Abstract
Security issues related to cloud computing as well as all solutions proposed in the literature are one of the high topics for research. However, there are many unsolved problems regarded to cloud storage. In this paper, we focused on an adaptive model of data storage based on Secret Sharing Schemes (SSS) and Residue Number System (RNS). We proposed five strategies to minimize information loss and time to data upload and download into the cloud. We evaluate these strategies on seven Cloud Storage Providers (CSPs). We study a correlation of system settings with the probability of information loss, data redundancy, speed of access to CSPs, and encoding/decoding speeds We demonstrate that strategies that consider CSPs with the best upload access speeds and then, after storing, migrate to the CSPs with the least probability of information loss or best download speeds show better performance behavior.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Chen, D., Zhao, H.: Data security and privacy protection issues in cloud computing. In: 2012 International Conference on Computer Science and Electronics Engineering (ICCSEE), vol. 1, pp. 647–651. IEEE (2012). https://doi.org/10.1109/ICCSEE.2012.193
Krutz, R.L., Vines, R.D.: Cloud Security: A Comprehensive Guide to Secure Cloud Computing, 1st edn. Wiley, Hoboken (2010)
Gagnaire, M., et al.: Downtime statistics of current cloud solutions. International Working Group on Cloud Computing Resiliency, Technical report (2012)
IWGCR International Working Group on Cloud Computing Resiliency Homepage. http://iwgcr.org/. Accessed 1 Sept 2018
SecureList Homepage. https://securelist.com/all/?tag=53. Accessed 3 Nov 2018
CloudHarmony Homepage. https://cloudharmony.com/status-of-storage. Accessed 3 Nov 2018
Dimakis, A.G., Godfrey, P.B., Wu, Y., Wainwright, M.J., Ramchandran, K.: Network coding for distributed storage systems. IEEE Trans. Inf. Theory 56(9), 4539–4551 (2010). https://doi.org/10.1109/TIT.2010.2054295
Ateniese, G., Fu, K., Green, M., Hohenberger, S.: Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Trans. Inf. Syst. Secur. 9(1), 1–30 (2006). https://doi.org/10.1145/1127345.1127346
Buyya, R., Yeo, C.S., Venugopal, S., Broberg, J., Brandic, I.: Cloud computing and emerging IT platforms: vision, hype, and reality for delivering computing as the 5th utility. Future Gener. Comput. Syst. 25(6), 599–616 (2009). https://doi.org/10.1016/j.future.2008.12.001
Ghemawat, S., Gobioff, H., Leung, S.-T.: The Google file system. In: Proceedings of the Nineteenth ACM Symposium on Operating Systems Principles, pp. 29–43. ACM, New York (2003). https://doi.org/10.1145/1165389.945450
Ganesan, A., Alagappan, R., Arpaci-Dusseau, A.C., Arpaci-Dusseau, R.H.: Redundancy does not imply fault tolerance: analysis of distributed storage reactions to single errors and corruptions. In: Proceedings of the 15th Usenix Conference on File and Storage Technologies, pp. 149–165. USENIX Association, Berkeley (2017)
Bessani, A., Correia, M., Quaresma, B., André, F., Sousa, P.: DepSky: dependable and secure storage in a cloud-of-clouds. ACM Trans. Storage 9(4), 12 (2013). https://doi.org/10.1145/2535929
Abu-Libdeh, H., Princehouse, L., Weatherspoon, H.: RACS: a case for cloud storage diversity. In: Proceedings of the 1st ACM Symposium on Cloud computing, pp. 229–240. ACM (2010). https://doi.org/10.1145/1807128.1807165
Chervyakov, N., Babenko, M., Tchernykh, A., Kucherov, N., Miranda-López, V., Cortés-Mendoza, J.M.: AR-RRNS: configurable, scalable and reliable systems for Internet of Things to ensure security. Future Gener. Comput. Syst. 92, 1080–1092 (2019). https://doi.org/10.1016/j.future.2017.09.061
Marium, S., Nazir, Q., Shaikh, A.A., Ahthasham, S., Mehmood, M.A.: Implementation of EAP with RSA for enhancing the security of cloud computing. Int. J. Basic Appl. Sci. 1(3), 177–183 (2012)
Rathanam, G.J., Sumalatha, M.R.: Dynamic secure storage system in cloud services. In: 2014 International Conference on Recent Trends in Information Technology (ICRTIT), pp. 1–5. IEEE (2014). https://doi.org/10.1109/ICRTIT.2014.6996175
Babitha, M.P., Babu, K.R.R.: Secure cloud storage using AES encryption. In: International Conference on Automatic Control and Dynamic Optimization Techniques (ICACDOT), Pune, pp. 859–864 (2016)
Tchernykh, A., et al.: Performance evaluation of secret sharing schemes with data recovery in secured and reliable heterogeneous multi-cloud storage. Cluster Comput., 1–13 (2019). https://doi.org/10.1007/s10586-018-02896-9
Miranda-López, V., et al.: Experimental analysis of secret sharing schemes for cloud storage based on RNS. In: Mocskos, E., Nesmachnow, S. (eds.) CARLA 2017. CCIS, vol. 796, pp. 370–383. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-73353-1_26
Rivest, R., Adleman, L., Dertouzos, M.: On data banks and privacy homomorphisms. In: Foundations of Secure Computation, pp. 169–177. Academic Press (1978)
Gentry, C.: A fully homomorphic encryption scheme (2009)
Tchernykh, A., et al.: AC-RRNS: anti-collusion secured data sharing scheme for cloud storage. Int. J. Approx. Reason. 102, 60–73 (2018). https://doi.org/10.1016/j.ijar.2018.07.010
Celesti, A., Fazio, M., Villari, M., Puliafito, A.: Adding long-term availability, obfuscation, and encryption to multi-cloud storage systems. J. Netw. Comput. Appl. 59, 208–218 (2016). https://doi.org/10.1016/j.jnca.2014.09.021
Chang, C.H., Molahosseini, A.S., Zarandi, A.A.E., Tay, T.F.: Residue number systems: a new paradigm to datapath optimization for low-power and high-performance digital signal processing applications. IEEE Circ. Syst. Mag. 15, 26–44 (2015). https://doi.org/10.1109/MCAS.2015.2484118
Tchernykh, A., Schwiegelsohn, U., Talbi, E., Babenko, M.: Towards understanding uncertainty in cloud computing with risks of confidentiality, integrity, and availability. J. Comput. Sci. (2016). https://doi.org/10.1016/j.jocs.2016.11.011
Tchernykh, A., Schwiegelsohn, U., Alexandrov, V., Talbi, E.: Towards understanding uncertainty in cloud computing resource provisioning. Procedia Comput. Sci. 51, 1772–1781 (2015). https://doi.org/10.1016/j.procs.2015.05.387
Tchernykh, A., et al.: Towards mitigating uncertainty of data security breaches and collusion in cloud computing. In: Proceedings of UCC 2017, Lyon, France, pp. 137–141. IEEE Press (2017). https://doi.org/10.1109/DEXA.2017.44
Egnyte. https://www.egnyte.com/file-access/desktop-access.html. Accessed 15 Feb 2018
Drago, I., Mellia, M., Munafo, M.M., Sperotto, A., Sadre, R., Pras, A.: Inside dropbox: understanding personal cloud storage services. In: Proceedings of the 2012 Internet Measurement Conference, pp. 481–494. ACM (2012). https://doi.org/10.1145/2398776.2398827
OneDrive. https://onedrive.live.com/about/en-us/. Accessed 15 Feb 2018
GoogleDrive. https://www.google.com/intl/en_us/drive/. Accessed 15 Feb 2018
Box. https://www.box.com/home. Accessed 10 Jan 2018
ShareFile. https://www.citrix.com/products/sharefile/. Accessed 10 Jan 2018
SalesForce. https://www.salesforce.com/eu/products/what-is-salesforce/. Accessed 15 Feb 2018
Google Drive API. https://developers.google.com/api-client-library/java/apis/drive/v2
Dropbox API. https://www.dropbox.com/developers/documentation/java
Sharefile API. https://api.sharefile.com/rest/
OneDrive API. https://docs.microsoft.com/en-us/onedrive/developer/rest-api/
Egnyte API. https://developers.egnyte.com/docs/read/Home
Salesforce API. https://developer.salesforce.com/page/REST_API
Apache HttpClient. https://hc.apache.org
CloudHarmony. https://www.networkworld.com/article/3020235/cloud-computing/and-the-cloud-provider-with-the-best-uptime-in-2015-is.html
Acknowledgments
The work is partially supported by Russian Foundation for Basic Research (RFBR) 18-07-01224 and State task No. 2.6035.2017.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Lopez-Falcon, E.C., Miranda-López, V., Tchernykh, A., Babenko, M., Avetisyan, A. (2019). Bi-objective Analysis of an Adaptive Secure Data Storage in a Multi-cloud. In: Meneses, E., Castro, H., Barrios Hernández, C., Ramos-Pollan, R. (eds) High Performance Computing. CARLA 2018. Communications in Computer and Information Science, vol 979. Springer, Cham. https://doi.org/10.1007/978-3-030-16205-4_23
Download citation
DOI: https://doi.org/10.1007/978-3-030-16205-4_23
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-16204-7
Online ISBN: 978-3-030-16205-4
eBook Packages: Computer ScienceComputer Science (R0)