Abstract
As more and more data are generated in an electronic format, the necessity of a data recovery service has increased, and the development of more efficient data backup and recovery technology has been an important issue during the past decade. While lots of effective backup and recovery technologies have been developed for enterprise level, little work has been done for convenient and inexpensive personal data recovery service, i.e., cloud storage service is still inadequate or expensive for backing up tera-scale HDDs. Furthermore, since privacy protection is a crucial issue for providing a personal data recovery service, a plain data backup-based recovery service is not adequate for public service. Users are reluctant to upload their data to internet backup servers until they can fully trust the service provider in terms of privacy protection. We propose a novel data recovery service framework on cloud infrastructure, a parity cloud service, which provides privacy-protected personal data recovery service while requiring a small storage space in the cloud. The proposed framework does not require any user data to be uploaded to the server, but only parity data are uploaded to the server for user data recovery. Also, the necessary server-side resources for providing the service are within a reasonable bound, depending on the data recoverability and recovery time.
Similar content being viewed by others
References
Armbrust, M., et al.: Above the clouds: a Berkeley view of cloud computing. http://www.eecs.berkeley.edu/ (2009)
Boru, D., Kliazovich, D., Granelli, F., Bouvry, P., Zomaya, A.Y.: Energy-efficient data replication in cloud computing datacenters. Cluster Comput. 18(1), 385–402 (2015)
Casey Newton: Dropbox slashes pricing and boosts storage as competition intensifies. http://www.theverge.com/2014/8/27/6072757/dropbox-slashes-pricing-and-boosts-storage-as-competition-intensifies/ (2014)
Chris Mills: Samsung’s 16TB SSD is now an actual thing people can buy. http://gizmodo.com/samsungs-16tb-ssd-is-now-an-actual-thing-people-can-buy-1762536707/ (2016)
Cloud Security Alliance: Security guidance for critical areas of focus in cloud computing (2011)
Dark Reading: Security is chief obstacle to cloud computing adoption, study says. http://www.darkreading.com (2009)
Elerath, J.G.: A simple equation for estimating reliability of an N+1 redundant array of independent disks (RAID). In: Proceedings of IEEE/IFIP International Conference on Dependable Systems and Networks, pp. 484–493 (2009)
Fitzi, M., Garay, J., Gollakota, S., Rangan, C.P., Srinathan, K.: Round-optimal and efficient verifiable secret sharing. In: Proceedings of Third Theory of Cryptography Conference, TCC ’2006 (2006)
Gentry, C.: Fully homomorphic encryption using ideal lattices. In: Proceedings of the 41st ACM Symposium on Theory of Computing (STOC) (2009)
Goldreich, O., Micali, S., Wigderson, A.: How to play ANY mental game. In: Proceedings of the Nineteenth Annual ACM Conference on Theory of Computing, pp. 218–219 (1987)
Google: Buy, change, or cancel storage plans (of google drive). https://support.google.com/drive/answer/2375123?hl=en/ (2016)
Greenan, K.M., Plank, J.S., Wylie, J.J.: Mean time to meaningless: MTTDL, Markov models, and storage system reliability. In: Proceedings of the 2nd USENIX HotStorage, Boston, MA (2010)
Hao, F., Lakshman, T., Mukherjee, S., Song, H.: Secure cloud computing with a virtualized network infrastructure. In: Proceedings of the 2nd USENIX Conference on Hot Topics in Cloud Computing (2010)
IETF: Extensible authentication protocol (EAP) key management framework, RFC 5247SKY. http://tools.ietf.org/html/rfc5247/ (2008)
Schwarz, J.E.T., Xin, Q., Miller, E.L., Long, D.D.: Disk scrubbing in large archival storage systems. In: Proceedings of IEEE International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunications Systems (2004)
Kari, H.H.: Latent sector faults and reliability of disk arrays. PhD thesis, Helsinki University of Technology (1997)
Kemeny, J.G., Snell, J.L.: Finite Markov chains, 2nd edn. Springer, New York (1976)
Microsoft: Skydrive. http://skydrive.live.com/ (2015)
Network World: Are security issues delaying adoption of cloud computing? http://www.networkworld.com (2009)
ownCloud: ownCloud—Your Cloud, Your Data, and Your Way! http://owncloud.org/ (2015)
Pearson, S.: Taking account of privacy when designing cloud computing services. In: Proceedings of the 2009 ICSE Workshop on Software Engineering Challenges of Cloud Computing (2009)
Quisquater, J.J., Guillou, L.C., Berson, T.A.: How to explain zero-knowledge protocols to your children. In: Proceedings of Advances in Cryptology—CRYPTO ’89, pp. 628–631 (1990)
Schroeder, B., Gibson, G.A.: Disk failures in the real world: what does an MTTF of 1,000,000 hours mean to you? In: Proceedings of the 5th USENIX Conference on File and Storage Technologies, San Jose, CA (2007)
Song, C., Park, S., Kim, D., Kang, S.: Parity cloud service: a privacy-protected personal data recovery service. In: Proceedings of the IEEE International Workshop on Trust, Security and Privacy in Internet of Things (2011)
Sparkleshare: Sparkleshare—self hosted, instant, secure file sync. http://sparkleshare.org/ (2015)
Wan, J., Zhang, J., Zhou, L., Wang, Y., Jiang, C., Ren, Y., Wang, J.: ORTHRUS: a lightweighted block-level cloud storage system. Cluster Comput. 16(4), 625–638 (2015)
Xin, Q., Miller, E.L., Thomas Schwarz, S., Long, D.D.E.: Reliability mechanisms for very large storage systems. In: Proceedings of the 20th IEEE MSST, San Diego, CA (2003)
Acknowledgements
This work was supported by the National Research Foundation of Korea (NRF) Grant funded by the Korea government (No. 2014R1A2A2A01004187).
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Jung, H., Park, Y., Song, CW. et al. PCS: a parity-based personal data recovery service in cloud. Cluster Comput 20, 2655–2668 (2017). https://doi.org/10.1007/s10586-017-0805-8
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10586-017-0805-8