Data Reliability in Multi-provider Cloud Storage Service with RRNS

  • Massimo Villari
  • Antonio Celesti
  • Francesco Tusa
  • Antonio Puliafito
Part of the Communications in Computer and Information Science book series (CCIS, volume 393)


Nowadays, more and more Cloud storage providers are appearing on the market. Nevertheless, data availability and confidentiality represent critical issues considering Cloud computing. This paper discusses an approach that on one hand enables customers to use at the same time different Cloud storage providers, and that on the other hand guarantees both data redundancy and obfuscation. According to our approach, files are fragmented and stored in different Cloud storage providers by means of the Redundant Residue Number System (RRNS). Besides providing us data redundancy, RRNS allows us to preserve the data confidentiality by means of an obfuscation-base strategy spreading metadata over different cloud providers. In addition, our approach allows a customer to retrieve his/her files even if a cloud storage provider is not available anymore. Experiments highlight the factors that have to be considered to configure the system according to the customer’s requirements.


Cloud Computing Storage Big Data Reliability Confidentiality 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Celesti, A., Tusa, F., Villari, M., Puliafito, A.: How the dataweb can support cloud federation: Service representation and secure data exchange. In: Second Symposium on Network Cloud Computing and Applications (NCCA 2012), pp. 73–79 (2012)Google Scholar
  2. 2.
    Fazio, M., Celesti, A., Villari, M.: Design of a message-oriented middleware for cooperating clouds. In: Canal, C., Villari, M. (eds.) ESOCC 2013. CCIS, vol. 393, pp. 25–36. Springer, Heidelberg (2013)Google Scholar
  3. 3.
    Celesti, A., Tusa, F., Villari, M., Puliafito, A.: Integration of clever clouds with third party software systems through a rest web service interface. In: IEEE Symposium on Computers and Communications (ISCC 2012), pp. 827–832 (2012)Google Scholar
  4. 4.
    Celesti, A., Puliafito, A., Tusa, F., Villari, M.: Energy sustainability in cooperating clouds. In: Proceedings of the 3rd International Conference on Cloud Computing and Services Science (CLOSER 2013), pp. 83–89 (2013)Google Scholar
  5. 5.
    Celesti, A., Peditto, N., Verboso, F., Villari, M., Puliafito, A.: Draco paas: a distributed resilient adaptable cloud oriented platform. In: 27th IEEE International Parallel & Distributed Processing Symposium (IPDPS 2014), pp. 1490–1497 (2013)Google Scholar
  6. 6.
    Celesti, A., Fazio, M., Villari, M., Puliafito, A.: Virtual machine provisioning through satellite communications in federated cloud environments. Future Generation Computer Systems 28(1), 85–93 (2012)CrossRefGoogle Scholar
  7. 7.
    Mulfari, D., Celesti, A., Villari, M., Puliafito, A.: How cloud computing can support on-demand assistive services. In: International Cross-Disciplinary Conference on Web Accessibility (W4A 2013) (2013)Google Scholar
  8. 8.
    SME: Storage made easy (2013),
  9. 9.
    NSA-PRISM: surveillance program (2013),
  10. 10.
    NSA: Prism program taps in to user data of apple, google and others (June 2013),
  11. 11.
    Celesti, A., Tusa, F., Villari, M., Puliafito, A.: Se clever: A secure message oriented middleware for cloud federation. In: IEEE Symposium on Computers and Communications (ISCC 2013) (2013)Google Scholar
  12. 12.
    Vernik, G., Shulman-Peleg, A., Dippl, S., Formisano, C., Jaeger, M., Kolodner, E., Villari, M.: Data on-boarding in federated storage clouds. In: IEEE CLOUD 2013 IEEE 6th International Conference on Cloud Computing, Santa Clara Marriott, CA, USA, June 27-July 2. Center of Silicon Valley (2013)Google Scholar
  13. 13.
    Zhang, Y., Liu, W., Song, J.: A novel solution of distributed file storage for cloud service. In: 2012 IEEE 36th Annual Computer Software and Applications Conference Workshops (COMPSACW), pp. 26–31 (2012)Google Scholar
  14. 14.
    Nahar, P., Joshi, A., Saupp, A.: Data migration using active cloud engine. In: 2012 IEEE International Conference on Cloud Computing in Emerging Markets (CCEM), pp. 1–4 (2012)Google Scholar
  15. 15.
    Hai-Jia, W., Peng, L., Wei-wei, C.: The optimization theory of file partition in network storage environment. In: 2010 9th International Conference on Grid and Cooperative Computing (GCC), pp. 30–33 (2010)Google Scholar
  16. 16.
    Fan, K., Zhao, L., Shen, X., Li, H., Yang, Y.: Smart-blocking file storage method in cloud computing. In: 2012 1st IEEE International Conference on Communications in China (ICCC), pp. 57–62 (2012)Google Scholar
  17. 17.
    Zhang, N., Jing, J., Liu, P.: Cloud shredder: Removing the laptop on-road data disclosure threat in the cloud computing era. In: 2011 IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 1592–1599 (2011)Google Scholar
  18. 18.
    Shum, K., Hu, Y.: Functional-repair-by-transfer regenerating codes. In: 2012 IEEE International Symposium on Information Theory Proceedings (ISIT), pp. 1192–1196 (2012)Google Scholar
  19. 19.
    Srivastava, S., Gupta, V., Yadav, R., Kant, K.: Enhanced distributed storage on the cloud. In: 2012 Third International Conference on Computer and Communication Technology (ICCCT), pp. 321–325 (2012)Google Scholar
  20. 20.
    Szabo, N.S., Tanaka, R.I.: Residue Arithmetic and its Applications to Computer Technology. Mc Graw-Hill, New York (1967)zbMATHGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2013

Authors and Affiliations

  • Massimo Villari
    • 1
  • Antonio Celesti
    • 1
  • Francesco Tusa
    • 1
  • Antonio Puliafito
    • 1
  1. 1.DICIEMAUniversity of MessinaMessinaItaly

Personalised recommendations