjee, M., Cao, Jn., Kothapalli, K., Rajsbaum, S. (eds) Distributed Computing and Networking. ICDCN 2014. Lecture Notes in Computer Science, vol 8314. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-45249-9_30

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-45249-9_30

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-45248-2

  • Online ISBN: 978-3-642-45249-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics